Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
apL.mips-20220121-0317

Overview

General Information

Sample Name:apL.mips-20220121-0317
Analysis ID:557427
MD5:13e8ba90e042ab6bbc3821fad3cf1837
SHA1:c7dbaf4b95ad104e35570b287b74f8375f1e5d01
SHA256:37b5a5d9d5ab50a8dff649678a9f10f26a5923186c97d1a623902b68e795abdc
Infos:

Detection

Mirai
Score:80
Range:0 - 100
Whitelisted:false

Signatures

Yara detected Mirai
Multi AV Scanner detection for submitted file
Opens /proc/net/* files useful for finding connected devices and routers
Deletes all firewall rules
Sample deletes itself
Sample is packed with UPX
Deletes security-related log files
Tries to stop the "iptables" service
Executes the "kill" or "pkill" command typically used to terminate processes
Sample contains only a LOAD segment without any section mappings
Reads CPU information from /sys indicative of miner or evasive malware
Yara signature match
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Executes the "systemctl" command used for controlling the systemd system and service manager
Deletes log files
Executes the "iptables" command used for managing IP filtering and manipulation
Executes commands using a shell command-line interpreter
Executes the "rm" command used to delete files or directories

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures
Static ELF header machine description suggests that the sample might not execute correctly on this machine
Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:557427
Start date:21.01.2022
Start time:04:42:43
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 9m 22s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:apL.mips-20220121-0317
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Detection:MAL
Classification:mal80.spre.troj.evad.linMIPS-20220121-0317@0/2@0/0
Command:/tmp/apL.mips-20220121-0317
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
Gosh your fatter then a tree
Standard Error:Failed to stop iptables.service: Unit iptables.service not loaded.
Failed to stop firewalld.service: Unit firewalld.service not loaded.
sh: 1: history: not found
  • system is lnxubuntu20
  • apL.mips-20220121-0317 (PID: 5216, Parent: 5112, MD5: 0083f1f0e77be34ad27f849842bbb00c) Arguments: /tmp/apL.mips-20220121-0317
    • apL.mips-20220121-0317 New Fork (PID: 5219, Parent: 5216)
      • apL.mips-20220121-0317 New Fork (PID: 5222, Parent: 5219)
        • sh (PID: 5224, Parent: 5222, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "rm -rf /tmp/* /var/* /var/run/* /var/tmp/*"
          • sh New Fork (PID: 5226, Parent: 5224)
          • rm (PID: 5226, Parent: 5224, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -rf /tmp/apL.mips-20220121-0317 /tmp/config-err-dHT8bZ /tmp/dmesgtail.log /tmp/snap.lxd /tmp/ssh-hOQ5FjG2iVgO /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-ModemManager.service-c4RYFi /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-colord.service-gKIF8e /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-fwupd.service-gB0a9f /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-switcheroo-control.service-APWnLg /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-logind.service-IofUpj /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-resolved.service-AfPZzg /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-upower.service-x0xO0i /tmp/tmp.qtPPbjdkIb /tmp/tmp.tvSNtKHMtv /tmp/tmp.xTL7lOZ5v5 /tmp/vmware-root_721-4290559889 /var/backups /var/cache /var/crash /var/lib /var/local /var/lock /var/log /var/mail /var/metrics /var/opt /var/run /var/snap /var/spool /var/tmp /var/run/NetworkManager /var/run/acpid.pid /var/run/acpid.socket /var/run/apport.lock /var/run/avahi-daemon /var/run/blkid /var/run/cloud-init /var/run/console-setup /var/run/crond.pid /var/run/crond.reboot /var/run/cryptsetup /var/run/cups /var/run/dbus /var/run/dmeventd-client /var/run/dmeventd-server /var/run/gdm3 /var/run/gdm3.pid /var/run/initctl /var/run/initramfs /var/run/irqbalance /var/run/lock /var/run/log /var/run/lvm /var/run/mlocate.daily.lock /var/run/mono-xsp4 /var/run/mono-xsp4.pid /var/run/motd.d /var/run/mount /var/run/multipathd.pid /var/run/netns /var/run/network /var/run/screen /var/run/sendsigs.omit.d /var/run/shm /var/run/snapd /var/run/snapd-snap.socket /var/run/snapd.socket /var/run/speech-dispatcher /var/run/spice-vdagentd /var/run/sshd /var/run/sshd.pid /var/run/sudo /var/run/systemd /var/run/tmpfiles.d /var/run/udev /var/run/udisks2 /var/run/unattended-upgrades.lock /var/run/user /var/run/utmp /var/run/uuidd /var/run/vmware /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-ModemManager.service-J6Q1Te /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-colord.service-srP90f /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-fwupd.service-biJ0Gi /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-switcheroo-control.service-1jIxdj /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-logind.service-llmWag /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-resolved.service-X16eHh /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-upower.service-GpSnaf
        • sh (PID: 5231, Parent: 5222, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "rm -rf /var/log/wtmp"
          • sh New Fork (PID: 5233, Parent: 5231)
          • rm (PID: 5233, Parent: 5231, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -rf /var/log/wtmp
        • sh (PID: 5234, Parent: 5222, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "rm -rf /tmp/*"
          • sh New Fork (PID: 5236, Parent: 5234)
          • rm (PID: 5236, Parent: 5234, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -rf /tmp/*
        • sh (PID: 5237, Parent: 5222, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "rm -rf /bin/netstat"
          • sh New Fork (PID: 5239, Parent: 5237)
          • rm (PID: 5239, Parent: 5237, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -rf /bin/netstat
        • sh (PID: 5240, Parent: 5222, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -F"
          • sh New Fork (PID: 5242, Parent: 5240)
          • iptables (PID: 5242, Parent: 5240, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -F
        • sh (PID: 5246, Parent: 5222, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pkill -9 busybox"
          • sh New Fork (PID: 5248, Parent: 5246)
          • pkill (PID: 5248, Parent: 5246, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pkill -9 busybox
