Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
bezWhgH7DL.elf

Overview

General Information

Sample name:bezWhgH7DL.elf
renamed because original name is a hash value
Original sample name:83d35720ddf336f71e1702a332c590aa.elf
Analysis ID:1438527
MD5:83d35720ddf336f71e1702a332c590aa
SHA1:69e5719152b284a6539d69b9b6e8939c9ba3374c
SHA256:e589db61d5e1b238c153aab66fa63763c6bf23c795c81e7e6794b7cfb70ff9da
Tags:32elfmiraisparc
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1438527
Start date and time:2024-05-08 20:20:30 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 30s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:bezWhgH7DL.elf
renamed because original name is a hash value
Original Sample Name:83d35720ddf336f71e1702a332c590aa.elf
Detection:MAL
Classification:mal52.troj.linELF@0/1@1/0
  • VT rate limit hit for: bezWhgH7DL.elf
Command:/tmp/bezWhgH7DL.elf
PID:5435
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
xXxSlicexXxxVEGA.
Standard Error:
  • system is lnxubuntu20
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: bezWhgH7DL.elfReversingLabs: Detection: 55%

Networking

barindex
Source: global trafficTCP traffic: 91.92.244.58 ports 0,1,5,6,9,60195
Source: global trafficTCP traffic: 192.168.2.13:51460 -> 91.92.244.58:60195
Source: /tmp/bezWhgH7DL.elf (PID: 5435)Socket: 127.0.0.1::63841Jump to behavior
Source: global trafficTCP traffic: 192.168.2.13:48202 -> 185.125.190.26:443
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: global trafficDNS traffic detected: DNS query: minuoddos.top
Source: unknownNetwork traffic detected: HTTP traffic on port 48202 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.troj.linELF@0/1@1/0
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3761/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3122/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3117/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3114/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/914/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/518/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/519/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/5418/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/917/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3637/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/5419/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3134/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3375/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3132/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3095/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/5270/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1745/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1866/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1588/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/884/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1982/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/765/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3246/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/767/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/800/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1906/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/802/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/803/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1748/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/5440/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3420/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1482/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/490/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1480/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1755/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1238/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1875/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/2964/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3413/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1751/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1872/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/2961/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1475/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/656/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/778/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/657/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/658/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/659/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/418/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/936/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/419/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/5438/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/816/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1879/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1891/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3310/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3153/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/780/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/660/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1921/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/783/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1765/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/2974/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3707/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1400/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1884/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3424/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3708/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/2972/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3709/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