Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
VPXX0UiRJ3.elf

Overview

General Information

Sample name:VPXX0UiRJ3.elf
renamed because original name is a hash value
Original sample name:61682f3d6f8a60b2526fbf2e331a44fa.elf
Analysis ID:1428685
MD5:61682f3d6f8a60b2526fbf2e331a44fa
SHA1:287d1364326ea46270e2b46bd3c7c5e04f028ce0
SHA256:7a74f548ee440de4c1d35b891fc609a84f5acf5e8b6841a1001b463c4dc46532
Tags:32elfintelmirai
Infos:

Detection

Mirai, Moobot, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Mirai
Yara detected Moobot
Yara detected Okiru
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
Reads system version information
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1428685
Start date and time:2024-04-19 11:50:21 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 21s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:VPXX0UiRJ3.elf
renamed because original name is a hash value
Original Sample Name:61682f3d6f8a60b2526fbf2e331a44fa.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@21/0
Command:/tmp/VPXX0UiRJ3.elf
PID:5694
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • systemd New Fork (PID: 5736, Parent: 1)
  • snap-failure (PID: 5736, Parent: 1, MD5: 69136a7d575731ce62349f2e4d3e5c36) Arguments: /usr/lib/snapd/snap-failure snapd
    • systemctl (PID: 5754, Parent: 5736, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl stop snapd.socket
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
VPXX0UiRJ3.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    VPXX0UiRJ3.elfJoeSecurity_MoobotYara detected MoobotJoe Security
      VPXX0UiRJ3.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
        VPXX0UiRJ3.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0x11068:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1107c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x11090:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x110a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x110b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x110cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x110e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x110f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x11108:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1111c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x11130:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x11144:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x11158:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1116c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x11180:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x11194:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x111a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x111bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x111d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x111e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x111f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        VPXX0UiRJ3.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
        • 0x46b0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
        Click to see the 6 entries
        SourceRuleDescriptionAuthorStrings
        5694.1.0000000008048000.000000000805b000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
          5694.1.0000000008048000.000000000805b000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
            5694.1.0000000008048000.000000000805b000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
              5694.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
              • 0x11068:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1107c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x11090:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x110a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x110b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x110cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x110e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x110f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x11108:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1111c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x11130:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x11144:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x11158:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1116c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x11180:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x11194:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x111a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x111bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x111d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x111e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x111f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              5694.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
              • 0x46b0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
              Click to see the 10 entries
              Timestamp:04/19/24-11:51:57.752627
              SID:2030490
              Source Port:41448
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:52:29.887131
              SID:2030490
              Source Port:41458
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:53:39.319465
              SID:2030490
              Source Port:41478
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:52:21.049647
              SID:2030490
              Source Port:41456
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:53:05.074079
              SID:2030490
              Source Port:41468
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:53:28.456780
              SID:2030490
              Source Port:41476
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:52:58.253118
              SID:2030490
              Source Port:41466
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:52:17.231819
              SID:2030490
              Source Port:41454
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:53:43.185008
              SID:2030490
              Source Port:41480
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:53:55.746040
              SID:2030490
              Source Port:41486
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:54:01.586434
              SID:2030490
              Source Port:41488
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:53:18.772726
              SID:2030490
              Source Port:41472
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:52:43.592802
              SID:2030490
              Source Port:41462
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:52:05.546930
              SID:2030490
              Source Port:41450
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:52:14.379856
              SID:2030490
              Source Port:41452
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:53:45.052765
              SID:2030490
              Source Port:41482
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:53:51.901617
              SID:2030490
              Source Port:41484
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:53:15.915257
              SID:2030490
              Source Port:41470
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:53:22.622454
              SID:2030490
              Source Port:41474
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:52:38.746003
              SID:2030490
              Source Port:41460
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:04/19/24-11:52:54.418714
              SID:2030490
              Source Port:41464
              Destination Port:29989
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: VPXX0UiRJ3.elfAvira: detected
              Source: VPXX0UiRJ3.elfReversingLabs: Detection: 63%
              Source: VPXX0UiRJ3.elfVirustotal: Detection: 39%Perma Link
              Source: VPXX0UiRJ3.elfJoe Sandbox ML: detected
              Source: VPXX0UiRJ3.elfString: HTTP/1.1 200 OKbulus.armbulus.arm5bulus.arm6bulus.arm7bulus.mipsbulus.mpslbulus.x86_64bulus.sh4abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZanko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-server/proc/%d/exe/tmp/%s%s%c/proc/self/cmdline/proc/%d/proc/self/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofia/var/Bulusshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/3f

