Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
BN34UR6QlT.elf

Overview

General Information

Sample name:BN34UR6QlT.elf
renamed because original name is a hash value
Original sample name:66ef61ae742d72b4a385e16e95b078c5.elf
Analysis ID:1430426
MD5:66ef61ae742d72b4a385e16e95b078c5
SHA1:a0d83934a8cbf59724508aee78f9f380e8ea8118
SHA256:75600ccfde87375df9385bfc70f8153b9926b702446e616076518a6a21037b8d
Tags:32elfgafgytrenesas
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Queries the IP of a very long domain name
Sample deletes itself
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1430426
Start date and time:2024-04-23 16:42:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 55s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:BN34UR6QlT.elf
renamed because original name is a hash value
Original Sample Name:66ef61ae742d72b4a385e16e95b078c5.elf
Detection:MAL
Classification:mal64.troj.evad.linELF@0/1@6/0
  • VT rate limit hit for: BN34UR6QlT.elf
Command:/tmp/BN34UR6QlT.elf
PID:5493
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
about to cum inside a femboy btw
Standard Error:
  • system is lnxubuntu20
  • sh (PID: 5499, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
  • gsd-rfkill (PID: 5499, Parent: 1383, MD5: 88a16a3c0aba1759358c06215ecfb5cc) Arguments: /usr/libexec/gsd-rfkill
  • systemd New Fork (PID: 5504, Parent: 1)
  • systemd-hostnamed (PID: 5504, Parent: 1, MD5: 2cc8a5576629a2d5bd98e49a4b8bef65) Arguments: /lib/systemd/systemd-hostnamed
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: BN34UR6QlT.elfAvira: detected
Source: BN34UR6QlT.elfReversingLabs: Detection: 31%
Source: BN34UR6QlT.elfString: lEOF/proc//proc/%s/cmdlinerwgetcurlftpechokillbashrebootshutdownhaltpoweroff[locker] killed process: %s ;; pid: %d

