Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
BQBkS6XgmA.elf

Overview

General Information

Sample name:BQBkS6XgmA.elf
renamed because original name is a hash value
Original sample name:031c2472345deeb21991cf266a37fbf7.elf
Analysis ID:1431634
MD5:031c2472345deeb21991cf266a37fbf7
SHA1:76174c14973dcbdee8219328fa8b26d026e15b34
SHA256:d79406fea972e5dba68cb68892040878ce6d6aee2fd6ab392216df9d1da1add2
Tags:32elfintelmirai
Infos:

Detection

Mirai
Score:96
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Machine Learning detection for sample
Sample tries to kill multiple processes (SIGKILL)
Sends malformed DNS queries
Uses dynamic DNS services
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1431634
Start date and time:2024-04-25 14:52:18 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 12s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:BQBkS6XgmA.elf
renamed because original name is a hash value
Original Sample Name:031c2472345deeb21991cf266a37fbf7.elf
Detection:MAL
Classification:mal96.spre.troj.linELF@0/0@54/0
Command:/tmp/BQBkS6XgmA.elf
PID:5495
Exit Code:
Exit Code Info:
Killed:True
Standard Output:
mosts
Standard Error:[main] cant remove reboot function.: No such file or directory
[main] cant remove reboot function.: No such file or directory
[main] cant remove reboot function.: No such file or directory
[main] cant remove reboot function.: No such file or directory
[main] cant remove reboot function.: No such file or directory
[main] cant remove reboot function.: No such file or directory
[main] cant remove reboot function.: No such file or directory
[main] cant remove reboot function.: No such file or directory
[main] cant remove reboot function.: No such file or directory
[main] cant remove reboot function.: No such file or directory
[main] cant remove reboot function.: No such file or directory
[main] cant remove reboot function.: No such file or directory
  • system is lnxubuntu20
  • xfdesktop (PID: 5517, Parent: 3011, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
  • xfdesktop (PID: 5519, Parent: 3011, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
  • xfdesktop (PID: 5524, Parent: 3011, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
  • xfdesktop (PID: 5527, Parent: 3011, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
  • xfdesktop (PID: 5532, Parent: 3011, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
BQBkS6XgmA.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x13130:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13144:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13158:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1316c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13180:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13194:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x131a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x131bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x131d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x131e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x131f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1320c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13220:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13234:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13248:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1325c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13270:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13284:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13298:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x132ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x132c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
BQBkS6XgmA.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x4b50:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
BQBkS6XgmA.elfLinux_Trojan_Mirai_5f7b67b8unknownunknown
  • 0xc2f3:$a: 89 38 83 CF FF 89 F8 5A 59 5F C3 57 56 83 EC 04 8B 7C 24 10 8B 4C
BQBkS6XgmA.elfLinux_Trojan_Mirai_88de437funknownunknown
  • 0x8742:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
BQBkS6XgmA.elfLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0xf389:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
Click to see the 2 entries
SourceRuleDescriptionAuthorStrings
5497.1.0000000008048000.000000000805e000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x13130:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13144:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13158:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1316c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13180:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13194:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x131a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x131bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x131d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x131e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x131f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1320c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13220:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13234:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13248:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1325c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13270:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13284:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13298:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x132ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x132c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
5497.1.0000000008048000.000000000805e000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x4b50:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
5497.1.0000000008048000.000000000805e000.r-x.sdmpLinux_Trojan_Mirai_5f7b67b8unknownunknown
  • 0xc2f3:$a: 89 38 83 CF FF 89 F8 5A 59 5F C3 57 56 83 EC 04 8B 7C 24 10 8B 4C
5497.1.0000000008048000.000000000805e000.r-x.sdmpLinux_Trojan_Mirai_88de437funknownunknown
  • 0x8742:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
5497.1.0000000008048000.000000000805e000.r-x.sdmpLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0xf389:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
Click to see the 11 entries
Timestamp:04/25/24-14:53:28.812939
SID:2030490
Source Port:50424
Destination Port:2023
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-14:53:21.319093
SID:2030490
Source Port:50422
Destination Port:2023
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-14:53:43.110239
SID:2030490
Source Port:50428
Destination Port:2023
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-14:53:34.123601
SID:2030490
Source Port:50426
Destination Port:2023
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: BQBkS6XgmA.elfAvira: detected
Source: BQBkS6XgmA.elfReversingLabs: Detection: 62%
Source: BQBkS6XgmA.elfVirustotal: Detection: 43%Perma Link
Source: BQBkS6XgmA.elfJoe Sandbox ML: detected
Source: BQBkS6XgmA.elfString: ./dvr_gui./upnp_server./dvr_app/proc/proc/%s/cmdline./pkillkillallwgetbusyboxtopcurltftppgrepxargsawktoyboxKh

