Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
Y04kc90KjB.elf

Overview

General Information

Sample name:Y04kc90KjB.elf
renamed because original name is a hash value
Original sample name:3269d259e15e21443a2e1e7e83d45e45.elf
Analysis ID:1430430
MD5:3269d259e15e21443a2e1e7e83d45e45
SHA1:d74f28ae8f403a5ff336986d5cead17b6eb4390a
SHA256:130c8fc7a6e5e3a0f3bd8c2bbf231af16a478603706d7f670f3eb0f0742d78ad
Tags:32elfmiraimotorola
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Sample deletes itself
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1430430
Start date and time:2024-04-23 16:46:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 41s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:Y04kc90KjB.elf
renamed because original name is a hash value
Original Sample Name:3269d259e15e21443a2e1e7e83d45e45.elf
Detection:MAL
Classification:mal52.evad.linELF@0/1@1/0
  • VT rate limit hit for: Y04kc90KjB.elf
Command:/tmp/Y04kc90KjB.elf
PID:5523
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
about to cum inside a femboy btw
Standard Error:
  • system is lnxubuntu20
  • sh (PID: 5536, Parent: 1498, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
  • gsd-rfkill (PID: 5536, Parent: 1498, MD5: 88a16a3c0aba1759358c06215ecfb5cc) Arguments: /usr/libexec/gsd-rfkill
  • systemd New Fork (PID: 5541, Parent: 1)
  • systemd-hostnamed (PID: 5541, Parent: 1, MD5: 2cc8a5576629a2d5bd98e49a4b8bef65) Arguments: /lib/systemd/systemd-hostnamed
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Y04kc90KjB.elfReversingLabs: Detection: 26%
Source: Y04kc90KjB.elfString: N^NuEOF/proc//proc/%s/cmdlinerwgetcurlftpechokillbashrebootshutdownhaltpoweroff[locker] killed process: %s ;; pid: %d
Source: global trafficTCP traffic: 192.168.2.15:37424 -> 89.190.156.145:7733
Source: global trafficTCP traffic: 192.168.2.15:53544 -> 94.156.79.77:33966
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownDNS traffic detected: queries for: cnc.voidnet.click
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/Y04kc90KjB.elf (PID: 5528)SIGKILL sent: pid: 1679, result: successfulJump to behavior
Source: classification engineClassification label: mal52.evad.linELF@0/1@1/0
Source: /usr/libexec/gsd-rfkill (PID: 5536)Directory: <invalid fd (9)>/..Jump to behavior
Source: /usr/libexec/gsd-rfkill (PID: 5536)Directory: <invalid fd (8)>/..Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5541)Directory: <invalid fd (10)>/..Jump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/1333/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/911/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/1591/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/1585/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/804/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/1484/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/133/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/1479/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/931/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/1595/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/812/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/933/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/262/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/142/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/263/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/264/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/265/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/145/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/266/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/267/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/268/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/269/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/1486/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/270/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/271/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/272/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/273/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/274/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/275/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/276/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/277/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/278/cmdlineJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5528)File opened: /proc/279/cmdlineJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/Y04kc90KjB.elf (PID: 5526)File: /tmp/Y04kc90KjB.elfJump to behavior
Source: /tmp/Y04kc90KjB.elf (PID: 5523)Queries kernel information via 'uname': Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5541)Queries kernel information via 'uname': Jump to behavior
Source: Y04kc90KjB.elf, 5523.1.00007ffec0461000.00007ffec0482000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.zrLeXM\
Source: Y04kc90KjB.elf, 5523.1.00007ffec0461000.00007ffec0482000.rw-.sdmpBinary or memory string: /qemu-open.XXXXX
Source: Y04kc90KjB.elf, 5523.1.000055bec23ae000.000055bec2433000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/m68k
Source: Y04kc90KjB.elf, 5523.1.00007ffec0461000.00007ffec0482000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
Source: Y04kc90KjB.elf, 5523.1.000055bec23ae000.000055bec2433000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
Source: Y04kc90KjB.elf, 5523.1.00007ffec0461000.00007ffec0482000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-m68k/tmp/Y04kc90KjB.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/Y04kc90KjB.elf
Source: Y04kc90KjB.elf, 5523.1.00007ffec0461000.00007ffec0482000.rw-.sdmpBinary or memory string: /tmp/qemu-open.zrLeXM
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Hidden Files and Directories
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File Deletion
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1430430 Sample: Y04kc90KjB.elf Startdate: 23/04/2024 Architecture: LINUX Score: 52 19 cnc.voidnet.click 94.156.79.77, 33966, 53544 NET1-ASBG Bulgaria 2->19 21 89.190.156.145, 7733 HOSTUS-GLOBAL-ASHostUSHK United Kingdom 2->21 23 Multi AV Scanner detection for submitted file 2->23 8 Y04kc90KjB.elf 2->8         started        10 gnome-session-binary sh gsd-rfkill 2->10         started        12 systemd systemd-hostnamed 2->12         started        signatures3 process4 process5 14 Y04kc90KjB.elf 8->14         started        signatures6 25 Sample deletes itself 14->25 17 Y04kc90KjB.elf 14->17         started        process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Y04kc90KjB.elf26%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
cnc.voidnet.click
94.156.79.77
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    94.156.79.77
