Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
wOIrAYQ8IM.elf

Overview

General Information

Sample name:wOIrAYQ8IM.elf
renamed because original name is a hash value
Original sample name:94ba115f3f3c595ca802ab67259a1a46.elf
Analysis ID:1431545
MD5:94ba115f3f3c595ca802ab67259a1a46
SHA1:d459542bea31e6d3a6fa932a842b5b54e5bf13cb
SHA256:924ff4dc1f289fd2dd9c8080a28fac4bd43302a894a156be027819eb892fcc00
Tags:32elfmiraimotorola
Infos:

Detection

Mirai
Score:64
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1431545
Start date and time:2024-04-25 12:25:13 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:wOIrAYQ8IM.elf
renamed because original name is a hash value
Original Sample Name:94ba115f3f3c595ca802ab67259a1a46.elf
Detection:MAL
Classification:mal64.troj.linELF@0/0@5/0
Command:/tmp/wOIrAYQ8IM.elf
PID:5547
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
wOIrAYQ8IM.elfJoeSecurity_Mirai_9Yara detected MiraiJoe Security
    SourceRuleDescriptionAuthorStrings
    5556.1.00007fb964001000.00007fb964012000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
      5549.1.00007fb964001000.00007fb964012000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
        5550.1.00007fb964001000.00007fb964012000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
          5547.1.00007fb964001000.00007fb964012000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
            Process Memory Space: wOIrAYQ8IM.elf PID: 5549JoeSecurity_Mirai_9Yara detected MiraiJoe Security
              Click to see the 2 entries
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: wOIrAYQ8IM.elfAvira: detected
              Source: wOIrAYQ8IM.elfReversingLabs: Detection: 70%
              Source: wOIrAYQ8IM.elfVirustotal: Detection: 62%Perma Link
              Source: global trafficTCP traffic: 192.168.2.15:47464 -> 64.23.251.20:9511
              Source: global trafficTCP traffic: 192.168.2.15:43894 -> 128.199.180.45:9511
              Source: global trafficTCP traffic: 192.168.2.15:45250 -> 174.138.51.159:9511
              Source: global trafficTCP traffic: 192.168.2.15:42744 -> 161.35.210.154:9511
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5547)Socket: 127.0.0.1::29103Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5549)Socket: 0.0.0.0::23Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5549)Socket: 0.0.0.0::0Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5549)Socket: 0.0.0.0::80Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5549)Socket: 0.0.0.0::81Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5549)Socket: 0.0.0.0::8443Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5549)Socket: 0.0.0.0::9009Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5549)Socket: 0.0.0.0::1337Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5549)Socket: 0.0.0.0::13883Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5549)Socket: 0.0.0.0::19481Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5549)Socket: 0.0.0.0::4444Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5549)Socket: 0.0.0.0::9789Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)Socket: 0.0.0.0::0Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)Socket: 0.0.0.0::80Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)Socket: 0.0.0.0::81Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)Socket: 0.0.0.0::8443Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)Socket: 0.0.0.0::9009Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)Socket: 0.0.0.0::1337Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)Socket: 0.0.0.0::13883Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)Socket: 0.0.0.0::19481Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)Socket: 0.0.0.0::4444Jump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)Socket: 0.0.0.0::9789Jump to behavior
              Source: unknownTCP traffic detected without corresponding DNS query: 64.23.251.20
              Source: unknownTCP traffic detected without corresponding DNS query: 64.23.251.20
              Source: unknownTCP traffic detected without corresponding DNS query: 64.23.251.20
              Source: unknownTCP traffic detected without corresponding DNS query: 64.23.251.20
              Source: unknownTCP traffic detected without corresponding DNS query: 128.199.180.45
              Source: unknownTCP traffic detected without corresponding DNS query: 128.199.180.45
              Source: unknownTCP traffic detected without corresponding DNS query: 128.199.180.45
              Source: unknownTCP traffic detected without corresponding DNS query: 128.199.180.45
              Source: unknownTCP traffic detected without corresponding DNS query: 174.138.51.159
              Source: unknownTCP traffic detected without corresponding DNS query: 174.138.51.159
              Source: unknownTCP traffic detected without corresponding DNS query: 174.138.51.159
              Source: unknownTCP traffic detected without corresponding DNS query: 174.138.51.159
              Source: unknownTCP traffic detected without corresponding DNS query: 64.23.251.20
              Source: unknownTCP traffic detected without corresponding DNS query: 64.23.251.20
              Source: unknownTCP traffic detected without corresponding DNS query: 64.23.251.20
              Source: unknownTCP traffic detected without corresponding DNS query: 64.23.251.20
              Source: global trafficDNS traffic detected: DNS query: www.sushiking.world
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5549)SIGKILL sent: pid: 933, result: successfulJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)SIGKILL sent: pid: 933, result: successfulJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)SIGKILL sent: pid: 5549, result: successfulJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)SIGKILL sent: pid: 764, result: successfulJump to behavior