Networking

barindex
Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:50422 -> 203.145.46.240:2023
Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:50424 -> 203.145.46.240:2023
Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:50426 -> 203.145.46.240:2023
Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:50428 -> 203.145.46.240:2023
Source: global trafficDNS traffic detected: malformed DNS query: aomacamada.ddns.net. [malformed]
Source: global trafficDNS traffic detected: malformed DNS query: net-killer.ddns.net. [malformed]
Source: global trafficDNS traffic detected: malformed DNS query: Vet-killer.io.v. [malformed]
Source: global trafficDNS traffic detected: malformed DNS query: net-killer.ooguy.com. [malformed]
Source: unknownDNS query: name: net-killer.ddns.net
Source: unknownDNS query: name: aomacamada.ddns.net
Source: unknownDNS query: name: aomacamada.ddns.net. [malformed]
Source: unknownDNS query: name: net-killer.ddns.net. [malformed]
Source: global trafficTCP traffic: 192.168.2.14:50422 -> 203.145.46.240:2023
Source: global trafficTCP traffic: 192.168.2.14:53952 -> 51.79.217.59:2023
Source: global trafficDNS traffic detected: DNS query: net-killer.ooguy.com
Source: global trafficDNS traffic detected: DNS query: aomacamada.ddns.net. [malformed]
Source: global trafficDNS traffic detected: DNS query: net-killer.ddns.net. [malformed]
Source: global trafficDNS traffic detected: DNS query: Vet-killer.io.v. [malformed]
Source: global trafficDNS traffic detected: DNS query: net-killer.ooguy.com. [malformed]
Source: global trafficDNS traffic detected: DNS query: aomacamada.ddns.net
Source: global trafficDNS traffic detected: DNS query: net-killer.ddns.net
Source: global trafficDNS traffic detected: DNS query: domain-botnet.servehttp.com

System Summary

barindex
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: Process Memory Space: BQBkS6XgmA.elf PID: 5495, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: BQBkS6XgmA.elf PID: 5497, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 917, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 928, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 940, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 941, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 1203, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 3183, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 5517, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 5519, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 5524, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 5527, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 5532, result: successfulJump to behavior
Source: Initial sampleString containing 'busybox' found: busybox
Source: Initial sampleString containing 'busybox' found: ./dvr_gui./upnp_server./dvr_app/proc/proc/%s/cmdline./pkillkillallwgetbusyboxtopcurltftppgrepxargsawktoyboxKh
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 917, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 928, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 940, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 941, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 1203, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 3183, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 5517, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 5519, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 5524, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 5527, result: successfulJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)SIGKILL sent: pid: 5532, result: successfulJump to behavior
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: BQBkS6XgmA.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5497.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5495.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: Process Memory Space: BQBkS6XgmA.elf PID: 5495, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: BQBkS6XgmA.elf PID: 5497, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: classification engineClassification label: mal96.spre.troj.linELF@0/0@54/0
Source: /usr/bin/xfdesktop (PID: 5519)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /usr/bin/xfdesktop (PID: 5524)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /usr/bin/xfdesktop (PID: 5527)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /usr/bin/xfdesktop (PID: 5532)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/1583/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/2672/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/3759/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/1577/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/3756/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/3757/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/3758/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/1593/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/3094/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/3406/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/1589/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/3402/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/806/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/807/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/928/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/135/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/3412/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/1371/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/BQBkS6XgmA.elf (PID: 5496)File opened: /proc/262/cmdlineJump to behavior
Source: /usr/bin/xfdesktop (PID: 5519)Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/xfdesktop (PID: 5524)Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/xfdesktop (PID: 5527)Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/xfdesktop (PID: 5532)Queries kernel information via 'uname': Jump to behavior

