Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
cundi.x86.elf

Overview

General Information

Sample Name:cundi.x86.elf
Analysis ID:1297955
MD5:0f3cafe5c364e949d2b290821c19f064
SHA1:ef447ffa0e77278a21c2f54d5b6422f9f37839d5
SHA256:81226130c99470d5ae4b0663477337100ef3c4ceb175fa078755543ee77e4dd4
Infos:

Detection

Mirai
Score:92
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Yara detected Mirai
Detected Mirai
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Machine Learning detection for sample
Found strings indicative of a multi-platform dropper
Connects to many ports of the same IP (likely port scanning)
Yara signature match
Sample has stripped symbol table
Enumerates processes within the "proc" file system
Detected TCP or UDP traffic on non-standard ports
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable

Classification

Joe Sandbox Version:38.0.0 Beryl
Analysis ID:1297955
Start date and time:2023-08-26 23:25:01 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 32s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample file name:cundi.x86.elf
Detection:MAL
Classification:mal92.spre.troj.linELF@0/0@11/0
Command:/tmp/cundi.x86.elf
PID:5528
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cundi.x86.elf (PID: 5528, Parent: 5434, MD5: 0f3cafe5c364e949d2b290821c19f064) Arguments: /tmp/cundi.x86.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
cundi.x86.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
    cundi.x86.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
    • 0x21e0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
    cundi.x86.elfLinux_Trojan_Mirai_5f7b67b8unknownunknown
    • 0x7545:$a: 89 38 83 CF FF 89 F8 5A 59 5F C3 57 56 83 EC 04 8B 7C 24 10 8B 4C
    cundi.x86.elfLinux_Trojan_Mirai_88de437funknownunknown
    • 0x3e52:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
    cundi.x86.elfLinux_Trojan_Mirai_389ee3e9unknownunknown
    • 0xa518:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
    Click to see the 2 entries
    SourceRuleDescriptionAuthorStrings
    5528.1.0000000008048000.0000000008058000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
      5528.1.0000000008048000.0000000008058000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
      • 0x21e0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
      5528.1.0000000008048000.0000000008058000.r-x.sdmpLinux_Trojan_Mirai_5f7b67b8unknownunknown
      • 0x7545:$a: 89 38 83 CF FF 89 F8 5A 59 5F C3 57 56 83 EC 04 8B 7C 24 10 8B 4C
      5528.1.0000000008048000.0000000008058000.r-x.sdmpLinux_Trojan_Mirai_88de437funknownunknown
      • 0x3e52:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
      5528.1.0000000008048000.0000000008058000.r-x.sdmpLinux_Trojan_Mirai_389ee3e9unknownunknown
      • 0xa518:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
      Click to see the 3 entries
      Timestamp:192.168.2.15103.189.202.18755672439572030490 08/26/23-23:26:59.950551
      SID:2030490
      Source Port:55672
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.15103.189.202.18755662439572030490 08/26/23-23:26:19.689042
      SID:2030490
      Source Port:55662
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.15103.189.202.18755668439572030490 08/26/23-23:26:38.933528
      SID:2030490
      Source Port:55668
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.15103.189.202.18755658439572030490 08/26/23-23:25:58.214955
      SID:2030490
      Source Port:55658
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.15103.189.202.18755676439572030490 08/26/23-23:27:20.710402
      SID:2030490
      Source Port:55676
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.15103.189.202.18755664439572030490 08/26/23-23:26:28.117056
      SID:2030490
      Source Port:55664
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.15103.189.202.18755666439572030490 08/26/23-23:26:36.523006
      SID:2030490
      Source Port:55666
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.15103.189.202.18755674439572030490 08/26/23-23:27:10.378111
      SID:2030490
      Source Port:55674
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.15103.189.202.18755656439572030490 08/26/23-23:25:47.803300
      SID:2030490
      Source Port:55656
      Destination Port:43957
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:103.189.202.187192.168.2.1543957556762030489 08/26/23-23:27:40.097184
      SID:2030489
      Source Port:43957
      Destination Port:55676
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: cundi.x86.elfReversingLabs: Detection: 52%
      Source: cundi.x86.elfVirustotal: Detection: 33%Perma Link
      Source: cundi.x86.elfJoe Sandbox ML: detected

