Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
Space.m68k.elf

Overview

General Information

Sample name:Space.m68k.elf
Analysis ID:1665360
MD5:12885acf04e9c9ec92c9b85892fbb69e
SHA1:c82a896d7ee583a92f72fe3eaf9aaec1c7f74b67
SHA256:6a63de47ad6f84492c9b124425cf8065aa775e57f83830a319851072b9981c92
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:72
Range:0 - 100

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1665360
Start date and time:2025-04-15 14:02:15 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 45s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:Space.m68k.elf
Detection:MAL
Classification:mal72.troj.linELF@0/0@0/0
Command:/tmp/Space.m68k.elf
PID:5518
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • dash New Fork (PID: 5596, Parent: 3670)
  • rm (PID: 5596, Parent: 3670, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.FZyZ6dyDOs /tmp/tmp.KRo7iLuEbR /tmp/tmp.01gI1ZNmq8
  • dash New Fork (PID: 5597, Parent: 3670)
  • rm (PID: 5597, Parent: 3670, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.FZyZ6dyDOs /tmp/tmp.KRo7iLuEbR /tmp/tmp.01gI1ZNmq8
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
Space.m68k.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    Space.m68k.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0x151af:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x151c3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x151d7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x151eb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x151ff:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15213:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15227:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1523b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1524f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15263:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15277:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1528b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1529f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x152b3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x152c7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x152db:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x152ef:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15303:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15317:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1532b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1533f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    SourceRuleDescriptionAuthorStrings
    5535.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5535.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x151af:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x151c3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x151d7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x151eb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x151ff:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15213:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15227:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1523b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1524f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15263:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15277:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1528b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1529f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x152b3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x152c7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x152db:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x152ef:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15303:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15317:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1532b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1533f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5518.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        5518.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0x151af:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x151c3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x151d7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x151eb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x151ff:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x15213:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x15227:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1523b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1524f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x15263:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x15277:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1528b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1529f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x152b3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x152c7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x152db:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x152ef:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x15303:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x15317:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1532b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1533f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        5520.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          Click to see the 11 entries
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Space.m68k.elfAvira: detected
          Source: Space.m68k.elfVirustotal: Detection: 63%Perma Link
          Source: Space.m68k.elfReversingLabs: Detection: 63%
          Source: global trafficTCP traffic: 192.168.2.15:58298 -> 107.173.143.15:3778
          Source: unknownTCP traffic detected without corresponding DNS query: 54.247.62.1
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
          Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
          Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownTCP traffic detected without corresponding DNS query: 107.173.143.15
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 36200
          Source: unknownNetwork traffic detected: HTTP traffic on port 52464 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 36200 -> 443