3147/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/2970/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1881/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3146/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3300/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1805/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1925/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1804/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1648/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1922/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3429/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3442/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3165/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3164/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3163/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3162/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/790/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3161/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/792/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/793/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/672/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1930/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/674/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/795/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3315/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1411/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/2984/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/1410/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/797/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/676/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3434/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3158/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/678/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/679/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5442)File opened: /proc/3710/mapsJump to behavior
Source: /tmp/bezWhgH7DL.elf (PID: 5435)Queries kernel information via 'uname': Jump to behavior
Source: bezWhgH7DL.elf, 5435.1.00005647dec8d000.00005647ded12000.rw-.sdmp, bezWhgH7DL.elf, 5437.1.00005647dec8d000.00005647ded12000.rw-.sdmp, bezWhgH7DL.elf, 5440.1.00005647dec8d000.00005647ded12000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sparc
Source: bezWhgH7DL.elf, 5435.1.00005647dec8d000.00005647ded12000.rw-.sdmp, bezWhgH7DL.elf, 5437.1.00005647dec8d000.00005647ded12000.rw-.sdmp, bezWhgH7DL.elf, 5440.1.00005647dec8d000.00005647ded12000.rw-.sdmpBinary or memory string: GV!/etc/qemu-binfmt/sparc
Source: bezWhgH7DL.elf, 5435.1.00007ffcf99c7000.00007ffcf99e8000.rw-.sdmp, bezWhgH7DL.elf, 5437.1.00007ffcf99c7000.00007ffcf99e8000.rw-.sdmp, bezWhgH7DL.elf, 5440.1.00007ffcf99c7000.00007ffcf99e8000.rw-.sdmpBinary or memory string: @2ROx86_64/usr/bin/qemu-sparc/tmp/bezWhgH7DL.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/bezWhgH7DL.elf
Source: bezWhgH7DL.elf, 5435.1.00007ffcf99c7000.00007ffcf99e8000.rw-.sdmp, bezWhgH7DL.elf, 5437.1.00007ffcf99c7000.00007ffcf99e8000.rw-.sdmp, bezWhgH7DL.elf, 5440.1.00007ffcf99c7000.00007ffcf99e8000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1438527 Sample: bezWhgH7DL.elf Startdate: 08/05/2024 Architecture: LINUX Score: 52 18 minuoddos.top 91.92.244.58, 51460, 60195 THEZONEBG Bulgaria 2->18 20 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->20 22 Multi AV Scanner detection for submitted file 2->22 24 Connects to many ports of the same IP (likely port scanning) 2->24 8 bezWhgH7DL.elf 2->8         started        signatures3 process4 process5 10 bezWhgH7DL.elf 8->10         started        12 bezWhgH7DL.elf 8->12         started        process6 14 bezWhgH7DL.elf 10->14         started        16 bezWhgH7DL.elf 10->16         started       
SourceDetectionScannerLabelLink
bezWhgH7DL.elf55%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
minuoddos.top
91.92.244.58
truetrue
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    185.125.190.26
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    91.92.244.58
    minuoddos.topBulgaria
    34368THEZONEBGtrue
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    185.125.190.26AMrO8CmESP.elfGet hashmaliciousMirai, OkiruBrowse
      g6oxYwoub0.elfGet hashmaliciousGafgytBrowse
        UmTKdyjQ3h.elfGet hashmaliciousGafgytBrowse
          HWAIKevRb7.elfGet hashmaliciousOkiruBrowse
            ysbnzIu9Fh.elfGet hashmaliciousMiraiBrowse
              VUiCJxsbgq.elfGet hashmaliciousOkiruBrowse
                k5u3qlfvl3.elfGet hashmaliciousUnknownBrowse
                  a2PdqkbMxB.elfGet hashmaliciousMiraiBrowse
                    jamfw5cEd1.elfGet hashmaliciousGafgyt, MiraiBrowse
                      Aqua.arm7-20240507-1758.elfGet hashmaliciousMiraiBrowse
                        91.92.244.58ATvOcqLo1D.elfGet hashmaliciousUnknownBrowse
                          PP6je8BlFL.elfGet hashmaliciousUnknownBrowse
                            Lj7qNwy54U.elfGet hashmaliciousUnknownBrowse
                              g4jUx3nLmP.elfGet hashmaliciousUnknownBrowse
                                JupQoUiGIu.elfGet hashmaliciousUnknownBrowse
                                  mg5TkCr4DY.elfGet hashmaliciousUnknownBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    minuoddos.topATvOcqLo1D.elfGet hashmaliciousUnknownBrowse
                                    • 91.92.244.58
                                    PP6je8BlFL.elfGet hashmaliciousUnknownBrowse
                                    • 91.92.244.58
                                    Lj7qNwy54U.elfGet hashmaliciousUnknownBrowse
                                    • 91.92.244.58
                                    g4jUx3nLmP.elfGet hashmaliciousUnknownBrowse
