Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
4GI3jkntqw.elf

Overview

General Information

Sample name:4GI3jkntqw.elf
renamed because original name is a hash value
Original sample name:0e5afecdde0017b3342fbff860842917.elf
Analysis ID:1406935
MD5:0e5afecdde0017b3342fbff860842917
SHA1:a4128bb2f4daf0d665e15c1f48b5ebc0cfc164b0
SHA256:71d1ed5fba5b97dd00bc8d7c5c155cb45822c5b63f5162e3fddaa177d7fa76d7
Tags:32elfmiraipowerpc
Infos:

Detection

Mirai, Moobot
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
Yara detected Moobot
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1406935
Start date and time:2024-03-11 18:55:13 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 43s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:4GI3jkntqw.elf
renamed because original name is a hash value
Original Sample Name:0e5afecdde0017b3342fbff860842917.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/0@1/0
  • VT rate limit hit for: 4GI3jkntqw.elf
Command:/tmp/4GI3jkntqw.elf
PID:6219
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
4GI3jkntqw.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    4GI3jkntqw.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0xb914:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xb928:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xb93c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xb950:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xb964:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xb978:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xb98c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xb9a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xb9b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xb9c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xb9dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xb9f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xba04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xba18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xba2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xba40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xba54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xba68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xba7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xba90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xbaa4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    SourceRuleDescriptionAuthorStrings
    6219.1.00007fb100001000.00007fb10000f000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
      6219.1.00007fb100001000.00007fb10000f000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xb914:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb928:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb93c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb950:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb964:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb978:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb98c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb9a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb9b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb9c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb9dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb9f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xba04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xba18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xba2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xba40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xba54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xba68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xba7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xba90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbaa4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      Process Memory Space: 4GI3jkntqw.elf PID: 6219JoeSecurity_MoobotYara detected MoobotJoe Security
        Process Memory Space: 4GI3jkntqw.elf PID: 6219Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0x3dc1:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3dd5:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3de9:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3dfd:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3e11:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3e25:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3e39:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3e4d:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3e61:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3e75:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3e89:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3e9d:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3eb1:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3ec5:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3ed9:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3eed:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3f01:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3f15:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3f29:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3f3d:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x3f51:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        Timestamp:03/11/24-18:55:51.260979
        SID:2030491
        Source Port:38416
        Destination Port:55650
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:03/11/24-18:57:49.672928
        SID:2030489
        Source Port:55650
        Destination Port:38416
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 4GI3jkntqw.elfAvira: detected

        Networking

        barindex
        Source: TrafficSnort IDS: 2030491 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) 192.168.2.23:38416 -> 154.9.29.154:55650
        Source: TrafficSnort IDS: 2030489 ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response 154.9.29.154:55650 -> 192.168.2.23:38416
        Source: global trafficTCP traffic: 192.168.2.23:38416 -> 154.9.29.154:55650
        Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
        Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
        Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
        Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
        Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
        Source: unknownDNS traffic detected: queries for: wcjwcj.cn
        Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

        System Summary

        barindex
        Source: 4GI3jkntqw.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: 6219.1.00007fb100001000.00007fb10000f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: Process Memory Space: 4GI3jkntqw.elf PID: 6219, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: ELF static info symbol of initial sample.symtab present: no
        Source: 4GI3jkntqw.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: 6219.1.00007fb100001000.00007fb10000f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: Process Memory Space: 4GI3jkntqw.elf PID: 6219, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: classification engineClassification label: mal84.troj.evad.linELF@0/0@1/0
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1582/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/3088/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/230/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/110/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/231/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/111/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/232/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1579/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/112/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/233/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1699/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/113/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/234/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1335/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1698/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/114/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/235/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1334/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1576/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/2302/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/115/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/236/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/116/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/237/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/117/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/118/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/910/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6227/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/119/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/912/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6228/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/10/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/2307/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/11/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/918/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6241/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/12/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6240/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/13/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6243/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/14/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6242/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/15/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6245/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/16/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6244/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/17/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6247/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/18/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6246/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1594/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/120/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/121/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1349/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/122/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/243/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/123/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/2/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/124/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/3/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/4/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/125/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/126/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1344/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1465/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1586/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/127/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/248/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/128/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/249/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1463/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/800/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/9/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/801/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/20/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/21/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/1900/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/22/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6252/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/23/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6251/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/24/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6254/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/25/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6253/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/26/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6256/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/27/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6255/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/28/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6258/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/29/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6257/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/491/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/250/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/130/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/251/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/6250/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/252/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/132/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/253/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/254/cmdlineJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6223)File opened: /proc/255/cmdlineJump to behavior

