Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
Tb0uDdOwyO.elf

Overview

General Information

Sample name:Tb0uDdOwyO.elf
renamed because original name is a hash value
Original sample name:3e187e6674b0013cefa5b0aee409be68.elf
Analysis ID:1430427
MD5:3e187e6674b0013cefa5b0aee409be68
SHA1:3789e604f3eb3c3e2fda15ccfab2001d7eed8bf6
SHA256:4e3ea3385ea84d2ad76cb34eb7188aff681a5a2513b3922f12846dc4d4ba2495
Tags:32elfmipsmirai
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample deletes itself
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1430427
Start date and time:2024-04-23 16:42:14 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 42s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:Tb0uDdOwyO.elf
renamed because original name is a hash value
Original Sample Name:3e187e6674b0013cefa5b0aee409be68.elf
Detection:MAL
Classification:mal60.evad.linELF@0/1@2/0
  • VT rate limit hit for: Tb0uDdOwyO.elf
Command:/tmp/Tb0uDdOwyO.elf
PID:5523
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
about to cum inside a femboy btw
Standard Error:
  • system is lnxubuntu20
  • sh (PID: 5537, Parent: 1498, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
  • gsd-rfkill (PID: 5537, Parent: 1498, MD5: 88a16a3c0aba1759358c06215ecfb5cc) Arguments: /usr/libexec/gsd-rfkill
  • systemd New Fork (PID: 5542, Parent: 1)
  • systemd-hostnamed (PID: 5542, Parent: 1, MD5: 2cc8a5576629a2d5bd98e49a4b8bef65) Arguments: /lib/systemd/systemd-hostnamed
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Tb0uDdOwyO.elfAvira: detected
Source: Tb0uDdOwyO.elfReversingLabs: Detection: 31%
Source: Tb0uDdOwyO.elfString: 'EOF/proc//proc/%s/cmdlinerwgetcurlftpechokillbashrebootshutdownhaltpoweroff[locker] killed process: %s ;; pid: %d
Source: global trafficTCP traffic: 192.168.2.15:53542 -> 94.156.79.77:33966
Source: global trafficTCP traffic: 192.168.2.15:37426 -> 89.190.156.145:7733
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownDNS traffic detected: queries for: cnc.voidnet.click
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)SIGKILL sent: pid: 1679, result: successfulJump to behavior
Source: classification engineClassification label: mal60.evad.linELF@0/1@2/0
Source: /usr/libexec/gsd-rfkill (PID: 5537)Directory: <invalid fd (9)>/..Jump to behavior
Source: /usr/libexec/gsd-rfkill (PID: 5537)Directory: <invalid fd (8)>/..Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5542)Directory: <invalid fd (10)>/..Jump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/1333/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/911/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/1591/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/1585/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/804/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/1484/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/133/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/1479/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/931/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/1595/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/812/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/933/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/262/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/142/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/263/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/264/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/265/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/145/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/266/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/267/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/268/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/269/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/1486/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/270/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/271/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/272/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/273/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/274/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/275/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/276/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/277/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/278/cmdlineJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5527)File opened: /proc/279/cmdlineJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/Tb0uDdOwyO.elf (PID: 5525)File: /tmp/Tb0uDdOwyO.elfJump to behavior
Source: /tmp/Tb0uDdOwyO.elf (PID: 5523)Queries kernel information via 'uname': Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5542)Queries kernel information via 'uname': Jump to behavior
Source: Tb0uDdOwyO.elf, 5523.1.00007ffe45da0000.00007ffe45dc1000.rw-.sdmpBinary or memory string: /tmp/qemu-open.BMIFQP
Source: Tb0uDdOwyO.elf, 5523.1.000055c7ed6bf000.000055c7ed746000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
Source: Tb0uDdOwyO.elf, 5523.1.00007ffe45da0000.00007ffe45dc1000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.BMIFQP\
Source: Tb0uDdOwyO.elf, 5523.1.00007ffe45da0000.00007ffe45dc1000.rw-.sdmpBinary or memory string: /qemu-open.XXXXX
Source: Tb0uDdOwyO.elf, 5523.1.00007ffe45da0000.00007ffe45dc1000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/Tb0uDdOwyO.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/Tb0uDdOwyO.elf
Source: Tb0uDdOwyO.elf, 5523.1.000055c7ed6bf000.000055c7ed746000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
Source: Tb0uDdOwyO.elf, 5523.1.00007ffe45da0000.00007ffe45dc1000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Hidden Files and Directories
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File Deletion
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1430427 Sample: Tb0uDdOwyO.elf Startdate: 23/04/2024 Architecture: LINUX Score: 60 19 cnc.voidnet.click 94.156.79.77, 33966, 53542 NET1-ASBG Bulgaria 2->19 21 89.190.156.145, 7733 HOSTUS-GLOBAL-ASHostUSHK United Kingdom 2->21 23 Antivirus / Scanner detection for submitted sample 2->23 25 Multi AV Scanner detection for submitted file 2->25 8 Tb0uDdOwyO.elf 2->8         started        10 gnome-session-binary sh gsd-rfkill 2->10         started        12 systemd systemd-hostnamed 2->12         started        signatures3 process4 process5 14 Tb0uDdOwyO.elf 8->14         started        signatures6 27 Sample deletes itself 14->27 17 Tb0uDdOwyO.elf 14->17         started        process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Tb0uDdOwyO.elf32%ReversingLabsLinux.Trojan.Mirai