        • sh (PID: 5254, Parent: 5222, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pkill -9 perl"
          • sh New Fork (PID: 5256, Parent: 5254)
          • pkill (PID: 5256, Parent: 5254, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pkill -9 perl
        • sh (PID: 5258, Parent: 5222, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pkill -9 python"
          • sh New Fork (PID: 5260, Parent: 5258)
          • pkill (PID: 5260, Parent: 5258, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pkill -9 python
        • sh (PID: 5263, Parent: 5222, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "service iptables stop"
          • sh New Fork (PID: 5265, Parent: 5263)
          • service (PID: 5265, Parent: 5263, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: service iptables stop
            • service New Fork (PID: 5266, Parent: 5265)
            • basename (PID: 5266, Parent: 5265, MD5: 3283660e59f128df18bec9b96fbd4d41) Arguments: basename /usr/sbin/service
            • service New Fork (PID: 5267, Parent: 5265)
            • basename (PID: 5267, Parent: 5265, MD5: 3283660e59f128df18bec9b96fbd4d41) Arguments: basename /usr/sbin/service
            • service New Fork (PID: 5268, Parent: 5265)
            • systemctl (PID: 5268, Parent: 5265, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl --quiet is-active multi-user.target
            • service New Fork (PID: 5269, Parent: 5265)
              • service New Fork (PID: 5270, Parent: 5269)
              • systemctl (PID: 5270, Parent: 5269, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl list-unit-files --full --type=socket
              • service New Fork (PID: 5271, Parent: 5269)
              • sed (PID: 5271, Parent: 5269, MD5: 885062561f66aa1d4af4c54b9e7cc81a) Arguments: sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
          • systemctl (PID: 5265, Parent: 5263, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl stop iptables.service
        • sh (PID: 5272, Parent: 5222, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/sbin/iptables -F; /sbin/iptables -X"
          • sh New Fork (PID: 5274, Parent: 5272)
          • iptables (PID: 5274, Parent: 5272, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -F
          • sh New Fork (PID: 5275, Parent: 5272)
          • iptables (PID: 5275, Parent: 5272, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -X
        • sh (PID: 5276, Parent: 5222, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "service firewalld stop"
          • sh New Fork (PID: 5278, Parent: 5276)
          • service (PID: 5278, Parent: 5276, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: service firewalld stop
            • service New Fork (PID: 5279, Parent: 5278)
            • basename (PID: 5279, Parent: 5278, MD5: 3283660e59f128df18bec9b96fbd4d41) Arguments: basename /usr/sbin/service
            • service New Fork (PID: 5280, Parent: 5278)
            • basename (PID: 5280, Parent: 5278, MD5: 3283660e59f128df18bec9b96fbd4d41) Arguments: basename /usr/sbin/service
            • service New Fork (PID: 5281, Parent: 5278)
            • systemctl (PID: 5281, Parent: 5278, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl --quiet is-active multi-user.target
            • service New Fork (PID: 5282, Parent: 5278)
              • service New Fork (PID: 5283, Parent: 5282)
              • systemctl (PID: 5283, Parent: 5282, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl list-unit-files --full --type=socket
              • service New Fork (PID: 5284, Parent: 5282)
              • sed (PID: 5284, Parent: 5282, MD5: 885062561f66aa1d4af4c54b9e7cc81a) Arguments: sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
          • systemctl (PID: 5278, Parent: 5276, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl stop firewalld.service
        • sh (PID: 5287, Parent: 5222, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "rm -rf ~/.bash_history"
          • sh New Fork (PID: 5289, Parent: 5287)
          • rm (PID: 5289, Parent: 5287, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -rf /root/.bash_history
        • sh (PID: 5290, Parent: 5222, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "history -c"
  • dash New Fork (PID: 5294, Parent: 4331)
  • cat (PID: 5294, Parent: 4331, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.qtPPbjdkIb
  • dash New Fork (PID: 5295, Parent: 4331)
  • head (PID: 5295, Parent: 4331, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5296, Parent: 4331)
  • tr (PID: 5296, Parent: 4331, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5297, Parent: 4331)
  • cut (PID: 5297, Parent: 4331, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5298, Parent: 4331)
  • cat (PID: 5298, Parent: 4331, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.qtPPbjdkIb
  • dash New Fork (PID: 5299, Parent: 4331)
  • head (PID: 5299, Parent: 4331, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5300, Parent: 4331)
  • tr (PID: 5300, Parent: 4331, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5301, Parent: 4331)
  • cut (PID: 5301, Parent: 4331, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5302, Parent: 4331)
  • rm (PID: 5302, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.qtPPbjdkIb /tmp/tmp.tvSNtKHMtv /tmp/tmp.xTL7lOZ5v5
  • cleanup
SourceRuleDescriptionAuthorStrings
apL.mips-20220121-0317SUSP_ELF_LNX_UPX_Compressed_FileDetects a suspicious ELF binary with UPX compressionFlorian Roth
  • 0x8d28:$s1: PROT_EXEC|PROT_WRITE failed.
  • 0x8d97:$s2: $Id: UPX
  • 0x8d48:$s3: $Info: This file is packed with the UPX executable packer
SourceRuleDescriptionAuthorStrings
5219.1.00000000f7f1692e.000000004729ffe7.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    5216.1.00000000f7f1692e.000000004729ffe7.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5218.1.00000000f7f1692e.000000004729ffe7.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: apL.mips-20220121-0317Virustotal: Detection: 27%Perma Link
        Source: apL.mips-20220121-0317ReversingLabs: Detection: 25%
        Source: /usr/bin/pkill (PID: 5248)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
        Source: /usr/bin/pkill (PID: 5256)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
        Source: /usr/bin/pkill (PID: 5260)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
        Source: unknownHTTPS traffic detected: 54.171.230.55:443 -> 192.168.2.23:33608 version: TLS 1.2