    cnc.voidnet.clickBulgaria
    43561NET1-ASBGfalse
    89.190.156.145
    unknownUnited Kingdom
    7489HOSTUS-GLOBAL-ASHostUSHKfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    94.156.79.77BN34UR6QlT.elfGet hashmaliciousUnknownBrowse
      cG1d8L6E2V.elfGet hashmaliciousUnknownBrowse
        Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
          PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
            2NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
              gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
                89.190.156.145BN34UR6QlT.elfGet hashmaliciousUnknownBrowse
                  cG1d8L6E2V.elfGet hashmaliciousUnknownBrowse
                    Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                      PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                        2NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
                          gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
                            EOtMo9xTFK.elfGet hashmaliciousMiraiBrowse
                              epLN92K8RM.elfGet hashmaliciousMiraiBrowse
                                8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                                  LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    cnc.voidnet.clickTb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                                    • 94.156.79.77
                                    PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                                    • 94.156.79.77
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    HOSTUS-GLOBAL-ASHostUSHKBN34UR6QlT.elfGet hashmaliciousUnknownBrowse
                                    • 89.190.156.145
                                    cG1d8L6E2V.elfGet hashmaliciousUnknownBrowse
                                    • 89.190.156.145
                                    Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                                    • 89.190.156.145
                                    PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                                    • 89.190.156.145
                                    BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                    • 162.245.217.156
                                    2NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
                                    • 89.190.156.145
                                    gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
                                    • 89.190.156.145
                                    EOtMo9xTFK.elfGet hashmaliciousMiraiBrowse
                                    • 89.190.156.145
                                    epLN92K8RM.elfGet hashmaliciousMiraiBrowse
                                    • 89.190.156.145
                                    NET1-ASBGBN34UR6QlT.elfGet hashmaliciousUnknownBrowse
                                    • 94.156.79.77
                                    cG1d8L6E2V.elfGet hashmaliciousUnknownBrowse
                                    • 94.156.79.77
                                    Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                                    • 94.156.79.77
                                    PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                                    • 94.156.79.77
                                    NMdpQecbkg.elfGet hashmaliciousMiraiBrowse
                                    • 94.156.8.135
                                    BRUFEN ORDER VAC442_7467247728478134247.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 87.121.105.163
                                    NLgD8SSCOD.elfGet hashmaliciousGafgytBrowse
                                    • 94.156.79.152
                                    http://94.156.79.129/x86_64Get hashmaliciousUnknownBrowse
                                    • 94.156.79.129
                                    http://94.156.79.129/tenda.shGet hashmaliciousUnknownBrowse
                                    • 94.156.79.129
                                    file.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                    • 94.156.79.164
                                    No context
                                    No context
                                    Process:/tmp/Y04kc90KjB.elf
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):30
                                    Entropy (8bit):4.481727678869737
                                    Encrypted:false
                                    SSDEEP:3:TgXQ0NloHJN:TgXQ03aJN
                                    MD5:6EE5DE36190EC7D5ECC9E8C2D2B058E5
                                    SHA1:F22B6CF1F0CD3F022D7D5F57B4CD0C7387E14DDC
                                    SHA-256:AE3D53993B68297AB4AE10B29C1CF894531F6695B39377A2C759DBD5C532B620
                                    SHA-512:44E3AED56FE2DB6C5741481D0C0D13D1AC3C3F4AC99573802696B1F5F88D5A2B7BFB1F7493383AE7DE56DC4151C7FFBA6FBA82376CEF5C2EAA6119C743892B79
                                    Malicious:false
                                    Reputation:low
                                    Preview:/tmp/Y04kc90KjB.elf.nwlrbbmqbh
                                    File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                                    Entropy (8bit):6.208112429158695
                                    TrID:
                                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                    File name:Y04kc90KjB.elf
                                    File size:85'248 bytes
                                    MD5:3269d259e15e21443a2e1e7e83d45e45
                                    SHA1:d74f28ae8f403a5ff336986d5cead17b6eb4390a
                                    SHA256:130c8fc7a6e5e3a0f3bd8c2bbf231af16a478603706d7f670f3eb0f0742d78ad
                                    SHA512:cbdb8b3dde63e2ab4c18e18d9f496db71789ef221a43d83ef364bc8297bfa127ecdf1c434e2eaf2cc9e6f1c61e4de5453509d29bc9a7ea237a300fb49abfaf64
                                    SSDEEP:1536:41LJvCyEpMADod2480ydtklqtfCYi5Y4Tjr/ZDLl+xUwwCF:WLJqpmADod2iydtkVYoYG5l+xbZF
                                    TLSH:BA833AD7F400ED7DFC0ED77B4853490AB671A3A156831B3A3367B963AD321A44926F82
                                    File Content Preview:.ELF.......................D...4..Kp.....4. ...(......................F...F....... .......G...g...g....0..%....... .dt.Q............................NV..a....da.... N^NuNV..J9..k0f>"y..g. QJ.g.X.#...g.N."y..g. QJ.f.A.....J.g.Hy..F.N.X.......k0N^NuNV..N^NuN