Remote Access Functionality

barindex
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Hidden Files and Directories
1
OS Credential Dumping
1
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network Medium1
Service Stop
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive11
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1431634 Sample: BQBkS6XgmA.elf Startdate: 25/04/2024 Architecture: LINUX Score: 96 21 net-killer.ddns.net. [malformed] 2->21 23 aomacamada.ddns.net. [malformed] 2->23 25 6 other IPs or domains 2->25 29 Snort IDS alert for network traffic 2->29 31 Malicious sample detected (through community Yara rule) 2->31 33 Antivirus / Scanner detection for submitted sample 2->33 39 3 other signatures 2->39 8 BQBkS6XgmA.elf 2->8         started        10 xfce4-session xfdesktop 2->10         started        12 xfce4-session xfdesktop 2->12         started        14 3 other processes 2->14 signatures3 35 Sends malformed DNS queries 23->35 37 Uses dynamic DNS services 23->37 process4 process5 16 BQBkS6XgmA.elf 8->16         started        signatures6 27 Sample tries to kill multiple processes (SIGKILL) 16->27 19 BQBkS6XgmA.elf 16->19         started        process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
BQBkS6XgmA.elf62%ReversingLabsLinux.Trojan.Mirai
BQBkS6XgmA.elf44%VirustotalBrowse
BQBkS6XgmA.elf100%AviraEXP/ELF.Mirai.Z.A
BQBkS6XgmA.elf100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLink
aomacamada.ddns.net8%VirustotalBrowse
net-killer.ddns.net18%VirustotalBrowse
net-killer.ooguy.com4%VirustotalBrowse
domain-botnet.servehttp.com4%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
aomacamada.ddns.net
203.145.46.240
truetrueunknown
net-killer.ddns.net
203.145.46.240
truetrueunknown
net-killer.ooguy.com
203.145.46.240
truetrueunknown
domain-botnet.servehttp.com
51.79.217.59
truefalseunknown
aomacamada.ddns.net. [malformed]
unknown
unknowntrue
    unknown
    net-killer.ooguy.com. [malformed]
    unknown
    unknowntrue
      unknown
      net-killer.ddns.net. [malformed]
      unknown
      unknowntrue
        unknown
        Vet-killer.io.v. [malformed]
        unknown
        unknowntrue
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          51.79.217.59
          domain-botnet.servehttp.comCanada
          16276OVHFRfalse
          203.145.46.240
          aomacamada.ddns.netunknown
          9313ONTHENET-ASNetworkTechnologyAUSTPLAUtrue
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          51.79.217.59ij5Z8oy5e3.elfGet hashmaliciousMiraiBrowse
            iuMawBi6yU.elfGet hashmaliciousMiraiBrowse
              aMTecZscrq.elfGet hashmaliciousUnknownBrowse
                v2cDqXmZtv.elfGet hashmaliciousMiraiBrowse
                  Wd2T9v9ZMT.elfGet hashmaliciousMiraiBrowse
                    7T1vOaCJto.elfGet hashmaliciousMiraiBrowse
                      203.145.46.240ij5Z8oy5e3.elfGet hashmaliciousMiraiBrowse
                        iuMawBi6yU.elfGet hashmaliciousMiraiBrowse
                          aMTecZscrq.elfGet hashmaliciousUnknownBrowse
                            wvg9YxoOiG.elfGet hashmaliciousMiraiBrowse
                              v2cDqXmZtv.elfGet hashmaliciousMiraiBrowse
                                EV66ROvDut.elfGet hashmaliciousMiraiBrowse
                                  Wd2T9v9ZMT.elfGet hashmaliciousMiraiBrowse
                                    7T1vOaCJto.elfGet hashmaliciousMiraiBrowse
                                      sGQ61OAVck.elfGet hashmaliciousMiraiBrowse
                                        0oJ784pwEP.elfGet hashmaliciousMiraiBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          net-killer.ooguy.comsGQ61OAVck.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          0oJ784pwEP.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          domain-botnet.servehttp.comij5Z8oy5e3.elfGet hashmaliciousMiraiBrowse
                                          • 51.79.217.59
                                          iuMawBi6yU.elfGet hashmaliciousMiraiBrowse
                                          • 51.79.217.59
                                          aMTecZscrq.elfGet hashmaliciousUnknownBrowse
                                          • 51.79.217.59
                                          v2cDqXmZtv.elfGet hashmaliciousMiraiBrowse
                                          • 51.79.217.59
                                          Wd2T9v9ZMT.elfGet hashmaliciousMiraiBrowse
                                          • 51.79.217.59
                                          7T1vOaCJto.elfGet hashmaliciousMiraiBrowse
                                          • 51.79.217.59
                                          n4J9NMfLTM.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          4wngRroxli.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          igIKGnfg87.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ONTHENET-ASNetworkTechnologyAUSTPLAUij5Z8oy5e3.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          iuMawBi6yU.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          aMTecZscrq.elfGet hashmaliciousUnknownBrowse
                                          • 203.145.46.240
                                          wvg9YxoOiG.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          v2cDqXmZtv.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          EV66ROvDut.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          Wd2T9v9ZMT.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          7T1vOaCJto.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          sGQ61OAVck.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          0oJ784pwEP.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          OVHFRij5Z8oy5e3.elfGet hashmaliciousMiraiBrowse
                                          • 51.79.217.59
                                          iuMawBi6yU.elfGet hashmaliciousMiraiBrowse
                                          • 51.79.217.59
                                          aMTecZscrq.elfGet hashmaliciousUnknownBrowse
                                          • 51.79.217.59
                                          http://rapnews.plGet hashmaliciousUnknownBrowse
                                          • 213.186.33.5
                                          https://ortelia.com/download-ortelia-curator/Get hashmaliciousHavocBrowse
                                          • 139.99.130.163
                                          https://clicks.aweber.com/y/ct/?l=irQzWw&m=hE2OWd5T.UYPuTr&b=hqint4ojZ0QPjD7.f4mxDg#Ym5hbmRlcnNvbkBwcmVzaWRpby5jb20=Get hashmaliciousHTMLPhisherBrowse
                                          • 51.210.113.194
                                          SecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                                          • 51.38.43.18
                                          lmg1_Mlakaifa443456.vbsGet hashmaliciousAsyncRAT, DcRat, RemcosBrowse
                                          • 139.99.133.66
                                          https://campaign-statistics.com/link_click/PJygYHTMZ2_OXDfP/30633247af9f78d20f1e067eab9a8276Get hashmaliciousHTMLPhisherBrowse
                                          • 91.134.146.191
                                          https://i.imgur.com/VlAllek.pngGet hashmaliciousUnknownBrowse
                                          • 51.79.152.81
                                          No context
                                          No context
                                          No created / dropped files found
                                          File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                          Entropy (8bit):5.853728556884894
                                          TrID:
                                          • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                          • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                          File name:BQBkS6XgmA.elf
                                          File size:108'676 bytes
                                          MD5:031c2472345deeb21991cf266a37fbf7
                                          SHA1:76174c14973dcbdee8219328fa8b26d026e15b34
                                          SHA256:d79406fea972e5dba68cb68892040878ce6d6aee2fd6ab392216df9d1da1add2
                                          SHA512:9e1b6294a8cafc28c8b697b50a3fdfc5dbe4e097163d65bc8a499cd28aefe962ebf8e0d6df46c873cfb5ed9a0724102161bcbe3a4622c6a9c5ada06451c4c7ae
                                          SSDEEP:3072:O1iOep8X1gmlYfVWkKDjb9sG/H0USyA/r9mLk:O1iOep8X1gmlYfVdYt9URz9mL
                                          TLSH:94B37CC5E283D4F6E84715B06036E73BAE36D07A2119FA46C37C9D31F8C6541A627BAC
                                          File Content Preview:.ELF....................d...4...........4. ...(......................Z...Z...............`...........F..L...........Q.td............................U..S.......{_...h....s-..[]...$.............U......=.&...t..5....D......D.......u........t....h............