              Networking

              barindex
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41448 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41450 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41452 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41454 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41456 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41458 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41460 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41462 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41464 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41466 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41468 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41470 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41472 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41474 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41476 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41478 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41480 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41482 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41484 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41486 -> 103.174.73.85:29989
              Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:41488 -> 103.174.73.85:29989
              Source: global trafficTCP traffic: 192.168.2.13:41448 -> 103.174.73.85:29989
              Source: unknownDNS traffic detected: queries for: proxy.heleh.vn

              System Summary

              barindex
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: Process Memory Space: VPXX0UiRJ3.elf PID: 5694, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Initial sampleString containing 'busybox' found: /bin/busybox
              Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKbulus.armbulus.arm5bulus.arm6bulus.arm7bulus.mipsbulus.mpslbulus.x86_64bulus.sh4abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZanko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-server/proc/%d/exe/tmp/%s%s%c/proc/self/cmdline/proc/%d/proc/self/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofia/var/Bulusshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/3f
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: VPXX0UiRJ3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: Process Memory Space: VPXX0UiRJ3.elf PID: 5694, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.linELF@0/0@21/0
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/230/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/231/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/232/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/233/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/234/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/236/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/237/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/238/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/239/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/914/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/3636/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/19/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/240/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/3095/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/241/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/242/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/244/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/245/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/246/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/5/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/247/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/248/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/7/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/249/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/129/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/8/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/1906/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/802/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/3420/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/1482/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/1480/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/371/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/131/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/252/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/253/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/254/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/1238/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/134/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/255/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/256/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/257/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/378/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/3413/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/1475/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/936/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/816/cmdlineJump to behavior
              Source: /tmp/VPXX0UiRJ3.elf (PID: 5696)File opened: /proc/3659/cmdlineJump to behavior
              Source: /usr/lib/snapd/snap-failure (PID: 5754)Systemctl executable: /usr/bin/systemctl -> systemctl stop snapd.socketJump to behavior
              Source: /usr/lib/snapd/snap-failure (PID: 5736)Reads version info: /proc/versionJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: VPXX0UiRJ3.elf, type: SAMPLE
              Source: Yara matchFile source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: VPXX0UiRJ3.elf PID: 5694, type: MEMORYSTR
              Source: Yara matchFile source: VPXX0UiRJ3.elf, type: SAMPLE
              Source: Yara matchFile source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: VPXX0UiRJ3.elf PID: 5694, type: MEMORYSTR
              Source: Yara matchFile source: VPXX0UiRJ3.elf, type: SAMPLE
