Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
JupQoUiGIu.elf

Overview

General Information

Sample name:JupQoUiGIu.elf
renamed because original name is a hash value
Original sample name:76648acab10541b71737b5795231b2e8.elf
Analysis ID:1438519
MD5:76648acab10541b71737b5795231b2e8
SHA1:1269f6c5354fb9b743a16f9f9d835a051b3f237d
SHA256:e28b537be1422a8621fd50eb2c4064dd9f37dd3bc1703807a54173491cfd789c
Tags:32elfmirairenesas
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1438519
Start date and time:2024-05-08 20:10:17 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 44s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:JupQoUiGIu.elf
renamed because original name is a hash value
Original Sample Name:76648acab10541b71737b5795231b2e8.elf
Detection:MAL
Classification:mal52.troj.linELF@0/0@1/0
  • VT rate limit hit for: JupQoUiGIu.elf
Command:/tmp/JupQoUiGIu.elf
PID:6239
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
xXxSlicexXxxVEGA.
Standard Error:
  • system is lnxubuntu20
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: JupQoUiGIu.elfReversingLabs: Detection: 55%

Networking

barindex
Source: global trafficTCP traffic: 91.92.244.58 ports 0,1,5,6,9,60195
Source: global trafficTCP traffic: 192.168.2.23:54936 -> 91.92.244.58:60195
Source: /tmp/JupQoUiGIu.elf (PID: 6239)Socket: 127.0.0.1::63841Jump to behavior
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: global trafficDNS traffic detected: DNS query: minuoddos.top
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.troj.linELF@0/0@1/0
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1582/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2033/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1612/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1579/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1699/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1335/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1698/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2028/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1334/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1576/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2025/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2146/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/910/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/912/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/517/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/759/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/918/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1594/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1349/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1623/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/761/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1622/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/884/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1983/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2038/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1344/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1465/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1586/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1860/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1463/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2156/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/800/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/801/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1629/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1627/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1900/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/491/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2050/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1877/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/772/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1633/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1599/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1632/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/774/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1477/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/654/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/896/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1476/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1872/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2048/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/655/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1475/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/656/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/777/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/657/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/658/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/419/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/936/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1639/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1638/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1809/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1494/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1890/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2063/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2062/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1888/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1886/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/420/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1489/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/785/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1642/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/788/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/667/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/789/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1648/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2078/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2077/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2074/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/670/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/793/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1656/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1654/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/674/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1532/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/796/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/675/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/797/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/676/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/677/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2069/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2102/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/799/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2080/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2084/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2083/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1668/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1664/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1389/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/840/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/720/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2114/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/721/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/1661/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/2079/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6247)File opened: /proc/847/mapsJump to behavior