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: /tmp/4GI3jkntqw.elf (PID: 6219)File: /tmp/4GI3jkntqw.elfJump to behavior
        Source: /tmp/4GI3jkntqw.elf (PID: 6219)Queries kernel information via 'uname': Jump to behavior
        Source: 4GI3jkntqw.elf, 6219.1.00005582d037f000.00005582d042f000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc11!hotpluggableq
        Source: 4GI3jkntqw.elf, 6219.1.00005582d037f000.00005582d042f000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
        Source: 4GI3jkntqw.elf, 6219.1.00007fff3f79e000.00007fff3f7bf000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
        Source: 4GI3jkntqw.elf, 6219.1.00007fff3f79e000.00007fff3f7bf000.rw-.sdmpBinary or memory string: ix86_64/usr/bin/qemu-ppc/tmp/4GI3jkntqw.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/4GI3jkntqw.elf

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 4GI3jkntqw.elf, type: SAMPLE
        Source: Yara matchFile source: 6219.1.00007fb100001000.00007fb10000f000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 4GI3jkntqw.elf PID: 6219, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
        Source: Yara matchFile source: 4GI3jkntqw.elf, type: SAMPLE
        Source: Yara matchFile source: 6219.1.00007fb100001000.00007fb10000f000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 4GI3jkntqw.elf PID: 6219, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
        File Deletion
        1
        OS Credential Dumping
        11
        Security Software Discovery
        Remote ServicesData from Local System1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
        Non-Standard Port
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
        Application Layer Protocol
        Traffic DuplicationData Destruction
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1406935 Sample: 4GI3jkntqw.elf Startdate: 11/03/2024 Architecture: LINUX Score: 84 20 wcjwcj.cn 154.9.29.154, 38416, 55650 ENDOFFICEUS United States 2->20 22 109.202.202.202, 80 INIT7CH Switzerland 2->22 24 2 other IPs or domains 2->24 26 Snort IDS alert for network traffic 2->26 28 Malicious sample detected (through community Yara rule) 2->28 30 Antivirus / Scanner detection for submitted sample 2->30 32 2 other signatures 2->32 9 4GI3jkntqw.elf 2->9         started        signatures3 process4 signatures5 34 Sample deletes itself 9->34 12 4GI3jkntqw.elf 9->12         started        process6 process7 14 4GI3jkntqw.elf 12->14         started        16 4GI3jkntqw.elf 12->16         started        process8 18 4GI3jkntqw.elf 14->18         started       

