Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
pVwXSHLriO.elf

Overview

General Information

Sample name:pVwXSHLriO.elf
renamed because original name is a hash value
Original sample name:804fd7ad1e2f877eede67f40e31a4bba.elf
Analysis ID:1421750
MD5:804fd7ad1e2f877eede67f40e31a4bba
SHA1:db927cdecacc7ceed307acff72ad7b18aa5a0378
SHA256:644af42f11122f38964208e0b124c75d01ee25b2b24ff40e33fb6cee47b41774
Tags:32elfintelmirai
Infos:

Detection

Mirai, Moobot
Score:96
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Moobot
Machine Learning detection for sample
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1421750
Start date and time:2024-04-07 20:00:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 23s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:pVwXSHLriO.elf
renamed because original name is a hash value
Original Sample Name:804fd7ad1e2f877eede67f40e31a4bba.elf
Detection:MAL
Classification:mal96.troj.evad.linELF@0/0@1/0
Command:/tmp/pVwXSHLriO.elf
PID:5429
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
pVwXSHLriO.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    pVwXSHLriO.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0xc45c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc470:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc484:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc498:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc4ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc4c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc4d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc4e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc4fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc510:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc524:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc538:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc54c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc560:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc574:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc588:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc59c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc5b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc5c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc5d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc5ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    pVwXSHLriO.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
    • 0x4b60:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
    pVwXSHLriO.elfLinux_Trojan_Mirai_88de437funknownunknown
    • 0x7552:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
    pVwXSHLriO.elfLinux_Trojan_Mirai_389ee3e9unknownunknown
    • 0xa4f3:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
    Click to see the 2 entries
    SourceRuleDescriptionAuthorStrings
    5429.1.0000000008048000.0000000008057000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
      5429.1.0000000008048000.0000000008057000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xc45c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc470:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc484:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc498:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc4ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc4c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc4d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc4e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc4fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc510:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc524:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc538:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc54c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc560:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc574:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc588:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc59c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc5b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc5c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc5d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc5ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5429.1.0000000008048000.0000000008057000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
      • 0x4b60:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
      5429.1.0000000008048000.0000000008057000.r-x.sdmpLinux_Trojan_Mirai_88de437funknownunknown
      • 0x7552:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
      5429.1.0000000008048000.0000000008057000.r-x.sdmpLinux_Trojan_Mirai_389ee3e9unknownunknown
      • 0xa4f3:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
      Click to see the 4 entries
      Timestamp:04/07/24-20:00:57.184009
      SID:2030491
      Source Port:48958
      Destination Port:9009
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:04/07/24-20:02:51.029693
      SID:2030489
      Source Port:9009
      Destination Port:48958
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: pVwXSHLriO.elfAvira: detected
      Source: pVwXSHLriO.elfReversingLabs: Detection: 52%
      Source: pVwXSHLriO.elfVirustotal: Detection: 57%Perma Link
      Source: pVwXSHLriO.elfJoe Sandbox ML: detected

      Networking

      barindex
      Source: TrafficSnort IDS: 2030491 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) 192.168.2.13:48958 -> 45.67.86.157:9009
      Source: TrafficSnort IDS: 2030489 ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response 45.67.86.157:9009 -> 192.168.2.13:48958
      Source: global trafficTCP traffic: 192.168.2.13:48958 -> 45.67.86.157:9009
      Source: unknownDNS traffic detected: queries for: xiaokkk.02maill.com