Tb0uDdOwyO.elf100%AviraEXP/ELF.Mirai.W
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
cnc.voidnet.click
94.156.79.77
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    94.156.79.77
    cnc.voidnet.clickBulgaria
    43561NET1-ASBGfalse
    89.190.156.145
    unknownUnited Kingdom
    7489HOSTUS-GLOBAL-ASHostUSHKfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    94.156.79.772NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
      gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
        89.190.156.1452NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
          gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
            EOtMo9xTFK.elfGet hashmaliciousMiraiBrowse
              epLN92K8RM.elfGet hashmaliciousMiraiBrowse
                8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                  LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                    Fv42CUocuV.elfGet hashmaliciousMiraiBrowse
                      RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                        CcsWgcYeDy.elfGet hashmaliciousMiraiBrowse
                          Trhc0oj3L5.elfGet hashmaliciousMiraiBrowse
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            HOSTUS-GLOBAL-ASHostUSHKBitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                            • 162.245.217.156
                            2NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
                            • 89.190.156.145
                            gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
                            • 89.190.156.145
                            EOtMo9xTFK.elfGet hashmaliciousMiraiBrowse
                            • 89.190.156.145
                            epLN92K8RM.elfGet hashmaliciousMiraiBrowse
                            • 89.190.156.145
                            8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                            • 89.190.156.145
                            LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                            • 89.190.156.145
                            Fv42CUocuV.elfGet hashmaliciousMiraiBrowse
                            • 89.190.156.145
                            RL3RPCHZ1b.elfGet hashmaliciousMiraiBrowse
                            • 89.190.156.145
                            NET1-ASBGNMdpQecbkg.elfGet hashmaliciousMiraiBrowse
                            • 94.156.8.135
                            BRUFEN ORDER VAC442_7467247728478134247.vbsGet hashmaliciousGuLoader, RemcosBrowse
                            • 87.121.105.163
                            NLgD8SSCOD.elfGet hashmaliciousGafgytBrowse
                            • 94.156.79.152
                            http://94.156.79.129/x86_64Get hashmaliciousUnknownBrowse
                            • 94.156.79.129
                            http://94.156.79.129/tenda.shGet hashmaliciousUnknownBrowse
                            • 94.156.79.129
                            file.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                            • 94.156.79.164
                            SCMP_#U547d#U4ee4_004020024001.wsfGet hashmaliciousUnknownBrowse
                            • 87.121.105.163
                            https://comptesupport.info/it/steps/login.phpGet hashmaliciousUnknownBrowse
                            • 94.156.8.16
                            QAroRO82HE.elfGet hashmaliciousMiraiBrowse
                            • 93.123.85.69
                            xOaQfmp0Kl.elfGet hashmaliciousMiraiBrowse
                            • 93.123.85.69
                            No context
                            No context
                            Process:/tmp/Tb0uDdOwyO.elf
                            File Type:data
                            Category:dropped
                            Size (bytes):30
                            Entropy (8bit):4.306890595608519
                            Encrypted:false
                            SSDEEP:3:TgsAR8HJN:TgsAkJN
                            MD5:6584F89498344F117C8B8895701F330A
                            SHA1:458291D3CB0E88E13D730A9E9D6228E7251FB5DC
                            SHA-256:A90C35CBD87E0D402E85FC2EDB61E114358617EE32A2EE2BC4CB78F76083E43B
                            SHA-512:2048F836EC6E8E42220377519558EC15BBC6F8A564A2C102C76590E858C493D00A96C7CD4AE60CCE9B3FD94B7C376EBD62272CDF812246313ECF7FCE24631F98
                            Malicious:false
                            Reputation:low
                            Preview:/tmp/Tb0uDdOwyO.elf.nwlrbbmqbh
                            File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
                            Entropy (8bit):5.447339529745386
                            TrID:
                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                            File name:Tb0uDdOwyO.elf
                            File size:101'476 bytes
                            MD5:3e187e6674b0013cefa5b0aee409be68
                            SHA1:3789e604f3eb3c3e2fda15ccfab2001d7eed8bf6
                            SHA256:4e3ea3385ea84d2ad76cb34eb7188aff681a5a2513b3922f12846dc4d4ba2495
                            SHA512:374192d379d1ba43b15e4f59727765e5f670a9e17ad4f8e27824511ca24e6092cc072d4580b746922ba6b2a0bc2e41b7b202aec20b319f8e7902b149ab41ca1d
                            SSDEEP:1536:0CTVNyBTWIuKXty/7Ly43jSZdYq21RFGFgOUAqwKZqlzMHLZTJ3627VukOSis:00VNyBj+P1XGFNYwKHjNuk5
                            TLSH:56A3D706FF550FFBDCAFCD374AE9070525CCA90A12A93B367574D828B54A24B0AE3D64
                            File Content Preview:.ELF....................`.@.4...4.......4. ...(...............@...@. z.. z....................E...E..... ,..........Q.td...............................<...'!......'.......................<...'!... .........9'.. ........................<...'!........... ]9