                                          ELF header

                                          Class:ELF32
                                          Data:2's complement, little endian
                                          Version:1 (current)
                                          Machine:Intel 80386
                                          Version Number:0x1
                                          Type:EXEC (Executable file)
                                          OS/ABI:UNIX - System V
                                          ABI Version:0
                                          Entry Point Address:0x8048164
                                          Flags:0x0
                                          ELF Header Size:52
                                          Program Header Offset:52
                                          Program Header Size:32
                                          Number of Program Headers:3
                                          Section Header Offset:108276
                                          Section Header Size:40
                                          Number of Section Headers:10
                                          Header String Table Index:9
                                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                          NULL0x00x00x00x00x0000
                                          .initPROGBITS0x80480940x940x1c0x00x6AX001
                                          .textPROGBITS0x80480b00xb00x12d960x00x6AX0016
                                          .finiPROGBITS0x805ae460x12e460x170x00x6AX001
                                          .rodataPROGBITS0x805ae600x12e600x2c480x00x2A0032
                                          .ctorsPROGBITS0x805e0000x160000xc0x00x3WA004
                                          .dtorsPROGBITS0x805e00c0x1600c0x80x00x3WA004
                                          .dataPROGBITS0x805e0400x160400x46740x00x3WA0032
                                          .bssNOBITS0x80626c00x1a6b40x488c0x00x3WA0032
                                          .shstrtabSTRTAB0x00x1a6b40x3e0x00x0001
                                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                          LOAD0x00x80480000x80480000x15aa80x15aa86.61790x5R E0x1000.init .text .fini .rodata
                                          LOAD0x160000x805e0000x805e0000x46b40x8f4c0.25250x6RW 0x1000.ctors .dtors .data .bss
                                          GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          04/25/24-14:53:28.812939TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)504242023192.168.2.14203.145.46.240
                                          04/25/24-14:53:21.319093TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)504222023192.168.2.14203.145.46.240
                                          04/25/24-14:53:43.110239TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)504282023192.168.2.14203.145.46.240
                                          04/25/24-14:53:34.123601TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)504262023192.168.2.14203.145.46.240
                                          TimestampSource PortDest PortSource IPDest IP
                                          Apr 25, 2024 14:53:20.928047895 CEST504222023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:21.318947077 CEST202350422203.145.46.240192.168.2.14
                                          Apr 25, 2024 14:53:21.319026947 CEST504222023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:21.319092989 CEST504222023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:21.678024054 CEST202350422203.145.46.240192.168.2.14
                                          Apr 25, 2024 14:53:21.680795908 CEST202350422203.145.46.240192.168.2.14
                                          Apr 25, 2024 14:53:27.420954943 CEST504242023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:28.443166971 CEST504242023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:28.812815905 CEST202350424203.145.46.240192.168.2.14
                                          Apr 25, 2024 14:53:28.812901020 CEST504242023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:28.812938929 CEST504242023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:29.228360891 CEST202350424203.145.46.240192.168.2.14
                                          Apr 25, 2024 14:53:29.229821920 CEST202350424203.145.46.240192.168.2.14
                                          Apr 25, 2024 14:53:32.662986994 CEST504262023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:33.690985918 CEST504262023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:34.123442888 CEST202350426203.145.46.240192.168.2.14
                                          Apr 25, 2024 14:53:34.123600960 CEST504262023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:34.123600960 CEST504262023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:34.521011114 CEST202350426203.145.46.240192.168.2.14
                                          Apr 25, 2024 14:53:34.530371904 CEST202350426203.145.46.240192.168.2.14
                                          Apr 25, 2024 14:53:41.709774971 CEST504282023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:42.714584112 CEST504282023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:43.110106945 CEST202350428203.145.46.240192.168.2.14
                                          Apr 25, 2024 14:53:43.110198021 CEST504282023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:43.110239029 CEST504282023192.168.2.14203.145.46.240
                                          Apr 25, 2024 14:53:43.501879930 CEST202350428203.145.46.240192.168.2.14
                                          Apr 25, 2024 14:53:43.508636951 CEST202350428203.145.46.240192.168.2.14
                                          Apr 25, 2024 14:53:51.707654953 CEST539522023192.168.2.1451.79.217.59
                                          Apr 25, 2024 14:53:52.029750109 CEST20235395251.79.217.59192.168.2.14
                                          Apr 25, 2024 14:54:03.631635904 CEST539542023192.168.2.1451.79.217.59
                                          Apr 25, 2024 14:54:03.953741074 CEST20235395451.79.217.59192.168.2.14
