Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
lhZOo8vhuI.elf

Overview

General Information

Sample name:lhZOo8vhuI.elf
renamed because original name is a hash value
Original sample name:0fe8b4c612a6e8c840579328a02dc93f.elf
Analysis ID:1427853
MD5:0fe8b4c612a6e8c840579328a02dc93f
SHA1:9db360adc86b08b60ac07d9d2c7e3458ca184312
SHA256:ce0f6a0246f408a1ca1ec77fc7e7341756d4d5dead481f219bc7c3627f2425d3
Tags:64elfmirai
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Executes the "iptables" command to insert, remove and/or manipulate rules
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Executes commands using a shell command-line interpreter
Executes the "iptables" command used for managing IP filtering and manipulation
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1427853
Start date and time:2024-04-18 09:33:48 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 28s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:lhZOo8vhuI.elf
renamed because original name is a hash value
Original Sample Name:0fe8b4c612a6e8c840579328a02dc93f.elf
Detection:MAL
Classification:mal68.troj.linELF@0/0@1/0
Command:/tmp/lhZOo8vhuI.elf
PID:5526
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
listening dn0
Standard Error:
  • system is lnxubuntu20
  • lhZOo8vhuI.elf (PID: 5526, Parent: 5450, MD5: 0fe8b4c612a6e8c840579328a02dc93f) Arguments: /tmp/lhZOo8vhuI.elf
    • lhZOo8vhuI.elf New Fork (PID: 5527, Parent: 5526)
      • lhZOo8vhuI.elf New Fork (PID: 5530, Parent: 5527)
        • sh (PID: 5531, Parent: 5530, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
          • sh New Fork (PID: 5532, Parent: 5531)
          • iptables (PID: 5532, Parent: 5531, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
        • sh (PID: 5538, Parent: 5530, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
          • sh New Fork (PID: 5539, Parent: 5538)
          • busybox (PID: 5539, Parent: 5538, MD5: 70584dffe9cb0309eb22ba78aa54bcdc) Arguments: /bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
        • sh (PID: 5540, Parent: 5530, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
          • sh New Fork (PID: 5541, Parent: 5540)
        • sh (PID: 5542, Parent: 5530, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
          • sh New Fork (PID: 5543, Parent: 5542)
        • sh (PID: 5544, Parent: 5530, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
          • sh New Fork (PID: 5545, Parent: 5544)
          • busybox (PID: 5545, Parent: 5544, MD5: 70584dffe9cb0309eb22ba78aa54bcdc) Arguments: busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
  • cleanup
SourceRuleDescriptionAuthorStrings
lhZOo8vhuI.elfLinux_Trojan_Mirai_564b8edaunknownunknown
  • 0xfd2:$a: 83 FE 01 76 12 0F B7 07 83 EE 02 48 83 C7 02 48 01 C1 83 FE 01
SourceRuleDescriptionAuthorStrings
5526.1.0000000000400000.0000000000417000.r-x.sdmpLinux_Trojan_Mirai_564b8edaunknownunknown
  • 0xfd2:$a: 83 FE 01 76 12 0F B7 07 83 EE 02 48 83 C7 02 48 01 C1 83 FE 01
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: lhZOo8vhuI.elfReversingLabs: Detection: 15%
Source: lhZOo8vhuI.elfVirustotal: Detection: 20%Perma Link
Source: lhZOo8vhuI.elfJoe Sandbox ML: detected

Networking

barindex
Source: global trafficTCP traffic: 212.118.43.167 ports 35342,2,3,4,5,2222
Source: /bin/sh (PID: 5532)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --dport 26721 -j ACCEPTJump to behavior
Source: global trafficTCP traffic: 192.168.2.15:51764 -> 212.118.43.167:35342
Source: global trafficTCP traffic: 192.168.2.15:51184 -> 77.105.138.202:35342
Source: global trafficTCP traffic: 192.168.2.15:41162 -> 185.196.11.64:35342
Source: /bin/sh (PID: 5532)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --dport 26721 -j ACCEPTJump to behavior
Source: /tmp/lhZOo8vhuI.elf (PID: 5526)Socket: 127.0.0.1::8345Jump to behavior
Source: /tmp/lhZOo8vhuI.elf (PID: 5530)Socket: 0.0.0.0::26721Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 77.105.138.202
Source: unknownTCP traffic detected without corresponding DNS query: 77.105.138.202
Source: unknownTCP traffic detected without corresponding DNS query: 77.105.138.202
Source: unknownTCP traffic detected without corresponding DNS query: 77.105.138.202
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownDNS traffic detected: queries for: dead-cheap-doma.in