      Spreading

      barindex
      Source: cundi.x86.elfString: HTTP/1.1 200 OKcundi.armcundi.arm5cundi.arm6cundi.arm7cundi.mipscundi.mpslcundi.x86_64cundi.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

      Networking

      barindex
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.15:55656 -> 103.189.202.187:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.15:55658 -> 103.189.202.187:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.15:55662 -> 103.189.202.187:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.15:55664 -> 103.189.202.187:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.15:55666 -> 103.189.202.187:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.15:55668 -> 103.189.202.187:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.15:55672 -> 103.189.202.187:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.15:55674 -> 103.189.202.187:43957
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.15:55676 -> 103.189.202.187:43957
      Source: TrafficSnort IDS: 2030489 ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response 103.189.202.187:43957 -> 192.168.2.15:55676
      Source: global trafficTCP traffic: 103.16.161.29 ports 43957,3,4,5,7,9
      Source: global trafficTCP traffic: 103.189.202.187 ports 43957,3,4,5,7,9
      Source: global trafficTCP traffic: 192.168.2.15:55656 -> 103.189.202.187:43957
      Source: global trafficTCP traffic: 192.168.2.15:52072 -> 103.16.161.29:43957
      Source: unknownDNS traffic detected: queries for: galaxybotnet.site

      System Summary

      barindex
      Source: cundi.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
      Source: cundi.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
      Source: cundi.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
      Source: cundi.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
      Source: cundi.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
      Source: cundi.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
      Source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
      Source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
      Source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
      Source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
      Source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
      Source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
      Source: cundi.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
      Source: cundi.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
      Source: cundi.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
      Source: cundi.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
      Source: cundi.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
      Source: cundi.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
      Source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
      Source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
      Source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
      Source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
      Source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
      Source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: Initial sampleString containing 'busybox' found: /bin/busybox
      Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKcundi.armcundi.arm5cundi.arm6cundi.arm7cundi.mipscundi.mpslcundi.x86_64cundi.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
      Source: classification engineClassification label: mal92.spre.troj.linELF@0/0@11/0
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/231/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/233/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/1333/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/1695/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/911/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/914/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/917/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/11/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/12/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/13/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/14/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/15/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/16/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/17/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/18/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/19/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/1591/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/120/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/121/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/1/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/122/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/243/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/2/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/123/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/3/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/124/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/1588/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