                                          TimestampSource PortDest PortSource IPDest IP
                                          Apr 25, 2024 14:53:20.643861055 CEST3504453192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:20.857419014 CEST53350448.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:23.809099913 CEST5138953192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:23.919379950 CEST53513898.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:23.919502974 CEST4984653192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:24.029489040 CEST53498468.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:24.029589891 CEST4001353192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:24.139873028 CEST53400138.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:24.140021086 CEST4681753192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:24.250179052 CEST53468178.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:24.250334978 CEST3426453192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:24.360379934 CEST53342648.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:24.520667076 CEST5622853192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:24.630590916 CEST53562288.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:24.630685091 CEST5652253192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:24.740905046 CEST53565228.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:24.740983009 CEST4836053192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:24.851039886 CEST53483608.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:24.851164103 CEST5129053192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:24.961200953 CEST53512908.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:24.961282015 CEST4475853192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:25.071527004 CEST53447588.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:25.249912977 CEST3956553192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:25.360027075 CEST53395658.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:25.360147953 CEST4152753192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:25.470164061 CEST53415278.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:25.470328093 CEST3672753192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:25.580432892 CEST53367278.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:25.580552101 CEST4476053192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:25.690903902 CEST53447608.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:25.691107988 CEST3350553192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:25.801254034 CEST53335058.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:25.967997074 CEST5869953192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:26.078077078 CEST53586998.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:26.078193903 CEST4606753192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:26.188215971 CEST53460678.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:26.188321114 CEST3861353192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:26.298522949 CEST53386138.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:26.298649073 CEST5685253192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:26.408808947 CEST53568528.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:26.408936977 CEST4254053192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:26.519054890 CEST53425408.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:26.690354109 CEST5935153192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:26.800601006 CEST53593518.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:26.800749063 CEST4750353192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:26.910839081 CEST53475038.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:26.910981894 CEST5057653192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:27.021342993 CEST53505768.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:27.021456003 CEST4650453192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:27.131572962 CEST53465048.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:27.131675959 CEST5318053192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:27.241671085 CEST53531808.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:32.386024952 CEST5615453192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:32.511720896 CEST53561548.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:41.552115917 CEST5992953192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:41.677265882 CEST53599298.8.8.8192.168.2.14
                                          Apr 25, 2024 14:53:51.538976908 CEST5691153192.168.2.148.8.8.8
                                          Apr 25, 2024 14:53:51.664190054 CEST53569118.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:01.105120897 CEST3519053192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:01.215393066 CEST53351908.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:01.215533018 CEST5945853192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:01.325694084 CEST53594588.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:01.326212883 CEST3862753192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:01.436403990 CEST53386278.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:01.436577082 CEST5309253192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:01.546627998 CEST53530928.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:01.546808004 CEST3916553192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:01.656838894 CEST53391658.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:01.698601007 CEST5949853192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:01.808691978 CEST53594988.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:01.808922052 CEST4225653192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:01.919044018 CEST53422568.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:01.919261932 CEST3697253192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:02.032891035 CEST53369728.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:02.033072948 CEST3552453192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:02.143030882 CEST53355248.