                            ELF header

                            Class:ELF32
                            Data:2's complement, little endian
                            Version:1 (current)
                            Machine:MIPS R3000
                            Version Number:0x1
                            Type:EXEC (Executable file)
                            OS/ABI:UNIX - System V
                            ABI Version:0
                            Entry Point Address:0x400260
                            Flags:0x1007
                            ELF Header Size:52
                            Program Header Offset:52
                            Program Header Size:32
                            Number of Program Headers:3
                            Section Header Offset:100916
                            Section Header Size:40
                            Number of Section Headers:14
                            Header String Table Index:13
                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                            NULL0x00x00x00x00x0000
                            .initPROGBITS0x4000940x940x8c0x00x6AX004
                            .textPROGBITS0x4001200x1200x15c700x00x6AX0016
                            .finiPROGBITS0x415d900x15d900x5c0x00x6AX004
                            .rodataPROGBITS0x415df00x15df00x1c300x00x2A0016
                            .ctorsPROGBITS0x4580000x180000x80x00x3WA004
                            .dtorsPROGBITS0x4580080x180080x80x00x3WA004
                            .data.rel.roPROGBITS0x4580140x180140x40x00x3WA004
                            .dataPROGBITS0x4580200x180200x4700x00x3WA0016
                            .gotPROGBITS0x4584900x184900x5400x40x10000003WAp0016
                            .sbssNOBITS0x4589d00x189d00x140x00x10000003WAp004
                            .bssNOBITS0x4589f00x189d00x22300x00x3WA0016
                            .mdebug.abi32PROGBITS0xbe20x189d00x00x00x0001
                            .shstrtabSTRTAB0x00x189d00x640x00x0001
                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                            LOAD0x00x4000000x4000000x17a200x17a205.51760x5R E0x10000.init .text .fini .rodata
                            LOAD0x180000x4580000x4580000x9d00x2c204.19470x6RW 0x10000.ctors .dtors .data.rel.ro .data .got .sbss .bss
                            GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                            TimestampSource PortDest PortSource IPDest IP
                            Apr 23, 2024 16:42:59.638145924 CEST5354233966192.168.2.1594.156.79.77
                            Apr 23, 2024 16:42:59.862638950 CEST339665354294.156.79.77192.168.2.15
                            Apr 23, 2024 16:42:59.862736940 CEST5354233966192.168.2.1594.156.79.77
                            Apr 23, 2024 16:42:59.863126993 CEST5354233966192.168.2.1594.156.79.77
                            Apr 23, 2024 16:43:00.087340117 CEST339665354294.156.79.77192.168.2.15
                            Apr 23, 2024 16:43:00.087476015 CEST5354233966192.168.2.1594.156.79.77
                            Apr 23, 2024 16:43:00.214212894 CEST374267733192.168.2.1589.190.156.145
                            Apr 23, 2024 16:43:00.311834097 CEST339665354294.156.79.77192.168.2.15
                            Apr 23, 2024 16:43:01.239046097 CEST374267733192.168.2.1589.190.156.145
                            Apr 23, 2024 16:43:03.255111933 CEST374267733192.168.2.1589.190.156.145