              Source: Yara matchFile source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: VPXX0UiRJ3.elf PID: 5694, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: Yara matchFile source: VPXX0UiRJ3.elf, type: SAMPLE
              Source: Yara matchFile source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: VPXX0UiRJ3.elf PID: 5694, type: MEMORYSTR
              Source: Yara matchFile source: VPXX0UiRJ3.elf, type: SAMPLE
              Source: Yara matchFile source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: VPXX0UiRJ3.elf PID: 5694, type: MEMORYSTR
              Source: Yara matchFile source: VPXX0UiRJ3.elf, type: SAMPLE
              Source: Yara matchFile source: 5694.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: VPXX0UiRJ3.elf PID: 5694, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              Valid AccountsWindows Management Instrumentation1
              Systemd Service
              1
              Systemd Service
              Direct Volume Access1
              OS Credential Dumping
              1
              System Information Discovery
              Remote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              Scripting
              Boot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1428685 Sample: VPXX0UiRJ3.elf Startdate: 19/04/2024 Architecture: LINUX Score: 100 20 proxy.heleh.vn 103.174.73.85, 29989, 41448, 41450 AARNET-AS-APAustralianAcademicandResearchNetworkAARNe unknown 2->20 22 Snort IDS alert for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 6 other signatures 2->28 8 systemd snap-failure 2->8         started        10 VPXX0UiRJ3.elf 2->10         started        signatures3 process4 process5 12 snap-failure systemctl 8->12         started        14 snap-failure 8->14         started        16 VPXX0UiRJ3.elf 10->16         started        process6 18 VPXX0UiRJ3.elf 16->18         started       
              SourceDetectionScannerLabelLink
              VPXX0UiRJ3.elf63%ReversingLabsLinux.Trojan.Mirai
              VPXX0UiRJ3.elf40%VirustotalBrowse
              VPXX0UiRJ3.elf100%AviraEXP/ELF.Mirai.Z.A
              VPXX0UiRJ3.elf100%Joe Sandbox ML
              No Antivirus matches
              SourceDetectionScannerLabelLink
              proxy.heleh.vn3%VirustotalBrowse
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              proxy.heleh.vn
              103.174.73.85
              truetrueunknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              103.174.73.85
              proxy.heleh.vnunknown
              7575AARNET-AS-APAustralianAcademicandResearchNetworkAARNetrue
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              103.174.73.85qlgIEbAy2D.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                vxYiJd3ok8.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                  qbmHR5ZIJL.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                    qIEANK2huJ.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                      evYVOXt11H.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                        BxEMaAYhqP.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                          9PYUxFx9pK.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                            bulus.arm7.elfGet hashmaliciousMiraiBrowse
                              bulus.arm5.elfGet hashmaliciousMiraiBrowse
                                bulus.arm.elfGet hashmaliciousMiraiBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  proxy.heleh.vnqlgIEbAy2D.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  vxYiJd3ok8.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  qbmHR5ZIJL.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  qIEANK2huJ.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  evYVOXt11H.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  BxEMaAYhqP.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  9PYUxFx9pK.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  AARNET-AS-APAustralianAcademicandResearchNetworkAARNeqlgIEbAy2D.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  vxYiJd3ok8.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  qbmHR5ZIJL.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  qIEANK2huJ.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  evYVOXt11H.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  BxEMaAYhqP.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  9PYUxFx9pK.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                  • 103.174.73.85
                                  BzmhHwFpCV.elfGet hashmaliciousMiraiBrowse
                                  • 103.189.218.40
                                  Gq7FlDf6cE.elfGet hashmaliciousMiraiBrowse
                                  • 103.183.144.21
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                  Entropy (8bit):5.774774322276727
                                  TrID:
                                  • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                  • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                  File name:VPXX0UiRJ3.elf
                                  File size:96'264 bytes
                                  MD5:61682f3d6f8a60b2526fbf2e331a44fa
                                  SHA1:287d1364326ea46270e2b46bd3c7c5e04f028ce0
                                  SHA256:7a74f548ee440de4c1d35b891fc609a84f5acf5e8b6841a1001b463c4dc46532
                                  SHA512:275e285d7307cca4a2a8f53db5b4abebccadd7e8f06ff55b71707db195bd103ffc0a3a1dccd0db6b088072152013dc7584a7307018f1c9fa6af0574b08cd5077
                                  SSDEEP:1536:ycIcWeUddgRSfOtWektXFC7rpHQj9In/klDw+uckqr2XPGRw7SPRDmxW:XBoddgRSmtVWXsPpHa9InYvjkXXe2WUx
                                  TLSH:C4936DC4F283D4FAE85705B12137AB365F33E0B56119EE42D3789E32AC92512DA17B9C
                                  File Content Preview:.ELF....................d...4...xv......4. ...(......................................................G..8...........Q.td............................U..S......./>...h....C...[]...$.............U......=@....t..5...................u........t....h............