          System Summary

          barindex
          Source: Space.m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5535.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5518.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5520.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5522.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: Space.m68k.elf PID: 5518, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: Space.m68k.elf PID: 5520, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: Space.m68k.elf PID: 5522, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: Space.m68k.elf PID: 5535, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Initial sampleString containing 'busybox' found: /bin/busybox
          Source: Initial sampleString containing 'busybox' found: /proc/net/tcp.x86.x86_64.arm.arm5.arm6.arm7.mips.mipsel.sh4.ppc/proc/proc/%d/exe/proc/%s/statusName:%s/bin/busybox/bin/systemd/usr/bintest/tmp/condi/tmp/zxcr9999/tmp/condinetwork/var/condibot/var/zxcr9999/var/CondiBot/var/condinet/bin/watchdog107.173.143.15
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: Space.m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5535.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5518.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5520.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5522.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: Space.m68k.elf PID: 5518, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: Space.m68k.elf PID: 5520, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: Space.m68k.elf PID: 5522, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: Space.m68k.elf PID: 5535, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal72.troj.linELF@0/0@0/0
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/110/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/231/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/111/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/112/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/233/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/113/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/114/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/235/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/115/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/1333/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/116/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/1695/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/117/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/118/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/119/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/911/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/914/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/3876/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/10/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/917/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/11/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/12/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/13/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/14/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/15/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/16/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/17/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/18/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/19/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/1591/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/120/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/121/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/1/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/122/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/243/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/2/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/123/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/3/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/124/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/1588/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/125/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/4/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/246/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/126/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/5/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/127/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/6/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/1585/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/128/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/7/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/129/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/8/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/800/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/9/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/802/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/803/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/804/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/20/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/21/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/3407/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/22/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/23/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/24/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/25/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/26/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/27/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/28/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/29/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/1484/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/490/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/250/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/130/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/251/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/131/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/132/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/133/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/1479/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/378/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/258/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/259/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/931/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/1595/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/812/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/933/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/30/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/3419/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/35/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/3670/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/3792/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/3310/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/260/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/261/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/262/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/142/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/263/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/264/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/265/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/145/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/266/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/267/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/268/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/3303/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/269/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/1486/statusJump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)File opened: /proc/1806/statusJump to behavior
          Source: /usr/bin/dash (PID: 5596)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.FZyZ6dyDOs /tmp/tmp.KRo7iLuEbR /tmp/tmp.01gI1ZNmq8Jump to behavior
          Source: /usr/bin/dash (PID: 5597)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.FZyZ6dyDOs /tmp/tmp.KRo7iLuEbR /tmp/tmp.01gI1ZNmq8Jump to behavior
          Source: /tmp/Space.m68k.elf (PID: 5518)Queries kernel information via 'uname': Jump to behavior
          Source: Space.m68k.elf, 5518.1.00007ffd42b49000.00007ffd42b6a000.rw-.sdmp, Space.m68k.elf, 5520.1.00007ffd42b49000.00007ffd42b6a000.rw-.sdmp, Space.m68k.elf, 5522.1.00007ffd42b49000.00007ffd42b6a000.rw-.sdmp, Space.m68k.elf, 5535.1.00007ffd42b49000.00007ffd42b6a000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
          Source: Space.m68k.elf, 5518.1.000056072232d000.00005607223b5000.rw-.sdmp, Space.m68k.elf, 5520.1.000056072232d000.0000560722391000.rw-.sdmp, Space.m68k.elf, 5522.1.000056072232d000.0000560722391000.rw-.sdmp, Space.m68k.elf, 5535.1.000056072232d000.00005607223b5000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
          Source: Space.m68k.elf, 5518.1.000056072232d000.00005607223b5000.rw-.sdmp, Space.m68k.elf, 5520.1.000056072232d000.0000560722391000.rw-.sdmp, Space.m68k.elf, 5522.1.000056072232d000.0000560722391000.rw-.sdmp, Space.m68k.elf, 5535.1.000056072232d000.00005607223b5000.rw-.sdmpBinary or memory string: V!/etc/qemu-binfmt/m68k
          Source: Space.m68k.elf, 5518.1.00007ffd42b49000.00007ffd42b6a000.rw-.sdmp, Space.m68k.elf, 5520.1.00007ffd42b49000.00007ffd42b6a000.rw-.sdmp, Space.m68k.elf, 5522.1.00007ffd42b49000.00007ffd42b6a000.rw-.sdmp, Space.m68k.elf, 5535.1.00007ffd42b49000.00007ffd42b6a000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-m68k/tmp/Space.m68k.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/Space.m68k.elf