/125/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/4/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/246/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/126/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/5/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/127/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/6/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/1585/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/128/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/7/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/129/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/8/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/800/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/9/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/802/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/803/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/804/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/20/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/21/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/3407/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/22/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/23/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/24/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/25/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/26/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/27/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/28/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/29/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/1484/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/490/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/250/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/130/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/251/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/131/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/132/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/133/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/1479/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/378/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/258/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/259/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/931/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/1595/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/812/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/933/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/30/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/3419/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/35/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/3310/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/260/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/261/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/262/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/142/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/263/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/264/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/265/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/145/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/266/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/267/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/268/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/3303/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/269/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/1486/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/1806/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/3440/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/270/cmdlineJump to behavior
      Source: /tmp/cundi.x86.elf (PID: 5530)File opened: /proc/271/cmdlineJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: cundi.x86.elf, type: SAMPLE
      Source: Yara matchFile source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: cundi.x86.elf PID: 5528, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: cundi.x86.elf, type: SAMPLE
      Source: Yara matchFile source: 5528.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: cundi.x86.elf PID: 5528, type: MEMORYSTR
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Scripting
      Path InterceptionPath Interception1
      Scripting
      1
      OS Credential Dumping
      System Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium1
      Non-Standard Port
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
      Non-Application Layer Protocol
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      cundi.x86.elf53%ReversingLabsLinux.Trojan.LnxMirai
      cundi.x86.elf34%VirustotalBrowse
      cundi.x86.elf100%Joe Sandbox ML
      No Antivirus matches
      SourceDetectionScannerLabelLink
      galaxybotnet.site3%VirustotalBrowse
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      galaxybotnet.site
      103.189.202.187
      truetrueunknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      103.16.161.29
      unknownJapan133159MAMMOTHMEDIA-AS-APMammothMediaPtyLtdAUtrue
      103.189.202.187
      galaxybotnet.siteunknown
