Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
arm5.elf

Overview

General Information

Sample name:arm5.elf
Analysis ID:1639659
MD5:a780f70a989200be42ed6ac1685cc140
SHA1:015cc1d5a8567a64f57a5b7e8e3235bbe7659f08
SHA256:580af952cb77ef868e73641910ed19c8967cdfc52b64a32f42c9e1a31ff5ab41
Tags:elfMiraiuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Uses STUN server to do NAT traversial
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1639659
Start date and time:2025-03-16 02:28:12 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 55s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:arm5.elf
Detection:MAL
Classification:mal56.troj.linELF@0/2@2/0
Command:/tmp/arm5.elf
PID:5502
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world
Standard Error:
  • system is lnxubuntu20
  • arm5.elf (PID: 5502, Parent: 5425, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/arm5.elf
    • arm5.elf New Fork (PID: 5505, Parent: 5502)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: arm5.elfVirustotal: Detection: 10%Perma Link

Networking

barindex
Source: global trafficTCP traffic: 104.245.241.64 ports 0,54780,4,5,7,8
Source: global trafficTCP traffic: 216.146.26.30 ports 50749,0,4,5,7,9
Source: unknownDNS query: name: stun.l.google.com
Source: global trafficTCP traffic: 192.168.2.13:54296 -> 104.245.241.64:54780
Source: global trafficTCP traffic: 192.168.2.13:37416 -> 216.146.26.30:50749
Source: global trafficUDP traffic: 192.168.2.13:60175 -> 74.125.250.129:19302
Source: /tmp/arm5.elf (PID: 5505)Socket: 127.0.0.1:22448Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 104.245.241.64
Source: unknownTCP traffic detected without corresponding DNS query: 104.245.241.64
Source: unknownTCP traffic detected without corresponding DNS query: 104.245.241.64
Source: unknownTCP traffic detected without corresponding DNS query: 104.245.241.64
Source: unknownTCP traffic detected without corresponding DNS query: 104.245.241.64
Source: unknownTCP traffic detected without corresponding DNS query: 104.245.241.64
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: unknownTCP traffic detected without corresponding DNS query: 216.146.26.30
Source: global trafficDNS traffic detected: DNS query: stun.l.google.com
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal56.troj.linELF@0/2@2/0
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/238/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/239/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/3631/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/241/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/1482/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/1480/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/371/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/1238/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/134/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/3413/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/1475/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/936/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/816/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5502)Queries kernel information via 'uname': Jump to behavior