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        4GI3jkntqw.elf100%AviraEXP/ELF.Mirai.Z.A
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        wcjwcj.cn
        154.9.29.154
        truetrue
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          154.9.29.154
          wcjwcj.cnUnited States
          64249ENDOFFICEUStrue
          109.202.202.202
          unknownSwitzerland
          13030INIT7CHfalse
          91.189.91.43
          unknownUnited Kingdom
          41231CANONICAL-ASGBfalse
          91.189.91.42
          unknownUnited Kingdom
          41231CANONICAL-ASGBfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          109.202.202.2023vwQxRUATl.elfGet hashmaliciousMoobotBrowse
            QII19aQAik.elfGet hashmaliciousUnknownBrowse
              Boe9zdWCEU.elfGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.PUA.Tool.Linux.BtcMine.9999.29599.18340.elfGet hashmaliciousXmrigBrowse
                  nodeGet hashmaliciousXmrigBrowse
                    Qr03qxnwhC.elfGet hashmaliciousMirai, GafgytBrowse
                      mMyJYrkdft.elfGet hashmaliciousMirai, GafgytBrowse
                        gQgg7L3pIN.elfGet hashmaliciousMirai, GafgytBrowse
                          UuYrbY32jL.elfGet hashmaliciousMirai, GafgytBrowse
                            Z6vmOkkpVH.elfGet hashmaliciousMirai, GafgytBrowse
                              91.189.91.433vwQxRUATl.elfGet hashmaliciousMoobotBrowse
                                QII19aQAik.elfGet hashmaliciousUnknownBrowse
                                  Boe9zdWCEU.elfGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.PUA.Tool.Linux.BtcMine.9999.29599.18340.elfGet hashmaliciousXmrigBrowse
                                      nodeGet hashmaliciousXmrigBrowse
                                        Qr03qxnwhC.elfGet hashmaliciousMirai, GafgytBrowse
                                          mMyJYrkdft.elfGet hashmaliciousMirai, GafgytBrowse
                                            gQgg7L3pIN.elfGet hashmaliciousMirai, GafgytBrowse
                                              UuYrbY32jL.elfGet hashmaliciousMirai, GafgytBrowse
                                                Z6vmOkkpVH.elfGet hashmaliciousMirai, GafgytBrowse
                                                  91.189.91.423vwQxRUATl.elfGet hashmaliciousMoobotBrowse
                                                    QII19aQAik.elfGet hashmaliciousUnknownBrowse
                                                      Boe9zdWCEU.elfGet hashmaliciousUnknownBrowse
                                                        SecuriteInfo.com.PUA.Tool.Linux.BtcMine.9999.29599.18340.elfGet hashmaliciousXmrigBrowse
                                                          nodeGet hashmaliciousXmrigBrowse
                                                            Qr03qxnwhC.elfGet hashmaliciousMirai, GafgytBrowse
                                                              mMyJYrkdft.elfGet hashmaliciousMirai, GafgytBrowse
                                                                gQgg7L3pIN.elfGet hashmaliciousMirai, GafgytBrowse
                                                                  UuYrbY32jL.elfGet hashmaliciousMirai, GafgytBrowse
                                                                    Z6vmOkkpVH.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      No context
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      CANONICAL-ASGB3vwQxRUATl.elfGet hashmaliciousMoobotBrowse
                                                                      • 91.189.91.42
                                                                      QII19aQAik.elfGet hashmaliciousUnknownBrowse
                                                                      • 91.189.91.42
                                                                      Boe9zdWCEU.elfGet hashmaliciousUnknownBrowse
                                                                      • 91.189.91.42
                                                                      SecuriteInfo.com.PUA.Tool.Linux.BtcMine.9999.29599.18340.elfGet hashmaliciousXmrigBrowse
                                                                      • 91.189.91.42
                                                                      nodeGet hashmaliciousXmrigBrowse
                                                                      • 91.189.91.42
                                                                      Qr03qxnwhC.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 91.189.91.42
                                                                      mMyJYrkdft.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 91.189.91.42
                                                                      R4bf2YJUap.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 185.125.190.26
                                                                      gQgg7L3pIN.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 91.189.91.42
                                                                      UuYrbY32jL.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 91.189.91.42
                                                                      CANONICAL-ASGB3vwQxRUATl.elfGet hashmaliciousMoobotBrowse
                                                                      • 91.189.91.42
                                                                      QII19aQAik.elfGet hashmaliciousUnknownBrowse
                                                                      • 91.189.91.42
                                                                      Boe9zdWCEU.elfGet hashmaliciousUnknownBrowse
                                                                      • 91.189.91.42
                                                                      SecuriteInfo.com.PUA.Tool.Linux.BtcMine.9999.29599.18340.elfGet hashmaliciousXmrigBrowse
                                                                      • 91.189.91.42
                                                                      nodeGet hashmaliciousXmrigBrowse
                                                                      • 91.189.91.42
                                                                      Qr03qxnwhC.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 91.189.91.42