      System Summary

      barindex
      Source: pVwXSHLriO.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: pVwXSHLriO.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
      Source: pVwXSHLriO.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
      Source: pVwXSHLriO.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
      Source: pVwXSHLriO.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
      Source: pVwXSHLriO.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
      Source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
      Source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
      Source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
      Source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
      Source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
      Source: Process Memory Space: pVwXSHLriO.elf PID: 5429, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: pVwXSHLriO.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: pVwXSHLriO.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
      Source: pVwXSHLriO.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
      Source: pVwXSHLriO.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
      Source: pVwXSHLriO.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
      Source: pVwXSHLriO.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
      Source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
      Source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
      Source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
      Source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
      Source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
      Source: Process Memory Space: pVwXSHLriO.elf PID: 5429, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: classification engineClassification label: mal96.troj.evad.linELF@0/0@1/0
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/230/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/231/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/232/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/233/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/236/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/237/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/238/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/239/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/3631/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/914/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/917/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/11/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/12/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/4063/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/13/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/14/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/15/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/16/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/17/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/18/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/19/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/240/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/3095/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/120/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/241/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/5271/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/121/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/242/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/1/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/122/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/243/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/2/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/123/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/244/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/3/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/124/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/245/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/1588/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/125/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/4/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/246/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/126/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/5/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/247/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/127/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/6/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/248/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/128/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/7/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/249/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/129/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/8/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/800/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/9/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/1906/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/802/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/803/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/20/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/21/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/22/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/23/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/24/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/25/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/26/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/27/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/28/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/29/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/3420/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/1482/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/490/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/1480/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/250/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/371/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/130/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/251/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/131/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/252/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/132/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/253/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/254/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/1238/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/134/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/255/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/256/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/257/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/378/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/3413/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/258/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/259/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/1475/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/936/cmdlineJump to behavior
      Source: /tmp/pVwXSHLriO.elf (PID: 5431)File opened: /proc/30/cmdlineJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: /tmp/pVwXSHLriO.elf (PID: 5429)File: /tmp/pVwXSHLriO.elfJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: pVwXSHLriO.elf, type: SAMPLE
      Source: Yara matchFile source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: pVwXSHLriO.elf PID: 5429, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
      Source: Yara matchFile source: pVwXSHLriO.elf, type: SAMPLE
      Source: Yara matchFile source: 5429.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: pVwXSHLriO.elf PID: 5429, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
      File Deletion
      1
      OS Credential Dumping
      System Service DiscoveryRemote ServicesData from Local System1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1421750 Sample: pVwXSHLriO.elf Startdate: 07/04/2024 Architecture: LINUX Score: 96 20 xiaokkk.02maill.com 45.67.86.157, 48958, 9009 SPD-NETTR Germany 2->20 22 Snort IDS alert for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 4 other signatures 2->28 9 pVwXSHLriO.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 pVwXSHLriO.elf 9->12         started        process6 process7 14 pVwXSHLriO.elf 12->14         started        16 pVwXSHLriO.elf 12->16         started        process8 18 pVwXSHLriO.elf 14->18         started       
      SourceDetectionScannerLabelLink
      pVwXSHLriO.elf53%ReversingLabsLinux.Trojan.Mirai
      pVwXSHLriO.elf57%VirustotalBrowse
      pVwXSHLriO.elf100%AviraEXP/ELF.Mirai.Z.A
      pVwXSHLriO.elf100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      xiaokkk.02maill.com
      45.67.86.157
      truetrue
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        45.67.86.157
        xiaokkk.02maill.comGermany
        57844SPD-NETTRtrue
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        SPD-NETTRna.elfGet hashmaliciousMiraiBrowse
        • 185.118.141.106
        nigga.shGet hashmaliciousMiraiBrowse
        • 45.12.96.123
        rc2G4fAIY4.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 45.81.142.31
        QzNtWxCnZh.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 45.81.142.31
        dqVusfiLPV.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 45.81.142.31
        SecuriteInfo.com.Linux.Siggen.9999.6736.22177.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 45.81.142.31
        SecuriteInfo.com.Trojan.GenericKD.65594079.25944.10510.exeGet hashmaliciousAgentTesla, RHADAMANTHYSBrowse
        • 212.193.30.32
        tyG9Ou5NOn.exeGet hashmaliciousUnknownBrowse
        • 185.72.8.185
        toprakkcv.xlsmGet hashmaliciousUnknownBrowse
        • 213.238.172.34
        toprakkcv.xlsmGet hashmaliciousUnknownBrowse
        • 213.238.172.34
        No context
        No context
        No created / dropped files found
        File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
        Entropy (8bit):6.585863085779578
        TrID:
        • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
        • ELF Executable and Linkable format (generic) (4004/1) 49.84%
        File name:pVwXSHLriO.elf
        File size:59'632 bytes
        MD5:804fd7ad1e2f877eede67f40e31a4bba
        SHA1:db927cdecacc7ceed307acff72ad7b18aa5a0378
        SHA256:644af42f11122f38964208e0b124c75d01ee25b2b24ff40e33fb6cee47b41774
        SHA512:42bc3a5a5476b1ebdcb50fa83c23974d90bf5f01fcdedc1e3de13bcdb7505140373ff209e8ac3a9d257a30f583bb45c1efd54bbb822fbc6530682647f2ccaf87
        SSDEEP:1536:kUeU8CS3qhe53IY/ElhAvEhbpvuKjBc1Epu/j6wCSqzecO:kbU833qhU3X/ElhQEhbpmQMOcj6wWzep
        TLSH:13435CD6E583D8F6EC0B04706035E72BAE72E0AE2219E647D768D531FC8FA41A513D9C
        File Content Preview:.ELF....................d...4...`.......4. ...(..............................................t...t.......'..........Q.td............................U..S............h........[]...$.............U......= w...t..5.....t......t......u........t....h.d..........