System Summary

barindex
Source: lhZOo8vhuI.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_564b8eda Author: unknown
Source: 5526.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_564b8eda Author: unknown
Source: Initial sampleString containing 'busybox' found: /bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
Source: Initial sampleString containing 'busybox' found: busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
Source: Initial sampleString containing 'busybox' found: @socketsetsockoptbindlisten1.1.1.1hi im here, i thinkbindtoipconnectpoll/bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT/usr/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPTbusybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT/proc/net/tcp/fd0
Source: ELF static info symbol of initial sample.symtab present: no
Source: lhZOo8vhuI.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_564b8eda reference_sample = ff04921d7bf9ca01ae33a9fc0743dce9ca250e42a33547c5665b1c9a0b5260ee, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 63a9e43902e7db0b7a20498b5a860e36201bacc407e9e336faca0b7cfbc37819, id = 564b8eda-6f0e-45b8-bef6-d61b0f090a36, last_modified = 2021-09-16
Source: 5526.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_564b8eda reference_sample = ff04921d7bf9ca01ae33a9fc0743dce9ca250e42a33547c5665b1c9a0b5260ee, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 63a9e43902e7db0b7a20498b5a860e36201bacc407e9e336faca0b7cfbc37819, id = 564b8eda-6f0e-45b8-bef6-d61b0f090a36, last_modified = 2021-09-16
Source: classification engineClassification label: mal68.troj.linELF@0/0@1/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5532)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --dport 26721 -j ACCEPTJump to behavior
Source: /tmp/lhZOo8vhuI.elf (PID: 5531)Shell command executed: sh -c "iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"Jump to behavior
Source: /tmp/lhZOo8vhuI.elf (PID: 5538)Shell command executed: sh -c "/bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"Jump to behavior
Source: /tmp/lhZOo8vhuI.elf (PID: 5540)Shell command executed: sh -c "/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"Jump to behavior
Source: /tmp/lhZOo8vhuI.elf (PID: 5542)Shell command executed: sh -c "/usr/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"Jump to behavior
Source: /tmp/lhZOo8vhuI.elf (PID: 5544)Shell command executed: sh -c "busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"Jump to behavior
Source: /bin/sh (PID: 5532)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --dport 26721 -j ACCEPTJump to behavior
Source: /bin/busybox (PID: 5539)Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5545)Queries kernel information via 'uname': Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path InterceptionDirect Volume AccessOS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
System Network Configuration Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1427853 Sample: lhZOo8vhuI.elf Startdate: 18/04/2024 Architecture: LINUX Score: 68 39 212.118.43.167, 2222, 35342 CITYLAN-ASRU Russian Federation 2->39 41 dead-cheap-doma.in 185.196.11.64, 35342, 41162 SIMPLECARRIERCH Switzerland 2->41 43 77.105.138.202, 35342 PLUSTELECOM-ASRU Russian Federation 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 Machine Learning detection for sample 2->49 51 Connects to many ports of the same IP (likely port scanning) 2->51 10 lhZOo8vhuI.elf 2->10         started        signatures3 process4 process5 12 lhZOo8vhuI.elf 10->12         started        process6 14 lhZOo8vhuI.elf 12->14         started        16 lhZOo8vhuI.elf 12->16         started        process7 18 lhZOo8vhuI.elf sh 14->18         started        20 lhZOo8vhuI.elf sh 14->20         started        22 lhZOo8vhuI.elf sh 14->22         started        26 2 other processes 14->26 24 lhZOo8vhuI.elf 16->24         started        process8 28 sh iptables 18->28         started        31 sh busybox 20->31         started        33 sh busybox 22->33         started        35 sh 26->35         started        37 sh 26->37         started        signatures9 53 Executes the "iptables" command to insert, remove and/or manipulate rules 28->53