Source: arm5.elf, 5502.1.00007ffda0a0f000.00007ffda0a30000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/arm5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/arm5.elf
Source: arm5.elf, 5502.1.00007f977c035000.00007f977c03b000.rw-.sdmpBinary or memory string: vmware
Source: arm5.elf, 5502.1.000055d1246e3000.000055d124832000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: arm5.elf, 5502.1.00007f977c035000.00007f977c03b000.rw-.sdmpBinary or memory string: qemu-arm
Source: arm5.elf, 5502.1.00007ffda0a0f000.00007ffda0a30000.rw-.sdmpBinary or memory string: /tmp/qemu-open.hyHeEf
Source: arm5.elf, 5502.1.000055d1246e3000.000055d124832000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: arm5.elf, 5502.1.00007ffda0a0f000.00007ffda0a30000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: arm5.elf, 5502.1.00007ffda0a0f000.00007ffda0a30000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.hyHeEf:
Source: arm5.elf, 5502.1.00007f977c035000.00007f977c03b000.rw-.sdmpBinary or memory string: !!a1gAWFxuAXsFWUgBRQAA!!a1gAWFxuAXsAWUgKRXgA!!a1gAWFxuAXsAWEgJR3IA!!a10CWFxuAHsGWVcWQHAA!!a10CWFxuAHsGWVcWQHUA!!aFwAWF9uA3sGW0gLRgAA!!aFwAWFlpG2QBW0gJTwAA!!qemu-arm2QBW0gJTwAA!
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
arm5.elf11%VirustotalBrowse
arm5.elf11%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
stun.l.google.com
74.125.250.129
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    216.146.26.30
    unknownReserved
    11915US-TELEPACIFICUStrue
    104.245.241.64
    unknownUnited States
    8100ASN-QUADRANET-GLOBALUStrue
    74.125.250.129
    stun.l.google.comUnited States
    15169GOOGLEUSfalse
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    US-TELEPACIFICUScbr.x86.elfGet hashmaliciousMiraiBrowse
    • 65.60.78.35
    jklmips.elfGet hashmaliciousUnknownBrowse
    • 66.81.80.166
    nklmips.elfGet hashmaliciousUnknownBrowse
    • 64.60.67.186
    jklm68k.elfGet hashmaliciousUnknownBrowse
    • 216.146.25.253
    nabmpsl.elfGet hashmaliciousUnknownBrowse
    • 208.57.85.236
    i686.elfGet hashmaliciousMiraiBrowse
    • 69.19.202.218
    nklmpsl.elfGet hashmaliciousUnknownBrowse
    • 207.22.32.9
    cbr.arm.elfGet hashmaliciousMiraiBrowse
    • 198.101.108.57
    nklppc.elfGet hashmaliciousUnknownBrowse
    • 216.14.60.100
    nklarm5.elfGet hashmaliciousUnknownBrowse
    • 66.81.23.210
    ASN-QUADRANET-GLOBALUSTransferencia - BBVA 20250312.pdf(45KB).com.exeGet hashmaliciousDarkTortilla, XWormBrowse
    • 104.245.240.123
    http://znhejdjbhiggcd.ossassessoria.com.br/4diZRA13374FbeN829lfsavaefhd2PDVVMSBOIIGVJMI4000TICW2208542O12?gMiA13bo9PEo5Get hashmaliciousUnknownBrowse
    • 194.53.137.131
    Presupuesto - N#U00ba 270 - 0020250314-0000945.com.exeGet hashmaliciousRemcos, DarkTortillaBrowse
    • 104.245.240.123