Source: /tmp/JupQoUiGIu.elf (PID: 6239)Queries kernel information via 'uname': Jump to behavior
Source: JupQoUiGIu.elf, 6239.1.00007fffeab56000.00007fffeab77000.rw-.sdmp, JupQoUiGIu.elf, 6242.1.00007fffeab56000.00007fffeab77000.rw-.sdmp, JupQoUiGIu.elf, 6246.1.00007fffeab56000.00007fffeab77000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sh4/tmp/JupQoUiGIu.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/JupQoUiGIu.elf
Source: JupQoUiGIu.elf, 6239.1.00007fffeab56000.00007fffeab77000.rw-.sdmp, JupQoUiGIu.elf, 6242.1.00007fffeab56000.00007fffeab77000.rw-.sdmp, JupQoUiGIu.elf, 6246.1.00007fffeab56000.00007fffeab77000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
Source: JupQoUiGIu.elf, 6239.1.000055de6f2c5000.000055de6f328000.rw-.sdmp, JupQoUiGIu.elf, 6242.1.000055de6f2c5000.000055de6f328000.rw-.sdmp, JupQoUiGIu.elf, 6246.1.000055de6f2c5000.000055de6f328000.rw-.sdmpBinary or memory string: U5!/etc/qemu-binfmt/sh4
Source: JupQoUiGIu.elf, 6239.1.000055de6f2c5000.000055de6f328000.rw-.sdmp, JupQoUiGIu.elf, 6242.1.000055de6f2c5000.000055de6f328000.rw-.sdmp, JupQoUiGIu.elf, 6246.1.000055de6f2c5000.000055de6f328000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1438519 Sample: JupQoUiGIu.elf Startdate: 08/05/2024 Architecture: LINUX Score: 52 18 minuoddos.top 91.92.244.58, 54936, 60195 THEZONEBG Bulgaria 2->18 20 109.202.202.202, 80 INIT7CH Switzerland 2->20 22 2 other IPs or domains 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Connects to many ports of the same IP (likely port scanning) 2->26 8 JupQoUiGIu.elf 2->8         started        signatures3 process4 process5 10 JupQoUiGIu.elf 8->10         started        12 JupQoUiGIu.elf 8->12         started        process6 14 JupQoUiGIu.elf 10->14         started        16 JupQoUiGIu.elf 10->16         started       
SourceDetectionScannerLabelLink
JupQoUiGIu.elf55%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
minuoddos.top
91.92.244.58
truetrue
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    109.202.202.202
    unknownSwitzerland
    13030INIT7CHfalse
    91.92.244.58
    minuoddos.topBulgaria
    34368THEZONEBGtrue
    91.189.91.43
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    91.189.91.42
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    109.202.202.202LGVxvlSFHL.elfGet hashmaliciousUnknownBrowse
      fuckjewishpeople.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
        systemd-resolvedGet hashmaliciousUnknownBrowse
          SecuriteInfo.com.Linux.Siggen.9999.2998.17754.elfGet hashmaliciousMiraiBrowse
            SecuriteInfo.com.HEUR.Backdoor.Linux.Gafgyt.cw.32679.18049.elfGet hashmaliciousUnknownBrowse
              DyHButIueY.elfGet hashmaliciousMiraiBrowse
                39MdRU6Xso.elfGet hashmaliciousMiraiBrowse
                  luLR9CuIwm.elfGet hashmaliciousGafgyt, MiraiBrowse
                    h1TlO5AbE7.elfGet hashmaliciousMiraiBrowse
                      mYyPA50Mdm.elfGet hashmaliciousMiraiBrowse
                        91.92.244.58mg5TkCr4DY.elfGet hashmaliciousUnknownBrowse
                          91.189.91.43LGVxvlSFHL.elfGet hashmaliciousUnknownBrowse
                            fuckjewishpeople.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                              systemd-resolvedGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Linux.Siggen.9999.2998.17754.elfGet hashmaliciousMiraiBrowse
                                  SecuriteInfo.com.HEUR.Backdoor.Linux.Gafgyt.cw.32679.18049.elfGet hashmaliciousUnknownBrowse
                                    DyHButIueY.elfGet hashmaliciousMiraiBrowse
                                      39MdRU6Xso.elfGet hashmaliciousMiraiBrowse
                                        luLR9CuIwm.elfGet hashmaliciousGafgyt, MiraiBrowse
                                          h1TlO5AbE7.elfGet hashmaliciousMiraiBrowse
                                            mYyPA50Mdm.elfGet hashmaliciousMiraiBrowse
                                              91.189.91.42LGVxvlSFHL.elfGet hashmaliciousUnknownBrowse
                                                fuckjewishpeople.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                  systemd-resolvedGet hashmaliciousUnknownBrowse
                                                    SecuriteInfo.com.Linux.Siggen.9999.2998.17754.elfGet hashmaliciousMiraiBrowse
                                                      SecuriteInfo.com.HEUR.Backdoor.Linux.Gafgyt.cw.32679.18049.elfGet hashmaliciousUnknownBrowse
                                                        DyHButIueY.elfGet hashmaliciousMiraiBrowse
                                                          39MdRU6Xso.elfGet hashmaliciousMiraiBrowse
                                                            luLR9CuIwm.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                              h1TlO5AbE7.elfGet hashmaliciousMiraiBrowse
                                                                mYyPA50Mdm.elfGet hashmaliciousMiraiBrowse
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  minuoddos.topmg5TkCr4DY.elfGet hashmaliciousUnknownBrowse
                                                                  • 91.92.244.58
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  CANONICAL-ASGBLGVxvlSFHL.elfGet hashmaliciousUnknownBrowse
                                                                  • 91.189.91.42
                                                                  fuckjewishpeople.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  systemd-resolvedGet hashmaliciousUnknownBrowse
                                                                  • 91.189.91.42
                                                                  SecuriteInfo.com.Linux.Siggen.9999.2998.17754.elfGet hashmaliciousMiraiBrowse
                                                                  • 91.189.91.42
                                                                  SecuriteInfo.com.HEUR.Backdoor.Linux.Gafgyt.cw.32679.18049.elfGet hashmaliciousUnknownBrowse
                                                                  • 91.189.91.42
                                                                  DyHButIueY.elfGet hashmaliciousMiraiBrowse
                                                                  • 91.189.91.42
                                                                  AMrO8CmESP.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 185.125.190.26
                                                                  g6oxYwoub0.elfGet hashmaliciousGafgytBrowse
                                                                  • 185.125.190.26
                                                                  39MdRU6Xso.elfGet hashmaliciousMiraiBrowse
                                                                  • 91.189.91.42
                                                                  UmTKdyjQ3h.elfGet hashmaliciousGafgytBrowse
                                                                  • 185.125.190.26
                                                                  CANONICAL-ASGBLGVxvlSFHL.elfGet hashmaliciousUnknownBrowse
                                                                  • 91.189.91.42