                                    ELF header

                                    Class:ELF32
                                    Data:2's complement, big endian
                                    Version:1 (current)
                                    Machine:MC68000
                                    Version Number:0x1
                                    Type:EXEC (Executable file)
                                    OS/ABI:UNIX - System V
                                    ABI Version:0
                                    Entry Point Address:0x80000144
                                    Flags:0x0
                                    ELF Header Size:52
                                    Program Header Offset:52
                                    Program Header Size:32
                                    Number of Program Headers:3
                                    Section Header Offset:84848
                                    Section Header Size:40
                                    Number of Section Headers:10
                                    Header String Table Index:9
                                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                    NULL0x00x00x00x00x0000
                                    .initPROGBITS0x800000940x940x140x00x6AX002
                                    .textPROGBITS0x800000a80xa80x12e4a0x00x6AX004
                                    .finiPROGBITS0x80012ef20x12ef20xe0x00x6AX002
                                    .rodataPROGBITS0x80012f000x12f000x17f90x00x2A002
                                    .ctorsPROGBITS0x800167000x147000x80x00x3WA004
                                    .dtorsPROGBITS0x800167080x147080x80x00x3WA004
                                    .dataPROGBITS0x800167140x147140x41c0x00x3WA004
                                    .bssNOBITS0x80016b300x14b300x21bc0x00x3WA004
                                    .shstrtabSTRTAB0x00x14b300x3e0x00x0001
                                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                    LOAD0x00x800000000x800000000x146f90x146f96.23080x5R E0x2000.init .text .fini .rodata
                                    LOAD0x147000x800167000x800167000x4300x25ec3.73430x6RW 0x2000.ctors .dtors .data .bss
                                    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                    TimestampSource PortDest PortSource IPDest IP
                                    Apr 23, 2024 16:46:57.898915052 CEST374247733192.168.2.1589.190.156.145
                                    Apr 23, 2024 16:46:58.035883904 CEST5354433966192.168.2.1594.156.79.77
                                    Apr 23, 2024 16:46:58.261699915 CEST339665354494.156.79.77192.168.2.15
                                    Apr 23, 2024 16:46:58.262259960 CEST5354433966192.168.2.1594.156.79.77
                                    Apr 23, 2024 16:46:58.262440920 CEST5354433966192.168.2.1594.156.79.77
                                    Apr 23, 2024 16:46:58.488068104 CEST339665354494.156.79.77192.168.2.15
                                    Apr 23, 2024 16:46:58.488187075 CEST5354433966192.168.2.1594.156.79.77
                                    Apr 23, 2024 16:46:58.713855028 CEST339665354494.156.79.77192.168.2.15
                                    Apr 23, 2024 16:46:58.915898085 CEST374247733192.168.2.1589.190.156.145
                                    Apr 23, 2024 16:47:00.931900024 CEST374247733192.168.2.1589.190.156.145
                                    Apr 23, 2024 16:47:05.155694008 CEST374247733192.168.2.1589.190.156.145
                                    Apr 23, 2024 16:47:13.347609043 CEST374247733192.168.2.1589.190.156.145
                                    Apr 23, 2024 16:47:13.716634989 CEST339665354494.156.79.77192.168.2.15