        ELF header

        Class:ELF32
        Data:2's complement, little endian
        Version:1 (current)
        Machine:Intel 80386
        Version Number:0x1
        Type:EXEC (Executable file)
        OS/ABI:UNIX - System V
        ABI Version:0
        Entry Point Address:0x8048164
        Flags:0x0
        ELF Header Size:52
        Program Header Offset:52
        Program Header Size:32
        Number of Program Headers:3
        Section Header Offset:59232
        Section Header Size:40
        Number of Section Headers:10
        Header String Table Index:9
        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
        NULL0x00x00x00x00x0000
        .initPROGBITS0x80480940x940x1c0x00x6AX001
        .textPROGBITS0x80480b00xb00xbfa60x00x6AX0016
        .finiPROGBITS0x80540560xc0560x170x00x6AX001
        .rodataPROGBITS0x80540800xc0800x241c0x00x2A0032
        .ctorsPROGBITS0x80574a00xe4a00x80x00x3WA004
        .dtorsPROGBITS0x80574a80xe4a80x80x00x3WA004
        .dataPROGBITS0x80574c00xe4c00x2600x00x3WA0032
        .bssNOBITS0x80577200xe7200x25200x00x3WA0032
        .shstrtabSTRTAB0x00xe7200x3e0x00x0001
        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
        LOAD0x00x80480000x80480000xe49c0xe49c6.62150x5R E0x1000.init .text .fini .rodata
        LOAD0xe4a00x80574a00x80574a00x2800x27a03.42580x6RW 0x1000.ctors .dtors .data .bss
        GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        04/07/24-20:00:57.184009TCP2030491ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)489589009192.168.2.1345.67.86.157
        04/07/24-20:02:51.029693TCP2030489ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response90094895845.67.86.157192.168.2.13
        TimestampSource PortDest PortSource IPDest IP
        Apr 7, 2024 20:00:56.891622066 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:00:57.183866024 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:00:57.183917999 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:00:57.184009075 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:00:57.203373909 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:00:57.220397949 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:00:57.476186991 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:00:57.480431080 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:00:57.480524063 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:00:57.481096983 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:00:57.500308990 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:00:57.512525082 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:00:57.520246983 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:00:57.540754080 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:00:57.561378956 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:00:57.792412043 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:00:57.832854033 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:00:57.894115925 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:00:57.894298077 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:00:58.187011003 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:07.580598116 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:07.872678995 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:11.008678913 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:11.008815050 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:11.009635925 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:11.027218103 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:11.043097973 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:11.058790922 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:11.074486971 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:11.301704884 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:11.319245100 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:11.335280895 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:11.350717068 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:11.366579056 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:11.366724968 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:11.658687115 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:31.013418913 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:31.013545036 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:31.014209986 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:31.030744076 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:31.046578884 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:31.062798977 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:31.078805923 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:31.306539059 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:31.322799921 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:31.343410969 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:31.354824066 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:31.374119043 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:31.374188900 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:31.666251898 