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:02.143193007 CEST4387653192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:02.253158092 CEST53438768.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:02.290599108 CEST3646853192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:02.400681019 CEST53364688.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:02.400844097 CEST4161453192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:02.510879040 CEST53416148.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:02.511035919 CEST5346153192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:02.621237040 CEST53534618.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:02.621381998 CEST4234653192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:02.731493950 CEST53423468.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:02.731664896 CEST4532153192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:02.841774940 CEST53453218.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:02.883418083 CEST6038053192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:02.993412018 CEST53603808.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:02.993539095 CEST4544653192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:03.103585958 CEST53454468.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:03.103755951 CEST4155053192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:03.213665962 CEST53415508.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:03.214025974 CEST5347853192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:03.324085951 CEST53534788.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:03.324254036 CEST5911353192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:03.436182022 CEST53591138.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:03.480968952 CEST3671553192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:03.591188908 CEST53367158.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:05.024275064 CEST4054853192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:05.134402990 CEST53405488.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:05.134572983 CEST3906353192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:05.244530916 CEST53390638.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:05.244664907 CEST4659853192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:05.354793072 CEST53465988.8.8.8192.168.2.14
                                          Apr 25, 2024 14:54:05.354909897 CEST4198153192.168.2.148.8.8.8
                                          Apr 25, 2024 14:54:05.465131998 CEST53419818.8.8.8192.168.2.14
                                          TimestampSource IPDest IPChecksumCodeType
                                          Apr 25, 2024 14:54:05.465239048 CEST192.168.2.148.8.8.8cfe8(Port unreachable)Destination Unreachable
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Apr 25, 2024 14:53:20.643861055 CEST192.168.2.148.8.8.80x4f46Standard query (0)net-killer.ooguy.comA (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:53:23.809099913 CEST192.168.2.148.8.8.80xe04bStandard query (0)aomacamada.ddns.net. [malformed]256323false
                                          Apr 25, 2024 14:53:23.919502974 CEST192.168.2.148.8.8.80xe04bStandard query (0)aomacamada.ddns.net. [malformed]256324false
                                          Apr 25, 2024 14:53:24.029589891 CEST192.168.2.148.8.8.80xe04bStandard query (0)aomacamada.ddns.net. [malformed]256324false
                                          Apr 25, 2024 14:53:24.140021086 CEST192.168.2.148.8.8.80xe04bStandard query (0)aomacamada.ddns.net. [malformed]256324false
                                          Apr 25, 2024 14:53:24.250334978 CEST192.168.2.148.8.8.80xe04bStandard query (0)aomacamada.ddns.net. [malformed]256324false
                                          Apr 25, 2024 14:53:24.520667076 CEST192.168.2.148.8.8.80xd379Standard query (0)net-killer.ddns.net. [malformed]256324false
                                          Apr 25, 2024 14:53:24.630685091 CEST192.168.2.148.8.8.80xd379Standard query (0)net-killer.ddns.net. [malformed]256324false
                                          Apr 25, 2024 14:53:24.740983009 CEST192.168.2.148.8.8.80xd379Standard query (0)net-killer.ddns.net. [malformed]256324false
                                          Apr 25, 2024 14:53:24.851164103 CEST192.168.2.148.8.8.80xd379Standard query (0)net-killer.ddns.net. [malformed]256324false
                                          Apr 25, 2024 14:53:24.961282015 CEST192.168.2.148.8.8.80xd379Standard query (0)net-killer.ddns.net. [malformed]256325false
                                          Apr 25, 2024 14:53:25.249912977 CEST192.168.2.148.8.8.80x73d5Standard query (0)Vet-killer.io.v. [malformed]256325false
                                          Apr 25, 2024 14:53:25.360147953 CEST192.168.2.148.8.8.80x73d5Standard query (0)Vet-killer.io.v. [malformed]256325false
                                          Apr 25, 2024 14:53:25.470328093 CEST192.168.2.148.8.8.80x73d5Standard query (0)Vet-killer.io.v. [malformed]256325false
                                          Apr 25, 2024 14:53:25.580552101 CEST192.168.2.148.8.8.80x73d5Standard query (0)Vet-killer.io.v. [malformed]256325false
                                          Apr 25, 2024 14:53:25.691107988 CEST192.168.2.148.8.8.80x73d5Standard query (0)Vet-killer.io.v. [malformed]256325false
                                          Apr 25, 2024 14:53:25.967997074 CEST192.168.2.148.8.8.80x2029Standard query (0)net-killer.ooguy.com. [malformed]256326false
                                          Apr 25, 2024 14:53:26.078193903 CEST192.168.2.148.8.8.80x2029Standard query (0)net-killer.ooguy.com. [malformed]256326false
                                          Apr 25, 2024 14:53:26.188321114 CEST192.168.2.148.8.8.80x2029Standard query (0)net-killer.ooguy.com. [malformed]256326false
                                          Apr 25, 2024 14:53:26.298649073 CEST192.168.2.148.8.8.80x2029Standard query (0)net-killer.ooguy.com. [malformed]256326false