                                    Apr 23, 2024 16:47:13.716811895 CEST5354433966192.168.2.1594.156.79.77
                                    Apr 23, 2024 16:47:28.944721937 CEST339665354494.156.79.77192.168.2.15
                                    Apr 23, 2024 16:47:28.945048094 CEST5354433966192.168.2.1594.156.79.77
                                    Apr 23, 2024 16:47:29.474982023 CEST374247733192.168.2.1589.190.156.145
                                    Apr 23, 2024 16:47:44.172576904 CEST339665354494.156.79.77192.168.2.15
                                    Apr 23, 2024 16:47:44.172739029 CEST5354433966192.168.2.1594.156.79.77
                                    Apr 23, 2024 16:47:59.400588989 CEST339665354494.156.79.77192.168.2.15
                                    Apr 23, 2024 16:47:59.400762081 CEST5354433966192.168.2.1594.156.79.77
                                    Apr 23, 2024 16:48:02.754076958 CEST374247733192.168.2.1589.190.156.145
                                    Apr 23, 2024 16:48:08.319221020 CEST5354433966192.168.2.1594.156.79.77
                                    Apr 23, 2024 16:48:08.544909954 CEST339665354494.156.79.77192.168.2.15
                                    Apr 23, 2024 16:48:08.545104980 CEST339665354494.156.79.77192.168.2.15
                                    Apr 23, 2024 16:48:08.545263052 CEST5354433966192.168.2.1594.156.79.77
                                    Apr 23, 2024 16:48:18.555537939 CEST5354433966192.168.2.1594.156.79.77
                                    Apr 23, 2024 16:48:18.780580044 CEST339665354494.156.79.77192.168.2.15
                                    Apr 23, 2024 16:48:18.780610085 CEST339665354494.156.79.77192.168.2.15
                                    Apr 23, 2024 16:48:18.780731916 CEST5354433966192.168.2.1594.156.79.77
                                    Apr 23, 2024 16:48:34.056777954 CEST339665354494.156.79.77192.168.2.15
                                    Apr 23, 2024 16:48:34.056953907 CEST5354433966192.168.2.1594.156.79.77
                                    Apr 23, 2024 16:48:49.286365986 CEST339665354494.156.79.77192.168.2.15
                                    Apr 23, 2024 16:48:49.286653996 CEST5354433966192.168.2.1594.156.79.77
                                    TimestampSource PortDest PortSource IPDest IP
                                    Apr 23, 2024 16:46:57.391222954 CEST3352253192.168.2.158.8.8.8
                                    Apr 23, 2024 16:46:57.501955986 CEST53335228.8.8.8192.168.2.15
                                    Apr 23, 2024 16:46:57.502577066 CEST5249653192.168.2.158.8.8.8
                                    Apr 23, 2024 16:46:57.609014034 CEST53524968.8.8.8192.168.2.15
                                    Apr 23, 2024 16:46:57.609234095 CEST4715553192.168.2.158.8.8.8
                                    Apr 23, 2024 16:46:57.715830088 CEST53471558.8.8.8192.168.2.15
                                    Apr 23, 2024 16:46:57.715974092 CEST4389353192.168.2.158.8.8.8
                                    Apr 23, 2024 16:46:57.822395086 CEST53438938.8.8.8192.168.2.15
                                    Apr 23, 2024 16:46:57.822545052 CEST3345653192.168.2.158.8.8.8
                                    Apr 23, 2024 16:46:57.929013014 CEST53334568.8.8.8192.168.2.15
                                    Apr 23, 2024 16:46:57.929131985 CEST5217853192.168.2.158.8.8.8
                                    Apr 23, 2024 16:46:58.035540104 CEST53521788.8.8.8192.168.2.15
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Apr 23, 2024 16:46:57.391222954 CEST192.168.2.158.8.8.80x4801Standard query (0)cnc.voidnet.clickA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Apr 23, 2024 16:46:57.501955986 CEST8.8.8.8192.168.2.150x4801No error (0)cnc.voidnet.click94.156.79.77A (IP address)IN (0x0001)false

