Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
JU8juw0kr0.elf

Overview

General Information

Sample name:JU8juw0kr0.elf
renamed because original name is a hash value
Original sample name:d64d515bcf2d91d1a7222e4a5a0ec940.elf
Analysis ID:1430434
MD5:d64d515bcf2d91d1a7222e4a5a0ec940
SHA1:b3db534c6b86da47dfa9a7b55885474acf596a57
SHA256:a757c63a3b1fd90cd245c9590266906aac0d02712049cb6873f0e2c2adc3b4c9
Tags:32armelfmirai
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Queries the IP of a very long domain name
Sample deletes itself
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1430434
Start date and time:2024-04-23 16:50:06 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 3s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:JU8juw0kr0.elf
renamed because original name is a hash value
Original Sample Name:d64d515bcf2d91d1a7222e4a5a0ec940.elf
Detection:MAL
Classification:mal64.troj.evad.linELF@0/1@6/0
  • VT rate limit hit for: JU8juw0kr0.elf
Command:/tmp/JU8juw0kr0.elf
PID:5548
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
about to cum inside a femboy btw
Standard Error:
  • system is lnxubuntu20
  • sh (PID: 5556, Parent: 1588, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
  • gsd-rfkill (PID: 5556, Parent: 1588, MD5: 88a16a3c0aba1759358c06215ecfb5cc) Arguments: /usr/libexec/gsd-rfkill
  • systemd New Fork (PID: 5561, Parent: 1)
  • systemd-hostnamed (PID: 5561, Parent: 1, MD5: 2cc8a5576629a2d5bd98e49a4b8bef65) Arguments: /lib/systemd/systemd-hostnamed
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: JU8juw0kr0.elfAvira: detected
Source: JU8juw0kr0.elfReversingLabs: Detection: 39%
Source: JU8juw0kr0.elfString: EOF/proc//proc/%s/cmdlinerwgetcurlftpechokillbashrebootshutdownhaltpoweroff[locker] killed process: %s ;; pid: %d

Networking

barindex
Source: unknownDNS traffic detected: query: cnc.voidnet.click.'f66a/PV!E(t:5r)I'fNNPV!a/E@
Source: unknownDNS traffic detected: query: cnc.voidnet.click.'f66a/PV!E(lj5)I'fNNPV!a/E@.@@y.5,a
Source: unknownDNS traffic detected: query: cnc.voidnet.click.'fx66a/PV!E(bBj>5)I'fNNPV!a/E@.@@y
Source: unknownDNS traffic detected: query: cnc.voidnet.click.'fNT66a/PV!E(&:?5)I'fTNNPV!a/E@.@@y5,br)I
Source: unknownDNS traffic detected: query: cnc.voidnet.click.'fJJPV!a/E<V@@+Y5p('f66
Source: global trafficTCP traffic: 192.168.2.13:44752 -> 89.190.156.145:7733
Source: global trafficTCP traffic: 192.168.2.13:51574 -> 94.156.79.77:33966
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownDNS traffic detected: queries for: cnc.voidnet.click
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/JU8juw0kr0.elf (PID: 5552)SIGKILL sent: pid: 1884, result: successfulJump to behavior
Source: classification engineClassification label: mal64.troj.evad.linELF@0/1@6/0
Source: /usr/libexec/gsd-rfkill (PID: 5556)Directory: <invalid fd (9)>/..Jump to behavior
Source: /usr/libexec/gsd-rfkill (PID: 5556)Directory: <invalid fd (8)>/..Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5561)Directory: <invalid fd (10)>/..Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/238/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/239/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/241/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/1482/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/1480/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/371/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/1238/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/134/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/1475/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/936/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/816/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/262/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/142/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/263/cmdlineJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552)File opened: /proc/264/cmdlineJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/JU8juw0kr0.elf (PID: 5550)File: /tmp/JU8juw0kr0.elfJump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5548)Queries kernel information via 'uname': Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5561)Queries kernel information via 'uname': Jump to behavior
Source: JU8juw0kr0.elf, 5548.1.0000556169f1b000.000055616a049000.rw-.sdmpBinary or memory string: iaU!/etc/qemu-binfmt/arm
Source: JU8juw0kr0.elf, 5548.1.00007ffdcd3cb000.00007ffdcd3ec000.rw-.sdmpBinary or memory string: /tmp/qemu-open.TsJKJG
Source: JU8juw0kr0.elf, 5548.1.00007ffdcd3cb000.00007ffdcd3ec000.rw-.sdmpBinary or memory string: xfaU/tmp/qemu-open.TsJKJG:
Source: JU8juw0kr0.elf, 5548.1.00007ffdcd3cb000.00007ffdcd3ec000.rw-.sdmpBinary or memory string: qx86_64/usr/bin/qemu-arm/tmp/JU8juw0kr0.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/JU8juw0kr0.elf