                                                                  fuckjewishpeople.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  systemd-resolvedGet hashmaliciousUnknownBrowse
                                                                  • 91.189.91.42
                                                                  SecuriteInfo.com.Linux.Siggen.9999.2998.17754.elfGet hashmaliciousMiraiBrowse
                                                                  • 91.189.91.42
                                                                  SecuriteInfo.com.HEUR.Backdoor.Linux.Gafgyt.cw.32679.18049.elfGet hashmaliciousUnknownBrowse
                                                                  • 91.189.91.42
                                                                  DyHButIueY.elfGet hashmaliciousMiraiBrowse
                                                                  • 91.189.91.42
                                                                  AMrO8CmESP.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 185.125.190.26
                                                                  g6oxYwoub0.elfGet hashmaliciousGafgytBrowse
                                                                  • 185.125.190.26
                                                                  39MdRU6Xso.elfGet hashmaliciousMiraiBrowse
                                                                  • 91.189.91.42
                                                                  UmTKdyjQ3h.elfGet hashmaliciousGafgytBrowse
                                                                  • 185.125.190.26
                                                                  THEZONEBGmg5TkCr4DY.elfGet hashmaliciousUnknownBrowse
                                                                  • 91.92.244.58
                                                                  z51ComprobantedePago.exeGet hashmaliciousXenoRATBrowse
                                                                  • 91.92.243.131
                                                                  Comprobante.exeGet hashmaliciousXenoRATBrowse
                                                                  • 91.92.243.131
                                                                  SecuriteInfo.com.Trojan.PackedNET.2147.22278.5618.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                  • 91.92.253.28
                                                                  VT3czLymhe.exeGet hashmaliciousUnknownBrowse
                                                                  • 91.92.253.114
                                                                  Comprobante.exeGet hashmaliciousXenoRATBrowse
                                                                  • 91.92.243.131
                                                                  download.elfGet hashmaliciousUnknownBrowse
                                                                  • 91.92.245.104
                                                                  Odeme_belgesi.exeGet hashmaliciousXenoRATBrowse
                                                                  • 91.92.243.131
                                                                  Odeme_belgesi.exeGet hashmaliciousXenoRATBrowse
                                                                  • 91.92.243.131
                                                                  Odeme_belgesi.exeGet hashmaliciousXenoRATBrowse
                                                                  • 91.92.243.131
                                                                  INIT7CHLGVxvlSFHL.elfGet hashmaliciousUnknownBrowse
                                                                  • 109.202.202.202
                                                                  fuckjewishpeople.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 109.202.202.202
                                                                  systemd-resolvedGet hashmaliciousUnknownBrowse
                                                                  • 109.202.202.202
                                                                  SecuriteInfo.com.Linux.Siggen.9999.2998.17754.elfGet hashmaliciousMiraiBrowse
                                                                  • 109.202.202.202
                                                                  SecuriteInfo.com.HEUR.Backdoor.Linux.Gafgyt.cw.32679.18049.elfGet hashmaliciousUnknownBrowse
                                                                  • 109.202.202.202
                                                                  DyHButIueY.elfGet hashmaliciousMiraiBrowse
                                                                  • 109.202.202.202
                                                                  39MdRU6Xso.elfGet hashmaliciousMiraiBrowse
                                                                  • 109.202.202.202
                                                                  luLR9CuIwm.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 109.202.202.202
                                                                  h1TlO5AbE7.elfGet hashmaliciousMiraiBrowse
                                                                  • 109.202.202.202
                                                                  mYyPA50Mdm.elfGet hashmaliciousMiraiBrowse
                                                                  • 109.202.202.202
                                                                  No context
                                                                  No context
                                                                  No created / dropped files found
                                                                  File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
                                                                  Entropy (8bit):6.7747727133418065
                                                                  TrID:
                                                                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                  File name:JupQoUiGIu.elf
                                                                  File size:56'200 bytes
                                                                  MD5:76648acab10541b71737b5795231b2e8
                                                                  SHA1:1269f6c5354fb9b743a16f9f9d835a051b3f237d
                                                                  SHA256:e28b537be1422a8621fd50eb2c4064dd9f37dd3bc1703807a54173491cfd789c
                                                                  SHA512:8739d4049d133015fb729176ba69ec2b072c8e479d50050f6162da4c56498cc2db99cc97d5538fc1811afba86a8dcd524def5cc2efea2fa9dcbeb5d56b849620
                                                                  SSDEEP:768:n/bBvb3aMFSaSp6WeViDp2DDFH/FgTmF5CCor6Ex/CvV79l:n/VvTaySaSnRaRKrr/CvJ
                                                                  TLSH:0E437D37C4AC2D90C55845B5A628DAF40BA3F504A6A27FF587828D658043FFCF60A7F9
                                                                  File Content Preview:.ELF..............*.......@.4...........4. ...(...............@...@...........................A...A.(...h...........Q.td............................././"O.n........#.*@........#.*@,....o&O.n...l..............................././.../.a"O.!...n...a.b("...q.