                                                                      mMyJYrkdft.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 91.189.91.42
                                                                      R4bf2YJUap.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 185.125.190.26
                                                                      gQgg7L3pIN.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 91.189.91.42
                                                                      UuYrbY32jL.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 91.189.91.42
                                                                      INIT7CH3vwQxRUATl.elfGet hashmaliciousMoobotBrowse
                                                                      • 109.202.202.202
                                                                      QII19aQAik.elfGet hashmaliciousUnknownBrowse
                                                                      • 109.202.202.202
                                                                      Boe9zdWCEU.elfGet hashmaliciousUnknownBrowse
                                                                      • 109.202.202.202
                                                                      SecuriteInfo.com.PUA.Tool.Linux.BtcMine.9999.29599.18340.elfGet hashmaliciousXmrigBrowse
                                                                      • 109.202.202.202
                                                                      nodeGet hashmaliciousXmrigBrowse
                                                                      • 109.202.202.202
                                                                      Qr03qxnwhC.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 109.202.202.202
                                                                      mMyJYrkdft.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 109.202.202.202
                                                                      gQgg7L3pIN.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 109.202.202.202
                                                                      UuYrbY32jL.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 109.202.202.202
                                                                      Z6vmOkkpVH.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 109.202.202.202
                                                                      ENDOFFICEUSMnR9Zf2F4a.elfGet hashmaliciousMiraiBrowse
                                                                      • 156.96.125.231
                                                                      3mPS6MjiRe.elfGet hashmaliciousMiraiBrowse
                                                                      • 38.242.18.217
                                                                      kyQ6tISCd6.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.13.19.154
                                                                      GenOJdFvy7.elfGet hashmaliciousMiraiBrowse
                                                                      • 156.96.125.243
                                                                      z8kSnLJt9Y.elfGet hashmaliciousMiraiBrowse
                                                                      • 156.96.125.226
                                                                      Q9WWwskOzG.elfGet hashmaliciousMiraiBrowse
                                                                      • 156.96.125.249
                                                                      87T8fOc6se.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.9.28.251
                                                                      Dc5V2L8ODq.elfGet hashmaliciousUnknownBrowse
                                                                      • 154.9.28.251
                                                                      xDZ7cKndQ8.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.9.28.251
                                                                      468fG6OT6w.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.9.28.251
                                                                      No context
                                                                      No context
                                                                      No created / dropped files found
                                                                      File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
                                                                      Entropy (8bit):6.225399689346095
                                                                      TrID:
                                                                      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                      File name:4GI3jkntqw.elf
                                                                      File size:55'152 bytes
                                                                      MD5:0e5afecdde0017b3342fbff860842917
                                                                      SHA1:a4128bb2f4daf0d665e15c1f48b5ebc0cfc164b0
                                                                      SHA256:71d1ed5fba5b97dd00bc8d7c5c155cb45822c5b63f5162e3fddaa177d7fa76d7
                                                                      SHA512:a8466b92fa4491379118422408f7769639106ca24f3a17fb01e2813a2e2aada2e62795ebf334bc10bb65e4dc74d9805c4b83888d7bf91550d1543ef8f13e016e
                                                                      SSDEEP:768:cbXAxLERfyECRZuRlgQ0cq1eg9X+UdUcO9Cm54C+Jjc8Adtbcg12sFRxtAS+wnT1:SX+iDqXXJ2tCu+q8gbcgIQx6WnTXF
                                                                      TLSH:9E434A02B31C0E47C0A31A70263F1BD1D7BFA9D022E4F689255E9B9A9671E375486FCD
                                                                      File Content Preview:.ELF...........................4.........4. ...(.......................................................h..%0........dt.Q.............................!..|......$H...H......$8!. |...N.. .!..|.......?.............../...@..\?........+../...A..$8...})......N..