              Source: classification engineClassification label: mal64.troj.linELF@0/0@5/0
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/5383/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3881/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1185/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3241/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3241/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3483/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1732/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1732/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1730/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1730/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1333/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1333/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1695/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1695/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3235/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3235/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3234/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3234/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/515/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/911/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1617/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1617/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/914/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1615/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1615/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/917/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/917/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/917/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3255/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3255/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3253/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3253/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1591/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1591/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3252/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3252/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3251/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3251/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3250/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3250/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1623/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1623/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1588/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1588/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3249/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3249/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/764/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/764/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/764/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3368/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1585/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1585/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3246/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3246/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3488/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/766/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/766/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/766/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/800/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/800/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/800/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/888/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/888/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/888/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/802/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/802/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/802/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1509/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1509/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/803/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/803/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/803/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/804/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/804/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/804/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/5549/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1867/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1867/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3407/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1484/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1484/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/490/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/490/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/490/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1514/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1514/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1634/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1634/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1479/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1479/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1875/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/3379/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/654/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/655/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/931/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/931/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/931/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/777/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/777/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/777/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1595/fdJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/1595/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5555)File opened: /proc/656/exeJump to behavior
              Source: /tmp/wOIrAYQ8IM.elf (PID: 5547)Queries kernel information via 'uname': Jump to behavior
              Source: wOIrAYQ8IM.elf, 5547.1.00007ffd7e88c000.00007ffd7e8ad000.rw-.sdmp, wOIrAYQ8IM.elf, 5549.1.00007ffd7e88c000.00007ffd7e8ad000.rw-.sdmp, wOIrAYQ8IM.elf, 5550.1.00007ffd7e88c000.00007ffd7e8ad000.rw-.sdmp, wOIrAYQ8IM.elf, 5556.1.00007ffd7e88c000.00007ffd7e8ad000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-m68k/tmp/wOIrAYQ8IM.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/wOIrAYQ8IM.elf
              Source: wOIrAYQ8IM.elf, 5547.1.000055b68b069000.000055b68b0ee000.rw-.sdmp, wOIrAYQ8IM.elf, 5549.1.000055b68b069000.000055b68b0ee000.rw-.sdmp, wOIrAYQ8IM.elf, 5550.1.000055b68b069000.000055b68b0ee000.rw-.sdmp, wOIrAYQ8IM.elf, 5556.1.000055b68b069000.000055b68b0ee000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/m68k
              Source: wOIrAYQ8IM.elf, 5547.1.00007ffd7e88c000.00007ffd7e8ad000.rw-.sdmp, wOIrAYQ8IM.elf, 5549.1.00007ffd7e88c000.00007ffd7e8ad000.rw-.sdmp, wOIrAYQ8IM.elf, 5550.1.00007ffd7e88c000.00007ffd7e8ad000.rw-.sdmp, wOIrAYQ8IM.elf, 5556.1.00007ffd7e88c000.00007ffd7e8ad000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
              Source: wOIrAYQ8IM.elf, 5547.1.000055b68b069000.000055b68b0ee000.rw-.sdmp, wOIrAYQ8IM.elf, 5549.1.000055b68b069000.000055b68b0ee000.rw-.sdmp, wOIrAYQ8IM.elf, 5550.1.000055b68b069000.000055b68b0ee000.rw-.sdmp, wOIrAYQ8IM.elf, 5556.1.000055b68b069000.000055b68b0ee000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: wOIrAYQ8IM.elf, type: SAMPLE
              Source: Yara matchFile source: 5556.1.00007fb964001000.00007fb964012000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5549.1.00007fb964001000.00007fb964012000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5550.1.00007fb964001000.00007fb964012000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5547.1.00007fb964001000.00007fb964012000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wOIrAYQ8IM.elf PID: 5549, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: wOIrAYQ8IM.elf PID: 5550, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: wOIrAYQ8IM.elf PID: 5556, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: wOIrAYQ8IM.elf, type: SAMPLE
              Source: Yara matchFile source: 5556.1.00007fb964001000.00007fb964012000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5549.1.00007fb964001000.00007fb964012000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5550.1.00007fb964001000.00007fb964012000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5547.1.00007fb964001000.00007fb964012000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wOIrAYQ8IM.elf PID: 5549, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: wOIrAYQ8IM.elf PID: 5550, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: wOIrAYQ8IM.elf PID: 5556, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
              OS Credential Dumping
              11
              Security Software Discovery
              Remote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1431545 Sample: wOIrAYQ8IM.elf Startdate: 25/04/2024 Architecture: LINUX Score: 64 20 128.199.180.45, 43894, 9511 DIGITALOCEAN-ASNUS United Kingdom 2->20 22 161.35.210.154, 42744, 9511 DIGITALOCEAN-ASNUS United States 2->22 24 3 other IPs or domains 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 Yara detected Mirai 2->30 8 wOIrAYQ8IM.elf 2->8         started        signatures3 process4 process5 10 wOIrAYQ8IM.elf 8->10         started        12 wOIrAYQ8IM.elf 8->12         started        14 wOIrAYQ8IM.elf 8->14         started        process6 16 wOIrAYQ8IM.elf 10->16         started        18 wOIrAYQ8IM.elf 10->18         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              wOIrAYQ8IM.elf70%ReversingLabsLinux.Trojan.Mirai
              wOIrAYQ8IM.elf62%VirustotalBrowse
              wOIrAYQ8IM.elf100%AviraLINUX/Mirai.bonb
              No Antivirus matches
              SourceDetectionScannerLabelLink
              www.sushiking.world8%VirustotalBrowse
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              www.sushiking.world
              unknown
              unknownfalseunknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              64.23.251.20
              unknownUnited States
              3064AFFINITY-FTLUSfalse
              161.35.210.154
              unknownUnited States
              14061DIGITALOCEAN-ASNUSfalse
              174.138.51.159
              unknownUnited States
              14061DIGITALOCEAN-ASNUSfalse
              128.199.180.45
              unknownUnited Kingdom
              14061DIGITALOCEAN-ASNUSfalse
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              AFFINITY-FTLUShttps://u44058082.ct.sendgrid.net/ls/click?upn=u001.wjMLvmoK1OC9dTKy5UL4VbqcIJmZWkGKJypB0ZF6j6rXk8HVnxe0g2af-2BenroUoONz6EEWthgE-2Bi2vVRUosKTZRVQ5v63hCdxrdKCztVooIv51imK8tr-2Bb3beAsH6u-2FNluJlUKmd7nST-2B9m-2Bl2Rgv4y6uHLimO0TjhZzZ-2F-2BDlllJQne3tT99z6x4W12pJpddTL-2BoJ2-2Bdo6961pFN3dV2Rg-3D-3DeWGT_h-2FW4DSvZGhKY-2FmU3Rq-2F3L-2FXo2OZSHdaVvlpgAgHQWDXPYB9CNYi-2FcvonFCbsEhjt9RP-2BQa7dTwbMJOOaP3JRnMW6mQAitl6qAb1EkaAR-2BmnZDE6Bi3ooqtCrrMW-2F3TPNMK3AVi1YKIdTOZivmUJGaXdrtbqCykfnTTkN9KMRy80rdRqf6LWUCYWGeeaXb-2BD6jokMbr-2FaJKvKMHDNWAfHyhaE6QO9pw7souFUseKb40g-3DGet hashmaliciousHTMLPhisherBrowse