      7575AARNET-AS-APAustralianAcademicandResearchNetworkAARNetrue
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      103.16.161.29cundi.arm7.elfGet hashmaliciousMiraiBrowse
        cundi.arm.elfGet hashmaliciousMiraiBrowse
          103.189.202.187cundi.arm5.elfGet hashmaliciousMiraiBrowse
            cundi.arm7.elfGet hashmaliciousMiraiBrowse
              cundi.arm.elfGet hashmaliciousMiraiBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                galaxybotnet.sitecundi.arm5.elfGet hashmaliciousMiraiBrowse
                • 103.189.202.187
                cundi.arm7.elfGet hashmaliciousMiraiBrowse
                • 103.16.161.29
                cundi.arm.elfGet hashmaliciousMiraiBrowse
                • 103.16.161.29
                h635QTHfHV.elfGet hashmaliciousGafgyt, MiraiBrowse
                • 103.16.161.29
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                MAMMOTHMEDIA-AS-APMammothMediaPtyLtdAUcundi.arm7.elfGet hashmaliciousMiraiBrowse
                • 103.16.161.29
                cundi.arm.elfGet hashmaliciousMiraiBrowse
                • 103.16.161.29
                http://agrisemm.comGet hashmaliciousUnknownBrowse
                • 43.229.61.61
                https://ddec1-0-en-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fapp.tenantoptions.com.au%2freferences%2fMYSreaWwJJ0X%3fsecret%3d2cdaadca1e8a0943afa70e3f1cb7ea299cf7e2be6cc054bdc737f1b32d5a92fc&umid=d1b3592a-6530-461c-9fc0-fd8ec85939cc&auth=3a5566c60b1f4d8525fa8ab109f94675a663eb25-241f0935f5647c4328bf35eda237f17018fc8ab2Get hashmaliciousUnknownBrowse
                • 112.213.34.225
                Odit.htmlGet hashmaliciousHtmlDropperBrowse
                • 103.1.186.183
                dWzOw1VU1S.exeGet hashmaliciousGuLoaderBrowse
                • 103.4.234.80
                NetTime.exeGet hashmaliciousUnknownBrowse
                • 103.230.156.198
                http://loveclockibi.pro/r28d6.php?32=1o0263983e1a6452f_1np4.sgz1puon.A0107rfgbtd1wc97q7_ko2149.ftroqZzc2bnAxamczZWI10r5djfGet hashmaliciousUnknownBrowse
                • 103.1.185.101
                rRsoQuWmvY.elfGet hashmaliciousMiraiBrowse
                • 110.232.112.206
                http://files.ausgamers.com/downloads/1658366602/ShipSimulatorExtremesDemo.exeGet hashmaliciousUnknownBrowse
                • 150.107.74.29
                ERHHGet hashmaliciousCryptOne EmotetBrowse
                • 43.229.62.186
                2YnVgiNH23Get hashmaliciousUnknownBrowse
                • 103.1.186.86
                Inv_16429_from_308715.xlsmGet hashmaliciousUnknownBrowse
                • 103.1.185.227
                DHL Overdue Invoice 1997872109.xlsmGet hashmaliciousUnknownBrowse
                • 103.1.185.227
                https://adelaideservautocareservices.com.au/zs/j2rmupgilbcfqexwe5h9vp6g.php?MTYwMjA4MDY4NWYwN2NlMDllN2Q1NTNlNWU1ODcwZGM1N2RhOWQ1ZWFkNDNiZTIxZTUyODQ1NTQ1NzI1N2FkMmJjMTYyNWVlNjE4ZTgwYmY2YQ==&data=aXJlbmUuZnJhbmNvQGVtc3VyLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                • 150.107.72.148
                qXpkpxFw.exeGet hashmaliciousUnknownBrowse
                • 103.230.156.64
                https://www.balwynservautocareservices.com.auGet hashmaliciousUnknownBrowse
                • 150.107.72.148
                https://erindalecarcare.com.au/voicenotes/5u5mon9027ux6slgutwe4q33.php?MTYwMDY5NzcyNGM4ZDQxYWJkMmNkMDM1MjE0ZTk1MDY5ZDAyYmQ2NWIyNmVmZmI4ODVmNTYwMTM2OTdmMWFjODIxODRlMzFlMjM3ODZmYzM0NQ==&data=bGF1cmEuZ3VpbGxlbUBlbXN1ci5jb20=Get hashmaliciousUnknownBrowse
                • 150.107.72.148
                https://www.google.com/url?q=https%3A%2F%2Fnorthhavenshopping.com.au%2F.550f5b6f5e2a56d1&sa=D&sntz=1&usg=AFQjCNHyKpfr6A1L2dyixT19OKl5EbWCRgGet hashmaliciousUnknownBrowse
                • 103.230.158.3
                https://view.joomag.com/my-first-publication-voice-message-1/0119891001599758522Get hashmaliciousHTMLPhisherBrowse
                • 150.107.72.148
                No context
                No context
                No created / dropped files found
                File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                Entropy (8bit):5.6264421273829655
                TrID:
                • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                File name:cundi.x86.elf
                File size:82'952 bytes
                MD5:0f3cafe5c364e949d2b290821c19f064
                SHA1:ef447ffa0e77278a21c2f54d5b6422f9f37839d5
                SHA256:81226130c99470d5ae4b0663477337100ef3c4ceb175fa078755543ee77e4dd4
                SHA512:375b47a42c8aa6b41984be1f797be6c60f9df32a35e1bcfd4f15cf543a6c7887ea77ebd6d850c372c58cfa763163d54844db9b798d0f7a0f33b07ad18855112f
                SSDEEP:1536:JuBj0SLUbDq71Oomq1TisuYLwwPnCgPmCRyTSQtUq:JuBIlbe785qZzuw/DPhU+e
                TLSH:EF835BC5B6C3D4F6EC5305B2607B97768B33F43A102AEB43C7299936C852950E6177AC
                File Content Preview:.ELF....................d...4...xB......4. ...(......................................................G..8...........Q.td............................U..S......./....h........[]...$.............U......=@....t..5...................u........t....h.z..........