                                          Apr 25, 2024 14:53:26.408936977 CEST192.168.2.148.8.8.80x2029Standard query (0)net-killer.ooguy.com. [malformed]256326false
                                          Apr 25, 2024 14:53:26.690354109 CEST192.168.2.148.8.8.80x884aStandard query (0)Vet-killer.io.v. [malformed]256326false
                                          Apr 25, 2024 14:53:26.800749063 CEST192.168.2.148.8.8.80x884aStandard query (0)Vet-killer.io.v. [malformed]256326false
                                          Apr 25, 2024 14:53:26.910981894 CEST192.168.2.148.8.8.80x884aStandard query (0)Vet-killer.io.v. [malformed]256327false
                                          Apr 25, 2024 14:53:27.021456003 CEST192.168.2.148.8.8.80x884aStandard query (0)Vet-killer.io.v. [malformed]256327false
                                          Apr 25, 2024 14:53:27.131675959 CEST192.168.2.148.8.8.80x884aStandard query (0)Vet-killer.io.v. [malformed]256327false
                                          Apr 25, 2024 14:53:32.386024952 CEST192.168.2.148.8.8.80x2fe9Standard query (0)aomacamada.ddns.netA (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:53:41.552115917 CEST192.168.2.148.8.8.80x2b75Standard query (0)net-killer.ddns.netA (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:53:51.538976908 CEST192.168.2.148.8.8.80x3aStandard query (0)domain-botnet.servehttp.comA (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:54:01.105120897 CEST192.168.2.148.8.8.80xee69Standard query (0)aomacamada.ddns.net. [malformed]256361false
                                          Apr 25, 2024 14:54:01.215533018 CEST192.168.2.148.8.8.80xee69Standard query (0)aomacamada.ddns.net. [malformed]256361false
                                          Apr 25, 2024 14:54:01.326212883 CEST192.168.2.148.8.8.80xee69Standard query (0)aomacamada.ddns.net. [malformed]256361false
                                          Apr 25, 2024 14:54:01.436577082 CEST192.168.2.148.8.8.80xee69Standard query (0)aomacamada.ddns.net. [malformed]256361false
                                          Apr 25, 2024 14:54:01.546808004 CEST192.168.2.148.8.8.80xee69Standard query (0)aomacamada.ddns.net. [malformed]256361false
                                          Apr 25, 2024 14:54:01.698601007 CEST192.168.2.148.8.8.80xbd3aStandard query (0)net-killer.ddns.net. [malformed]256361false
                                          Apr 25, 2024 14:54:01.808922052 CEST192.168.2.148.8.8.80xbd3aStandard query (0)net-killer.ddns.net. [malformed]256361false
                                          Apr 25, 2024 14:54:01.919261932 CEST192.168.2.148.8.8.80xbd3aStandard query (0)net-killer.ddns.net. [malformed]256362false
                                          Apr 25, 2024 14:54:02.033072948 CEST192.168.2.148.8.8.80xbd3aStandard query (0)net-killer.ddns.net. [malformed]256362false
                                          Apr 25, 2024 14:54:02.143193007 CEST192.168.2.148.8.8.80xbd3aStandard query (0)net-killer.ddns.net. [malformed]256362false
                                          Apr 25, 2024 14:54:02.290599108 CEST192.168.2.148.8.8.80xe24bStandard query (0)net-killer.ddns.net. [malformed]256362false
                                          Apr 25, 2024 14:54:02.400844097 CEST192.168.2.148.8.8.80xe24bStandard query (0)net-killer.ddns.net. [malformed]256362false
                                          Apr 25, 2024 14:54:02.511035919 CEST192.168.2.148.8.8.80xe24bStandard query (0)net-killer.ddns.net. [malformed]256362false
                                          Apr 25, 2024 14:54:02.621381998 CEST192.168.2.148.8.8.80xe24bStandard query (0)net-killer.ddns.net. [malformed]256362false
                                          Apr 25, 2024 14:54:02.731664896 CEST192.168.2.148.8.8.80xe24bStandard query (0)net-killer.ddns.net. [malformed]256362false
                                          Apr 25, 2024 14:54:02.883418083 CEST192.168.2.148.8.8.80x1a72Standard query (0)Vet-killer.io.v. [malformed]256362false
                                          Apr 25, 2024 14:54:02.993539095 CEST192.168.2.148.8.8.80x1a72Standard query (0)Vet-killer.io.v. [malformed]256363false
                                          Apr 25, 2024 14:54:03.103755951 CEST192.168.2.148.8.8.80x1a72Standard query (0)Vet-killer.io.v. [malformed]256363false
                                          Apr 25, 2024 14:54:03.214025974 CEST192.168.2.148.8.8.80x1a72Standard query (0)Vet-killer.io.v. [malformed]256363false
                                          Apr 25, 2024 14:54:03.324254036 CEST192.168.2.148.8.8.80x1a72Standard query (0)Vet-killer.io.v. [malformed]256363false
                                          Apr 25, 2024 14:54:03.480968952 CEST192.168.2.148.8.8.80x3e62Standard query (0)domain-botnet.servehttp.comA (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:54:05.024275064 CEST192.168.2.148.8.8.80x6c1bStandard query (0)net-killer.ooguy.com. [malformed]256365false
                                          Apr 25, 2024 14:54:05.134572983 CEST192.168.2.148.8.8.80x6c1bStandard query (0)net-killer.ooguy.com. [malformed]256365false
                                          Apr 25, 2024 14:54:05.244664907 CEST192.168.2.148.8.8.80x6c1bStandard query (0)net-killer.ooguy.com. [malformed]256365false
                                          Apr 25, 2024 14:54:05.354909897 CEST192.168.2.148.8.8.80x6c1bStandard query (0)net-killer.ooguy.com. [malformed]256365false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Apr 25, 2024 14:53:20.857419014 CEST8.8.8.8192.168.2.140x4f46No error (0)net-killer.ooguy.com203.145.46.240A (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:53:32.511720896 CEST8.8.8.8192.168.2.140x2fe9No error (0)aomacamada.ddns.net203.145.46.240A (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:53:41.677265882 CEST8.8.8.8192.168.2.140x2b75No error (0)net-killer.ddns.net203.145.46.240A (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:53:51.664190054 CEST8.8.8.8192.168.2.140x3aNo error (0)domain-botnet.servehttp.com51.79.217.59A (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:54:03.591188908 CEST8.8.8.8192.168.2.140x3e62No error (0)domain-botnet.servehttp.com51.79.217.59A (IP address)IN (0x0001)false