Source: JU8juw0kr0.elf, 5548.1.0000556169f1b000.000055616a049000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: JU8juw0kr0.elf, 5548.1.00007ffdcd3cb000.00007ffdcd3ec000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Hidden Files and Directories
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File Deletion
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive11
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1430434 Sample: JU8juw0kr0.elf Startdate: 23/04/2024 Architecture: LINUX Score: 64 19 cnc.voidnet.click.'fx66a/PV!E(bBj>5)I'fNNPV!a/E@.@@y 2->19 21 cnc.voidnet.click.'fNT66a/PV!E(&:?5)I'fTNNPV!a/E@.@@y5,br)I 2->21 23 5 other IPs or domains 2->23 25 Antivirus / Scanner detection for submitted sample 2->25 27 Multi AV Scanner detection for submitted file 2->27 8 JU8juw0kr0.elf 2->8         started        10 gnome-session-binary sh gsd-rfkill 2->10         started        12 systemd systemd-hostnamed 2->12         started        signatures3 29 Queries the IP of a very long domain name 21->29 process4 process5 14 JU8juw0kr0.elf 8->14         started        signatures6 31 Sample deletes itself 14->31 17 JU8juw0kr0.elf 14->17         started        process7
SourceDetectionScannerLabelLink
JU8juw0kr0.elf39%ReversingLabsLinux.Trojan.Mirai
JU8juw0kr0.elf100%AviraEXP/ELF.Mirai.W
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
cnc.voidnet.click
94.156.79.77
truetrue
    unknown
    cnc.voidnet.click.'fNT66a/PV!E(&:?5)I'fTNNPV!a/E@.@@y5,br)I
    unknown
    unknowntrue
      low
      cnc.voidnet.click.'fJJPV!a/E<V@@+Y5p('f66
      unknown
      unknowntrue
        low
        cnc.voidnet.click.'f66a/PV!E(t:5r)I'fNNPV!a/E@
        unknown
        unknowntrue
          low
          cnc.voidnet.click.'fx66a/PV!E(bBj>5)I'fNNPV!a/E@.@@y
          unknown
          unknowntrue
            low
            cnc.voidnet.click.'f66a/PV!E(lj5)I'fNNPV!a/E@.@@y.5,a
            unknown
            unknowntrue
              low
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              94.156.79.77
              cnc.voidnet.clickBulgaria
              43561NET1-ASBGtrue
              89.190.156.145
              unknownUnited Kingdom
              7489HOSTUS-GLOBAL-ASHostUSHKfalse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              94.156.79.776WfrjCTjs8.elfGet hashmaliciousUnknownBrowse
                mJ4CsuZhyr.elfGet hashmaliciousMiraiBrowse
                  W46ssx5gcI.elfGet hashmaliciousUnknownBrowse
                    Y04kc90KjB.elfGet hashmaliciousUnknownBrowse
                      BN34UR6QlT.elfGet hashmaliciousUnknownBrowse
                        cG1d8L6E2V.elfGet hashmaliciousUnknownBrowse
                          Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                            PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                              2NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
                                gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
                                  89.190.156.1456WfrjCTjs8.elfGet hashmaliciousUnknownBrowse
                                    W46ssx5gcI.elfGet hashmaliciousUnknownBrowse
                                      Y04kc90KjB.elfGet hashmaliciousUnknownBrowse
                                        BN34UR6QlT.elfGet hashmaliciousUnknownBrowse
                                          cG1d8L6E2V.elfGet hashmaliciousUnknownBrowse
                                            Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                                              PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                                                2NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
                                                  gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
                                                    EOtMo9xTFK.elfGet hashmaliciousMiraiBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      cnc.voidnet.clickW46ssx5gcI.elfGet hashmaliciousUnknownBrowse
                                                      • 94.156.79.77
                                                      Y04kc90KjB.elfGet hashmaliciousUnknownBrowse
                                                      • 94.156.79.77
                                                      Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                                                      • 94.156.79.77
                                                      PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                                                      • 94.156.79.77
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      HOSTUS-GLOBAL-ASHostUSHK6WfrjCTjs8.elfGet hashmaliciousUnknownBrowse
                                                      • 89.190.156.145
                                                      W46ssx5gcI.elfGet hashmaliciousUnknownBrowse