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:51.021354914 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:51.022217989 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:51.042541027 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:51.060674906 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:51.079061985 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:51.096916914 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:51.315176010 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:51.334558010 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:51.352653980 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:51.371073008 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:51.389799118 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:01:51.389872074 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:01:51.682111025 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:11.023344040 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:11.024548054 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:11.055818081 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:11.083149910 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:11.111428976 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:11.139106989 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:11.316488981 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:11.347920895 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:11.375183105 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:11.404082060 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:11.433804035 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:11.433960915 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:11.726083994 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:31.032418013 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:31.033365965 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:31.053189039 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:31.070152998 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:31.086688995 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:31.103521109 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:31.326574087 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:31.348617077 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:31.363575935 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:31.380359888 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:31.396495104 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:31.396581888 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:31.688669920 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:51.029692888 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:51.030875921 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:51.051736116 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:51.071106911 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:51.089421034 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:51.109818935 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:51.322964907 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:51.343759060 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:51.363282919 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:51.381567955 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:51.401945114 CEST90094895845.67.86.157192.168.2.13
        Apr 7, 2024 20:02:51.402096987 CEST489589009192.168.2.1345.67.86.157
        Apr 7, 2024 20:02:51.694133043 CEST90094895845.67.86.157192.168.2.13
        TimestampSource PortDest PortSource IPDest IP
        Apr 7, 2024 20:00:56.649350882 CEST4710453192.168.2.138.8.8.8
        Apr 7, 2024 20:00:56.810945988 CEST53471048.8.8.8192.168.2.13
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Apr 7, 2024 20:00:56.649350882 CEST192.168.2.138.8.8.80xb3e6Standard query (0)xiaokkk.02maill.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Apr 7, 2024 20:00:56.810945988 CEST8.8.8.8192.168.2.130xb3e6No error (0)xiaokkk.02maill.com45.67.86.157A (IP address)IN (0x0001)false

        System Behavior

        Start time (UTC):18:00:56
        Start date (UTC):07/04/2024
        Path:/tmp/pVwXSHLriO.elf
        Arguments:/tmp/pVwXSHLriO.elf
        File size:59632 bytes
        MD5 hash:804fd7ad1e2f877eede67f40e31a4bba

        Start time (UTC):18:00:56
        Start date (UTC):07/04/2024
        Path:/tmp/pVwXSHLriO.elf
        Arguments:-
        File size:59632 bytes
        MD5 hash:804fd7ad1e2f877eede67f40e31a4bba

        Start time (UTC):18:00:56
        Start date (UTC):07/04/2024
        Path:/tmp/pVwXSHLriO.elf
        Arguments:-
        File size:59632 bytes
        MD5 hash:804fd7ad1e2f877eede67f40e31a4bba

        Start time (UTC):18:00:56
        Start date (UTC):07/04/2024
        Path:/tmp/pVwXSHLriO.elf
        Arguments:-
        File size:59632 bytes
        MD5 hash:804fd7ad1e2f877eede67f40e31a4bba

        Start time (UTC):18:00:56
        Start date (UTC):07/04/2024
        Path:/tmp/pVwXSHLriO.elf
        Arguments:-
        File size:59632 bytes
        MD5 hash:804fd7ad1e2f877eede67f40e31a4bba