                                  ELF header

                                  Class:ELF32
                                  Data:2's complement, little endian
                                  Version:1 (current)
                                  Machine:Intel 80386
                                  Version Number:0x1
                                  Type:EXEC (Executable file)
                                  OS/ABI:UNIX - System V
                                  ABI Version:0
                                  Entry Point Address:0x8048164
                                  Flags:0x0
                                  ELF Header Size:52
                                  Program Header Offset:52
                                  Program Header Size:32
                                  Number of Program Headers:3
                                  Section Header Offset:95864
                                  Section Header Size:40
                                  Number of Section Headers:10
                                  Header String Table Index:9
                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                  NULL0x00x00x00x00x0000
                                  .initPROGBITS0x80480940x940x1c0x00x6AX001
                                  .textPROGBITS0x80480b00xb00x10a660x00x6AX0016
                                  .finiPROGBITS0x8058b160x10b160x170x00x6AX001
                                  .rodataPROGBITS0x8058b400x10b400x23700x00x2A0032
                                  .ctorsPROGBITS0x805beb40x12eb40xc0x00x3WA004
                                  .dtorsPROGBITS0x805bec00x12ec00x80x00x3WA004
                                  .dataPROGBITS0x805bee00x12ee00x47580x00x3WA0032
                                  .bssNOBITS0x80606400x176380x49ac0x00x3WA0032
                                  .shstrtabSTRTAB0x00x176380x3e0x00x0001
                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                  LOAD0x00x80480000x80480000x12eb00x12eb06.57890x5R E0x1000.init .text .fini .rodata
                                  LOAD0x12eb40x805beb40x805beb40x47840x91380.35950x6RW 0x1000.ctors .dtors .data .bss
                                  GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  04/19/24-11:51:57.752627TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4144829989192.168.2.13103.174.73.85
                                  04/19/24-11:52:29.887131TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4145829989192.168.2.13103.174.73.85
                                  04/19/24-11:53:39.319465TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4147829989192.168.2.13103.174.73.85
                                  04/19/24-11:52:21.049647TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4145629989192.168.2.13103.174.73.85
                                  04/19/24-11:53:05.074079TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4146829989192.168.2.13103.174.73.85
                                  04/19/24-11:53:28.456780TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4147629989192.168.2.13103.174.73.85
                                  04/19/24-11:52:58.253118TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4146629989192.168.2.13103.174.73.85
                                  04/19/24-11:52:17.231819TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4145429989192.168.2.13103.174.73.85
                                  04/19/24-11:53:43.185008TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4148029989192.168.2.13103.174.73.85
                                  04/19/24-11:53:55.746040TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4148629989192.168.2.13103.174.73.85
                                  04/19/24-11:54:01.586434TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4148829989192.168.2.13103.174.73.85
                                  04/19/24-11:53:18.772726TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4147229989192.168.2.13103.174.73.85
                                  04/19/24-11:52:43.592802TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4146229989192.168.2.13103.174.73.85
                                  04/19/24-11:52:05.546930TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4145029989192.168.2.13103.174.73.85
                                  04/19/24-11:52:14.379856TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4145229989192.168.2.13103.174.73.85
                                  04/19/24-11:53:45.052765TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4148229989192.168.2.13103.174.73.85
                                  04/19/24-11:53:51.901617TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4148429989192.168.2.13103.174.73.85
                                  04/19/24-11:53:15.915257TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4147029989192.168.2.13103.174.73.85
                                  04/19/24-11:53:22.622454TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4147429989192.168.2.13103.174.73.85
                                  04/19/24-11:52:38.746003TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4146029989192.168.2.13103.174.73.85
                                  04/19/24-11:52:54.418714TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)4146429989192.168.2.13103.174.73.85
                                  TimestampSource PortDest PortSource IPDest IP
                                  Apr 19, 2024 11:51:57.409117937 CEST4144829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:51:57.752494097 CEST2998941448103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:51:57.752572060 CEST4144829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:51:57.752626896 CEST4144829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:51:58.095606089 CEST2998941448103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:51:58.095662117 CEST2998941448103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:51:58.095746040 CEST4144829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:51:58.438581944 CEST2998941448103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:05.200895071 CEST4145029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:05.546761036 CEST2998941450103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:05.546844959 CEST4145029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:05.546930075 CEST4145029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:05.896409035 CEST2998941450103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:05.896447897 CEST2998941450103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:05.896547079 CEST4145029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:06.242222071 CEST2998941450103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:14.002401114 CEST4145229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:14.379697084 CEST2998941452103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:14.379854918 