                                    • 91.92.244.58
                                    JupQoUiGIu.elfGet hashmaliciousUnknownBrowse
                                    • 91.92.244.58
                                    mg5TkCr4DY.elfGet hashmaliciousUnknownBrowse
                                    • 91.92.244.58
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    CANONICAL-ASGBATvOcqLo1D.elfGet hashmaliciousUnknownBrowse
                                    • 91.189.91.42
                                    Hl1XYulacW.elfGet hashmaliciousUnknownBrowse
                                    • 91.189.91.42
                                    JupQoUiGIu.elfGet hashmaliciousUnknownBrowse
                                    • 91.189.91.42
                                    LGVxvlSFHL.elfGet hashmaliciousUnknownBrowse
                                    • 91.189.91.42
                                    fuckjewishpeople.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                                    • 91.189.91.42
                                    systemd-resolvedGet hashmaliciousUnknownBrowse
                                    • 91.189.91.42
                                    SecuriteInfo.com.Linux.Siggen.9999.2998.17754.elfGet hashmaliciousMiraiBrowse
                                    • 91.189.91.42
                                    SecuriteInfo.com.HEUR.Backdoor.Linux.Gafgyt.cw.32679.18049.elfGet hashmaliciousUnknownBrowse
                                    • 91.189.91.42
                                    DyHButIueY.elfGet hashmaliciousMiraiBrowse
                                    • 91.189.91.42
                                    AMrO8CmESP.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 185.125.190.26
                                    THEZONEBGATvOcqLo1D.elfGet hashmaliciousUnknownBrowse
                                    • 91.92.244.58
                                    PP6je8BlFL.elfGet hashmaliciousUnknownBrowse
                                    • 91.92.244.58
                                    Lj7qNwy54U.elfGet hashmaliciousUnknownBrowse
                                    • 91.92.244.58
                                    g4jUx3nLmP.elfGet hashmaliciousUnknownBrowse
                                    • 91.92.244.58
                                    JupQoUiGIu.elfGet hashmaliciousUnknownBrowse
                                    • 91.92.244.58
                                    mg5TkCr4DY.elfGet hashmaliciousUnknownBrowse
                                    • 91.92.244.58
                                    z51ComprobantedePago.exeGet hashmaliciousXenoRATBrowse
                                    • 91.92.243.131
                                    Comprobante.exeGet hashmaliciousXenoRATBrowse
                                    • 91.92.243.131
                                    SecuriteInfo.com.Trojan.PackedNET.2147.22278.5618.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                    • 91.92.253.28
                                    VT3czLymhe.exeGet hashmaliciousUnknownBrowse
                                    • 91.92.253.114
                                    No context
                                    No context
                                    Process:/tmp/bezWhgH7DL.elf
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):310
                                    Entropy (8bit):3.5699882974477983
                                    Encrypted:false
                                    SSDEEP:6:M3gcyNCtXoX6/VUV4cyNCtX8/I9l/VbY/VfKoO/VNfiY/VH:M39yNCt4rVlyNCts/Ihl
                                    MD5:00AD016E9039991546A9CE7D84C4FBE4
                                    SHA1:EE8FD4DCF5422EBF9D84D93ECCEC1FEDB48A0CC4
                                    SHA-256:D10B425D21DBFBB214FB3E765FD35069F3698DA3ADA3AF563014C9C977229B48
                                    SHA-512:BAA2F86D5ABACE77B20E738147FCF68A3A81708550EF44FD77E36CCA9DF20B4B147D24DCE964C426CB58E2F354FA93DADA9D84344255A1A0DC9F38F1CCD1A69A
                                    Malicious:false
                                    Reputation:low
                                    Preview:10000-20000 r-xp 00000000 fd:00 531566 /tmp/bezWhgH7DL.elf.20000-21000 rw-p 00010000 fd:00 531566 /tmp/bezWhgH7DL.elf.21000-22000 rw-p 00000000 00:00 0 .22000-24000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                                    File type:ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, stripped
                                    Entropy (8bit):6.011482866281488
                                    TrID:
                                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                    File name:bezWhgH7DL.elf
                                    File size:66'568 bytes
                                    MD5:83d35720ddf336f71e1702a332c590aa
                                    SHA1:69e5719152b284a6539d69b9b6e8939c9ba3374c
                                    SHA256:e589db61d5e1b238c153aab66fa63763c6bf23c795c81e7e6794b7cfb70ff9da
                                    SHA512:3363e490fff52d218f0d336a3944523f294e44baabe36922bbf52e2e2691c6b6a97fa7dc5787d7a701dab457315b5a26df56efe6a878d6e69c17010a1ed48aa6
                                    SSDEEP:768:x7QzG79IoInRX1A6+ROMG9/w0YFFjd3A+ZXpPmIeT1LB/0OQjFHibOYvn4w7N3HW:RMo9InnRX1A6+ROMg/wGOYvbmBaC
                                    TLSH:88536C16B8391E17C0E8A5BE12FB8B65B2F42A4E04A4879D3E360F8FFF615D4A507174
                                    File Content Preview:.ELF...........................4...x.....4. ...(.......................................................8...x........dt.Q................................@..(....@.<.................#.....b8..`.....!..... ...@.....".........`......$ ... ...@...........`....