              • 64.23.226.150
              https://assets-usa.mkt.dynamics.com/6f8aa86c-81f8-ee11-a1fa-0022482e8338/digitalassets/standaloneforms/4b367e61-8601-ef11-a1fd-0022482f3701Get hashmaliciousHTMLPhisherBrowse
              • 64.23.226.150
              Yui1pUgieI.elfGet hashmaliciousMiraiBrowse
              • 207.36.195.227
              fK5W9PpT6b.elfGet hashmaliciousMiraiBrowse
              • 64.159.70.60
              x86_64.elfGet hashmaliciousMirai, MoobotBrowse
              • 64.157.204.199
              https://public-usa.mkt.dynamics.com/api/orgs/32983d95-27f1-ee11-9048-6045bd003f26/r/fRm8pkV330iHTYCS6crZCQEAAAA?target=%7B%22TargetUrl%22%3A%22https%253A%252F%252Fassets-usa.mkt.dynamics.com%252F32983d95-27f1-ee11-9048-6045bd003f26%252Fdigitalassets%252Fstandaloneforms%252F2f9e7a0c-d6f1-ee11-904b-000d3a3150cc%22%2C%22RedirectOptions%22%3A%7B%221%22%3Anull%7D%7D&digest=Nv%2BCTrkJ%2BmF6HefH41pboUrkVZcZ6asr%2BK%2BBQi0xqh4%3D&secretVersion=a587597bbd2d4ba3bb4334f6d8be15eeGet hashmaliciousHTMLPhisherBrowse
              • 64.23.242.148
              BoTl06PDGl.exeGet hashmaliciousFormBookBrowse
              • 66.113.136.229
              ixtUbGW9Vx.exeGet hashmaliciousFormBookBrowse
              • 66.113.136.229
              XJBYhQFCGi.exeGet hashmaliciousFormBookBrowse
              • 66.113.136.229
              A6en1Q0smW.exeGet hashmaliciousFormBookBrowse
              • 66.113.136.229
              DIGITALOCEAN-ASNUShttp://jtmidgett.law/CaptRedr.htmlGet hashmaliciousHTMLPhisherBrowse
              • 159.65.82.236
              http://decktop.us/gORiyfGet hashmaliciousHTMLPhisherBrowse
              • 161.35.235.194
              xm393ns3.exeGet hashmaliciousUnknownBrowse
              • 161.35.82.213
              xm393ns3.exeGet hashmaliciousUnknownBrowse
              • 161.35.82.213
              xm393ns3.exeGet hashmaliciousUnknownBrowse
              • 161.35.82.213
              xm393ns0.exeGet hashmaliciousUnknownBrowse
              • 64.225.4.76
              xm393ns0.exeGet hashmaliciousUnknownBrowse
              • 64.225.4.76
              xm393ns0.exeGet hashmaliciousUnknownBrowse
              • 64.225.4.76
              https://btcpike.topGet hashmaliciousUnknownBrowse
              • 138.197.57.171
              SecuriteInfo.com.Program.Unwanted.5215.4772.1835.exeGet hashmaliciousPureLog StealerBrowse
              • 165.227.176.158
              DIGITALOCEAN-ASNUShttp://jtmidgett.law/CaptRedr.htmlGet hashmaliciousHTMLPhisherBrowse
              • 159.65.82.236
              http://decktop.us/gORiyfGet hashmaliciousHTMLPhisherBrowse
              • 161.35.235.194
              xm393ns3.exeGet hashmaliciousUnknownBrowse
              • 161.35.82.213
              xm393ns3.exeGet hashmaliciousUnknownBrowse
              • 161.35.82.213
              xm393ns3.exeGet hashmaliciousUnknownBrowse
              • 161.35.82.213
              xm393ns0.exeGet hashmaliciousUnknownBrowse
              • 64.225.4.76
              xm393ns0.exeGet hashmaliciousUnknownBrowse
              • 64.225.4.76
              xm393ns0.exeGet hashmaliciousUnknownBrowse
              • 64.225.4.76
              https://btcpike.topGet hashmaliciousUnknownBrowse
              • 138.197.57.171
              SecuriteInfo.com.Program.Unwanted.5215.4772.1835.exeGet hashmaliciousPureLog StealerBrowse
              • 165.227.176.158
              DIGITALOCEAN-ASNUShttp://jtmidgett.law/CaptRedr.htmlGet hashmaliciousHTMLPhisherBrowse
              • 159.65.82.236
              http://decktop.us/gORiyfGet hashmaliciousHTMLPhisherBrowse
              • 161.35.235.194
              xm393ns3.exeGet hashmaliciousUnknownBrowse
              • 161.35.82.213
              xm393ns3.exeGet hashmaliciousUnknownBrowse
              • 161.35.82.213
              xm393ns3.exeGet hashmaliciousUnknownBrowse
              • 161.35.82.213
              xm393ns0.exeGet hashmaliciousUnknownBrowse
              • 64.225.4.76
              xm393ns0.exeGet hashmaliciousUnknownBrowse
              • 64.225.4.76
              xm393ns0.exeGet hashmaliciousUnknownBrowse
              • 64.225.4.76
              https://btcpike.topGet hashmaliciousUnknownBrowse
              • 138.197.57.171
              SecuriteInfo.com.Program.Unwanted.5215.4772.1835.exeGet hashmaliciousPureLog StealerBrowse
              • 165.227.176.158
              No context
              No context
              No created / dropped files found
              File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
              Entropy (8bit):6.328872487101359
              TrID:
              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
              File name:wOIrAYQ8IM.elf
              File size:67'760 bytes
              MD5:94ba115f3f3c595ca802ab67259a1a46
              SHA1:d459542bea31e6d3a6fa932a842b5b54e5bf13cb
              SHA256:924ff4dc1f289fd2dd9c8080a28fac4bd43302a894a156be027819eb892fcc00
              SHA512:74b5ade68ce364d916f9acb7e1835edb5f366f2354d051528cdc17fe44f0746473de07325a050003e790d3f7a635469a35268114142994797c6b86b92c8a7e5b
              SSDEEP:1536:ojbH34PuUBmMfV2M2nCm/Thh8L7sZblezJg8r:ojMfsdnv/M+edR
              TLSH:07633CD9B4019DACF98FDAFE84714E09FC61631160930F2B6AABFDD36C711A98D12D42
              File Content Preview:.ELF.......................D...4... .....4. ...(.......................f...f...... ........l..%l..%l...t...,...... .dt.Q............................NV..a....da.....N^NuNV..J9..&.f>"y..%. QJ.g.X.#...%.N."y..%. QJ.f.A.....J.g.Hy...hN.X.......&.N^NuNV..N^NuN