Networking

barindex
Source: unknownDNS traffic detected: query: cnc.voidnet.click.'f66a0PV!E(j5SSX'fNNPV!a0E@-
Source: unknownDNS traffic detected: query: cnc.voidnet.click.'f66a0PV!E(ju55_v'fNNPV!a0E@-
Source: unknownDNS traffic detected: query: cnc.voidnet.click.'f<566a0PV!E(:15<'f6NNPV!a0E@-
Source: unknownDNS traffic detected: query: cnc.voidnet.click.'f66a0PV!E(9;5^"'fNNPV!a0E@-
Source: unknownDNS traffic detected: query: cnc.voidnet.click.'fu66a0PV!E(:+5q'fvJJPV!a0E<
Source: global trafficTCP traffic: 192.168.2.14:38994 -> 94.156.79.77:33966
Source: global trafficTCP traffic: 192.168.2.14:57248 -> 89.190.156.145:7733
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownDNS traffic detected: queries for: cnc.voidnet.click
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/BN34UR6QlT.elf (PID: 5497)SIGKILL sent: pid: 1639, result: successfulJump to behavior
Source: classification engineClassification label: mal64.troj.evad.linELF@0/1@6/0
Source: /usr/libexec/gsd-rfkill (PID: 5499)Directory: <invalid fd (9)>/..Jump to behavior
Source: /usr/libexec/gsd-rfkill (PID: 5499)Directory: <invalid fd (8)>/..Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5504)Directory: <invalid fd (10)>/..Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/1583/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/1577/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/1593/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/1589/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/806/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/807/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/928/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/135/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/1371/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/262/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/142/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/263/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/264/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/265/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/145/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/266/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/1369/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/267/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/268/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/269/cmdlineJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497)File opened: /proc/940/cmdlineJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/BN34UR6QlT.elf (PID: 5495)File: /tmp/BN34UR6QlT.elfJump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5493)Queries kernel information via 'uname': Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5504)Queries kernel information via 'uname': Jump to behavior
Source: BN34UR6QlT.elf, 5493.1.00007fff9edb8000.00007fff9edd9000.rw-.sdmpBinary or memory string: /qemu-open.XXXXX
Source: BN34UR6QlT.elf, 5493.1.00007fff9edb8000.00007fff9edd9000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
Source: BN34UR6QlT.elf, 5493.1.00007fff9edb8000.00007fff9edd9000.rw-.sdmpBinary or memory string: /tmp/qemu-open.rpL8fx
Source: BN34UR6QlT.elf, 5493.1.00007fff9edb8000.00007fff9edd9000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sh4/tmp/BN34UR6QlT.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/BN34UR6QlT.elf
Source: BN34UR6QlT.elf, 5493.1.000055bc2a125000.000055bc2a188000.rw-.sdmpBinary or memory string: U5!/etc/qemu-binfmt/sh4
Source: BN34UR6QlT.elf, 5493.1.000055bc2a125000.000055bc2a188000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4
Source: BN34UR6QlT.elf, 5493.1.00007fff9edb8000.00007fff9edd9000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.rpL8fx\
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Hidden Files and Directories
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File Deletion
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive11
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1430426 Sample: BN34UR6QlT.elf Startdate: 23/04/2024 Architecture: LINUX Score: 64 19 cnc.voidnet.click.'fu66a0PV!E(:+5q'fvJJPV!a0E< 2->19 21 cnc.voidnet.click.'f<566a0PV!E(:15<'f6NNPV!a0E@- 2->21 23 5 other IPs or domains 2->23 25 Antivirus / Scanner detection for submitted sample 2->25 27 Multi AV Scanner detection for submitted file 2->27 8 BN34UR6QlT.elf 2->8         started        10 gnome-session-binary sh gsd-rfkill 2->10         started        12 systemd systemd-hostnamed 2->12         started        signatures3 29 Queries the IP of a very long domain name 21->29 process4 process5 14 BN34UR6QlT.elf 8->14         started        signatures6 31 Sample deletes itself 14->31 17 BN34UR6QlT.elf 14->17         started        process7
SourceDetectionScannerLabelLink
BN34UR6QlT.elf32%ReversingLabsLinux.Trojan.Mirai
BN34UR6QlT.elf100%AviraEXP/ELF.Mirai.W
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
cnc.voidnet.click
94.156.79.77
truetrue
    unknown
    cnc.voidnet.click.'f66a0PV!E(ju55_v'fNNPV!a0E@-
    unknown
    unknowntrue
      unknown
      cnc.voidnet.click.'f66a0PV!E(9;5^"'fNNPV!a0E@-
      unknown
      unknowntrue
        unknown
        cnc.voidnet.click.'f66a0PV!E(j5SSX'fNNPV!a0E@-
        unknown
        unknowntrue
          unknown
          cnc.voidnet.click.'f<566a0PV!E(:15<'f6NNPV!a0E@-
          unknown
          unknowntrue
            unknown
            cnc.voidnet.click.'fu66a0PV!E(:+5q'fvJJPV!a0E<
            unknown
            unknowntrue
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              94.156.79.77
              cnc.voidnet.clickBulgaria
              43561NET1-ASBGtrue
              89.190.156.145
              unknownUnited Kingdom
              7489HOSTUS-GLOBAL-ASHostUSHKfalse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              94.156.79.77PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                2NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
                  gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
                    89.190.156.145Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                      PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                        2NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