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Space.m68k.elf, type: SAMPLE
          Source: Yara matchFile source: 5535.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5518.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5520.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5522.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Space.m68k.elf PID: 5518, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Space.m68k.elf PID: 5520, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Space.m68k.elf PID: 5522, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Space.m68k.elf PID: 5535, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Space.m68k.elf, type: SAMPLE
          Source: Yara matchFile source: 5535.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5518.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5520.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5522.1.00007fd5d0001000.00007fd5d0019000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Space.m68k.elf PID: 5518, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Space.m68k.elf PID: 5520, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Space.m68k.elf PID: 5522, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Space.m68k.elf PID: 5535, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          File Deletion
          1
          OS Credential Dumping
          11
          Security Software Discovery
          Remote ServicesData from Local System1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1665360 Sample: Space.m68k.elf Startdate: 15/04/2025 Architecture: LINUX Score: 72 24 107.173.143.15, 3778, 58298, 58300 AS-COLOCROSSINGUS United States 2->24 26 34.243.160.129, 36200, 443 AMAZON-02US United States 2->26 28 54.247.62.1, 443 AMAZON-02US United States 2->28 30 Malicious sample detected (through community Yara rule) 2->30 32 Antivirus / Scanner detection for submitted sample 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 Yara detected Mirai 2->36 8 Space.m68k.elf 2->8         started        10 dash rm 2->10         started        12 dash rm 2->12         started        signatures3 process4 process5 14 Space.m68k.elf 8->14         started        16 Space.m68k.elf 8->16         started        18 Space.m68k.elf 8->18         started        process6 20 Space.m68k.elf 14->20         started        22 Space.m68k.elf 14->22         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Space.m68k.elf63%VirustotalBrowse
          Space.m68k.elf64%ReversingLabsLinux.Backdoor.Mirai
          Space.m68k.elf100%AviraLINUX/Mirai.bonb
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          34.243.160.129
          unknownUnited States
          16509AMAZON-02USfalse
          54.247.62.1
          unknownUnited States
          16509AMAZON-02USfalse
          107.173.143.15
          unknownUnited States
          36352AS-COLOCROSSINGUSfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          34.243.160.129sh4.elfGet hashmaliciousAquabotBrowse
            na.elfGet hashmaliciousPrometeiBrowse
              na.elfGet hashmaliciousPrometeiBrowse
                resgod.arc.elfGet hashmaliciousMiraiBrowse
                  i.elfGet hashmaliciousUnknownBrowse
                    ntpd.elfGet hashmaliciousMuhstik, TsunamiBrowse
                      GoldAge3ATOspc.elfGet hashmaliciousUnknownBrowse
                        zerarm.elfGet hashmaliciousUnknownBrowse
                          main_ppc.elfGet hashmaliciousMiraiBrowse
                            main_mpsl.elfGet hashmaliciousMiraiBrowse
                              54.247.62.1boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                  i686.elfGet hashmaliciousAquabotBrowse
                                    linpeas.shGet hashmaliciousUnknownBrowse
                                      hidakibest.arm7.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        na.elfGet hashmaliciousPrometeiBrowse
                                          na.elfGet hashmaliciousPrometeiBrowse
                                            2xvhK6n0L5YrHJ4.mips.elfGet hashmaliciousMiraiBrowse
                                              vision.m68k.elfGet hashmaliciousMiraiBrowse
                                                vision.arm5.elfGet hashmaliciousUnknownBrowse
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  AMAZON-02USdone1.ps1Get hashmaliciousFormBookBrowse
                                                  • 143.204.29.58
                                                  https://files.stample.com/browserUpload/59722db0-d3c0-43c0-b975-c51a1290a89dGet hashmaliciousHTMLPhisherBrowse
                                                  • 3.163.115.83
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 52.11.240.239
                                                  https://we.tl/t-IBThwlthXD?trk=dw_recover_expired_transfer&utm_campaign=dw_recover_expired_transfer&utm_medium=email&utm_source=wt_sendgrid&utm_template=pre_deletion_72hrs_emailGet hashmaliciousUnknownBrowse
                                                  • 3.248.132.116
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 52.11.240.239
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 52.11.240.239
