Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
unLvC6fFA8.elf

Overview

General Information

Sample name:unLvC6fFA8.elf
renamed because original name is a hash value
Original sample name:33385ab702556fd99ef203847f38c545.elf
Analysis ID:1431709
MD5:33385ab702556fd99ef203847f38c545
SHA1:f84709c2a8836039b6b6c265d7a19ef05fd23e7e
SHA256:bec50fef1d2c1b986ddcbd79bbd66e725236129a79af64ffd6d8f54c48c08ecf
Tags:32elfintelmirai
Infos:

Detection

Mirai, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Mirai
Yara detected Okiru
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1431709
Start date and time:2024-04-25 17:01:13 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 39s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:unLvC6fFA8.elf
renamed because original name is a hash value
Original Sample Name:33385ab702556fd99ef203847f38c545.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@1/0
Command:/tmp/unLvC6fFA8.elf
PID:5491
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
unLvC6fFA8.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    unLvC6fFA8.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
      unLvC6fFA8.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xf6b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf6cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf6e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf6f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf708:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf71c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf730:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf744:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf758:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf76c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf780:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf794:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf7a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf7bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf7d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf7e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf7f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf80c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf820:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf834:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf848:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      unLvC6fFA8.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
      • 0x32f0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
      unLvC6fFA8.elfLinux_Trojan_Mirai_5f7b67b8unknownunknown
      • 0x8655:$a: 89 38 83 CF FF 89 F8 5A 59 5F C3 57 56 83 EC 04 8B 7C 24 10 8B 4C
      Click to see the 4 entries
      SourceRuleDescriptionAuthorStrings
      5491.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
        5491.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
          5491.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xf6b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf6cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf6e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf6f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf708:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf71c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf730:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf744:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf758:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf76c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf780:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf794:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf7a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf7bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf7d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf7e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf7f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf80c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf820:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf834:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xf848:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5491.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
          • 0x32f0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
          5491.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Mirai_5f7b67b8unknownunknown
          • 0x8655:$a: 89 38 83 CF FF 89 F8 5A 59 5F C3 57 56 83 EC 04 8B 7C 24 10 8B 4C
          Click to see the 7 entries
          Timestamp:04/25/24-17:04:01.685456
          SID:2030489
          Source Port:43957
          Destination Port:56492
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/25/24-17:02:03.165940
          SID:2030490
          Source Port:56492
          Destination Port:43957
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: unLvC6fFA8.elfAvira: detected
          Source: unLvC6fFA8.elfReversingLabs: Detection: 63%
          Source: unLvC6fFA8.elfVirustotal: Detection: 60%Perma Link
          Source: unLvC6fFA8.elfJoe Sandbox ML: detected
          Source: unLvC6fFA8.elfString: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

          Networking

          barindex
          Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.14:56492 -> 89.185.30.66:43957
          Source: TrafficSnort IDS: 2030489 ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response 89.185.30.66:43957 -> 192.168.2.14:56492
          Source: global trafficTCP traffic: 89.185.30.66 ports 43957,3,4,5,7,9
          Source: global trafficTCP traffic: 192.168.2.14:56492 -> 89.185.30.66:43957
          Source: global trafficDNS traffic detected: DNS query: bot.qngxgw.eu.org