        Spreading

        barindex
        Source: /tmp/apL.mips-20220121-0317 (PID: 5216)Opens: /proc/net/route

        Networking

        barindex
        Source: /bin/sh (PID: 5242)Args: iptables -F
        Source: /usr/sbin/service (PID: 5265)Systemctl executable stopping iptables: /usr/sbin/systemctl -> systemctl stop iptables.service
        Source: /usr/sbin/service (PID: 5265)Systemctl executable stopping iptables: /usr/bin/systemctl -> systemctl stop iptables.service
        Source: /bin/sh (PID: 5274)Iptables executable: /sbin/iptables -> /sbin/iptables -F
        Source: /bin/sh (PID: 5275)Iptables executable: /sbin/iptables -> /sbin/iptables -X
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33608
        Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 33608 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
        Source: unknownTCP traffic detected without corresponding DNS query: 192.236.160.175
        Source: unknownTCP traffic detected without corresponding DNS query: 192.236.160.175
        Source: unknownTCP traffic detected without corresponding DNS query: 192.236.160.175
        Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 60.220.215.198
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
        Source: unknownTCP traffic detected without corresponding DNS query: 123.178.234.190
        Source: unknownTCP traffic detected without corresponding DNS query: 192.236.160.175
        Source: unknownTCP traffic detected without corresponding DNS query: 192.236.160.175
        Source: unknownTCP traffic detected without corresponding DNS query: 123.178.234.190
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 123.178.234.190
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
        Source: unknownTCP traffic detected without corresponding DNS query: 123.178.234.190
        Source: unknownTCP traffic detected without corresponding DNS query: 123.178.234.190
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
        Source: unknownTCP traffic detected without corresponding DNS query: 123.178.234.190
        Source: unknownTCP traffic detected without corresponding DNS query: 123.17.44.158
        Source: unknownTCP traffic detected without corresponding DNS query: 192.236.160.175
        Source: unknownTCP traffic detected without corresponding DNS query: 192.236.160.175
        Source: unknownTCP traffic detected without corresponding DNS query: 192.236.160.175
        Source: unknownTCP traffic detected without corresponding DNS query: 192.236.160.175
        Source: unknownTCP traffic detected without corresponding DNS query: 36.65.75.239
        Source: unknownTCP traffic detected without corresponding DNS query: 192.236.160.175
        Source: unknownTCP traffic detected without corresponding DNS query: 192.236.160.175
        Source: apL.mips-20220121-0317String found in binary or memory: http://upx.sf.net
        Source: unknownHTTPS traffic detected: 54.171.230.55:443 -> 192.168.2.23:33608 version: TLS 1.2
        Source: LOAD without section mappingsProgram segment: 0x100000
        Source: apL.mips-20220121-0317, type: SAMPLEMatched rule: SUSP_ELF_LNX_UPX_Compressed_File date = 2018-12-12, author = Florian Roth, description = Detects a suspicious ELF binary with UPX compression, reference = Internal Research, score = 038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4
        Source: classification engineClassification label: mal80.spre.troj.evad.linMIPS-20220121-0317@0/2@0/0

        Data Obfuscation

        barindex
        Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
        Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
        Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $

        Persistence and Installation Behavior

        barindex
        Source: /bin/sh (PID: 5242)Args: iptables -F
        Source: /usr/sbin/service (PID: 5265)Systemctl executable stopping iptables: /usr/sbin/systemctl -> systemctl stop iptables.service
        Source: /usr/sbin/service (PID: 5265)Systemctl executable stopping iptables: /usr/bin/systemctl -> systemctl stop iptables.service
        Source: /bin/sh (PID: 5248)Pkill executable: /usr/bin/pkill -> pkill -9 busybox
        Source: /bin/sh (PID: 5256)Pkill executable: /usr/bin/pkill -> pkill -9 perl
        Source: /bin/sh (PID: 5260)Pkill executable: /usr/bin/pkill -> pkill -9 python
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/5140/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/5140/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1582/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1582/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/3088/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/3088/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/230/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/230/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/110/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/110/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/231/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/231/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/111/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/111/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/232/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/232/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1579/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1579/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/112/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/112/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/233/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/233/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1699/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1699/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/113/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/113/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/234/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/234/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1335/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1335/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1698/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1698/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/114/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/114/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/235/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/235/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1334/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1334/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1576/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1576/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/2302/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/2302/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/115/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/115/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/236/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/236/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/116/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/116/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/237/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/237/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/117/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/117/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/118/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/118/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/910/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/910/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/119/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/119/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/912/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/912/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/10/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/10/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/2307/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/2307/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/11/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