                                                                  ELF header

                                                                  Class:ELF32
                                                                  Data:2's complement, little endian
                                                                  Version:1 (current)
                                                                  Machine:<unknown>
                                                                  Version Number:0x1
                                                                  Type:EXEC (Executable file)
                                                                  OS/ABI:UNIX - System V
                                                                  ABI Version:0
                                                                  Entry Point Address:0x4001a0
                                                                  Flags:0x9
                                                                  ELF Header Size:52
                                                                  Program Header Offset:52
                                                                  Program Header Size:32
                                                                  Number of Program Headers:3
                                                                  Section Header Offset:55800
                                                                  Section Header Size:40
                                                                  Number of Section Headers:10
                                                                  Header String Table Index:9
                                                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                  NULL0x00x00x00x00x0000
                                                                  .initPROGBITS0x4000940x940x300x00x6AX004
                                                                  .textPROGBITS0x4000e00xe00xcc400x00x6AX0032
                                                                  .finiPROGBITS0x40cd200xcd200x240x00x6AX004
                                                                  .rodataPROGBITS0x40cd440xcd440xa480x00x2A004
                                                                  .ctorsPROGBITS0x41d7900xd7900x80x00x3WA004
                                                                  .dtorsPROGBITS0x41d7980xd7980x80x00x3WA004
                                                                  .dataPROGBITS0x41d7a40xd7a40x2140x00x3WA004
                                                                  .bssNOBITS0x41d9b80xd9b80x4400x00x3WA004
                                                                  .shstrtabSTRTAB0x00xd9b80x3e0x00x0001
                                                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                  LOAD0x00x4000000x4000000xd78c0xd78c6.81380x5R E0x10000.init .text .fini .rodata
                                                                  LOAD0xd7900x41d7900x41d7900x2280x6682.99790x6RW 0x10000.ctors .dtors .data .bss
                                                                  GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  May 8, 2024 20:11:00.973721981 CEST5493660195192.168.2.2391.92.244.58
                                                                  May 8, 2024 20:11:01.275723934 CEST601955493691.92.244.58192.168.2.23
                                                                  May 8, 2024 20:11:01.275970936 CEST5493660195192.168.2.2391.92.244.58
                                                                  May 8, 2024 20:11:01.276201963 CEST5493660195192.168.2.2391.92.244.58
                                                                  May 8, 2024 20:11:01.579651117 CEST601955493691.92.244.58192.168.2.23
                                                                  May 8, 2024 20:11:01.579958916 CEST5493660195192.168.2.2391.92.244.58
                                                                  May 8, 2024 20:11:01.882075071 CEST601955493691.92.244.58192.168.2.23
                                                                  May 8, 2024 20:11:02.922940969 CEST43928443192.168.2.2391.189.91.42
                                                                  May 8, 2024 20:11:08.554024935 CEST42836443192.168.2.2391.189.91.43
                                                                  May 8, 2024 20:11:10.089864016 CEST4251680192.168.2.23109.202.202.202
                                                                  May 8, 2024 20:11:11.285268068 CEST5493660195192.168.2.2391.92.244.58
                                                                  May 8, 2024 20:11:11.587240934 CEST601955493691.92.244.58192.168.2.23
                                                                  May 8, 2024 20:11:11.587327003 CEST601955493691.92.244.58192.168.2.23
                                                                  May 8, 2024 20:11:11.587584972 CEST5493660195192.168.2.2391.92.244.58
                                                                  May 8, 2024 20:11:24.423830032 CEST43928443192.168.2.2391.189.91.42
                                                                  May 8, 2024 20:11:26.916095018 CEST601955493691.92.244.58192.168.2.23
                                                                  May 8, 2024 20:11:26.916400909 CEST5493660195192.168.2.2391.92.244.58