          System Summary

          barindex
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: Process Memory Space: unLvC6fFA8.elf PID: 5491, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Initial sampleString containing 'busybox' found: /bin/busybox
          Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: unLvC6fFA8.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: Process Memory Space: unLvC6fFA8.elf PID: 5491, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal100.troj.linELF@0/0@1/0
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/1583/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/2672/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/110/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/111/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/112/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/113/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/234/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/1577/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/114/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/235/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/115/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/116/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/117/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/118/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/119/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/10/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/917/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/11/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/12/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/13/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/14/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/15/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/16/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/17/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/18/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/19/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/1593/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/240/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/120/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/3094/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/121/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/242/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/3406/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/1/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/122/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/243/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/2/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/123/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/244/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/1589/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/3/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/124/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/245/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/1588/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/125/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/4/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/246/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/3402/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/126/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/5/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/247/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/127/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/6/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/248/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/128/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/7/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/249/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/8/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/129/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/800/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/9/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/801/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/803/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/20/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/806/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/21/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/807/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/928/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/22/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/23/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/24/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/25/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/26/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/27/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/28/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/29/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/3420/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/490/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/250/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/130/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/251/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/131/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/252/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/132/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/253/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/254/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/255/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/135/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/256/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/1599/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/257/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/378/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/258/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/3412/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/259/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/30/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/35/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/1371/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/260/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/261/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/262/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/142/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/263/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/264/cmdlineJump to behavior
          Source: /tmp/unLvC6fFA8.elf (PID: 5493)File opened: /proc/265/cmdlineJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: unLvC6fFA8.elf, type: SAMPLE
          Source: Yara matchFile source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: unLvC6fFA8.elf PID: 5491, type: MEMORYSTR
          Source: Yara matchFile source: unLvC6fFA8.elf, type: SAMPLE
          Source: Yara matchFile source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: unLvC6fFA8.elf PID: 5491, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
          Source: Yara matchFile source: unLvC6fFA8.elf, type: SAMPLE
          Source: Yara matchFile source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: unLvC6fFA8.elf PID: 5491, type: MEMORYSTR
          Source: Yara matchFile source: unLvC6fFA8.elf, type: SAMPLE
          Source: Yara matchFile source: 5491.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: unLvC6fFA8.elf PID: 5491, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information1
          Scripting
          Valid AccountsWindows Management Instrumentation1
          Scripting
          Path InterceptionDirect Volume Access1
          OS Credential Dumping
          System Service DiscoveryRemote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          unLvC6fFA8.elf63%ReversingLabsLinux.Trojan.Mirai
          unLvC6fFA8.elf60%VirustotalBrowse
          unLvC6fFA8.elf100%AviraEXP/ELF.Mirai.Z.A
          unLvC6fFA8.elf100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLink
          bot.qngxgw.eu.org5%VirustotalBrowse
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          bot.qngxgw.eu.org
          89.185.30.66
          truetrueunknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          89.185.30.66
          bot.qngxgw.eu.orgUkraine
          34092TVCOM-ASUAtrue
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          TVCOM-ASUA5j9ZIHs8fDGet hashmaliciousUnknownBrowse
          • 193.106.81.229
          No context
          No context
          No created / dropped files found
          File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
          Entropy (8bit):5.714781580652813
          TrID:
          • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
          • ELF Executable and Linkable format (generic) (4004/1) 49.84%
          File name:unLvC6fFA8.elf
          File size:89'576 bytes
          MD5:33385ab702556fd99ef203847f38c545
          SHA1:f84709c2a8836039b6b6c265d7a19ef05fd23e7e
          SHA256:bec50fef1d2c1b986ddcbd79bbd66e725236129a79af64ffd6d8f54c48c08ecf
          SHA512:4b2c21fcba5c6843f3e9351b096a4fed3fff335c7db533c1ab2ae0a94ea65b79055c76dfe73486c554c4aebe0af9da05d07f88cccb79911b3c824f8b038aeae8
          SSDEEP:1536:xpmWc2AcighsZ82fJxfcxHD1mSsM8meUigBQ9TnkISGtAd10xZ:xpmX2riED2frfKHhmLVUBQ9kVT10x
          TLSH:4E936CC5F643D4F5E89304B1613AAB339B33F0B52019EA43D7799932ECA2511EA16B5C
          File Content Preview:.ELF....................d...4...X\......4. ...(......................................................G..8...........Q.td............................U..S........$...h........[]...$.............U......= ....t..5...................u........t....h............