              ELF header

              Class:ELF32
              Data:2's complement, big endian
              Version:1 (current)
              Machine:MC68000
              Version Number:0x1
              Type:EXEC (Executable file)
              OS/ABI:UNIX - System V
              ABI Version:0
              Entry Point Address:0x80000144
              Flags:0x0
              ELF Header Size:52
              Program Header Offset:52
              Program Header Size:32
              Number of Program Headers:3
              Section Header Offset:67360
              Section Header Size:40
              Number of Section Headers:10
              Header String Table Index:9
              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
              NULL0x00x00x00x00x0000
              .initPROGBITS0x800000940x940x140x00x6AX002
              .textPROGBITS0x800000a80xa80xf72a0x00x6AX004
              .finiPROGBITS0x8000f7d20xf7d20xe0x00x6AX002
              .rodataPROGBITS0x8000f7e00xf7e00xd860x00x2A002
              .ctorsPROGBITS0x8001256c0x1056c0x80x00x3WA004
              .dtorsPROGBITS0x800125740x105740x80x00x3WA004
              .dataPROGBITS0x800125800x105800x1600x00x3WA004
              .bssNOBITS0x800126e00x106e00x3b80x00x3WA004
              .shstrtabSTRTAB0x00x106e00x3e0x00x0001
              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
              LOAD0x00x800000000x800000000x105660x105666.36170x5R E0x2000.init .text .fini .rodata
              LOAD0x1056c0x8001256c0x8001256c0x1740x52c0.94790x6RW 0x2000.ctors .dtors .data .bss
              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
              TimestampSource PortDest PortSource IPDest IP
              Apr 25, 2024 12:26:02.390089035 CEST474649511192.168.2.1564.23.251.20
              Apr 25, 2024 12:26:02.562314034 CEST95114746464.23.251.20192.168.2.15
              Apr 25, 2024 12:26:02.562391996 CEST474649511192.168.2.1564.23.251.20
              Apr 25, 2024 12:26:02.562592030 CEST474649511192.168.2.1564.23.251.20
              Apr 25, 2024 12:26:02.734680891 CEST95114746464.23.251.20192.168.2.15
              Apr 25, 2024 12:26:02.734735966 CEST474649511192.168.2.1564.23.251.20
              Apr 25, 2024 12:26:02.875787020 CEST95114746464.23.251.20192.168.2.15
              Apr 25, 2024 12:26:02.906922102 CEST95114746464.23.251.20192.168.2.15
              Apr 25, 2024 12:26:03.987886906 CEST438949511192.168.2.15128.199.180.45
              Apr 25, 2024 12:26:04.348802090 CEST951143894128.199.180.45192.168.2.15
              Apr 25, 2024 12:26:04.348903894 CEST438949511192.168.2.15128.199.180.45
              Apr 25, 2024 12:26:04.348995924 CEST438949511192.168.2.15128.199.180.45
              Apr 25, 2024 12:26:04.708717108 CEST951143894128.199.180.45192.168.2.15
              Apr 25, 2024 12:26:04.708796978 CEST438949511192.168.2.15128.199.180.45
              Apr 25, 2024 12:26:05.033386946 CEST951143894128.199.180.45192.168.2.15
              Apr 25, 2024 12:26:05.072813988 CEST951143894128.199.180.45192.168.2.15
              Apr 25, 2024 12:26:06.144535065 CEST452509511192.168.2.15174.138.51.159
              Apr 25, 2024 12:26:06.275070906 CEST951145250174.138.51.159192.168.2.15
              Apr 25, 2024 12:26:06.275209904 CEST452509511192.168.2.15174.138.51.159
              Apr 25, 2024 12:26:06.275211096 CEST452509511192.168.2.15174.138.51.159
              Apr 25, 2024 12:26:06.405797005 CEST951145250174.138.51.159192.168.2.15
              Apr 25, 2024 12:26:06.405873060 CEST452509511192.168.2.15174.138.51.159
              Apr 25, 2024 12:26:06.482994080 CEST951145250174.138.51.159192.168.2.15