                                                                  May 8, 2024 20:11:34.662312031 CEST42836443192.168.2.2391.189.91.43
                                                                  May 8, 2024 20:11:40.805634975 CEST4251680192.168.2.23109.202.202.202
                                                                  May 8, 2024 20:11:42.219059944 CEST601955493691.92.244.58192.168.2.23
                                                                  May 8, 2024 20:11:42.219183922 CEST5493660195192.168.2.2391.92.244.58
                                                                  May 8, 2024 20:11:57.523042917 CEST601955493691.92.244.58192.168.2.23
                                                                  May 8, 2024 20:11:57.523170948 CEST5493660195192.168.2.2391.92.244.58
                                                                  May 8, 2024 20:12:05.378012896 CEST43928443192.168.2.2391.189.91.42
                                                                  May 8, 2024 20:12:11.637154102 CEST5493660195192.168.2.2391.92.244.58
                                                                  May 8, 2024 20:12:11.941423893 CEST601955493691.92.244.58192.168.2.23
                                                                  May 8, 2024 20:12:11.941608906 CEST5493660195192.168.2.2391.92.244.58
                                                                  May 8, 2024 20:12:27.269646883 CEST601955493691.92.244.58192.168.2.23
                                                                  May 8, 2024 20:12:27.269857883 CEST5493660195192.168.2.2391.92.244.58
                                                                  May 8, 2024 20:12:42.572361946 CEST601955493691.92.244.58192.168.2.23
                                                                  May 8, 2024 20:12:42.572508097 CEST5493660195192.168.2.2391.92.244.58
                                                                  May 8, 2024 20:12:57.875092983 CEST601955493691.92.244.58192.168.2.23
                                                                  May 8, 2024 20:12:57.875355959 CEST5493660195192.168.2.2391.92.244.58
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  May 8, 2024 20:11:00.670348883 CEST4607953192.168.2.238.8.8.8
                                                                  May 8, 2024 20:11:00.973052979 CEST53460798.8.8.8192.168.2.23
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  May 8, 2024 20:11:00.670348883 CEST192.168.2.238.8.8.80x8519Standard query (0)minuoddos.topA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  May 8, 2024 20:11:00.973052979 CEST8.8.8.8192.168.2.230x8519No error (0)minuoddos.top91.92.244.58A (IP address)IN (0x0001)false

                                                                  System Behavior

                                                                  Start time (UTC):18:11:00
                                                                  Start date (UTC):08/05/2024
                                                                  Path:/tmp/JupQoUiGIu.elf
                                                                  Arguments:/tmp/JupQoUiGIu.elf
                                                                  File size:4139976 bytes
                                                                  MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                                                  Start time (UTC):18:11:00
                                                                  Start date (UTC):08/05/2024
                                                                  Path:/tmp/JupQoUiGIu.elf
                                                                  Arguments:-
                                                                  File size:4139976 bytes
                                                                  MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                                                  Start time (UTC):18:11:00
                                                                  Start date (UTC):08/05/2024
                                                                  Path:/tmp/JupQoUiGIu.elf
                                                                  Arguments:-
                                                                  File size:4139976 bytes
                                                                  MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                                                  Start time (UTC):18:11:00
                                                                  Start date (UTC):08/05/2024
                                                                  Path:/tmp/JupQoUiGIu.elf
                                                                  Arguments:-
                                                                  File size:4139976 bytes
                                                                  MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                                                  Start time (UTC):18:11:00
                                                                  Start date (UTC):08/05/2024
                                                                  Path:/tmp/JupQoUiGIu.elf
                                                                  Arguments:-
                                                                  File size:4139976 bytes
                                                                  MD5 hash:8943e5f8f8c280467b4472c15ae93ba9