          ELF header

          Class:ELF32
          Data:2's complement, little endian
          Version:1 (current)
          Machine:Intel 80386
          Version Number:0x1
          Type:EXEC (Executable file)
          OS/ABI:UNIX - System V
          ABI Version:0
          Entry Point Address:0x8048164
          Flags:0x0
          ELF Header Size:52
          Program Header Offset:52
          Program Header Size:32
          Number of Program Headers:3
          Section Header Offset:89176
          Section Header Size:40
          Number of Section Headers:10
          Header String Table Index:9
          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
          NULL0x00x00x00x00x0000
          .initPROGBITS0x80480940x940x1c0x00x6AX001
          .textPROGBITS0x80480b00xb00xf1360x00x6AX0016
          .finiPROGBITS0x80571e60xf1e60x170x00x6AX001
          .rodataPROGBITS0x80572000xf2000x22900x00x2A0032
          .ctorsPROGBITS0x805a4940x114940xc0x00x3WA004
          .dtorsPROGBITS0x805a4a00x114a00x80x00x3WA004
          .dataPROGBITS0x805a4c00x114c00x47580x00x3WA0032
          .bssNOBITS0x805ec200x15c180x49ac0x00x3WA0032
          .shstrtabSTRTAB0x00x15c180x3e0x00x0001
          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
          LOAD0x00x80480000x80480000x114900x114906.58850x5R E0x1000.init .text .fini .rodata
          LOAD0x114940x805a4940x805a4940x47840x91380.36430x6RW 0x1000.ctors .dtors .data .bss
          GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          04/25/24-17:04:01.685456TCP2030489ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response439575649289.185.30.66192.168.2.14
          04/25/24-17:02:03.165940TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5649243957192.168.2.1489.185.30.66
          TimestampSource PortDest PortSource IPDest IP
          Apr 25, 2024 17:02:02.808526993 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:02:03.165797949 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:02:03.165901899 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:02:03.165940046 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:02:03.525738955 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:02:03.529555082 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:02:03.529650927 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:02:13.537256956 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:02:13.937634945 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:02:21.665009022 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:02:21.665252924 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:02:41.668884039 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:02:41.669033051 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:03:01.672692060 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:03:01.672810078 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:03:21.676848888 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:03:21.677026987 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:03:41.681749105 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:03:41.681971073 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:03:42.422044039 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:03:42.422224998 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:03:43.193973064 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:03:43.194118977 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:03:44.740056992 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:03:44.740190983 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:03:47.818013906 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:03:47.818161964 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:03:53.977989912 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:03:53.978148937 CEST5649243957192.168.2.1489.185.30.66
          Apr 25, 2024 17:04:01.685456038 CEST439575649289.185.30.66192.168.2.14
          Apr 25, 2024 17:04:01.685581923 CEST5649243957192.168.2.1489.185.30.66
          TimestampSource PortDest PortSource IPDest IP
          Apr 25, 2024 17:02:02.599802017 CEST3840353192.168.2.148.8.8.8
          Apr 25, 2024 17:02:02.808363914 CEST53384038.8.8.8192.168.2.14
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Apr 25, 2024 17:02:02.599802017 CEST192.168.2.148.8.8.80xa3c6Standard query (0)bot.qngxgw.eu.orgA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Apr 25, 2024 17:02:02.808363914 CEST8.8.8.8192.168.2.140xa3c6No error (0)bot.qngxgw.eu.org89.185.30.66A (IP address)IN (0x0001)false

          System Behavior

          Start time (UTC):15:02:01
          Start date (UTC):25/04/2024
          Path:/tmp/unLvC6fFA8.elf
          Arguments:/tmp/unLvC6fFA8.elf
          File size:89576 bytes
          MD5 hash:33385ab702556fd99ef203847f38c545

          Start time (UTC):15:02:01
          Start date (UTC):25/04/2024
          Path:/tmp/unLvC6fFA8.elf
          Arguments:-
          File size:89576 bytes
          MD5 hash:33385ab702556fd99ef203847f38c545

          Start time (UTC):15:02:01
          Start date (UTC):25/04/2024
          Path:/tmp/unLvC6fFA8.elf
          Arguments:-
          File size:89576 bytes
          MD5 hash:33385ab702556fd99ef203847f38c545