                                                                      ELF header

                                                                      Class:ELF32
                                                                      Data:2's complement, big endian
                                                                      Version:1 (current)
                                                                      Machine:PowerPC
                                                                      Version Number:0x1
                                                                      Type:EXEC (Executable file)
                                                                      OS/ABI:UNIX - System V
                                                                      ABI Version:0
                                                                      Entry Point Address:0x100001f0
                                                                      Flags:0x0
                                                                      ELF Header Size:52
                                                                      Program Header Offset:52
                                                                      Program Header Size:32
                                                                      Number of Program Headers:3
                                                                      Section Header Offset:54672
                                                                      Section Header Size:40
                                                                      Number of Section Headers:12
                                                                      Header String Table Index:11
                                                                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                      NULL0x00x00x00x00x0000
                                                                      .initPROGBITS0x100000940x940x240x00x6AX004
                                                                      .textPROGBITS0x100000b80xb80xb7600x00x6AX004
                                                                      .finiPROGBITS0x1000b8180xb8180x200x00x6AX004
                                                                      .rodataPROGBITS0x1000b8380xb8380x19a00x00x2A008
                                                                      .ctorsPROGBITS0x1001d1dc0xd1dc0x80x00x3WA004
                                                                      .dtorsPROGBITS0x1001d1e40xd1e40x80x00x3WA004
                                                                      .dataPROGBITS0x1001d1f00xd1f00x3140x00x3WA008
                                                                      .sdataPROGBITS0x1001d5040xd5040x400x00x3WA004
                                                                      .sbssNOBITS0x1001d5440xd5440x600x00x3WA004
                                                                      .bssNOBITS0x1001d5a40xd5440x21680x00x3WA004
                                                                      .shstrtabSTRTAB0x00xd5440x4b0x00x0001
                                                                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                      LOAD0x00x100000000x100000000xd1d80xd1d86.28040x5R E0x10000.init .text .fini .rodata
                                                                      LOAD0xd1dc0x1001d1dc0x1001d1dc0x3680x25302.80850x6RW 0x10000.ctors .dtors .data .sdata .sbss .bss
                                                                      GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                      03/11/24-18:55:51.260979TCP2030491ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)3841655650192.168.2.23154.9.29.154
                                                                      03/11/24-18:57:49.672928TCP2030489ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response5565038416154.9.29.154192.168.2.23
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Mar 11, 2024 18:55:51.099363089 CET3841655650192.168.2.23154.9.29.154
                                                                      Mar 11, 2024 18:55:51.260426998 CET5565038416154.9.29.154192.168.2.23
                                                                      Mar 11, 2024 18:55:51.260677099 CET3841655650192.168.2.23154.9.29.154
                                                                      Mar 11, 2024 18:55:51.260978937 CET3841655650192.168.2.23154.9.29.154
                                                                      Mar 11, 2024 18:55:51.421798944 CET5565038416154.9.29.154192.168.2.23
                                                                      Mar 11, 2024 18:55:51.426903963 CET5565038416154.9.29.154192.168.2.23
                                                                      Mar 11, 2024 18:55:51.427181959 CET3841655650192.168.2.23154.9.29.154
                                                                      Mar 11, 2024 18:55:51.596587896 CET43928443192.168.2.2391.189.91.42
                                                                      Mar 11, 2024 18:55:56.971801043 CET42836443192.168.2.2391.189.91.43
                                                                      Mar 11, 2024 18:55:58.507587910 CET4251680192.168.2.23109.202.202.202
                                                                      Mar 11, 2024 18:56:01.435189962 CET3841655650192.168.2.23154.9.29.154
                                                                      Mar 11, 2024 18:56:01.636167049 CET5565038416154.9.29.154192.168.2.23
                                                                      Mar 11, 2024 18:56:09.647315979 CET5565038416154.9.29.154192.168.2.23
                                                                      Mar 11, 2024 18:56:09.647527933 CET3841655650192.168.2.23154.9.29.154
                                                                      Mar 11, 2024 18:56:12.329683065 CET43928443192.168.2.2391.189.91.42
                                                                      Mar 11, 2024 18:56:22.568254948 CET42836443192.168.2.2391.189.91.43
                                                                      Mar 11, 2024 18:56:28.711407900 CET4251680192.168.2.23109.202.202.202
                                                                      Mar 11, 2024 18:56:29.651947975 CET5565038416154.9.29.154192.168.2.23
                                                                      Mar 11, 2024 18:56:29.652282953 CET3841655650192.168.2.23154.9.29.154
                                                                      Mar 11, 2024 18:56:49.656177044 CET5565038416154.9.29.154192.168.2.23
                                                                      Mar 11, 2024 18:56:49.656303883 CET3841655650192.168.2.23154.9.29.154
                                                                      Mar 11, 2024 18:56:53.283807993 CET43928443192.168.2.2391.189.91.42
                                                                      Mar 11, 2024 18:57:09.662071943 CET5565038416154.9.29.154192.168.2.23
                                                                      Mar 11, 2024 18:57:09.662231922 CET3841655650192.168.2.23154.9.29.154
                                                                      Mar 11, 2024 18:57:13.761003017 CET42836443192.168.2.2391.189.91.43
                                                                      Mar 11, 2024 18:57:29.667213917 CET5565038416154.9.29.154192.168.2.23
                                                                      Mar 11, 2024 18:57:29.667536974 CET3841655650192.168.2.23154.9.29.154
                                                                      Mar 11, 2024 18:57:49.672928095 CET5565038416154.9.29.154192.168.2.23
                                                                      Mar 11, 2024 18:57:49.673079014 CET3841655650192.168.2.23154.9.29.154
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Mar 11, 2024 18:55:50.762085915 CET3384953192.168.2.238.8.8.8
                                                                      Mar 11, 2024 18:55:51.098840952 CET53338498.8.8.8192.168.2.23
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Mar 11, 2024 18:55:50.762085915 CET192.168.2.238.8.8.80xf523Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Mar 11, 2024 18:55:51.098840952 CET8.8.8.8192.168.2.230xf523No error (0)wcjwcj.cn154.9.29.154A (IP address)IN (0x0001)false