                                          System Behavior

                                          Start time (UTC):12:53:19
                                          Start date (UTC):25/04/2024
                                          Path:/tmp/BQBkS6XgmA.elf
                                          Arguments:/tmp/BQBkS6XgmA.elf
                                          File size:108676 bytes
                                          MD5 hash:031c2472345deeb21991cf266a37fbf7

                                          Start time (UTC):12:53:19
                                          Start date (UTC):25/04/2024
                                          Path:/tmp/BQBkS6XgmA.elf
                                          Arguments:-
                                          File size:108676 bytes
                                          MD5 hash:031c2472345deeb21991cf266a37fbf7

                                          Start time (UTC):12:53:19
                                          Start date (UTC):25/04/2024
                                          Path:/tmp/BQBkS6XgmA.elf
                                          Arguments:-
                                          File size:108676 bytes
                                          MD5 hash:031c2472345deeb21991cf266a37fbf7
                                          Start time (UTC):12:53:21
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfce4-session
                                          Arguments:-
                                          File size:264752 bytes
                                          MD5 hash:648919f03ad356720c8c27f5aaaf75d1

                                          Start time (UTC):12:53:21
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfdesktop
                                          Arguments:xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
                                          File size:473520 bytes
                                          MD5 hash:dfb13e1581f80065dcea16f2476f16f2

                                          Start time (UTC):12:53:21
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfce4-session
                                          Arguments:-
                                          File size:264752 bytes
                                          MD5 hash:648919f03ad356720c8c27f5aaaf75d1

                                          Start time (UTC):12:53:21
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfdesktop
                                          Arguments:xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
                                          File size:473520 bytes
                                          MD5 hash:dfb13e1581f80065dcea16f2476f16f2

                                          Start time (UTC):12:53:24
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfce4-session
                                          Arguments:-
                                          File size:264752 bytes
                                          MD5 hash:648919f03ad356720c8c27f5aaaf75d1

                                          Start time (UTC):12:53:24
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfdesktop
                                          Arguments:xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
                                          File size:473520 bytes
                                          MD5 hash:dfb13e1581f80065dcea16f2476f16f2

                                          Start time (UTC):12:53:26
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfce4-session
                                          Arguments:-
                                          File size:264752 bytes
                                          MD5 hash:648919f03ad356720c8c27f5aaaf75d1

                                          Start time (UTC):12:53:26
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfdesktop
                                          Arguments:xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
                                          File size:473520 bytes
                                          MD5 hash:dfb13e1581f80065dcea16f2476f16f2

                                          Start time (UTC):12:53:29
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfce4-session
                                          Arguments:-
                                          File size:264752 bytes
                                          MD5 hash:648919f03ad356720c8c27f5aaaf75d1

                                          Start time (UTC):12:53:29
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfdesktop
                                          Arguments:xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
                                          File size:473520 bytes
                                          MD5 hash:dfb13e1581f80065dcea16f2476f16f2