/11/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/918/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/918/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/12/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/12/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/13/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/13/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/14/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/14/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/5033/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/5033/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/15/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/15/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/16/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/16/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/17/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/17/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/18/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/18/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1594/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1594/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/120/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/120/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/121/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/121/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1349/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1349/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/1/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/122/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/122/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/243/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/243/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/123/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/123/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/2/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/2/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/124/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/124/cmdline
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/3/status
        Source: /usr/bin/pkill (PID: 5256)File opened: /proc/3/cmdline
        Source: /usr/sbin/service (PID: 5265)Systemctl executable: /usr/bin/systemctl -> systemctl stop iptables.service
        Source: /usr/sbin/service (PID: 5268)Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active multi-user.target
        Source: /usr/sbin/service (PID: 5270)Systemctl executable: /usr/bin/systemctl -> systemctl list-unit-files --full --type=socket
        Source: /usr/sbin/service (PID: 5278)Systemctl executable: /usr/bin/systemctl -> systemctl stop firewalld.service
        Source: /usr/sbin/service (PID: 5281)Systemctl executable: /usr/bin/systemctl -> systemctl --quiet is-active multi-user.target
        Source: /usr/sbin/service (PID: 5283)Systemctl executable: /usr/bin/systemctl -> systemctl list-unit-files --full --type=socket
        Source: /bin/sh (PID: 5274)Iptables executable: /sbin/iptables -> /sbin/iptables -F
        Source: /bin/sh (PID: 5275)Iptables executable: /sbin/iptables -> /sbin/iptables -X
        Source: /tmp/apL.mips-20220121-0317 (PID: 5224)Shell command executed: sh -c "rm -rf /tmp/* /var/* /var/run/* /var/tmp/*"
        Source: /tmp/apL.mips-20220121-0317 (PID: 5231)Shell command executed: sh -c "rm -rf /var/log/wtmp"
        Source: /tmp/apL.mips-20220121-0317 (PID: 5234)Shell command executed: sh -c "rm -rf /tmp/*"
        Source: /tmp/apL.mips-20220121-0317 (PID: 5237)Shell command executed: sh -c "rm -rf /bin/netstat"
        Source: /tmp/apL.mips-20220121-0317 (PID: 5240)Shell command executed: sh -c "iptables -F"
        Source: /tmp/apL.mips-20220121-0317 (PID: 5246)Shell command executed: sh -c "pkill -9 busybox"
        Source: /tmp/apL.mips-20220121-0317 (PID: 5254)Shell command executed: sh -c "pkill -9 perl"
        Source: /tmp/apL.mips-20220121-0317 (PID: 5258)Shell command executed: sh -c "pkill -9 python"
        Source: /tmp/apL.mips-20220121-0317 (PID: 5263)Shell command executed: sh -c "service iptables stop"
        Source: /tmp/apL.mips-20220121-0317 (PID: 5272)Shell command executed: sh -c "/sbin/iptables -F; /sbin/iptables -X"
        Source: /tmp/apL.mips-20220121-0317 (PID: 5276)Shell command executed: sh -c "service firewalld stop"
        Source: /tmp/apL.mips-20220121-0317 (PID: 5287)Shell command executed: sh -c "rm -rf ~/.bash_history"
        Source: /tmp/apL.mips-20220121-0317 (PID: 5290)Shell command executed: sh -c "history -c"
        Source: /bin/sh (PID: 5226)Rm executable: /usr/bin/rm -> rm -rf /tmp/apL.mips-20220121-0317 /tmp/config-err-dHT8bZ /tmp/dmesgtail.log /tmp/snap.lxd /tmp/ssh-hOQ5FjG2iVgO /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-ModemManager.service-c4RYFi /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-colord.service-gKIF8e /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-fwupd.service-gB0a9f /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-switcheroo-control.service-APWnLg /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-logind.service-IofUpj /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-resolved.service-AfPZzg /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-upower.service-x0xO0i /tmp/tmp.qtPPbjdkIb /tmp/tmp.tvSNtKHMtv /tmp/tmp.xTL7lOZ5v5 /tmp/vmware-root_721-4290559889 /var/backups /var/cache /var/crash /var/lib /var/local /var/lock /var/log /var/mail /var/metrics /var/opt /var/run /var/snap /var/spool /var/tmp /var/run/NetworkManager /var/run/acpid.pid /var/run/acpid.socket /var/run/apport.lock /var/run/avahi-daemon /var/run/blkid /var/run/cloud-init /var/run/console-setup /var/run/crond.pid /var/run/crond.reboot /var/run/cryptsetup /var/run/cups /var/run/dbus /var/run/dmeventd-client /var/run/dmeventd-server /var/run/gdm3 /var/run/gdm3.pid /var/run/initctl /var/run/initramfs /var/run/irqbalance /var/run/lock /var/run/log /var/run/lvm /var/run/mlocate.daily.lock /var/run/mono-xsp4 /var/run/mono-xsp4.pid /var/run/motd.d /var/run/mount /var/run/multipathd.pid /var/run/netns /var/run/network /var/run/screen /var/run/sendsigs.omit.d /var/run/shm /var/run/snapd /var/run/snapd-snap.socket /var/run/snapd.socket /var/run/speech-dispatcher /var/run/spice-vdagentd /var/run/sshd /var/run/sshd.pid /var/run/sudo /var/run/systemd /var/run/tmpfiles.d /var/run/udev /var/run/udisks2 /var/run/unattended-upgrades.lock /var/run/user /var/run/utmp /var/run/uuidd /var/run/vmware /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-ModemManager.service-J6Q1Te /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-colord.service-srP90f /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-fwupd.service-biJ0Gi /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-switcheroo-control.service-1jIxdj /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-logind.service-llmWag /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-resolved.service-X16eHh /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-upower.service-GpSnaf
        Source: /bin/sh (PID: 5233)Rm executable: /usr/bin/rm -> rm -rf /var/log/wtmp
        Source: /bin/sh (PID: 5236)Rm executable: /usr/bin/rm -> rm -rf /tmp/*
        Source: /bin/sh (PID: 5239)Rm executable: /usr/bin/rm -> rm -rf /bin/netstat
        Source: /bin/sh (PID: 5289)Rm executable: /usr/bin/rm -> rm -rf /root/.bash_history
        Source: /usr/bin/dash (PID: 5302)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.qtPPbjdkIb /tmp/tmp.tvSNtKHMtv /tmp/tmp.xTL7lOZ5v5
        Source: submitted sampleStderr: Failed to stop iptables.service: Unit iptables.service not loaded.Failed to stop firewalld.service: Unit firewalld.service not loaded.sh: 1: history: not found: exit code = 0
        Source: /usr/sbin/service (PID: 5271)Sed executable: /usr/bin/sed -> sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
        Source: /usr/sbin/service (PID: 5284)Sed executable: /usr/bin/sed -> sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: /usr/bin/rm (PID: 5226)File: /tmp/apL.mips-20220121-0317Jump to behavior