                                    ELF header

                                    Class:ELF32
                                    Data:2's complement, big endian
                                    Version:1 (current)
                                    Machine:Sparc
                                    Version Number:0x1
                                    Type:EXEC (Executable file)
                                    OS/ABI:UNIX - System V
                                    ABI Version:0
                                    Entry Point Address:0x101a4
                                    Flags:0x0
                                    ELF Header Size:52
                                    Program Header Offset:52
                                    Program Header Size:32
                                    Number of Program Headers:3
                                    Section Header Offset:66168
                                    Section Header Size:40
                                    Number of Section Headers:10
                                    Header String Table Index:9
                                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                    NULL0x00x00x00x00x0000
                                    .initPROGBITS0x100940x940x1c0x00x6AX004
                                    .textPROGBITS0x100b00xb00xf2940x00x6AX004
                                    .finiPROGBITS0x1f3440xf3440x140x00x6AX004
                                    .rodataPROGBITS0x1f3580xf3580xb380x00x2A008
                                    .ctorsPROGBITS0x200000x100000x80x00x3WA004
                                    .dtorsPROGBITS0x200080x100080x80x00x3WA004
                                    .dataPROGBITS0x200180x100180x2200x00x3WA008
                                    .bssNOBITS0x202380x102380x4400x00x3WA004
                                    .shstrtabSTRTAB0x00x102380x3e0x00x0001
                                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                    LOAD0x00x100000x100000xfe900xfe906.05370x5R E0x10000.init .text .fini .rodata
                                    LOAD0x100000x200000x200000x2380x6782.87500x6RW 0x10000.ctors .dtors .data .bss
                                    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                    TimestampSource PortDest PortSource IPDest IP
                                    May 8, 2024 20:21:08.603728056 CEST5146060195192.168.2.1391.92.244.58
                                    May 8, 2024 20:21:08.905929089 CEST601955146091.92.244.58192.168.2.13
                                    May 8, 2024 20:21:08.905987024 CEST5146060195192.168.2.1391.92.244.58
                                    May 8, 2024 20:21:08.906215906 CEST5146060195192.168.2.1391.92.244.58
                                    May 8, 2024 20:21:09.208426952 CEST601955146091.92.244.58192.168.2.13
                                    May 8, 2024 20:21:09.208491087 CEST5146060195192.168.2.1391.92.244.58
                                    May 8, 2024 20:21:09.510629892 CEST601955146091.92.244.58192.168.2.13
                                    May 8, 2024 20:21:18.914001942 CEST5146060195192.168.2.1391.92.244.58
                                    May 8, 2024 20:21:19.216259956 CEST601955146091.92.244.58192.168.2.13
                                    May 8, 2024 20:21:19.216344118 CEST601955146091.92.244.58192.168.2.13
                                    May 8, 2024 20:21:19.216418028 CEST5146060195192.168.2.1391.92.244.58
                                    May 8, 2024 20:21:19.257865906 CEST48202443192.168.2.13185.125.190.26
                                    May 8, 2024 20:21:34.531923056 CEST601955146091.92.244.58192.168.2.13
                                    May 8, 2024 20:21:34.532124043 CEST5146060195192.168.2.1391.92.244.58
                                    May 8, 2024 20:21:49.721901894 CEST48202443192.168.2.13185.125.190.26
                                    May 8, 2024 20:21:49.835201979 CEST601955146091.92.244.58192.168.2.13
                                    May 8, 2024 20:21:49.835313082 CEST5146060195192.168.2.1391.92.244.58
                                    May 8, 2024 20:22:05.137949944 CEST601955146091.92.244.58192.168.2.13
                                    May 8, 2024 20:22:05.138081074 CEST5146060195192.168.2.1391.92.244.58
                                    May 8, 2024 20:22:19.261867046 CEST5146060195192.168.2.1391.92.244.58
                                    May 8, 2024 20:22:19.564094067 CEST601955146091.92.244.58192.168.2.13
                                    May 8, 2024 20:22:19.564287901 CEST5146060195192.168.2.1391.92.244.58
                                    May 8, 2024 20:22:34.884015083 CEST601955146091.92.244.58192.168.2.13
                                    May 8, 2024 20:22:34.884164095 CEST5146060195192.168.2.1391.92.244.58
                                    May 8, 2024 20:22:50.186922073 CEST601955146091.92.244.58192.168.2.13
                                    May 8, 2024 20:22:50.187159061 CEST5146060195192.168.2.1391.92.244.58
                                    May 8, 2024 20:23:05.490008116 CEST601955146091.92.244.58192.168.2.13
                                    May 8, 2024 20:23:05.490164042 CEST5146060195192.168.2.1391.92.244.58
                                    TimestampSource PortDest PortSource IPDest IP
                                    May 8, 2024 20:21:08.432805061 CEST5870353192.168.2.138.8.8.8
                                    May 8, 2024 20:21:08.603046894 CEST53587038.8.8.8192.168.2.13
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    May 8, 2024 20:21:08.432805061 CEST192.168.2.138.8.8.80xe583Standard query (0)minuoddos.topA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    May 8, 2024 20:21:08.603046894 CEST8.8.8.8192.168.2.130xe583No error (0)minuoddos.top91.92.244.58A (IP address)IN (0x0001)false

                                    System Behavior

                                    Start time (UTC):18:21:07
                                    Start date (UTC):08/05/2024
                                    Path:/tmp/bezWhgH7DL.elf
                                    Arguments:/tmp/bezWhgH7DL.elf
                                    File size:4379400 bytes
                                    MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                    Start time (UTC):18:21:07
                                    Start date (UTC):08/05/2024
                                    Path:/tmp/bezWhgH7DL.elf
                                    Arguments:-
                                    File size:4379400 bytes
                                    MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                    Start time (UTC):18:21:07
                                    Start date (UTC):08/05/2024
                                    Path:/tmp/bezWhgH7DL.elf
                                    Arguments:-
                                    File size:4379400 bytes
                                    MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                    Start time (UTC):18:21:07
                                    Start date (UTC):08/05/2024
                                    Path:/tmp/bezWhgH7DL.elf
                                    Arguments:-
                                    File size:4379400 bytes
                                    MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                    Start time (UTC):18:21:07
                                    Start date (UTC):08/05/2024
                                    Path:/tmp/bezWhgH7DL.elf
                                    Arguments:-
                                    File size:4379400 bytes
                                    MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e