    m68k.elfGet hashmaliciousMiraiBrowse
    • 23.153.78.255
    https://vexti.com/punchss/bowllsGet hashmaliciousUnknownBrowse
    • 104.245.240.188
    https://email.mail.likolia.com/c/eJxM0D2O2zAQxfHTiB2NGXL4MQWLNL7GYsghYyKyJGiVBTanD-xq6_9rfk-O42NqgcQjkjZbIbIlTc5yC2xDQGapybFTowVGIFdNL5gIEyNDNo8SexTUphrH6MojC3qqzOR9EuBqZnHgAnh0GCBAvnEFx0Sa-wjaMS8ET5nrbZ1_9nXKre1Ps5bHdR2fi_-1uPvi7v_kXd9xcXdsjmJlokE---CBmSrlwU0wsHSz7dccs8k19-1FzJkgduyWhkNL3mfLMVQ7GqWYK0IANccq3_18zYWzJBxgqXe0VNFbYRo2IIqIahrozFlk07PfvuTv78e2EGiT9l37-RZ89k0_rvn8cVcyX8X9DwAA__8Ts2t8Get hashmaliciousUnknownBrowse
    • 104.238.60.95
    cbr.sh4.elfGet hashmaliciousMiraiBrowse
    • 45.199.228.216
    KGdzTBQpgz.exeGet hashmaliciousXWormBrowse
    • 104.245.240.123
    x20U0QJMVC.exeGet hashmaliciousXWormBrowse
    • 104.245.240.158
    ATT09858.htmGet hashmaliciousHTMLPhisherBrowse
    • 185.174.100.76
    No context
    No context
    Process:/tmp/arm5.elf
    File Type:data
    Category:dropped
    Size (bytes):14
    Entropy (8bit):3.521640636343319
    Encrypted:false
    SSDEEP:3:TggLAJ5:Tgg03
    MD5:A737667E3E61E716C83359F35BC141DA
    SHA1:E7C3DBC96B90E28F18CFB1CADE0C7AF673FFAA57
    SHA-256:2D8A0F430A3339E16B223D653251534539D95B1DF7142834F68D9172B1656E37
    SHA-512:0ACAFC3F3F40EDEF3D9F2F1CCE09BAF5004FD8488434F4903F18B9B7E77B4A6CDF7F84A47856CB2FDAA4B1B0F70FC2A3EDDE82BD29831FF54CB75F4E4C74FE74
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:/tmp/arm5.elf.
    Process:/tmp/arm5.elf
    File Type:data
    Category:dropped
    Size (bytes):14
    Entropy (8bit):3.521640636343319
    Encrypted:false
    SSDEEP:3:TggLAJ5:Tgg03
    MD5:A737667E3E61E716C83359F35BC141DA
    SHA1:E7C3DBC96B90E28F18CFB1CADE0C7AF673FFAA57
    SHA-256:2D8A0F430A3339E16B223D653251534539D95B1DF7142834F68D9172B1656E37
    SHA-512:0ACAFC3F3F40EDEF3D9F2F1CCE09BAF5004FD8488434F4903F18B9B7E77B4A6CDF7F84A47856CB2FDAA4B1B0F70FC2A3EDDE82BD29831FF54CB75F4E4C74FE74
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:/tmp/arm5.elf.
    File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
    Entropy (8bit):6.115857785556972
    TrID:
    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
    File name:arm5.elf
    File size:88'492 bytes
    MD5:a780f70a989200be42ed6ac1685cc140
    SHA1:015cc1d5a8567a64f57a5b7e8e3235bbe7659f08
    SHA256:580af952cb77ef868e73641910ed19c8967cdfc52b64a32f42c9e1a31ff5ab41
    SHA512:856d940fa84fc758ade4062a1040d8ddf0846b145287b6d5a0920c4178e792cc62f960c36c3b9a6e1fa14b2f454b31d5f9a9d52ff884a2761768de4bee344345
    SSDEEP:1536:2enuniCE4Lt7FqsS84xoYFPuT7VcFXoaYG6hr2PvT3OD8++3zC+RzLroH:6il4Lt7YxoePIS6Bhr2aD/ezV/o
    TLSH:DC831846B8409B2AC5D017BEFE1E528D33232FB8E3DE32029D156B2577DB95A0E3B451
    File Content Preview:.ELF..............(.....l...4....W......4. ...(........p.U...........................................V...V...............V...V...V...... G..........Q.td.............................@-..@............/..@-.,@...0....S..... 0....S.........../..0...0...@..../