                ELF header

                Class:ELF32
                Data:2's complement, little endian
                Version:1 (current)
                Machine:Intel 80386
                Version Number:0x1
                Type:EXEC (Executable file)
                OS/ABI:UNIX - System V
                ABI Version:0
                Entry Point Address:0x8048164
                Flags:0x0
                ELF Header Size:52
                Program Header Offset:52
                Program Header Size:32
                Number of Program Headers:3
                Section Header Offset:82552
                Section Header Size:40
                Number of Section Headers:10
                Header String Table Index:9
                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                NULL0x00x00x00x00x0000
                .initPROGBITS0x80480940x940x1c0x00x6AX001
                .textPROGBITS0x80480b00xb00xe0260x00x6AX0016
                .finiPROGBITS0x80560d60xe0d60x170x00x6AX001
                .rodataPROGBITS0x80561000xe1000x19b00x00x2A0032
                .ctorsPROGBITS0x8058ab40xfab40xc0x00x3WA004
                .dtorsPROGBITS0x8058ac00xfac00x80x00x3WA004
                .dataPROGBITS0x8058ae00xfae00x47580x00x3WA0032
                .bssNOBITS0x805d2400x142380x49ac0x00x3WA0032
                .shstrtabSTRTAB0x00x142380x3e0x00x0001
                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                LOAD0x00x80480000x80480000xfab00xfab06.57340x5R E0x1000.init .text .fini .rodata
                LOAD0xfab40x8058ab40x8058ab40x47840x91380.35980x6RW 0x1000.ctors .dtors .data .bss
                GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                192.168.2.15103.189.202.18755672439572030490 08/26/23-23:26:59.950551TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5567243957192.168.2.15103.189.202.187
                192.168.2.15103.189.202.18755662439572030490 08/26/23-23:26:19.689042TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5566243957192.168.2.15103.189.202.187
                192.168.2.15103.189.202.18755668439572030490 08/26/23-23:26:38.933528TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5566843957192.168.2.15103.189.202.187
                192.168.2.15103.189.202.18755658439572030490 08/26/23-23:25:58.214955TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5565843957192.168.2.15103.189.202.187
                192.168.2.15103.189.202.18755676439572030490 08/26/23-23:27:20.710402TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5567643957192.168.2.15103.189.202.187
                192.168.2.15103.189.202.18755664439572030490 08/26/23-23:26:28.117056TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5566443957192.168.2.15103.189.202.187
                192.168.2.15103.189.202.18755666439572030490 08/26/23-23:26:36.523006TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5566643957192.168.2.15103.189.202.187
                192.168.2.15103.189.202.18755674439572030490 08/26/23-23:27:10.378111TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5567443957192.168.2.15103.189.202.187
                192.168.2.15103.189.202.18755656439572030490 08/26/23-23:25:47.803300TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)5565643957192.168.2.15103.189.202.187
                103.189.202.187192.168.2.1543957556762030489 08/26/23-23:27:40.097184TCP2030489ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response4395755676103.189.202.187192.168.2.15
                TimestampSource PortDest PortSource IPDest IP
                Aug 26, 2023 23:25:47.607937098 CEST5565643957192.168.2.15103.189.202.187
                Aug 26, 2023 23:25:47.802913904 CEST4395755656103.189.202.187192.168.2.15
                Aug 26, 2023 23:25:47.803087950 CEST5565643957192.168.2.15103.189.202.187
                Aug 26, 2023 23:25:47.803299904 CEST5565643957192.168.2.15103.189.202.187
                Aug 26, 2023 23:25:47.998049974 CEST4395755656103.189.202.187192.168.2.15
                Aug 26, 2023 23:25:47.998075962 CEST4395755656103.189.202.187192.168.2.15
                Aug 26, 2023 23:25:58.019660950 CEST5565843957192.168.2.15103.189.202.187