                            Apr 23, 2024 16:43:07.510950089 CEST374267733192.168.2.1589.190.156.145
                            Apr 23, 2024 16:43:15.336571932 CEST339665354294.156.79.77192.168.2.15
                            Apr 23, 2024 16:43:15.336715937 CEST5354233966192.168.2.1594.156.79.77
                            Apr 23, 2024 16:43:15.702795982 CEST374267733192.168.2.1589.190.156.145
                            Apr 23, 2024 16:43:30.564524889 CEST339665354294.156.79.77192.168.2.15
                            Apr 23, 2024 16:43:30.564634085 CEST5354233966192.168.2.1594.156.79.77
                            Apr 23, 2024 16:43:31.830296040 CEST374267733192.168.2.1589.190.156.145
                            Apr 23, 2024 16:43:45.800703049 CEST339665354294.156.79.77192.168.2.15
                            Apr 23, 2024 16:43:45.801196098 CEST5354233966192.168.2.1594.156.79.77
                            Apr 23, 2024 16:44:01.028666019 CEST339665354294.156.79.77192.168.2.15
                            Apr 23, 2024 16:44:01.028851986 CEST5354233966192.168.2.1594.156.79.77
                            Apr 23, 2024 16:44:04.853327990 CEST374267733192.168.2.1589.190.156.145
                            Apr 23, 2024 16:44:09.918126106 CEST5354233966192.168.2.1594.156.79.77
                            Apr 23, 2024 16:44:10.142693996 CEST339665354294.156.79.77192.168.2.15
                            Apr 23, 2024 16:44:10.142776966 CEST339665354294.156.79.77192.168.2.15
                            Apr 23, 2024 16:44:10.142961979 CEST5354233966192.168.2.1594.156.79.77
                            Apr 23, 2024 16:44:20.153044939 CEST5354233966192.168.2.1594.156.79.77
                            Apr 23, 2024 16:44:20.374020100 CEST339665354294.156.79.77192.168.2.15
                            Apr 23, 2024 16:44:20.374054909 CEST339665354294.156.79.77192.168.2.15
                            Apr 23, 2024 16:44:20.374347925 CEST5354233966192.168.2.1594.156.79.77
                            Apr 23, 2024 16:44:35.722810984 CEST339665354294.156.79.77192.168.2.15
                            Apr 23, 2024 16:44:35.722991943 CEST5354233966192.168.2.1594.156.79.77
                            Apr 23, 2024 16:44:50.944677114 CEST339665354294.156.79.77192.168.2.15
                            Apr 23, 2024 16:44:50.944874048 CEST5354233966192.168.2.1594.156.79.77
                            TimestampSource PortDest PortSource IPDest IP
                            Apr 23, 2024 16:42:59.423657894 CEST4243853192.168.2.158.8.8.8
                            Apr 23, 2024 16:42:59.530653000 CEST53424388.8.8.8192.168.2.15
                            Apr 23, 2024 16:42:59.531419992 CEST4788653192.168.2.158.8.8.8
                            Apr 23, 2024 16:42:59.637810946 CEST53478868.8.8.8192.168.2.15
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Apr 23, 2024 16:42:59.423657894 CEST192.168.2.158.8.8.80x84a5Standard query (0)cnc.voidnet.clickA (IP address)IN (0x0001)false
                            Apr 23, 2024 16:42:59.531419992 CEST192.168.2.158.8.8.80x8403Standard query (0)cnc.voidnet.clickA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Apr 23, 2024 16:42:59.530653000 CEST8.8.8.8192.168.2.150x84a5No error (0)cnc.voidnet.click94.156.79.77A (IP address)IN (0x0001)false
                            Apr 23, 2024 16:42:59.637810946 CEST8.8.8.8192.168.2.150x8403No error (0)cnc.voidnet.click94.156.79.77A (IP address)IN (0x0001)false