                                                                      System Behavior

                                                                      Start time (UTC):17:55:49
                                                                      Start date (UTC):11/03/2024
                                                                      Path:/tmp/4GI3jkntqw.elf
                                                                      Arguments:/tmp/4GI3jkntqw.elf
                                                                      File size:5388968 bytes
                                                                      MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                                      Start time (UTC):17:55:49
                                                                      Start date (UTC):11/03/2024
                                                                      Path:/tmp/4GI3jkntqw.elf
                                                                      Arguments:-
                                                                      File size:5388968 bytes
                                                                      MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                                      Start time (UTC):17:55:49
                                                                      Start date (UTC):11/03/2024
                                                                      Path:/tmp/4GI3jkntqw.elf
                                                                      Arguments:-
                                                                      File size:5388968 bytes
                                                                      MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                                      Start time (UTC):17:55:49
                                                                      Start date (UTC):11/03/2024
                                                                      Path:/tmp/4GI3jkntqw.elf
                                                                      Arguments:-
                                                                      File size:5388968 bytes
                                                                      MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                                      Start time (UTC):17:55:49
                                                                      Start date (UTC):11/03/2024
                                                                      Path:/tmp/4GI3jkntqw.elf
                                                                      Arguments:-
                                                                      File size:5388968 bytes
                                                                      MD5 hash:ae65271c943d3451b7f026d1fadccea6