                                    System Behavior

                                    Start time (UTC):14:46:56
                                    Start date (UTC):23/04/2024
                                    Path:/tmp/Y04kc90KjB.elf
                                    Arguments:/tmp/Y04kc90KjB.elf
                                    File size:4463432 bytes
                                    MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                    Start time (UTC):14:46:56
                                    Start date (UTC):23/04/2024
                                    Path:/tmp/Y04kc90KjB.elf
                                    Arguments:-
                                    File size:4463432 bytes
                                    MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                    Start time (UTC):14:46:56
                                    Start date (UTC):23/04/2024
                                    Path:/tmp/Y04kc90KjB.elf
                                    Arguments:-
                                    File size:4463432 bytes
                                    MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                    Start time (UTC):14:46:57
                                    Start date (UTC):23/04/2024
                                    Path:/usr/libexec/gnome-session-binary
                                    Arguments:-
                                    File size:334664 bytes
                                    MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                    Start time (UTC):14:46:57
                                    Start date (UTC):23/04/2024
                                    Path:/bin/sh
                                    Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):14:46:57
                                    Start date (UTC):23/04/2024
                                    Path:/usr/libexec/gsd-rfkill
                                    Arguments:/usr/libexec/gsd-rfkill
                                    File size:51808 bytes
                                    MD5 hash:88a16a3c0aba1759358c06215ecfb5cc

                                    Start time (UTC):14:46:57
                                    Start date (UTC):23/04/2024
                                    Path:/usr/lib/systemd/systemd
                                    Arguments:-
                                    File size:1620224 bytes
                                    MD5 hash:9b2bec7092a40488108543f9334aab75

                                    Start time (UTC):14:46:57
                                    Start date (UTC):23/04/2024
                                    Path:/lib/systemd/systemd-hostnamed
                                    Arguments:/lib/systemd/systemd-hostnamed
                                    File size:35040 bytes
                                    MD5 hash:2cc8a5576629a2d5bd98e49a4b8bef65