              Apr 25, 2024 12:26:06.536163092 CEST951145250174.138.51.159192.168.2.15
              Apr 25, 2024 12:26:07.594485044 CEST474709511192.168.2.1564.23.251.20
              Apr 25, 2024 12:26:07.767174006 CEST95114747064.23.251.20192.168.2.15
              Apr 25, 2024 12:26:07.767508984 CEST474709511192.168.2.1564.23.251.20
              Apr 25, 2024 12:26:07.767508984 CEST474709511192.168.2.1564.23.251.20
              Apr 25, 2024 12:26:07.940037012 CEST95114747064.23.251.20192.168.2.15
              Apr 25, 2024 12:26:07.940329075 CEST474709511192.168.2.1564.23.251.20
              Apr 25, 2024 12:26:08.080497980 CEST95114747064.23.251.20192.168.2.15
              Apr 25, 2024 12:26:08.112692118 CEST95114747064.23.251.20192.168.2.15
              Apr 25, 2024 12:26:09.192374945 CEST427449511192.168.2.15161.35.210.154
              Apr 25, 2024 12:26:09.408541918 CEST951142744161.35.210.154192.168.2.15
              Apr 25, 2024 12:26:09.408720970 CEST427449511192.168.2.15161.35.210.154
              Apr 25, 2024 12:26:09.408776999 CEST427449511192.168.2.15161.35.210.154
              Apr 25, 2024 12:26:09.623296022 CEST951142744161.35.210.154192.168.2.15
              Apr 25, 2024 12:26:09.623569012 CEST427449511192.168.2.15161.35.210.154
              Apr 25, 2024 12:26:09.838500977 CEST951142744161.35.210.154192.168.2.15
              Apr 25, 2024 12:26:19.415806055 CEST427449511192.168.2.15161.35.210.154
              Apr 25, 2024 12:26:19.629947901 CEST951142744161.35.210.154192.168.2.15
              Apr 25, 2024 12:26:19.656502962 CEST951142744161.35.210.154192.168.2.15
              Apr 25, 2024 12:26:19.656615019 CEST427449511192.168.2.15161.35.210.154
              Apr 25, 2024 12:27:19.711725950 CEST427449511192.168.2.15161.35.210.154
              Apr 25, 2024 12:27:19.926953077 CEST951142744161.35.210.154192.168.2.15
              Apr 25, 2024 12:27:19.954001904 CEST951142744161.35.210.154192.168.2.15
              Apr 25, 2024 12:27:19.954449892 CEST427449511192.168.2.15161.35.210.154
              TimestampSource PortDest PortSource IPDest IP
              Apr 25, 2024 12:26:02.278640985 CEST5630153192.168.2.158.8.8.8
              Apr 25, 2024 12:26:02.389358997 CEST53563018.8.8.8192.168.2.15
              Apr 25, 2024 12:26:03.876538992 CEST5690953192.168.2.158.8.8.8
              Apr 25, 2024 12:26:03.987586975 CEST53569098.8.8.8192.168.2.15
              Apr 25, 2024 12:26:06.033608913 CEST6059453192.168.2.158.8.8.8
              Apr 25, 2024 12:26:06.144347906 CEST53605948.8.8.8192.168.2.15
              Apr 25, 2024 12:26:07.483283043 CEST4715153192.168.2.158.8.8.8
              Apr 25, 2024 12:26:07.594084024 CEST53471518.8.8.8192.168.2.15
              Apr 25, 2024 12:26:09.081305027 CEST5770253192.168.2.158.8.8.8
              Apr 25, 2024 12:26:09.191951036 CEST53577028.8.8.8192.168.2.15
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Apr 25, 2024 12:26:02.278640985 CEST192.168.2.158.8.8.80x35eeStandard query (0)www.sushiking.worldA (IP address)IN (0x0001)false
              Apr 25, 2024 12:26:03.876538992 CEST192.168.2.158.8.8.80x939cStandard query (0)www.sushiking.worldA (IP address)IN (0x0001)false
              Apr 25, 2024 12:26:06.033608913 CEST192.168.2.158.8.8.80x49dStandard query (0)www.sushiking.worldA (IP address)IN (0x0001)false
              Apr 25, 2024 12:26:07.483283043 CEST192.168.2.158.8.8.80x8daStandard query (0)www.sushiking.worldA (IP address)IN (0x0001)false
              Apr 25, 2024 12:26:09.081305027 CEST192.168.2.158.8.8.80xdf13Standard query (0)www.sushiking.worldA (IP address)IN (0x0001)false