        Malware Analysis System Evasion

        barindex
        Source: /usr/bin/rm (PID: 5233)Truncated file: /var/log/wtmpJump to behavior
        Source: /usr/bin/pkill (PID: 5248)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
        Source: /usr/bin/pkill (PID: 5256)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
        Source: /usr/bin/pkill (PID: 5260)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
        Source: /tmp/apL.mips-20220121-0317 (PID: 5216)Queries kernel information via 'uname':
        Source: /usr/bin/rm (PID: 5233)Truncated file: /var/log/wtmpJump to behavior
        Source: apL.mips-20220121-0317, 5216.1.00000000bdaea5af.00000000fc156366.rw-.sdmp, apL.mips-20220121-0317, 5218.1.00000000bdaea5af.00000000fc156366.rw-.sdmp, apL.mips-20220121-0317, 5219.1.00000000bdaea5af.00000000fc156366.rw-.sdmpBinary or memory string: 5V!/etc/qemu-binfmt/mips
        Source: apL.mips-20220121-0317, 5216.1.00000000e79fcff1.000000003a41f088.rw-.sdmp, apL.mips-20220121-0317, 5218.1.00000000e79fcff1.000000003a41f088.rw-.sdmp, apL.mips-20220121-0317, 5219.1.00000000e79fcff1.000000003a41f088.rw-.sdmpBinary or memory string: :XYx86_64/usr/bin/qemu-mips/tmp/apL.mips-20220121-0317SUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/apL.mips-20220121-0317
        Source: apL.mips-20220121-0317, 5216.1.00000000bdaea5af.00000000fc156366.rw-.sdmp, apL.mips-20220121-0317, 5218.1.00000000bdaea5af.00000000fc156366.rw-.sdmp, apL.mips-20220121-0317, 5219.1.00000000bdaea5af.00000000fc156366.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips
        Source: apL.mips-20220121-0317, 5216.1.00000000e79fcff1.000000003a41f088.rw-.sdmp, apL.mips-20220121-0317, 5218.1.00000000e79fcff1.000000003a41f088.rw-.sdmp, apL.mips-20220121-0317, 5219.1.00000000e79fcff1.000000003a41f088.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips
        Source: apL.mips-20220121-0317, 5216.1.00000000e79fcff1.000000003a41f088.rw-.sdmpBinary or memory string: 5V/tmp/qemu-open.JEqahA\
        Source: apL.mips-20220121-0317, 5216.1.00000000e79fcff1.000000003a41f088.rw-.sdmpBinary or memory string: /tmp/qemu-open.JEqahA