                          gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
                            EOtMo9xTFK.elfGet hashmaliciousMiraiBrowse
                              epLN92K8RM.elfGet hashmaliciousMiraiBrowse
                                8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                                  LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                                    Fv42CUocuV.elfGet hashmaliciousMiraiBrowse
                                      RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        cnc.voidnet.clickPCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                                        • 94.156.79.77
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        HOSTUS-GLOBAL-ASHostUSHKTb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                                        • 89.190.156.145
                                        PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                                        • 89.190.156.145
                                        BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                        • 162.245.217.156
                                        2NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
                                        • 89.190.156.145
                                        gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
                                        • 89.190.156.145
                                        EOtMo9xTFK.elfGet hashmaliciousMiraiBrowse
                                        • 89.190.156.145
                                        epLN92K8RM.elfGet hashmaliciousMiraiBrowse
                                        • 89.190.156.145
                                        8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                                        • 89.190.156.145
                                        LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                                        • 89.190.156.145
                                        NET1-ASBGPCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                                        • 94.156.79.77
                                        NMdpQecbkg.elfGet hashmaliciousMiraiBrowse
                                        • 94.156.8.135
                                        BRUFEN ORDER VAC442_7467247728478134247.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                        • 87.121.105.163
                                        NLgD8SSCOD.elfGet hashmaliciousGafgytBrowse
                                        • 94.156.79.152
                                        http://94.156.79.129/x86_64Get hashmaliciousUnknownBrowse
                                        • 94.156.79.129
                                        http://94.156.79.129/tenda.shGet hashmaliciousUnknownBrowse
                                        • 94.156.79.129
                                        file.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                        • 94.156.79.164
                                        SCMP_#U547d#U4ee4_004020024001.wsfGet hashmaliciousUnknownBrowse
                                        • 87.121.105.163
                                        https://comptesupport.info/it/steps/login.phpGet hashmaliciousUnknownBrowse
                                        • 94.156.8.16
                                        QAroRO82HE.elfGet hashmaliciousMiraiBrowse
                                        • 93.123.85.69
                                        No context
                                        No context
                                        Process:/tmp/BN34UR6QlT.elf
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):30
                                        Entropy (8bit):4.456564762130954
                                        Encrypted:false
                                        SSDEEP:3:Tgr4w5L8HJN:TgkCaJN
                                        MD5:7CE8EDC5EF1EFC6D1688C837C471888C
                                        SHA1:5CB5130DB5B61E2F54251209859D30B246B40366
                                        SHA-256:BCFB8B5A930757515FE8FBD63704611C2989841951F8BFA2655FDFFB5B1E62F6
                                        SHA-512:4BB6296D4D8E380E5ADED24B37B3CB621198EB389DEE91DE48D564E37F13049F4AE2E53CAA9F05AAEFDDD2CE4717BEBE869CA6C1D0B2ACC668579129B6628516
                                        Malicious:false
                                        Reputation:low
                                        Preview:/tmp/BN34UR6QlT.elf.nwlrbbmqbh
                                        File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
                                        Entropy (8bit):6.83508423390557
                                        TrID:
                                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                        File name:BN34UR6QlT.elf
                                        File size:67'072 bytes
                                        MD5:66ef61ae742d72b4a385e16e95b078c5
                                        SHA1:a0d83934a8cbf59724508aee78f9f380e8ea8118
                                        SHA256:75600ccfde87375df9385bfc70f8153b9926b702446e616076518a6a21037b8d
                                        SHA512:445fe4f3469b9c85fd6cbc79f6e9cef4f60c242e3783662a709b4f537c9403a486c9c060b4b34fef01858a429d5d9b23054b9b46297869b1714778c077ad7686
                                        SSDEEP:1536:NatwtVAbFF/lAKuLVGpiKh5knZmU6iCXIvGaPASiC:Nqhbn/ltYVGbhamU6id+QJ
                                        TLSH:4E639D73C9396E98D1A991F0B4349F745F23A11082A71FFB0E55C1B99087EACF6463B4
                                        File Content Preview:.ELF..............*.......@.4...p.......4. ...(...............@...@...........................A...A.0....&..........Q.td............................././"O.n........#.*@........#.*@l....o&O.n...l..............................././.../.a"O.!...n...a.b("...q.