CEST4145229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:14.379856110 CEST4145229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:14.758086920 CEST2998941452103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:14.758153915 CEST2998941452103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:14.758400917 CEST4145229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:15.136200905 CEST2998941452103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:16.864129066 CEST4145429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:17.224184036 CEST2998941454103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:17.224520922 CEST4145429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:17.231818914 CEST4145429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:17.588233948 CEST2998941454103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:17.588553905 CEST4145429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:17.594574928 CEST2998941454103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:17.949639082 CEST2998941454103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:20.694150925 CEST4145629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:21.049464941 CEST2998941456103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:21.049591064 CEST4145629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:21.049647093 CEST4145629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:21.404793978 CEST2998941456103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:21.404856920 CEST2998941456103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:21.405132055 CEST4145629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:21.759638071 CEST2998941456103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:29.511044979 CEST4145829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:29.886719942 CEST2998941458103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:29.887041092 CEST4145829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:29.887130976 CEST4145829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:30.262594938 CEST2998941458103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:30.262664080 CEST2998941458103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:30.262969017 CEST4145829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:30.637692928 CEST2998941458103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:38.368926048 CEST4146029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:38.745789051 CEST2998941460103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:38.746002913 CEST4146029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:38.746002913 CEST4146029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:39.123341084 CEST2998941460103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:39.123389959 CEST2998941460103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:39.123506069 CEST4146029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:39.502147913 CEST2998941460103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:43.231952906 CEST4146229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:43.592407942 CEST2998941462103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:43.592528105 CEST4146229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:43.592802048 CEST4146229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:43.952783108 CEST2998941462103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:43.952815056 CEST2998941462103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:43.953161001 CEST4146229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:44.313323975 CEST2998941462103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:54.059086084 CEST4146429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:54.418385029 CEST2998941464103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:54.418714046 CEST4146429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:54.418714046 CEST4146429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:54.779195070 CEST2998941464103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:54.779522896 CEST2998941464103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:54.779828072 CEST4146429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:54.779829025 CEST4146429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:55.727849960 CEST4146429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:56.087019920 CEST2998941464103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:56.885535955 CEST4146629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:57.903693914 CEST4146629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:58.252875090 CEST2998941466103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:58.253025055 CEST4146629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:58.253118038 CEST4146629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:58.256444931 CEST2998941466103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:58.256506920 CEST4146629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:58.604712963 CEST2998941466103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:58.605520010 CEST2998941466103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:52:58.605624914 CEST4146629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:52:58.957537889 CEST2998941466103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:04.711443901 CEST4146829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:05.073844910 CEST2998941468103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:05.073980093 CEST4146829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:05.074079037 CEST4146829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:05.437036991 CEST2998941468103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:05.437110901 CEST2998941468103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:05.437350988 CEST4146829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:05.799948931 CEST2998941468103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:15.543370962 CEST4147029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:15.914928913 CEST2998941470103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:15.915198088 CEST4147029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:15.915256977 CEST4147029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:16.287090063 CEST2998941470103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:16.287163973 CEST2998941470103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:16.287331104 CEST4147029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:16.658687115 CEST2998941470103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:18.393042088 CEST4147229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:18.772507906 CEST2998941472103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:18.772644043 CEST4147229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:18.772726059 CEST4147229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:19.154978991 