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 5219.1.00000000f7f1692e.000000004729ffe7.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5216.1.00000000f7f1692e.000000004729ffe7.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5218.1.00000000f7f1692e.000000004729ffe7.r-x.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 5219.1.00000000f7f1692e.000000004729ffe7.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5216.1.00000000f7f1692e.000000004729ffe7.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5218.1.00000000f7f1692e.000000004729ffe7.r-x.sdmp, type: MEMORY
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Command and Scripting Interpreter
        1
        Systemd Service
        1
        Systemd Service
        1
        Disable or Modify Tools
        1
        OS Credential Dumping
        11
        Security Software Discovery
        Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default Accounts1
        Scripting
        Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Scripting
        LSASS Memory1
        Remote System Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
        Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
        Obfuscated Files or Information
        Security Account Manager1
        System Network Configuration Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
        Disable or Modify System Firewall
        NTDS1
        System Information Discovery
        Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
        Indicator Removal on Host
        LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common11
        File Deletion
        Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 557427 Sample: apL.mips-20220121-0317 Startdate: 21/01/2022 Architecture: LINUX Score: 80 74 123.17.44.158, 23, 53046 VNPT-AS-VNVNPTCorpVN Viet Nam 2->74 76 36.65.75.239, 23, 45588 TELKOMNET-AS-APPTTelekomunikasiIndonesiaID Indonesia 2->76 78 7 other IPs or domains 2->78 80 Multi AV Scanner detection for submitted file 2->80 82 Yara detected Mirai 2->82 84 Sample is packed with UPX 2->84 12 apL.mips-20220121-0317 2->12         started        15 dash cat 2->15         started        17 dash head 2->17         started        19 7 other processes 2->19 signatures3 process4 signatures5 94 Opens /proc/net/* files useful for finding connected devices and routers 12->94 21 apL.mips-20220121-0317 12->21         started        23 apL.mips-20220121-0317 12->23         started        process6 process7 25 apL.mips-20220121-0317 21->25         started        process8 27 apL.mips-20220121-0317 sh 25->27         started        29 apL.mips-20220121-0317 sh 25->29         started        31 apL.mips-20220121-0317 sh 25->31         started        33 10 other processes 25->33 process9 35 sh service systemctl 27->35         started        38 sh rm 29->38         started        40 sh rm 31->40         started        42 sh iptables 33->42         started        44 sh service systemctl 33->44         started        46 sh rm 33->46         started        48 7 other processes 33->48 signatures10 86 Tries to stop the "iptables" service 35->86 50 service 35->50         started        52 service basename 35->52         started        54 service basename 35->54         started        56 service systemctl 35->56         started        88 Sample deletes itself 38->88 90 Deletes security-related log files 40->90 92 Deletes all firewall rules 42->92 58 service 44->58         started        60 service basename 44->60         started        62 service basename 44->62         started        64 service systemctl 44->64         started        process11 process12 66 service systemctl 50->66         started        68 service sed 50->68         started        70 service systemctl 58->70         started        72 service sed 58->72         started       
        SourceDetectionScannerLabelLink
        apL.mips-20220121-031728%VirustotalBrowse
        apL.mips-20220121-031726%ReversingLabsLinux.Trojan.Gafgyt
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://upx.sf.netapL.mips-20220121-0317false
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          54.171.230.55
          unknownUnited States
          16509AMAZON-02USfalse
          123.178.234.190
          unknownChina
          4809CHINATELECOM-CORE-WAN-CN2ChinaTelecomNextGenerationCarrfalse
          36.65.75.239
          unknownIndonesia
          7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDfalse
          192.236.160.175
          unknownUnited States
          54290HOSTWINDSUSfalse
          109.202.202.202
          unknownSwitzerland
          13030INIT7CHfalse
          123.17.44.158
          unknownViet Nam
          45899VNPT-AS-VNVNPTCorpVNfalse
          91.189.91.43
          unknownUnited Kingdom
          41231CANONICAL-ASGBfalse
          60.220.215.198
          unknownChina
          4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
          91.189.91.42
          unknownUnited Kingdom
          41231CANONICAL-ASGBfalse
          No context
          No context
          No context
          No context
          No context
          Process:/tmp/apL.mips-20220121-0317
          File Type:ASCII text
          Category:dropped
          Size (bytes):38
          Entropy (8bit):3.3918926446809334
          Encrypted:false
          SSDEEP:3:KkZRAkd:KaAu
          MD5:C7EA09D26E26605227076E0514A33038
          SHA1:C3F9736E9AF7BD0885578859A50B205C8FA5FC8E
          SHA-256:7E8AD76E0D200E93918CA2E93C99FF8ECD02071953BF1479819DB3AC0DBB6D07
          SHA-512:17D0088725EB9991E9EB82E8A3DE0878E45E6F394BBC2AD260AA59C786FF0AD565E145E21256425D1C0ABE15F3ECB402EBB0A6A5E1C2D5BA7A4D95EC93A2861F
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview:nameserver 8.8.8.8.nameserver 8.8.4.4.
          Process:/tmp/apL.mips-20220121-0317
          File Type:ASCII text
          Category:dropped
          Size (bytes):230
          Entropy (8bit):3.709552666863289
          Encrypted:false
          SSDEEP:6:iekrEcvwAsE5KlwSd4pzKaV6Lpms/a/1VCxGF:ur+m5MwSdIKaV6L1adVRF
          MD5:2E667F43AE18CD1FE3C108641708A82C
          SHA1:12B90DE2DA0FBCFE66F3D6130905E56C8D6A68D3
          SHA-256:6F721492E7A337C5B498A8F55F5EB7AC745AFF716D0B5B08EFF2C1B6B250F983
          SHA-512:D2A0EE2509154EC1098994F38BE172F98F4150399C534A04D5C675D7C05630802225019F19344CC9070C576BC465A4FEB382AC7712DE6BF25E9244B54A9DB830
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview:Iface.Destination.Gateway .Flags.RefCnt.Use.Metric.Mask..MTU.Window.IRTT .ens160.00000000.c0a80201.0003.0.0.0.00000000.0.0.0.ens160.c0a80200.00000000.0001.0.0.0.ffffff00.0.0.0.
          File type:ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
          Entropy (8bit):7.946793281986122
          TrID:
          • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
          • ELF Executable and Linkable format (generic) (4004/1) 49.84%
          File name:apL.mips-20220121-0317
          File size:46204
          MD5:13e8ba90e042ab6bbc3821fad3cf1837
          SHA1:c7dbaf4b95ad104e35570b287b74f8375f1e5d01
          SHA256:37b5a5d9d5ab50a8dff649678a9f10f26a5923186c97d1a623902b68e795abdc
          SHA512:ceb092fbdfd3ad39f6a49ee9dbf9d212ea7d3c9eec014dcc2bc5ba83bc6b1ab8f02965c453b1c076979c128011dfda8f12f32d6f4e363d7af8c4f951243a9cc7
          SSDEEP:768:r5FMs2rPZhkq92ZVHGWVLQttQwuHcIB085oYk6N50IwumgJgGlzDpbuR1JAnAtlZ:p2rd9CmKLstQwuYvYj7hw8VJuLaihT
          File Content Preview:.ELF.......................x...4.........4. ...(.........................................._|.F_|.F_|....................UPX!.d.....................b.......?.E.h4...@b..) ..]..0..ap%d>.>y....\._......@.....g#`.....o2Z.....x.....-"...i..;%...GT..e1.3"......