                                                      • 89.190.156.145
                                                      Y04kc90KjB.elfGet hashmaliciousUnknownBrowse
                                                      • 89.190.156.145
                                                      BN34UR6QlT.elfGet hashmaliciousUnknownBrowse
                                                      • 89.190.156.145
                                                      cG1d8L6E2V.elfGet hashmaliciousUnknownBrowse
                                                      • 89.190.156.145
                                                      Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                                                      • 89.190.156.145
                                                      PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                                                      • 89.190.156.145
                                                      BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                                      • 162.245.217.156
                                                      2NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
                                                      • 89.190.156.145
                                                      NET1-ASBG6WfrjCTjs8.elfGet hashmaliciousUnknownBrowse
                                                      • 94.156.79.77
                                                      mJ4CsuZhyr.elfGet hashmaliciousMiraiBrowse
                                                      • 94.156.79.77
                                                      W46ssx5gcI.elfGet hashmaliciousUnknownBrowse
                                                      • 94.156.79.77
                                                      Y04kc90KjB.elfGet hashmaliciousUnknownBrowse
                                                      • 94.156.79.77
                                                      BN34UR6QlT.elfGet hashmaliciousUnknownBrowse
                                                      • 94.156.79.77
                                                      cG1d8L6E2V.elfGet hashmaliciousUnknownBrowse
                                                      • 94.156.79.77
                                                      Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                                                      • 94.156.79.77
                                                      PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                                                      • 94.156.79.77
                                                      NMdpQecbkg.elfGet hashmaliciousMiraiBrowse
                                                      • 94.156.8.135
                                                      BRUFEN ORDER VAC442_7467247728478134247.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                      • 87.121.105.163
                                                      No context
                                                      No context
                                                      Process:/tmp/JU8juw0kr0.elf
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):30
                                                      Entropy (8bit):4.348394345536403
                                                      Encrypted:false
                                                      SSDEEP:3:TgoNES8HJN:TgoGJN
                                                      MD5:EB9CC00A04BB76B3B9F94034E236C407
                                                      SHA1:6DA77BA4C347302EAD2C66AC94088E1D350CFA49
                                                      SHA-256:D4DE88897EBC0B7932EA5C195811BC47F5C5130D636CEEF054C7E6B48F00C1D0
                                                      SHA-512:EEECF93A9A107F2C47910CDB7BDD2C92FDFB6D891EC93064BD15EEBB76760FEBB3C5BA615282607C73ECA133DD9E6BBF59B96A9B70B38F2226F07DDAEE2DF15C
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:/tmp/JU8juw0kr0.elf.nwlrbbmqbh
                                                      File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                                                      Entropy (8bit):6.052230684090755
                                                      TrID:
                                                      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                      File name:JU8juw0kr0.elf
                                                      File size:75'268 bytes
                                                      MD5:d64d515bcf2d91d1a7222e4a5a0ec940
                                                      SHA1:b3db534c6b86da47dfa9a7b55885474acf596a57