                                                  m68k.elfGet hashmaliciousMiraiBrowse
                                                  • 54.217.10.153
                                                  .i.elfGet hashmaliciousUnknownBrowse
                                                  • 54.217.10.153
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 52.11.240.239
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 34.249.145.219
                                                  AMAZON-02USdone1.ps1Get hashmaliciousFormBookBrowse
                                                  • 143.204.29.58
                                                  https://files.stample.com/browserUpload/59722db0-d3c0-43c0-b975-c51a1290a89dGet hashmaliciousHTMLPhisherBrowse
                                                  • 3.163.115.83
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 52.11.240.239
                                                  https://we.tl/t-IBThwlthXD?trk=dw_recover_expired_transfer&utm_campaign=dw_recover_expired_transfer&utm_medium=email&utm_source=wt_sendgrid&utm_template=pre_deletion_72hrs_emailGet hashmaliciousUnknownBrowse
                                                  • 3.248.132.116
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 52.11.240.239
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 52.11.240.239
                                                  m68k.elfGet hashmaliciousMiraiBrowse
                                                  • 54.217.10.153
                                                  .i.elfGet hashmaliciousUnknownBrowse
                                                  • 54.217.10.153
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 52.11.240.239
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 34.249.145.219
                                                  AS-COLOCROSSINGUSORDER-25013-67789543AX.vbsGet hashmaliciousWSHRat, DarkTortillaBrowse
                                                  • 104.168.7.12
                                                  ORDER-2504014-0054739AP.vbsGet hashmaliciousWSHRat, DarkTortillaBrowse
                                                  • 172.245.208.13
                                                  15042025Payment .xlsGet hashmaliciousUnknownBrowse
                                                  • 172.245.208.21
                                                  15042025Payment .xlsGet hashmaliciousUnknownBrowse
                                                  • 172.245.208.21
                                                  ORDER#250944.XLS.vbsGet hashmaliciousCaesium Obfuscator, STRRATBrowse
                                                  • 172.245.208.13
                                                  15042025Payment .xlsGet hashmaliciousUnknownBrowse
                                                  • 172.245.208.21
                                                  003.exeGet hashmaliciousUnknownBrowse
                                                  • 104.168.28.10
                                                  003.exeGet hashmaliciousUnknownBrowse
                                                  • 104.168.28.10
                                                  sdf.htaGet hashmaliciousCobalt StrikeBrowse
                                                  • 172.245.191.88
                                                  GFL-001-2034-PO-BK - REV.docx.docGet hashmaliciousUnknownBrowse
                                                  • 192.3.140.103
                                                  No context
                                                  No context
                                                  No created / dropped files found
                                                  File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                                                  Entropy (8bit):6.2758306137533735
                                                  TrID:
                                                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                  File name:Space.m68k.elf
                                                  File size:97'552 bytes
                                                  MD5:12885acf04e9c9ec92c9b85892fbb69e
                                                  SHA1:c82a896d7ee583a92f72fe3eaf9aaec1c7f74b67
                                                  SHA256:6a63de47ad6f84492c9b124425cf8065aa775e57f83830a319851072b9981c92
                                                  SHA512:169b9240aecc0608fd6efd4984b7d19af0cc6734e708c34dd4834eaf3bfb67b91a5b30a5d378566944adcbaa512c9a269e8faf5b86f166bb57a44fee6694f201
                                                  SSDEEP:1536:by9srCNMhSeGWMD8JnwzV8/EqzabQeuacWjcW0JcWcBl473nipO4WlV/Nk31JFgv:byqrzhSeZOJqGbQeuacWjcW0JcWcBS7N
                                                  TLSH:809319C7F811ED7EF80BD67748A34D0E7571F2A00A930A227767BA67EC760A5141BD82
                                                  File Content Preview:.ELF.......................D...4..{......4. ...(......................x...x....... .......x............x..*....... .dt.Q............................NV..a....da...P N^NuNV..J9...@f>"y.... QJ.g.X.#.....N."y.... QJ.f.A.....J.g.Hy....N.X........@N^NuNV..N^NuN