          ELF header

          Class:ELF32
          Data:2's complement, big endian
          Version:1 (current)
          Machine:MIPS R3000
          Version Number:0x1
          Type:EXEC (Executable file)
          OS/ABI:UNIX - System V
          ABI Version:0
          Entry Point Address:0x108178
          Flags:0x1007
          ELF Header Size:52
          Program Header Offset:52
          Program Header Size:32
          Number of Program Headers:2
          Section Header Offset:0
          Section Header Size:40
          Number of Section Headers:0
          Header String Table Index:0
          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
          LOAD0x00x1000000x1000000x94bc0x94bc4.13850x5R E0x10000
          LOAD0x5f7c0x465f7c0x465f7c0x00x00.00000x6RW 0x10000
          TimestampSource PortDest PortSource IPDest IP
          Jan 21, 2022 04:43:27.388259888 CET42836443192.168.2.2391.189.91.43
          Jan 21, 2022 04:43:27.740784883 CET5626027152192.168.2.23192.236.160.175
          Jan 21, 2022 04:43:27.777579069 CET2715256260192.236.160.175192.168.2.23
          Jan 21, 2022 04:43:27.777770996 CET5626027152192.168.2.23192.236.160.175
          Jan 21, 2022 04:43:27.778276920 CET5626027152192.168.2.23192.236.160.175
          Jan 21, 2022 04:43:27.803800106 CET2715256260192.236.160.175192.168.2.23
          Jan 21, 2022 04:43:28.156265020 CET4251680192.168.2.23109.202.202.202
          Jan 21, 2022 04:43:40.443809032 CET33608443192.168.2.2354.171.230.55
          Jan 21, 2022 04:43:40.504060030 CET4433360854.171.230.55192.168.2.23
          Jan 21, 2022 04:43:41.433717012 CET235448460.220.215.198192.168.2.23
          Jan 21, 2022 04:43:41.433834076 CET5448423192.168.2.2360.220.215.198
          Jan 21, 2022 04:43:42.491638899 CET43928443192.168.2.2391.189.91.42
          Jan 21, 2022 04:43:43.660487890 CET2346370123.178.234.190192.168.2.23
          Jan 21, 2022 04:43:43.660621881 CET4637023192.168.2.23123.178.234.190
          Jan 21, 2022 04:43:45.621551991 CET2715256260192.236.160.175192.168.2.23
          Jan 21, 2022 04:43:45.621700048 CET5626027152192.168.2.23192.236.160.175
          Jan 21, 2022 04:43:45.647458076 CET2715256260192.236.160.175192.168.2.23
          Jan 21, 2022 04:43:45.647593975 CET5626027152192.168.2.23192.236.160.175
          Jan 21, 2022 04:43:50.340563059 CET2346508123.178.234.190192.168.2.23
          Jan 21, 2022 04:43:50.340821028 CET4650823192.168.2.23123.178.234.190
          Jan 21, 2022 04:43:54.779340982 CET42836443192.168.2.2391.189.91.43
          Jan 21, 2022 04:43:55.714517117 CET4433360854.171.230.55192.168.2.23
          Jan 21, 2022 04:43:55.714546919 CET4433360854.171.230.55192.168.2.23
          Jan 21, 2022 04:43:55.714557886 CET4433360854.171.230.55192.168.2.23
          Jan 21, 2022 04:43:55.714571953 CET4433360854.171.230.55192.168.2.23
          Jan 21, 2022 04:43:55.714797974 CET33608443192.168.2.2354.171.230.55
          Jan 21, 2022 04:43:55.714850903 CET33608443192.168.2.2354.171.230.55
          Jan 21, 2022 04:43:55.714858055 CET33608443192.168.2.2354.171.230.55
          Jan 21, 2022 04:43:55.715085983 CET33608443192.168.2.2354.171.230.55
          Jan 21, 2022 04:43:55.715353966 CET4433360854.171.230.55192.168.2.23
          Jan 21, 2022 04:43:55.715492964 CET33608443192.168.2.2354.171.230.55
          Jan 21, 2022 04:43:55.717931032 CET33608443192.168.2.2354.171.230.55
          Jan 21, 2022 04:43:55.775317907 CET4433360854.171.230.55192.168.2.23
          Jan 21, 2022 04:43:55.939399004 CET4433360854.171.230.55192.168.2.23
          Jan 21, 2022 04:43:55.939620018 CET33608443192.168.2.2354.171.230.55
          Jan 21, 2022 04:43:55.940027952 CET33608443192.168.2.2354.171.230.55
          Jan 21, 2022 04:43:56.002125025 CET4433360854.171.230.55192.168.2.23
          Jan 21, 2022 04:43:56.019778013 CET4433360854.171.230.55192.168.2.23
          Jan 21, 2022 04:43:56.019942999 CET33608443192.168.2.2354.171.230.55
          Jan 21, 2022 04:43:56.022514105 CET33608443192.168.2.2354.171.230.55
          Jan 21, 2022 04:43:56.105163097 CET4433360854.171.230.55192.168.2.23
          Jan 21, 2022 04:43:56.459074020 CET2346656123.178.234.190192.168.2.23
          Jan 21, 2022 04:43:56.459467888 CET4665623192.168.2.23123.178.234.190
          Jan 21, 2022 04:43:58.099374056 CET4433360854.171.230.55192.168.2.23
          Jan 21, 2022 04:43:58.099422932 CET4433360854.171.230.55192.168.2.23
          Jan 21, 2022 04:43:58.099585056 CET33608443192.168.2.2354.171.230.55
          Jan 21, 2022 04:43:58.099632025 CET33608443192.168.2.2354.171.230.55
          Jan 21, 2022 04:43:58.875087976 CET4251680192.168.2.23109.202.202.202
          Jan 21, 2022 04:44:13.660618067 CET2346370123.178.234.190192.168.2.23
          Jan 21, 2022 04:44:13.660847902 CET4637023192.168.2.23123.178.234.190
          Jan 21, 2022 04:44:20.340912104 CET2346508123.178.234.190192.168.2.23
          Jan 21, 2022 04:44:20.341245890 CET4650823192.168.2.23123.178.234.190
          Jan 21, 2022 04:44:23.450227976 CET43928443192.168.2.2391.189.91.42
          Jan 21, 2022 04:44:26.460503101 CET2346656123.178.234.190192.168.2.23
          Jan 21, 2022 04:44:26.460788965 CET4665623192.168.2.23123.178.234.190
          Jan 21, 2022 04:44:30.784326077 CET2353046123.17.44.158192.168.2.23
          Jan 21, 2022 04:44:30.784523964 CET5304623192.168.2.23123.17.44.158
          Jan 21, 2022 04:44:45.650542021 CET2715256260192.236.160.175192.168.2.23
          Jan 21, 2022 04:44:45.650983095 CET5626027152192.168.2.23192.236.160.175
          Jan 21, 2022 04:44:45.676701069 CET2715256260192.236.160.175192.168.2.23
          Jan 21, 2022 04:44:45.676911116 CET5626027152192.168.2.23192.236.160.175
          Jan 21, 2022 04:45:45.679289103 CET2715256260192.236.160.175192.168.2.23
          Jan 21, 2022 04:45:45.679570913 CET5626027152192.168.2.23192.236.160.175
          Jan 21, 2022 04:45:45.705296993 CET2715256260192.236.160.175192.168.2.23
          Jan 21, 2022 04:45:45.705430984 CET5626027152192.168.2.23192.236.160.175
          Jan 21, 2022 04:46:24.381228924 CET234558836.65.75.239192.168.2.23
          Jan 21, 2022 04:46:24.381429911 CET4558823192.168.2.2336.65.75.239
          Jan 21, 2022 04:46:45.701894999 CET2715256260192.236.160.175192.168.2.23
          Jan 21, 2022 04:46:45.702198029 CET5626027152192.168.2.23192.236.160.175
          Jan 21, 2022 04:46:45.727813005 CET2715256260192.236.160.175192.168.2.23
          Jan 21, 2022 04:46:45.727952957 CET5626027152192.168.2.23192.236.160.175
          TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
          Jan 21, 2022 04:43:55.715353966 CET54.171.230.55443192.168.2.2333608CN=motd.ubuntu.com CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Mon Nov 22 12:20:38 CET 2021 Fri Sep 04 02:00:00 CEST 2020 Wed Jan 20 20:14:03 CET 2021Sun Feb 20 12:20:37 CET 2022 Mon Sep 15 18:00:00 CEST 2025 Mon Sep 30 20:14:03 CEST 2024771,4866-4867-4865-49196-49200-163-159-52393-52392-52394-49327-49325-49315-49311-49245-49249-49239-49235-49195-49199-162-158-49326-49324-49314-49310-49244-49248-49238-49234-49188-49192-107-106-49267-49271-196-195-49187-49191-103-64-49266-49270-190-189-49162-49172-57-56-136-135-49161-49171-51-50-69-68-157-49313-49309-49233-156-49312-49308-49232-61-192-60-186-53-132-47-65-255,0-11-10-35-22-23-13-43-45-51,29-23-30-25-24,0-1-2fb4726d465c5f28b84cd6d14cedd13a7
          CN=R3, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USFri Sep 04 02:00:00 CEST 2020Mon Sep 15 18:00:00 CEST 2025
          CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Jan 20 20:14:03 CET 2021Mon Sep 30 20:14:03 CEST 2024