CEST2998941472103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:19.155045033 CEST2998941472103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:19.155145884 CEST4147229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:19.534720898 CEST2998941472103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:22.261451960 CEST4147429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:22.622077942 CEST2998941474103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:22.622194052 CEST4147429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:22.622453928 CEST4147429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:22.982198954 CEST2998941474103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:22.982265949 CEST2998941474103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:22.982413054 CEST4147429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:23.342406988 CEST2998941474103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:28.088437080 CEST4147629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:28.456352949 CEST2998941476103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:28.456779957 CEST4147629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:28.456779957 CEST4147629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:28.830758095 CEST2998941476103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:28.830823898 CEST2998941476103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:28.831285954 CEST4147629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:29.199434996 CEST2998941476103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:38.937499046 CEST4147829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:39.319106102 CEST2998941478103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:39.319379091 CEST4147829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:39.319464922 CEST4147829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:39.701004028 CEST2998941478103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:39.701069117 CEST2998941478103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:39.701539040 CEST4147829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:40.082233906 CEST2998941478103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:42.807197094 CEST4148029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:43.184830904 CEST2998941480103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:43.185007095 CEST4148029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:43.185008049 CEST4148029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:43.562042952 CEST2998941480103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:43.562091112 CEST2998941480103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:43.562220097 CEST4148029989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:43.939191103 CEST2998941480103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:44.668030977 CEST4148229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:45.052536964 CEST2998941482103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:45.052697897 CEST4148229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:45.052764893 CEST4148229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:45.437228918 CEST2998941482103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:45.437295914 CEST2998941482103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:45.437417984 CEST4148229989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:45.822196960 CEST2998941482103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:51.543143988 CEST4148429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:51.901340008 CEST2998941484103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:51.901617050 CEST4148429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:51.901617050 CEST4148429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:52.260165930 CEST2998941484103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:52.260232925 CEST2998941484103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:52.260488033 CEST4148429989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:52.618278027 CEST2998941484103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:55.366807938 CEST4148629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:55.745860100 CEST2998941486103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:55.746004105 CEST4148629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:55.746040106 CEST4148629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:56.125947952 CEST2998941486103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:56.126014948 CEST2998941486103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:53:56.126110077 CEST4148629989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:53:56.506257057 CEST2998941486103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:54:01.231862068 CEST4148829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:54:01.586193085 CEST2998941488103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:54:01.586352110 CEST4148829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:54:01.586433887 CEST4148829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:54:01.941014051 CEST2998941488103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:54:01.941080093 CEST2998941488103.174.73.85192.168.2.13
                                  Apr 19, 2024 11:54:01.941344023 CEST4148829989192.168.2.13103.174.73.85
                                  Apr 19, 2024 11:54:02.295775890 CEST2998941488103.174.73.85192.168.2.13
                                  TimestampSource PortDest PortSource IPDest IP
                                  Apr 19, 2024 11:51:57.303970098 CEST4040153192.168.2.138.8.8.8
                                  Apr 19, 2024 11:51:57.409006119 CEST53404018.8.8.8192.168.2.13
                                  Apr 19, 2024 11:52:05.095886946 CEST5565453192.168.2.138.8.8.8
                                  Apr 19, 2024 11:52:05.200767994 CEST53556548.8.8.8192.168.2.13
                                  Apr 19, 2024 11:52:13.896723032 CEST4613853192.168.2.138.8.8.8
                                  Apr 19, 2024 11:52:14.002194881 CEST53461388.8.8.8192.168.2.13
                                  Apr 19, 2024 11:52:16.758503914 CEST4126153192.168.2.138.8.8.8
                                  Apr 19, 2024 11:52:16.863859892 CEST53412618.8.8.8192.168.2.13
                                  Apr 19, 2024 11:52:20.588572979 CEST5058653192.168.2.138.8.8.8
                                  Apr 19, 2024 11:52:20.693954945 CEST53505868.8.8.8192.168.2.13
                                  Apr 19, 2024 11:52:29.405200005 CEST5415953192.168.2.138.8.8.8
                                  Apr 19, 2024 11:52:29.510700941 CEST53541598.8.8.8192.168.2.13
                                  Apr 19, 2024 11:52:38.263052940 CEST5312453192.168.2.138.8.8.8
                                  Apr 19, 2024 11:52:38.368767023 CEST53531248.8.8.8192.168.2.13