                                                      SHA256:a757c63a3b1fd90cd245c9590266906aac0d02712049cb6873f0e2c2adc3b4c9
                                                      SHA512:7e4a991390bb6b9781eb684f761305de599a8eb3b5fa81e77c17d7e869f41ee069c726c39416761502be64e1dbf6254ad4b4f183c72c8dd7c8d07450ab7bc650
                                                      SSDEEP:1536:8GcEk0+/kGoDDBKhjErbwlONGR5znoyhI6SiC:8GcSRMjEPsRnx+
                                                      TLSH:32733A91FD829613C6D012BBFB5E418D372A13A8D3EE72079E256F20378785B0E77652
                                                      File Content Preview:.ELF...a..........(.........4...t$......4. ...(.......................................... ... ... ..4....&..........Q.td..................................-...L."...vA..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                                                      ELF header

                                                      Class:ELF32
                                                      Data:2's complement, little endian
                                                      Version:1 (current)
                                                      Machine:ARM
                                                      Version Number:0x1
                                                      Type:EXEC (Executable file)
                                                      OS/ABI:ARM - ABI
                                                      ABI Version:0
                                                      Entry Point Address:0x8190
                                                      Flags:0x2
                                                      ELF Header Size:52
                                                      Program Header Offset:52
                                                      Program Header Size:32
                                                      Number of Program Headers:3
                                                      Section Header Offset:74868
                                                      Section Header Size:40
                                                      Number of Section Headers:10
                                                      Header String Table Index:9
                                                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                      NULL0x00x00x00x00x0000
                                                      .initPROGBITS0x80940x940x180x00x6AX004
                                                      .textPROGBITS0x80b00xb00x106100x00x6AX0016
                                                      .finiPROGBITS0x186c00x106c00x140x00x6AX004
                                                      .rodataPROGBITS0x186d40x106d40x18380x00x2A004
                                                      .ctorsPROGBITS0x220000x120000x80x00x3WA004
                                                      .dtorsPROGBITS0x220080x120080x80x00x3WA004
                                                      .dataPROGBITS0x220140x120140x4200x00x3WA004
                                                      .bssNOBITS0x224340x124340x21e00x00x3WA004
                                                      .shstrtabSTRTAB0x00x124340x3e0x00x0001
                                                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                      LOAD0x00x80000x80000x11f0c0x11f0c6.09010x5R E0x8000.init .text .fini .rodata
                                                      LOAD0x120000x220000x220000x4340x26143.51890x6RW 0x8000.ctors .dtors .data .bss
                                                      GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Apr 23, 2024 16:51:17.498450041 CEST447527733192.168.2.1389.190.156.145
                                                      Apr 23, 2024 16:51:17.587240934 CEST5157433966192.168.2.1394.156.79.77
                                                      Apr 23, 2024 16:51:17.814845085 CEST339665157494.156.79.77192.168.2.13
                                                      Apr 23, 2024 16:51:17.815099955 CEST5157433966192.168.2.1394.156.79.77
                                                      Apr 23, 2024 16:51:17.815381050 CEST5157433966192.168.2.1394.156.79.77
                                                      Apr 23, 2024 16:51:18.042754889 CEST339665157494.156.79.77192.168.2.13
                                                      Apr 23, 2024 16:51:18.042818069 CEST5157433966192.168.2.1394.156.79.77
                                                      Apr 23, 2024 16:51:18.270431042 CEST339665157494.156.79.77192.168.2.13
                                                      Apr 23, 2024 16:51:18.500682116 CEST447527733192.168.2.1389.190.156.145
                                                      Apr 23, 2024 16:51:20.516664028 CEST447527733192.168.2.1389.190.156.145