                                        ELF header

                                        Class:ELF32
                                        Data:2's complement, little endian
                                        Version:1 (current)
                                        Machine:<unknown>
                                        Version Number:0x1
                                        Type:EXEC (Executable file)
                                        OS/ABI:UNIX - System V
                                        ABI Version:0
                                        Entry Point Address:0x4001a0
                                        Flags:0x9
                                        ELF Header Size:52
                                        Program Header Offset:52
                                        Program Header Size:32
                                        Number of Program Headers:3
                                        Section Header Offset:66672
                                        Section Header Size:40
                                        Number of Section Headers:10
                                        Header String Table Index:9
                                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                        NULL0x00x00x00x00x0000
                                        .initPROGBITS0x4000940x940x300x00x6AX004
                                        .textPROGBITS0x4000e00xe00xe5800x00x6AX0032
                                        .finiPROGBITS0x40e6600xe6600x240x00x6AX004
                                        .rodataPROGBITS0x40e6840xe6840x18580x00x2A004
                                        .ctorsPROGBITS0x4100000x100000x80x00x3WA004
                                        .dtorsPROGBITS0x4100080x100080x80x00x3WA004
                                        .dataPROGBITS0x4100140x100140x41c0x00x3WA004
                                        .bssNOBITS0x4104300x104300x21e00x00x3WA004
                                        .shstrtabSTRTAB0x00x104300x3e0x00x0001
                                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                        LOAD0x00x4000000x4000000xfedc0xfedc6.89790x5R E0x10000.init .text .fini .rodata
                                        LOAD0x100000x4100000x4100000x4300x26103.50290x6RW 0x10000.ctors .dtors .data .bss
                                        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                        TimestampSource PortDest PortSource IPDest IP
                                        Apr 23, 2024 16:42:58.751333952 CEST3899433966192.168.2.1494.156.79.77
                                        Apr 23, 2024 16:42:58.816898108 CEST572487733192.168.2.1489.190.156.145
                                        Apr 23, 2024 16:42:58.981656075 CEST339663899494.156.79.77192.168.2.14
                                        Apr 23, 2024 16:42:58.981734037 CEST3899433966192.168.2.1494.156.79.77
                                        Apr 23, 2024 16:42:58.982124090 CEST3899433966192.168.2.1494.156.79.77
                                        Apr 23, 2024 16:42:59.212348938 CEST339663899494.156.79.77192.168.2.14
                                        Apr 23, 2024 16:42:59.213190079 CEST3899433966192.168.2.1494.156.79.77
                                        Apr 23, 2024 16:42:59.443428040 CEST339663899494.156.79.77192.168.2.14
                                        Apr 23, 2024 16:42:59.840876102 CEST572487733192.168.2.1489.190.156.145
                                        Apr 23, 2024 16:43:01.856878996 CEST572487733192.168.2.1489.190.156.145
                                        Apr 23, 2024 16:43:05.920789957 CEST572487733192.168.2.1489.190.156.145
                                        Apr 23, 2024 16:43:14.112395048 CEST572487733192.168.2.1489.190.156.145
                                        Apr 23, 2024 16:43:14.445161104 CEST339663899494.156.79.77192.168.2.14
                                        Apr 23, 2024 16:43:14.445328951 CEST3899433966192.168.2.1494.156.79.77
                                        Apr 23, 2024 16:43:29.673171043 CEST339663899494.156.79.77192.168.2.14
                                        Apr 23, 2024 16:43:29.673321962 CEST3899433966192.168.2.1494.156.79.77
                                        Apr 23, 2024 16:43:30.239692926 CEST572487733192.168.2.1489.190.156.145
                                        Apr 23, 2024 16:43:44.905276060 CEST339663899494.156.79.77192.168.2.14
                                        Apr 23, 2024 16:43:44.905559063 CEST3899433966192.168.2.1494.156.79.77
                                        Apr 23, 2024 16:44:00.137299061 CEST339663899494.156.79.77192.168.2.14
                                        Apr 23, 2024 16:44:00.137502909 CEST3899433966192.168.2.1494.156.79.77
                                        Apr 23, 2024 16:44:04.286354065 CEST572487733192.168.2.1489.190.156.145
                                        Apr 23, 2024 16:44:09.025295019 CEST3899433966192.168.2.1494.156.79.77
                                        Apr 23, 2024 16:44:09.256581068 CEST339663899494.156.79.77192.168.2.14
                                        Apr 23, 2024 16:44:09.256688118 CEST339663899494.156.79.77192.168.2.14
                                        Apr 23, 2024 16:44:09.256827116 CEST3899433966192.168.2.1494.156.79.77
                                        Apr 23, 2024 16:44:19.266494989 CEST3899433966192.168.2.1494.156.79.77
                                        Apr 23, 2024 16:44:19.496968985 CEST339663899494.156.79.77192.168.2.14
                                        Apr 23, 2024 16:44:19.497004032 CEST339663899494.156.79.77192.168.2.14
                                        Apr 23, 2024 16:44:19.497221947 CEST3899433966192.168.2.1494.156.79.77
                                        Apr 23, 2024 16:44:34.953155994 CEST339663899494.156.79.77192.168.2.14
                                        Apr 23, 2024 16:44:34.953295946 CEST3899433966192.168.2.1494.156.79.77
                                        Apr 23, 2024 16:44:50.185307026 CEST339663899494.156.79.77192.168.2.14
                                        Apr 23, 2024 16:44:50.185549974 CEST3899433966192.168.2.1494.156.79.77
                                        TimestampSource PortDest PortSource IPDest IP
                                        Apr 23, 2024 16:42:58.110786915 CEST5575253192.168.2.148.8.8.8
                                        Apr 23, 2024 16:42:58.217442036 CEST53557528.8.8.8192.168.2.14
                                        Apr 23, 2024 16:42:58.218018055 CEST4078753192.168.2.148.8.8.8
                                        Apr 23, 2024 16:42:58.324567080 CEST53407878.8.8.8192.168.2.14
                                        Apr 23, 2024 16:42:58.325030088 CEST3768553192.168.2.148.8.8.8
                                        Apr 23, 2024 16:42:58.431364059 CEST53376858.8.8.8192.168.2.14
                                        Apr 23, 2024 16:42:58.431603909 CEST4651753192.168.2.148.8.8.8
                                        Apr 23, 2024 16:42:58.537915945 CEST53465178.8.8.8192.168.2.14
                                        Apr 23, 2024 16:42:58.538141012 CEST3802553192.168.2.148.8.8.8
                                        Apr 23, 2024 16:42:58.644535065 CEST53380258.8.8.8192.168.2.14
                                        Apr 23, 2024 16:42:58.644808054 CEST3299353192.168.2.148.8.8.8
                                        Apr 23, 2024 16:42:58.751080990 CEST53329938.8.8.8192.168.2.14
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Apr 23, 2024 16:42:58.110786915 CEST192.168.2.148.8.8.80xfbc6Standard query (0)cnc.voidnet.clickA (IP address)IN (0x0001)false
                                        Apr 23, 2024 16:42:58.218018055 CEST192.168.2.148.8.8.80xb91dStandard query (0)cnc.voidnet.click.'f66a0PV!E(j5SSX'fNNPV!a0E@-1638416401false
                                        Apr 23, 2024 16:42:58.325030088 CEST192.168.2.148.8.8.80xb91dStandard query (0)cnc.voidnet.click.'f66a0PV!E(ju55_v'fNNPV!a0E@-1638416401false
                                        Apr 23, 2024 16:42:58.431603909 CEST192.168.2.148.8.8.80xb91dStandard query (0)cnc.voidnet.click.'f<566a0PV!E(:15<'f6NNPV!a0E@-1638416401false
                                        Apr 23, 2024 16:42:58.538141012 CEST192.168.2.148.8.8.80xb91dStandard query (0)cnc.voidnet.click.'f66a0PV!E(9;5^"'fNNPV!a0E@-1638416401false
                                        Apr 23, 2024 16:42:58.644808054 CEST192.168.2.148.8.8.80xb91dStandard query (0)cnc.voidnet.click.'fu66a0PV!E(:+5q'fvJJPV!a0E<1638416390false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Apr 23, 2024 16:42:58.217442036 CEST8.8.8.8192.168.2.140xfbc6No error (0)cnc.voidnet.click94.156.79.77A (IP address)IN (0x0001)false