                                  Apr 19, 2024 11:52:43.123727083 CEST4718453192.168.2.138.8.8.8
                                  Apr 19, 2024 11:52:43.231724977 CEST53471848.8.8.8192.168.2.13
                                  Apr 19, 2024 11:52:53.953402042 CEST5721453192.168.2.138.8.8.8
                                  Apr 19, 2024 11:52:54.058871031 CEST53572148.8.8.8192.168.2.13
                                  Apr 19, 2024 11:52:56.779886007 CEST5404353192.168.2.138.8.8.8
                                  Apr 19, 2024 11:52:56.885292053 CEST53540438.8.8.8192.168.2.13
                                  Apr 19, 2024 11:53:04.605910063 CEST4796153192.168.2.138.8.8.8
                                  Apr 19, 2024 11:53:04.711143017 CEST53479618.8.8.8192.168.2.13
                                  Apr 19, 2024 11:53:15.437525034 CEST4372553192.168.2.138.8.8.8
                                  Apr 19, 2024 11:53:15.543097019 CEST53437258.8.8.8192.168.2.13
                                  Apr 19, 2024 11:53:18.287508011 CEST5945053192.168.2.138.8.8.8
                                  Apr 19, 2024 11:53:18.392846107 CEST53594508.8.8.8192.168.2.13
                                  Apr 19, 2024 11:53:22.155402899 CEST6036253192.168.2.138.8.8.8
                                  Apr 19, 2024 11:53:22.261219978 CEST53603628.8.8.8192.168.2.13
                                  Apr 19, 2024 11:53:27.982604027 CEST3284353192.168.2.138.8.8.8
                                  Apr 19, 2024 11:53:28.088238955 CEST53328438.8.8.8192.168.2.13
                                  Apr 19, 2024 11:53:38.831468105 CEST4171153192.168.2.138.8.8.8
                                  Apr 19, 2024 11:53:38.937077999 CEST53417118.8.8.8192.168.2.13
                                  Apr 19, 2024 11:53:42.701605082 CEST5268553192.168.2.138.8.8.8
                                  Apr 19, 2024 11:53:42.807044983 CEST53526858.8.8.8192.168.2.13
                                  Apr 19, 2024 11:53:44.562365055 CEST4881653192.168.2.138.8.8.8
                                  Apr 19, 2024 11:53:44.667826891 CEST53488168.8.8.8192.168.2.13
                                  Apr 19, 2024 11:53:51.437555075 CEST5475353192.168.2.138.8.8.8
                                  Apr 19, 2024 11:53:51.542815924 CEST53547538.8.8.8192.168.2.13
                                  Apr 19, 2024 11:53:55.260564089 CEST4689853192.168.2.138.8.8.8
                                  Apr 19, 2024 11:53:55.366441965 CEST53468988.8.8.8192.168.2.13
                                  Apr 19, 2024 11:54:01.126281977 CEST4840353192.168.2.138.8.8.8
                                  Apr 19, 2024 11:54:01.231612921 CEST53484038.8.8.8192.168.2.13
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Apr 19, 2024 11:51:57.303970098 CEST192.168.2.138.8.8.80x381Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:05.095886946 CEST192.168.2.138.8.8.80x377fStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:13.896723032 CEST192.168.2.138.8.8.80x925Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:16.758503914 CEST192.168.2.138.8.8.80x4111Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:20.588572979 CEST192.168.2.138.8.8.80x4de2Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:29.405200005 CEST192.168.2.138.8.8.80x3cacStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:38.263052940 CEST192.168.2.138.8.8.80x2711Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:43.123727083 CEST192.168.2.138.8.8.80xe2b7Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:53.953402042 CEST192.168.2.138.8.8.80x9017Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:56.779886007 CEST192.168.2.138.8.8.80xabe3Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:04.605910063 CEST192.168.2.138.8.8.80xb543Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:15.437525034 CEST192.168.2.138.8.8.80xf9b8Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:18.287508011 CEST192.168.2.138.8.8.80xb622Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:22.155402899 CEST192.168.2.138.8.8.80x9965Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:27.982604027 CEST192.168.2.138.8.8.80x5dd7Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:38.831468105 CEST192.168.2.138.8.8.80xc6bcStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:42.701605082 CEST192.168.2.138.8.8.80x7ffbStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:44.562365055 CEST192.168.2.138.8.8.80xeadaStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:51.437555075 CEST192.168.2.138.8.8.80xd0aeStandard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:55.260564089 CEST192.168.2.138.8.8.80x7c48Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:54:01.126281977 CEST192.168.2.138.8.8.80xeaa3Standard query (0)proxy.heleh.vnA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Apr 19, 2024 11:51:57.409006119 CEST8.8.8.8192.168.2.130x381No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:05.200767994 CEST8.8.8.8192.168.2.130x377fNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:14.002194881 CEST8.8.8.8192.168.2.130x925No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:16.863859892 CEST8.8.8.8192.168.2.130x4111No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:20.693954945 CEST8.8.8.8192.168.2.130x4de2No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:29.510700941 CEST8.8.8.8192.168.2.130x3cacNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:38.368767023 CEST8.8.8.8192.168.2.130x2711No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:43.231724977 CEST8.8.8.8192.168.2.130xe2b7No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:54.058871031 CEST8.8.8.8192.168.2.130x9017No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:52:56.885292053 CEST8.8.8.8192.168.2.130xabe3No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:04.711143017 CEST8.8.8.8192.168.2.130xb543No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:15.543097019 CEST8.8.8.8192.168.2.130xf9b8No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:18.392846107 CEST8.8.8.8192.168.2.130xb622No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:22.261219978 CEST8.8.8.8192.168.2.130x9965No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:28.088238955 CEST8.8.8.8192.168.2.130x5dd7No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:38.937077999 CEST8.8.8.8192.168.2.130xc6bcNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:42.807044983 CEST8.8.8.8192.168.2.130x7ffbNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:44.667826891 CEST8.8.8.8192.168.2.130xeadaNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:51.542815924 CEST8.8.8.8192.168.2.130xd0aeNo error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:53:55.366441965 CEST8.8.8.8192.168.2.130x7c48No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false
                                  Apr 19, 2024 11:54:01.231612921 CEST8.8.8.8192.168.2.130xeaa3No error (0)proxy.heleh.vn103.174.73.85A (IP address)IN (0x0001)false