                                                      Apr 23, 2024 16:51:24.644711971 CEST447527733192.168.2.1389.190.156.145
                                                      Apr 23, 2024 16:51:32.836682081 CEST447527733192.168.2.1389.190.156.145
                                                      Apr 23, 2024 16:51:33.272660971 CEST339665157494.156.79.77192.168.2.13
                                                      Apr 23, 2024 16:51:33.272886992 CEST5157433966192.168.2.1394.156.79.77
                                                      Apr 23, 2024 16:51:48.500670910 CEST339665157494.156.79.77192.168.2.13
                                                      Apr 23, 2024 16:51:48.500837088 CEST5157433966192.168.2.1394.156.79.77
                                                      Apr 23, 2024 16:51:48.964637995 CEST447527733192.168.2.1389.190.156.145
                                                      Apr 23, 2024 16:52:03.728842974 CEST339665157494.156.79.77192.168.2.13
                                                      Apr 23, 2024 16:52:03.729022026 CEST5157433966192.168.2.1394.156.79.77
                                                      Apr 23, 2024 16:52:18.960520029 CEST339665157494.156.79.77192.168.2.13
                                                      Apr 23, 2024 16:52:18.960798979 CEST5157433966192.168.2.1394.156.79.77
                                                      Apr 23, 2024 16:52:22.756592035 CEST447527733192.168.2.1389.190.156.145
                                                      Apr 23, 2024 16:52:27.882594109 CEST5157433966192.168.2.1394.156.79.77
                                                      Apr 23, 2024 16:52:28.110949039 CEST339665157494.156.79.77192.168.2.13
                                                      Apr 23, 2024 16:52:28.110986948 CEST339665157494.156.79.77192.168.2.13
                                                      Apr 23, 2024 16:52:28.111124992 CEST5157433966192.168.2.1394.156.79.77
                                                      Apr 23, 2024 16:52:38.121418953 CEST5157433966192.168.2.1394.156.79.77
                                                      Apr 23, 2024 16:52:38.348949909 CEST339665157494.156.79.77192.168.2.13
                                                      Apr 23, 2024 16:52:38.349025011 CEST339665157494.156.79.77192.168.2.13
                                                      Apr 23, 2024 16:52:38.349180937 CEST5157433966192.168.2.1394.156.79.77
                                                      Apr 23, 2024 16:52:53.640533924 CEST339665157494.156.79.77192.168.2.13
                                                      Apr 23, 2024 16:52:53.640678883 CEST5157433966192.168.2.1394.156.79.77
                                                      Apr 23, 2024 16:53:08.868571997 CEST339665157494.156.79.77192.168.2.13
                                                      Apr 23, 2024 16:53:08.868767977 CEST5157433966192.168.2.1394.156.79.77
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Apr 23, 2024 16:51:16.947798014 CEST6028853192.168.2.138.8.8.8
                                                      Apr 23, 2024 16:51:17.059294939 CEST53602888.8.8.8192.168.2.13
                                                      Apr 23, 2024 16:51:17.059940100 CEST4686253192.168.2.138.8.8.8
                                                      Apr 23, 2024 16:51:17.164767981 CEST53468628.8.8.8192.168.2.13
                                                      Apr 23, 2024 16:51:17.165009975 CEST5212853192.168.2.138.8.8.8
                                                      Apr 23, 2024 16:51:17.270051956 CEST53521288.8.8.8192.168.2.13
                                                      Apr 23, 2024 16:51:17.270229101 CEST4369753192.168.2.138.8.8.8
                                                      Apr 23, 2024 16:51:17.375159979 CEST53436978.8.8.8192.168.2.13
                                                      Apr 23, 2024 16:51:17.375325918 CEST4265753192.168.2.138.8.8.8
                                                      Apr 23, 2024 16:51:17.480334044 CEST53426578.8.8.8192.168.2.13
                                                      Apr 23, 2024 16:51:17.480482101 CEST4354853192.168.2.138.8.8.8
                                                      Apr 23, 2024 16:51:17.587025881 CEST53435488.8.8.8192.168.2.13
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Apr 23, 2024 16:51:16.947798014 CEST192.168.2.138.8.8.80xf62fStandard query (0)cnc.voidnet.clickA (IP address)IN (0x0001)false
                                                      Apr 23, 2024 16:51:17.059940100 CEST192.168.2.138.8.8.80x2949Standard query (0)cnc.voidnet.click.'f66a/PV!E(t:5r)I'fNNPV!a/E@1638416401false