                Aug 26, 2023 23:25:58.214684010 CEST4395755658103.189.202.187192.168.2.15
                Aug 26, 2023 23:25:58.214869022 CEST5565843957192.168.2.15103.189.202.187
                Aug 26, 2023 23:25:58.214955091 CEST5565843957192.168.2.15103.189.202.187
                Aug 26, 2023 23:25:58.410124063 CEST4395755658103.189.202.187192.168.2.15
                Aug 26, 2023 23:25:58.410160065 CEST4395755658103.189.202.187192.168.2.15
                Aug 26, 2023 23:25:58.410329103 CEST5565843957192.168.2.15103.189.202.187
                Aug 26, 2023 23:25:58.605242014 CEST4395755658103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:06.447442055 CEST5207243957192.168.2.15103.16.161.29
                Aug 26, 2023 23:26:07.468230009 CEST5207243957192.168.2.15103.16.161.29
                Aug 26, 2023 23:26:09.484458923 CEST5207243957192.168.2.15103.16.161.29
                Aug 26, 2023 23:26:13.516599894 CEST5207243957192.168.2.15103.16.161.29
                Aug 26, 2023 23:26:19.493745089 CEST5566243957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:19.688760042 CEST4395755662103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:19.688911915 CEST5566243957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:19.689042091 CEST5566243957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:19.884895086 CEST4395755662103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:19.884953976 CEST4395755662103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:19.885117054 CEST5566243957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:20.080396891 CEST4395755662103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:27.922184944 CEST5566443957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:28.116774082 CEST4395755664103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:28.116947889 CEST5566443957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:28.117055893 CEST5566443957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:28.311619997 CEST4395755664103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:28.311665058 CEST4395755664103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:28.311853886 CEST5566443957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:28.506304026 CEST4395755664103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:36.327910900 CEST5566643957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:36.522764921 CEST4395755666103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:36.522955894 CEST5566643957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:36.523005962 CEST5566643957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:36.717736006 CEST4395755666103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:36.717786074 CEST4395755666103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:38.738317013 CEST5566843957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:38.933233976 CEST4395755668103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:38.933449030 CEST5566843957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:38.933527946 CEST5566843957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:39.128170967 CEST4395755668103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:39.128241062 CEST4395755668103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:39.128395081 CEST5566843957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:39.322609901 CEST4395755668103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:47.711601973 CEST5208243957192.168.2.15103.16.161.29
                Aug 26, 2023 23:26:48.718285084 CEST5208243957192.168.2.15103.16.161.29
                Aug 26, 2023 23:26:50.734422922 CEST5208243957192.168.2.15103.16.161.29
                Aug 26, 2023 23:26:54.990636110 CEST5208243957192.168.2.15103.16.161.29
                Aug 26, 2023 23:26:59.755878925 CEST5567243957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:59.950193882 CEST4395755672103.189.202.187192.168.2.15
                Aug 26, 2023 23:26:59.950423956 CEST5567243957192.168.2.15103.189.202.187
                Aug 26, 2023 23:26:59.950551033 CEST5567243957192.168.2.15103.189.202.187
                Aug 26, 2023 23:27:00.144854069 CEST4395755672103.189.202.187192.168.2.15