                                  System Behavior

                                  Start time (UTC):09:51:56
                                  Start date (UTC):19/04/2024
                                  Path:/tmp/VPXX0UiRJ3.elf
                                  Arguments:/tmp/VPXX0UiRJ3.elf
                                  File size:96264 bytes
                                  MD5 hash:61682f3d6f8a60b2526fbf2e331a44fa

                                  Start time (UTC):09:51:56
                                  Start date (UTC):19/04/2024
                                  Path:/tmp/VPXX0UiRJ3.elf
                                  Arguments:-
                                  File size:96264 bytes
                                  MD5 hash:61682f3d6f8a60b2526fbf2e331a44fa

                                  Start time (UTC):09:51:56
                                  Start date (UTC):19/04/2024
                                  Path:/tmp/VPXX0UiRJ3.elf
                                  Arguments:-
                                  File size:96264 bytes
                                  MD5 hash:61682f3d6f8a60b2526fbf2e331a44fa

                                  Start time (UTC):09:52:35
                                  Start date (UTC):19/04/2024
                                  Path:/usr/lib/systemd/systemd
                                  Arguments:-
                                  File size:1620224 bytes
                                  MD5 hash:9b2bec7092a40488108543f9334aab75

                                  Start time (UTC):09:52:35
                                  Start date (UTC):19/04/2024
                                  Path:/usr/lib/snapd/snap-failure
                                  Arguments:/usr/lib/snapd/snap-failure snapd
                                  File size:4764904 bytes
                                  MD5 hash:69136a7d575731ce62349f2e4d3e5c36

                                  Start time (UTC):09:52:35
                                  Start date (UTC):19/04/2024
                                  Path:/usr/lib/snapd/snap-failure
                                  Arguments:-
                                  File size:4764904 bytes
                                  MD5 hash:69136a7d575731ce62349f2e4d3e5c36

                                  Start time (UTC):09:52:35
                                  Start date (UTC):19/04/2024
                                  Path:/usr/bin/systemctl
                                  Arguments:systemctl stop snapd.socket
                                  File size:996584 bytes
                                  MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                                  Start time (UTC):09:52:36
                                  Start date (UTC):19/04/2024
                                  Path:/usr/lib/snapd/snap-failure
                                  Arguments:-
                                  File size:4764904 bytes
                                  MD5 hash:69136a7d575731ce62349f2e4d3e5c36