                            System Behavior

                            Start time (UTC):14:42:58
                            Start date (UTC):23/04/2024
                            Path:/tmp/Tb0uDdOwyO.elf
                            Arguments:/tmp/Tb0uDdOwyO.elf
                            File size:5773336 bytes
                            MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                            Start time (UTC):14:42:58
                            Start date (UTC):23/04/2024
                            Path:/tmp/Tb0uDdOwyO.elf
                            Arguments:-
                            File size:5773336 bytes
                            MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                            Start time (UTC):14:42:58
                            Start date (UTC):23/04/2024
                            Path:/tmp/Tb0uDdOwyO.elf
                            Arguments:-
                            File size:5773336 bytes
                            MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                            Start time (UTC):14:42:59
                            Start date (UTC):23/04/2024
                            Path:/usr/libexec/gnome-session-binary
                            Arguments:-
                            File size:334664 bytes
                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                            Start time (UTC):14:42:59
                            Start date (UTC):23/04/2024
                            Path:/bin/sh
                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):14:42:59
                            Start date (UTC):23/04/2024
                            Path:/usr/libexec/gsd-rfkill
                            Arguments:/usr/libexec/gsd-rfkill
                            File size:51808 bytes
                            MD5 hash:88a16a3c0aba1759358c06215ecfb5cc

                            Start time (UTC):14:43:00
                            Start date (UTC):23/04/2024
                            Path:/usr/lib/systemd/systemd
                            Arguments:-
                            File size:1620224 bytes
                            MD5 hash:9b2bec7092a40488108543f9334aab75

                            Start time (UTC):14:43:00
                            Start date (UTC):23/04/2024
                            Path:/lib/systemd/systemd-hostnamed
                            Arguments:/lib/systemd/systemd-hostnamed
                            File size:35040 bytes
                            MD5 hash:2cc8a5576629a2d5bd98e49a4b8bef65