                                                  ELF header

                                                  Class:ELF32
                                                  Data:2's complement, big endian
                                                  Version:1 (current)
                                                  Machine:MC68000
                                                  Version Number:0x1
                                                  Type:EXEC (Executable file)
                                                  OS/ABI:UNIX - System V
                                                  ABI Version:0
                                                  Entry Point Address:0x80000144
                                                  Flags:0x0
                                                  ELF Header Size:52
                                                  Program Header Offset:52
                                                  Program Header Size:32
                                                  Number of Program Headers:3
                                                  Section Header Offset:97152
                                                  Section Header Size:40
                                                  Number of Section Headers:10
                                                  Header String Table Index:9
                                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                  NULL0x00x00x00x00x0000
                                                  .initPROGBITS0x800000940x940x140x00x6AX002
                                                  .textPROGBITS0x800000a80xa80x1504a0x00x6AX004
                                                  .finiPROGBITS0x800150f20x150f20xe0x00x6AX002
                                                  .rodataPROGBITS0x800151000x151000x27c30x00x2A002
                                                  .ctorsPROGBITS0x800198c80x178c80x80x00x3WA004
                                                  .dtorsPROGBITS0x800198d00x178d00x80x00x3WA004
                                                  .dataPROGBITS0x800198dc0x178dc0x2640x00x3WA004
                                                  .bssNOBITS0x80019b400x17b400x28180x00x3WA004
                                                  .shstrtabSTRTAB0x00x17b400x3e0x00x0001
                                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                  LOAD0x00x800000000x800000000x178c30x178c36.29140x5R E0x2000.init .text .fini .rodata
                                                  LOAD0x178c80x800198c80x800198c80x2780x2a903.65170x6RW 0x2000.ctors .dtors .data .bss
                                                  GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Apr 15, 2025 14:02:55.495650053 CEST52464443192.168.2.1554.247.62.1
                                                  Apr 15, 2025 14:02:56.073265076 CEST582983778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:02:56.207806110 CEST377858298107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:02.261178970 CEST583003778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:02.394989014 CEST377858300107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:04.214703083 CEST583023778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:04.348794937 CEST377858302107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:10.397661924 CEST583043778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:10.531907082 CEST377858304107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:14.349915028 CEST583063778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:14.484803915 CEST377858306107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:20.533860922 CEST583083778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:20.668644905 CEST377858308107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:24.023472071 CEST36200443192.168.2.1534.243.160.129
                                                  Apr 15, 2025 14:03:24.023519039 CEST4433620034.243.160.129192.168.2.15
                                                  Apr 15, 2025 14:03:24.023613930 CEST36200443192.168.2.1534.243.160.129
                                                  Apr 15, 2025 14:03:24.024733067 CEST36200443192.168.2.1534.243.160.129
                                                  Apr 15, 2025 14:03:24.024770021 CEST4433620034.243.160.129192.168.2.15
                                                  Apr 15, 2025 14:03:24.486615896 CEST583123778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:24.620888948 CEST377858312107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:30.669939041 CEST583143778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:30.803344965 CEST377858314107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:32.622597933 CEST583163778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:32.756685972 CEST377858316107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:34.758717060 CEST583183778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:34.892888069 CEST377858318107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:37.894520998 CEST583203778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:38.028520107 CEST377858320107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:38.805000067 CEST583223778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:38.941891909 CEST377858322107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:40.945136070 CEST583243778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:41.079762936 CEST377858324107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:44.082108021 CEST583263778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:44.215636969 CEST377858326107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:47.030796051 CEST583283778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:47.165103912 CEST377858328107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:53.217438936 CEST583303778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:53.352128983 CEST377858330107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:03:56.166785002 CEST583323778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:03:56.300457954 CEST377858332107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:01.302501917 CEST583343778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:01.436635971 CEST377858334107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:02.354834080 CEST583363778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:02.488578081 CEST377858336107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:07.491223097 CEST583383778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:07.625960112 CEST377858338107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:08.438772917 CEST583403778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:08.573065996 CEST377858340107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:14.628191948 CEST583423778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:14.761826992 CEST377858342107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:17.575004101 CEST583443778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:17.708746910 CEST377858344107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:23.763799906 CEST583463778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:23.897325993 CEST377858346107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:24.020665884 CEST36200443192.168.2.1534.243.160.129
                                                  Apr 15, 2025 14:04:24.068269968 CEST4433620034.243.160.129192.168.2.15
                                                  Apr 15, 2025 14:04:25.710753918 CEST583483778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:25.844959974 CEST377858348107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:31.898752928 CEST583503778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:32.033057928 CEST377858350107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:35.846539021 CEST583523778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:35.982016087 CEST377858352107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:42.035517931 CEST583543778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:42.170068026 CEST377858354107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:43.983398914 CEST583563778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:44.116991997 CEST377858356107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:50.172744989 CEST583583778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:50.306720018 CEST377858358107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:54.118099928 CEST583603778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:54.251785040 CEST377858360107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:04:57.254087925 CEST583623778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:04:57.388684034 CEST377858362107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:05:00.309108973 CEST583643778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:05:00.443022966 CEST377858364107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:05:03.390806913 CEST583663778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:05:03.445595026 CEST583683778192.168.2.15107.173.143.15
                                                  Apr 15, 2025 14:05:03.524504900 CEST377858366107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:05:03.580331087 CEST377858368107.173.143.15192.168.2.15
                                                  Apr 15, 2025 14:05:06.667354107 CEST4433620034.243.160.129192.168.2.15