    ELF header

    Class:ELF32
    Data:2's complement, little endian
    Version:1 (current)
    Machine:ARM
    Version Number:0x1
    Type:EXEC (Executable file)
    OS/ABI:UNIX - System V
    ABI Version:0
    Entry Point Address:0x816c
    Flags:0x4000002
    ELF Header Size:52
    Program Header Offset:52
    Program Header Size:32
    Number of Program Headers:4
    Section Header Offset:88012
    Section Header Size:40
    Number of Section Headers:12
    Header String Table Index:11
    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
    NULL0x00x00x00x00x0000
    .initPROGBITS0x80b40xb40x140x00x6AX001
    .textPROGBITS0x80c80xc80x140a80x00x6AX004
    .finiPROGBITS0x1c1700x141700x140x00x6AX001
    .rodataPROGBITS0x1c1880x141880x14580x00x2A008
    .ARM.exidxARM_EXIDX0x1d5e00x155e00xc80x00x82AL204
    .init_arrayINIT_ARRAY0x256ac0x156ac0x40x00x3WA004
    .fini_arrayFINI_ARRAY0x256b00x156b00x40x00x3WA004
    .gotPROGBITS0x256b80x156b80x280x40x3WA004
    .dataPROGBITS0x256e00x156e00x940x00x3WA004
    .bssNOBITS0x257780x157740x46540x00x3WA008
    .shstrtabSTRTAB0x00x157740x580x00x0001
    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
    EXIDX0x155e00x1d5e00x1d5e00xc80xc84.26760x4R 0x4.ARM.exidx
    LOAD0x00x80000x80000x156a80x156a86.12720x5R E0x8000.init .text .fini .rodata .ARM.exidx
    LOAD0x156ac0x256ac0x256ac0xc80x47203.59850x6RW 0x8000.init_array .fini_array .got .data .bss
    GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
    TimestampSource PortDest PortSource IPDest IP
    Mar 16, 2025 02:29:21.829608917 CET5429654780192.168.2.13104.245.241.64
    Mar 16, 2025 02:29:21.834350109 CET5478054296104.245.241.64192.168.2.13
    Mar 16, 2025 02:29:21.835149050 CET5429654780192.168.2.13104.245.241.64
    Mar 16, 2025 02:29:22.875361919 CET5478054296104.245.241.64192.168.2.13
    Mar 16, 2025 02:29:22.875469923 CET5429654780192.168.2.13104.245.241.64
    Mar 16, 2025 02:29:23.259018898 CET5478054296104.245.241.64192.168.2.13
    Mar 16, 2025 02:29:23.259166002 CET5429654780192.168.2.13104.245.241.64
    Mar 16, 2025 02:29:26.660403967 CET5429654780192.168.2.13104.245.241.64
    Mar 16, 2025 02:29:26.665070057 CET5478054296104.245.241.64192.168.2.13
    Mar 16, 2025 02:29:27.094085932 CET5478054296104.245.241.64192.168.2.13
    Mar 16, 2025 02:29:27.094305992 CET5429654780192.168.2.13104.245.241.64
    Mar 16, 2025 02:29:27.099487066 CET5478054296104.245.241.64192.168.2.13
    Mar 16, 2025 02:29:28.096208096 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:29:28.101340055 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:29:28.101417065 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:29:29.292387962 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:29:29.292546034 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:29:29.751785040 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:29:29.751909971 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:29:33.150613070 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:29:33.156209946 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:29:48.156354904 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:29:48.161067009 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:29:48.161161900 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:29:48.165767908 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:29:59.495246887 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:29:59.495481968 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:30:14.511217117 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:30:14.516186953 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:30:14.516268015 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:30:14.520961046 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:30:32.816562891 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:30:32.821398020 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:30:32.821481943 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:30:32.826198101 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:30:51.965928078 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:30:51.971364975 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:30:51.971436977 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:30:51.976063967 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:31:10.242295980 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:31:10.247061014 CET5074937416216.146.26.30192.168.2.13
    Mar 16, 2025 02:31:10.247117996 CET3741650749192.168.2.13216.146.26.30
    Mar 16, 2025 02:31:10.253211975 CET5074937416216.146.26.30192.168.2.13
    TimestampSource PortDest PortSource IPDest IP
    Mar 16, 2025 02:29:22.841568947 CET3789353192.168.2.138.8.8.8
    Mar 16, 2025 02:29:22.849551916 CET53378938.8.8.8192.168.2.13
    Mar 16, 2025 02:29:22.849953890 CET6017519302192.168.2.1374.125.250.129
    Mar 16, 2025 02:29:23.296794891 CET193026017574.125.250.129192.168.2.13
    Mar 16, 2025 02:29:29.097660065 CET4981753192.168.2.138.8.8.8
    Mar 16, 2025 02:29:29.107321024 CET53498178.8.8.8192.168.2.13
    Mar 16, 2025 02:29:29.107462883 CET5672919302192.168.2.1374.125.250.129
    Mar 16, 2025 02:29:29.579343081 CET193025672974.125.250.129192.168.2.13
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Mar 16, 2025 02:29:22.841568947 CET192.168.2.138.8.8.80x2b13Standard query (0)stun.l.google.comA (IP address)IN (0x0001)false
    Mar 16, 2025 02:29:29.097660065 CET192.168.2.138.8.8.80xce86Standard query (0)stun.l.google.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Mar 16, 2025 02:29:22.849551916 CET8.8.8.8192.168.2.130x2b13No error (0)stun.l.google.com74.125.250.129A (IP address)IN (0x0001)false
    Mar 16, 2025 02:29:29.107321024 CET8.8.8.8192.168.2.130xce86No error (0)stun.l.google.com74.125.250.129A (IP address)IN (0x0001)false

    System Behavior

    Start time (UTC):01:29:19
    Start date (UTC):16/03/2025
    Path:/tmp/arm5.elf
    Arguments:/tmp/arm5.elf
    File size:4956856 bytes
    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

    Start time (UTC):01:29:20
    Start date (UTC):16/03/2025
    Path:/tmp/arm5.elf
    Arguments:-
    File size:4956856 bytes
    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1