          System Behavior

          Start time:04:43:26
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:/tmp/apL.mips-20220121-0317
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:27
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:27
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:27
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:27
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:27
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:sh -c "rm -rf /tmp/* /var/* /var/run/* /var/tmp/*"
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:27
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:27
          Start date:21/01/2022
          Path:/usr/bin/rm
          Arguments:rm -rf /tmp/apL.mips-20220121-0317 /tmp/config-err-dHT8bZ /tmp/dmesgtail.log /tmp/snap.lxd /tmp/ssh-hOQ5FjG2iVgO /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-ModemManager.service-c4RYFi /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-colord.service-gKIF8e /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-fwupd.service-gB0a9f /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-switcheroo-control.service-APWnLg /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-logind.service-IofUpj /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-resolved.service-AfPZzg /tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-upower.service-x0xO0i /tmp/tmp.qtPPbjdkIb /tmp/tmp.tvSNtKHMtv /tmp/tmp.xTL7lOZ5v5 /tmp/vmware-root_721-4290559889 /var/backups /var/cache /var/crash /var/lib /var/local /var/lock /var/log /var/mail /var/metrics /var/opt /var/run /var/snap /var/spool /var/tmp /var/run/NetworkManager /var/run/acpid.pid /var/run/acpid.socket /var/run/apport.lock /var/run/avahi-daemon /var/run/blkid /var/run/cloud-init /var/run/console-setup /var/run/crond.pid /var/run/crond.reboot /var/run/cryptsetup /var/run/cups /var/run/dbus /var/run/dmeventd-client /var/run/dmeventd-server /var/run/gdm3 /var/run/gdm3.pid /var/run/initctl /var/run/initramfs /var/run/irqbalance /var/run/lock /var/run/log /var/run/lvm /var/run/mlocate.daily.lock /var/run/mono-xsp4 /var/run/mono-xsp4.pid /var/run/motd.d /var/run/mount /var/run/multipathd.pid /var/run/netns /var/run/network /var/run/screen /var/run/sendsigs.omit.d /var/run/shm /var/run/snapd /var/run/snapd-snap.socket /var/run/snapd.socket /var/run/speech-dispatcher /var/run/spice-vdagentd /var/run/sshd /var/run/sshd.pid /var/run/sudo /var/run/systemd /var/run/tmpfiles.d /var/run/udev /var/run/udisks2 /var/run/unattended-upgrades.lock /var/run/user /var/run/utmp /var/run/uuidd /var/run/vmware /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-ModemManager.service-J6Q1Te /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-colord.service-srP90f /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-fwupd.service-biJ0Gi /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-switcheroo-control.service-1jIxdj /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-logind.service-llmWag /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-resolved.service-X16eHh /var/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-upower.service-GpSnaf
          File size:72056 bytes
          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b
          Start time:04:43:35
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:sh -c "rm -rf /var/log/wtmp"
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/usr/bin/rm
          Arguments:rm -rf /var/log/wtmp
          File size:72056 bytes
          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b
          Start time:04:43:35
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:sh -c "rm -rf /tmp/*"
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/usr/bin/rm
          Arguments:rm -rf /tmp/*
          File size:72056 bytes
          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b
          Start time:04:43:35
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:sh -c "rm -rf /bin/netstat"
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/usr/bin/rm
          Arguments:rm -rf /bin/netstat
          File size:72056 bytes
          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b
          Start time:04:43:35
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:sh -c "iptables -F"
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/usr/sbin/iptables
          Arguments:iptables -F
          File size:99296 bytes
          MD5 hash:1ab05fef765b6342cdfadaa5275b33af
          Start time:04:43:35
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:sh -c "pkill -9 busybox"
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:35
          Start date:21/01/2022
          Path:/usr/bin/pkill
          Arguments:pkill -9 busybox
          File size:30968 bytes
          MD5 hash:fa96a75a08109d8842e4865b2907d51f
          Start time:04:43:37
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:37
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:sh -c "pkill -9 perl"
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:38
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:38
          Start date:21/01/2022
          Path:/usr/bin/pkill
          Arguments:pkill -9 perl
          File size:30968 bytes
          MD5 hash:fa96a75a08109d8842e4865b2907d51f
          Start time:04:43:40
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:40
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:sh -c "pkill -9 python"
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:40
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:40
          Start date:21/01/2022
          Path:/usr/bin/pkill
          Arguments:pkill -9 python
          File size:30968 bytes
          MD5 hash:fa96a75a08109d8842e4865b2907d51f
          Start time:04:43:42
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:42
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:sh -c "service iptables stop"
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:42
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:42
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:service iptables stop
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:42
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:42
          Start date:21/01/2022
          Path:/usr/bin/basename
          Arguments:basename /usr/sbin/service
          File size:39256 bytes
          MD5 hash:3283660e59f128df18bec9b96fbd4d41
          Start time:04:43:42
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:42
          Start date:21/01/2022
          Path:/usr/bin/basename
          Arguments:basename /usr/sbin/service
          File size:39256 bytes
          MD5 hash:3283660e59f128df18bec9b96fbd4d41
          Start time:04:43:42
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:42
          Start date:21/01/2022
          Path:/usr/bin/systemctl
          Arguments:systemctl --quiet is-active multi-user.target
          File size:996584 bytes
          MD5 hash:4deddfb6741481f68aeac522cc26ff4b
          Start time:04:43:42
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:42
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:42
          Start date:21/01/2022
          Path:/usr/bin/systemctl
          Arguments:systemctl list-unit-files --full --type=socket
          File size:996584 bytes
          MD5 hash:4deddfb6741481f68aeac522cc26ff4b
          Start time:04:43:42
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:42
          Start date:21/01/2022
          Path:/usr/bin/sed
          Arguments:sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
          File size:121288 bytes
          MD5 hash:885062561f66aa1d4af4c54b9e7cc81a
          Start time:04:43:44
          Start date:21/01/2022
          Path:/usr/bin/systemctl
          Arguments:systemctl stop iptables.service
          File size:996584 bytes
          MD5 hash:4deddfb6741481f68aeac522cc26ff4b
          Start time:04:43:44
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:44
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:sh -c "/sbin/iptables -F; /sbin/iptables -X"
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:44
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:44
          Start date:21/01/2022
          Path:/sbin/iptables
          Arguments:/sbin/iptables -F
          File size:99296 bytes
          MD5 hash:1ab05fef765b6342cdfadaa5275b33af
          Start time:04:43:44
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:44
          Start date:21/01/2022
          Path:/sbin/iptables
          Arguments:/sbin/iptables -X
          File size:99296 bytes
          MD5 hash:1ab05fef765b6342cdfadaa5275b33af
          Start time:04:43:45
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:45
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:sh -c "service firewalld stop"
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:45
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:45
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:service firewalld stop
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:45
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:45
          Start date:21/01/2022
          Path:/usr/bin/basename
          Arguments:basename /usr/sbin/service
          File size:39256 bytes
          MD5 hash:3283660e59f128df18bec9b96fbd4d41
          Start time:04:43:45
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:45
          Start date:21/01/2022
          Path:/usr/bin/basename
          Arguments:basename /usr/sbin/service
          File size:39256 bytes
          MD5 hash:3283660e59f128df18bec9b96fbd4d41
          Start time:04:43:45
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:45
          Start date:21/01/2022
          Path:/usr/bin/systemctl
          Arguments:systemctl --quiet is-active multi-user.target
          File size:996584 bytes
          MD5 hash:4deddfb6741481f68aeac522cc26ff4b
          Start time:04:43:45
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:45
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:45
          Start date:21/01/2022
          Path:/usr/bin/systemctl
          Arguments:systemctl list-unit-files --full --type=socket
          File size:996584 bytes
          MD5 hash:4deddfb6741481f68aeac522cc26ff4b
          Start time:04:43:45
          Start date:21/01/2022
          Path:/usr/sbin/service
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:45
          Start date:21/01/2022
          Path:/usr/bin/sed
          Arguments:sed -ne s/\\.socket\\s*[a-z]*\\s*$/.socket/p
          File size:121288 bytes
          MD5 hash:885062561f66aa1d4af4c54b9e7cc81a
          Start time:04:43:48
          Start date:21/01/2022
          Path:/usr/bin/systemctl
          Arguments:systemctl stop firewalld.service
          File size:996584 bytes
          MD5 hash:4deddfb6741481f68aeac522cc26ff4b
          Start time:04:43:48
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:48
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:sh -c "rm -rf ~/.bash_history"
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:48
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:48
          Start date:21/01/2022
          Path:/usr/bin/rm
          Arguments:rm -rf /root/.bash_history
          File size:72056 bytes
          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b
          Start time:04:43:48
          Start date:21/01/2022
          Path:/tmp/apL.mips-20220121-0317
          Arguments:n/a
          File size:5777432 bytes
          MD5 hash:0083f1f0e77be34ad27f849842bbb00c
          Start time:04:43:48
          Start date:21/01/2022
          Path:/bin/sh
          Arguments:sh -c "history -c"
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/dash
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/cat
          Arguments:cat /tmp/tmp.qtPPbjdkIb
          File size:43416 bytes
          MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/dash
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/head
          Arguments:head -n 10
          File size:47480 bytes
          MD5 hash:fd96a67145172477dd57131396fc9608
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/dash
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/tr
          Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
          File size:51544 bytes
          MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/dash
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/cut
          Arguments:cut -c -80
          File size:47480 bytes
          MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/dash
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/cat
          Arguments:cat /tmp/tmp.qtPPbjdkIb
          File size:43416 bytes
          MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/dash
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/head
          Arguments:head -n 10
          File size:47480 bytes
          MD5 hash:fd96a67145172477dd57131396fc9608
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/dash
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/tr
          Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
          File size:51544 bytes
          MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/dash
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/cut
          Arguments:cut -c -80
          File size:47480 bytes
          MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/dash
          Arguments:n/a
          File size:129816 bytes
          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c
          Start time:04:43:55
          Start date:21/01/2022
          Path:/usr/bin/rm
          Arguments:rm -f /tmp/tmp.qtPPbjdkIb /tmp/tmp.tvSNtKHMtv /tmp/tmp.xTL7lOZ5v5
          File size:72056 bytes
          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b