              System Behavior

              Start time (UTC):10:26:01
              Start date (UTC):25/04/2024
              Path:/tmp/wOIrAYQ8IM.elf
              Arguments:/tmp/wOIrAYQ8IM.elf
              File size:4463432 bytes
              MD5 hash:cd177594338c77b895ae27c33f8f86cc

              Start time (UTC):10:26:01
              Start date (UTC):25/04/2024
              Path:/tmp/wOIrAYQ8IM.elf
              Arguments:-
              File size:4463432 bytes
              MD5 hash:cd177594338c77b895ae27c33f8f86cc

              Start time (UTC):10:26:01
              Start date (UTC):25/04/2024
              Path:/tmp/wOIrAYQ8IM.elf
              Arguments:-
              File size:4463432 bytes
              MD5 hash:cd177594338c77b895ae27c33f8f86cc

              Start time (UTC):10:26:01
              Start date (UTC):25/04/2024
              Path:/tmp/wOIrAYQ8IM.elf
              Arguments:-
              File size:4463432 bytes
              MD5 hash:cd177594338c77b895ae27c33f8f86cc

              Start time (UTC):10:26:01
              Start date (UTC):25/04/2024
              Path:/tmp/wOIrAYQ8IM.elf
              Arguments:-
              File size:4463432 bytes
              MD5 hash:cd177594338c77b895ae27c33f8f86cc

              Start time (UTC):10:26:01
              Start date (UTC):25/04/2024
              Path:/tmp/wOIrAYQ8IM.elf
              Arguments:-
              File size:4463432 bytes
              MD5 hash:cd177594338c77b895ae27c33f8f86cc