                Aug 26, 2023 23:27:00.144890070 CEST4395755672103.189.202.187192.168.2.15
                Aug 26, 2023 23:27:00.145127058 CEST5567243957192.168.2.15103.189.202.187
                Aug 26, 2023 23:27:00.339524984 CEST4395755672103.189.202.187192.168.2.15
                Aug 26, 2023 23:27:10.182683945 CEST5567443957192.168.2.15103.189.202.187
                Aug 26, 2023 23:27:10.377790928 CEST4395755674103.189.202.187192.168.2.15
                Aug 26, 2023 23:27:10.378020048 CEST5567443957192.168.2.15103.189.202.187
                Aug 26, 2023 23:27:10.378110886 CEST5567443957192.168.2.15103.189.202.187
                Aug 26, 2023 23:27:10.573149920 CEST4395755674103.189.202.187192.168.2.15
                Aug 26, 2023 23:27:10.573201895 CEST4395755674103.189.202.187192.168.2.15
                Aug 26, 2023 23:27:10.573571920 CEST5567443957192.168.2.15103.189.202.187
                Aug 26, 2023 23:27:10.768697977 CEST4395755674103.189.202.187192.168.2.15
                Aug 26, 2023 23:27:18.610625982 CEST5567643957192.168.2.15103.189.202.187
                Aug 26, 2023 23:27:19.631879091 CEST5567643957192.168.2.15103.189.202.187
                Aug 26, 2023 23:27:20.710050106 CEST4395755676103.189.202.187192.168.2.15
                Aug 26, 2023 23:27:20.710089922 CEST4395755676103.189.202.187192.168.2.15
                Aug 26, 2023 23:27:20.710329056 CEST5567643957192.168.2.15103.189.202.187
                Aug 26, 2023 23:27:20.710329056 CEST5567643957192.168.2.15103.189.202.187
                Aug 26, 2023 23:27:20.710402012 CEST5567643957192.168.2.15103.189.202.187
                Aug 26, 2023 23:27:20.893887997 CEST4395755676103.189.202.187192.168.2.15
                Aug 26, 2023 23:27:20.905385971 CEST4395755676103.189.202.187192.168.2.15
                Aug 26, 2023 23:27:20.908905029 CEST4395755676103.189.202.187192.168.2.15
                Aug 26, 2023 23:27:20.909121037 CEST5567643957192.168.2.15103.189.202.187
                Aug 26, 2023 23:27:40.097183943 CEST4395755676103.189.202.187192.168.2.15
                Aug 26, 2023 23:27:40.099507093 CEST5567643957192.168.2.15103.189.202.187
                TimestampSource PortDest PortSource IPDest IP
                Aug 26, 2023 23:25:47.571789980 CEST5725753192.168.2.158.8.8.8
                Aug 26, 2023 23:25:47.607728004 CEST53572578.8.8.8192.168.2.15
                Aug 26, 2023 23:25:57.998882055 CEST5659153192.168.2.158.8.8.8
                Aug 26, 2023 23:25:58.019511938 CEST53565918.8.8.8192.168.2.15
                Aug 26, 2023 23:26:06.410948038 CEST6063553192.168.2.158.8.8.8
                Aug 26, 2023 23:26:06.447176933 CEST53606358.8.8.8192.168.2.15
                Aug 26, 2023 23:26:19.457171917 CEST4290553192.168.2.158.8.8.8
                Aug 26, 2023 23:26:19.493524075 CEST53429058.8.8.8192.168.2.15
                Aug 26, 2023 23:26:27.885824919 CEST4689953192.168.2.158.8.8.8
                Aug 26, 2023 23:26:27.921883106 CEST53468998.8.8.8192.168.2.15
                Aug 26, 2023 23:26:36.312464952 CEST4876353192.168.2.158.8.8.8
                Aug 26, 2023 23:26:36.327647924 CEST53487638.8.8.8192.168.2.15
                Aug 26, 2023 23:26:38.718251944 CEST4573553192.168.2.158.8.8.8
                Aug 26, 2023 23:26:38.738038063 CEST53457358.8.8.8192.168.2.15
                Aug 26, 2023 23:26:46.129005909 CEST4746753192.168.2.158.8.8.8
                Aug 26, 2023 23:26:47.711405993 CEST53474678.8.8.8192.168.2.15
                Aug 26, 2023 23:26:59.719110012 CEST4276653192.168.2.158.8.8.8
                Aug 26, 2023 23:26:59.755547047 CEST53427668.8.8.8192.168.2.15
                Aug 26, 2023 23:27:10.145966053 CEST5501553192.168.2.158.8.8.8
                Aug 26, 2023 23:27:10.182353973 CEST53550158.8.8.8192.168.2.15
                Aug 26, 2023 23:27:18.574223042 CEST5668453192.168.2.158.8.8.8
                Aug 26, 2023 23:27:18.610313892 CEST53566848.8.8.8192.168.2.15
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Aug 26, 2023 23:25:47.571789980 CEST192.168.2.158.8.8.80x972cStandard query (0)galaxybotnet.siteA (IP address)IN (0x0001)false