                                        System Behavior

                                        Start time (UTC):14:42:57
                                        Start date (UTC):23/04/2024
                                        Path:/tmp/BN34UR6QlT.elf
                                        Arguments:/tmp/BN34UR6QlT.elf
                                        File size:4139976 bytes
                                        MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                        Start time (UTC):14:42:57
                                        Start date (UTC):23/04/2024
                                        Path:/tmp/BN34UR6QlT.elf
                                        Arguments:-
                                        File size:4139976 bytes
                                        MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                        Start time (UTC):14:42:57
                                        Start date (UTC):23/04/2024
                                        Path:/tmp/BN34UR6QlT.elf
                                        Arguments:-
                                        File size:4139976 bytes
                                        MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                        Start time (UTC):14:42:58
                                        Start date (UTC):23/04/2024
                                        Path:/usr/libexec/gnome-session-binary
                                        Arguments:-
                                        File size:334664 bytes
                                        MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                        Start time (UTC):14:42:58
                                        Start date (UTC):23/04/2024
                                        Path:/bin/sh
                                        Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
                                        File size:129816 bytes
                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                        Start time (UTC):14:42:58
                                        Start date (UTC):23/04/2024
                                        Path:/usr/libexec/gsd-rfkill
                                        Arguments:/usr/libexec/gsd-rfkill
                                        File size:51808 bytes
                                        MD5 hash:88a16a3c0aba1759358c06215ecfb5cc

                                        Start time (UTC):14:42:58
                                        Start date (UTC):23/04/2024
                                        Path:/usr/lib/systemd/systemd
                                        Arguments:-
                                        File size:1620224 bytes
                                        MD5 hash:9b2bec7092a40488108543f9334aab75

                                        Start time (UTC):14:42:58
                                        Start date (UTC):23/04/2024
                                        Path:/lib/systemd/systemd-hostnamed
                                        Arguments:/lib/systemd/systemd-hostnamed
                                        File size:35040 bytes
                                        MD5 hash:2cc8a5576629a2d5bd98e49a4b8bef65