                                                      Apr 23, 2024 16:51:17.165009975 CEST192.168.2.138.8.8.80x2949Standard query (0)cnc.voidnet.click.'f66a/PV!E(lj5)I'fNNPV!a/E@.@@y.5,a10569256false
                                                      Apr 23, 2024 16:51:17.270229101 CEST192.168.2.138.8.8.80x2949Standard query (0)cnc.voidnet.click.'fx66a/PV!E(bBj>5)I'fNNPV!a/E@.@@y1356811365false
                                                      Apr 23, 2024 16:51:17.375325918 CEST192.168.2.138.8.8.80x2949Standard query (0)cnc.voidnet.click.'fNT66a/PV!E(&:?5)I'fTNNPV!a/E@.@@y5,br)I325454false
                                                      Apr 23, 2024 16:51:17.480482101 CEST192.168.2.138.8.8.80x2949Standard query (0)cnc.voidnet.click.'fJJPV!a/E<V@@+Y5p('f666066047969false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Apr 23, 2024 16:51:17.059294939 CEST8.8.8.8192.168.2.130xf62fNo error (0)cnc.voidnet.click94.156.79.77A (IP address)IN (0x0001)false

                                                      System Behavior

                                                      Start time (UTC):14:51:15
                                                      Start date (UTC):23/04/2024
                                                      Path:/tmp/JU8juw0kr0.elf
                                                      Arguments:/tmp/JU8juw0kr0.elf
                                                      File size:4956856 bytes
                                                      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                      Start time (UTC):14:51:16
                                                      Start date (UTC):23/04/2024
                                                      Path:/tmp/JU8juw0kr0.elf
                                                      Arguments:-
                                                      File size:4956856 bytes
                                                      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                      Start time (UTC):14:51:16
                                                      Start date (UTC):23/04/2024
                                                      Path:/tmp/JU8juw0kr0.elf
                                                      Arguments:-
                                                      File size:4956856 bytes
                                                      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                      Start time (UTC):14:51:16
                                                      Start date (UTC):23/04/2024
                                                      Path:/usr/libexec/gnome-session-binary
                                                      Arguments:-
                                                      File size:334664 bytes
                                                      MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                                      Start time (UTC):14:51:16
                                                      Start date (UTC):23/04/2024
                                                      Path:/bin/sh
                                                      Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
                                                      File size:129816 bytes
                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                      Start time (UTC):14:51:16
                                                      Start date (UTC):23/04/2024
                                                      Path:/usr/libexec/gsd-rfkill
                                                      Arguments:/usr/libexec/gsd-rfkill
                                                      File size:51808 bytes
                                                      MD5 hash:88a16a3c0aba1759358c06215ecfb5cc

                                                      Start time (UTC):14:51:16
                                                      Start date (UTC):23/04/2024
                                                      Path:/usr/lib/systemd/systemd
                                                      Arguments:-
                                                      File size:1620224 bytes
                                                      MD5 hash:9b2bec7092a40488108543f9334aab75

                                                      Start time (UTC):14:51:16
                                                      Start date (UTC):23/04/2024
                                                      Path:/lib/systemd/systemd-hostnamed
                                                      Arguments:/lib/systemd/systemd-hostnamed
                                                      File size:35040 bytes
                                                      MD5 hash:2cc8a5576629a2d5bd98e49a4b8bef65