                                                  System Behavior

                                                  Start time (UTC):12:02:54
                                                  Start date (UTC):15/04/2025
                                                  Path:/tmp/Space.m68k.elf
                                                  Arguments:/tmp/Space.m68k.elf
                                                  File size:4463432 bytes
                                                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                  Start time (UTC):12:02:54
                                                  Start date (UTC):15/04/2025
                                                  Path:/tmp/Space.m68k.elf
                                                  Arguments:-
                                                  File size:4463432 bytes
                                                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                  Start time (UTC):12:02:54
                                                  Start date (UTC):15/04/2025
                                                  Path:/tmp/Space.m68k.elf
                                                  Arguments:-
                                                  File size:4463432 bytes
                                                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                  Start time (UTC):12:02:54
                                                  Start date (UTC):15/04/2025
                                                  Path:/tmp/Space.m68k.elf
                                                  Arguments:-
                                                  File size:4463432 bytes
                                                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                  Start time (UTC):12:03:01
                                                  Start date (UTC):15/04/2025
                                                  Path:/tmp/Space.m68k.elf
                                                  Arguments:-
                                                  File size:4463432 bytes
                                                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                  Start time (UTC):12:03:01
                                                  Start date (UTC):15/04/2025
                                                  Path:/tmp/Space.m68k.elf
                                                  Arguments:-
                                                  File size:4463432 bytes
                                                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                  Start time (UTC):12:04:22
                                                  Start date (UTC):15/04/2025
                                                  Path:/usr/bin/dash
                                                  Arguments:-
                                                  File size:129816 bytes
                                                  MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                  Start time (UTC):12:04:22
                                                  Start date (UTC):15/04/2025
                                                  Path:/usr/bin/rm
                                                  Arguments:rm -f /tmp/tmp.FZyZ6dyDOs /tmp/tmp.KRo7iLuEbR /tmp/tmp.01gI1ZNmq8
                                                  File size:72056 bytes
                                                  MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                  Start time (UTC):12:04:22
                                                  Start date (UTC):15/04/2025
                                                  Path:/usr/bin/dash
                                                  Arguments:-
                                                  File size:129816 bytes
                                                  MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                  Start time (UTC):12:04:22
                                                  Start date (UTC):15/04/2025
                                                  Path:/usr/bin/rm
                                                  Arguments:rm -f /tmp/tmp.FZyZ6dyDOs /tmp/tmp.KRo7iLuEbR /tmp/tmp.01gI1ZNmq8
                                                  File size:72056 bytes
                                                  MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b