                Aug 26, 2023 23:25:57.998882055 CEST192.168.2.158.8.8.80xa92aStandard query (0)galaxybotnet.siteA (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:06.410948038 CEST192.168.2.158.8.8.80xeb7cStandard query (0)galaxybotnet.siteA (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:19.457171917 CEST192.168.2.158.8.8.80xba5cStandard query (0)galaxybotnet.siteA (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:27.885824919 CEST192.168.2.158.8.8.80xa414Standard query (0)galaxybotnet.siteA (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:36.312464952 CEST192.168.2.158.8.8.80xab4cStandard query (0)galaxybotnet.siteA (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:38.718251944 CEST192.168.2.158.8.8.80xdd28Standard query (0)galaxybotnet.siteA (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:46.129005909 CEST192.168.2.158.8.8.80x4075Standard query (0)galaxybotnet.siteA (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:59.719110012 CEST192.168.2.158.8.8.80xa19dStandard query (0)galaxybotnet.siteA (IP address)IN (0x0001)false
                Aug 26, 2023 23:27:10.145966053 CEST192.168.2.158.8.8.80xc1a0Standard query (0)galaxybotnet.siteA (IP address)IN (0x0001)false
                Aug 26, 2023 23:27:18.574223042 CEST192.168.2.158.8.8.80x2ba7Standard query (0)galaxybotnet.siteA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Aug 26, 2023 23:25:47.607728004 CEST8.8.8.8192.168.2.150x972cNo error (0)galaxybotnet.site103.189.202.187A (IP address)IN (0x0001)false
                Aug 26, 2023 23:25:58.019511938 CEST8.8.8.8192.168.2.150xa92aNo error (0)galaxybotnet.site103.189.202.187A (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:06.447176933 CEST8.8.8.8192.168.2.150xeb7cNo error (0)galaxybotnet.site103.189.202.187A (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:06.447176933 CEST8.8.8.8192.168.2.150xeb7cNo error (0)galaxybotnet.site103.16.161.29A (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:19.493524075 CEST8.8.8.8192.168.2.150xba5cNo error (0)galaxybotnet.site103.189.202.187A (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:27.921883106 CEST8.8.8.8192.168.2.150xa414No error (0)galaxybotnet.site103.189.202.187A (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:36.327647924 CEST8.8.8.8192.168.2.150xab4cNo error (0)galaxybotnet.site103.189.202.187A (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:38.738038063 CEST8.8.8.8192.168.2.150xdd28No error (0)galaxybotnet.site103.16.161.29A (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:38.738038063 CEST8.8.8.8192.168.2.150xdd28No error (0)galaxybotnet.site103.189.202.187A (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:47.711405993 CEST8.8.8.8192.168.2.150x4075No error (0)galaxybotnet.site103.16.161.29A (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:47.711405993 CEST8.8.8.8192.168.2.150x4075No error (0)galaxybotnet.site103.189.202.187A (IP address)IN (0x0001)false
                Aug 26, 2023 23:26:59.755547047 CEST8.8.8.8192.168.2.150xa19dNo error (0)galaxybotnet.site103.189.202.187A (IP address)IN (0x0001)false
                Aug 26, 2023 23:27:10.182353973 CEST8.8.8.8192.168.2.150xc1a0No error (0)galaxybotnet.site103.189.202.187A (IP address)IN (0x0001)false
                Aug 26, 2023 23:27:18.610313892 CEST8.8.8.8192.168.2.150x2ba7No error (0)galaxybotnet.site103.189.202.187A (IP address)IN (0x0001)false
                Aug 26, 2023 23:27:18.610313892 CEST8.8.8.8192.168.2.150x2ba7No error (0)galaxybotnet.site103.16.161.29A (IP address)IN (0x0001)false

                System Behavior

                Start time:23:25:46
                Start date:26/08/2023
                Path:/tmp/cundi.x86.elf
                Arguments:/tmp/cundi.x86.elf
                File size:82952 bytes
                MD5 hash:0f3cafe5c364e949d2b290821c19f064

                Start time:23:25:46
                Start date:26/08/2023
                Path:/tmp/cundi.x86.elf
                Arguments:-
                File size:82952 bytes
                MD5 hash:0f3cafe5c364e949d2b290821c19f064

                Start time:23:25:46
                Start date:26/08/2023
                Path:/tmp/cundi.x86.elf
                Arguments:-
                File size:82952 bytes
                MD5 hash:0f3cafe5c364e949d2b290821c19f064