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
lhZOo8vhuI.elf16%ReversingLabsLinux.Trojan.Mirai
lhZOo8vhuI.elf21%VirustotalBrowse
lhZOo8vhuI.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
dead-cheap-doma.in
185.196.11.64
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    212.118.43.167
    unknownRussian Federation
    25308CITYLAN-ASRUtrue
    185.196.11.64
    dead-cheap-doma.inSwitzerland
    42624SIMPLECARRIERCHfalse
    77.105.138.202
    unknownRussian Federation
    42031PLUSTELECOM-ASRUfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    212.118.43.167uV4x1JLrrF.elfGet hashmaliciousUnknownBrowse
      DQVl3rjqoZ.elfGet hashmaliciousGafgytBrowse
        9jjtFFX0Tb.elfGet hashmaliciousUnknownBrowse
          ceKWlceqnf.elfGet hashmaliciousUnknownBrowse
            ULDAb4NYKK.elfGet hashmaliciousUnknownBrowse
              PAqN0mrUbb.elfGet hashmaliciousUnknownBrowse
                TsjmK7qSlf.elfGet hashmaliciousUnknownBrowse
                  ZXYyjKa6bs.elfGet hashmaliciousUnknownBrowse
                    ZE3opQX8Ch.elfGet hashmaliciousUnknownBrowse
                      1Mk36tjCOK.elfGet hashmaliciousUnknownBrowse
                        185.196.11.64uV4x1JLrrF.elfGet hashmaliciousUnknownBrowse
                          DQVl3rjqoZ.elfGet hashmaliciousGafgytBrowse
                            9jjtFFX0Tb.elfGet hashmaliciousUnknownBrowse
                              77.105.138.2021KGsIkmHsx.elfGet hashmaliciousUnknownBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                dead-cheap-doma.inuV4x1JLrrF.elfGet hashmaliciousUnknownBrowse
                                • 185.196.11.64
                                DQVl3rjqoZ.elfGet hashmaliciousGafgytBrowse
                                • 185.196.11.64
                                9jjtFFX0Tb.elfGet hashmaliciousUnknownBrowse
                                • 185.196.11.64
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                SIMPLECARRIERCHuV4x1JLrrF.elfGet hashmaliciousUnknownBrowse
                                • 185.196.11.64
                                DQVl3rjqoZ.elfGet hashmaliciousGafgytBrowse
                                • 185.196.11.64
                                9jjtFFX0Tb.elfGet hashmaliciousUnknownBrowse
                                • 185.196.11.64
                                dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                • 185.196.11.12
                                WC8X6qXwRB.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                • 185.196.10.233
                                8p1dq7mGv1.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                • 185.196.10.233
                                Dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                • 185.196.11.12
                                C6CM5vjm9f.elfGet hashmaliciousUnknownBrowse
                                • 185.196.9.5
                                tGUvOmucT1.elfGet hashmaliciousMiraiBrowse
                                • 185.196.9.5
                                HuQOCdLGIt.elfGet hashmaliciousMiraiBrowse
                                • 185.196.9.5
                                CITYLAN-ASRUuV4x1JLrrF.elfGet hashmaliciousUnknownBrowse
                                • 212.118.43.167
                                DQVl3rjqoZ.elfGet hashmaliciousGafgytBrowse
                                • 212.118.43.167
                                9jjtFFX0Tb.elfGet hashmaliciousUnknownBrowse
                                • 212.118.43.167
                                ceKWlceqnf.elfGet hashmaliciousUnknownBrowse
                                • 212.118.43.167
                                h2LK6AsZ1I.exeGet hashmaliciousRisePro StealerBrowse
                                • 88.210.9.117
                                SecuriteInfo.com.Win32.SpywareX-gen.4316.21522.exeGet hashmaliciousDanaBotBrowse
                                • 88.210.13.105
                                SecuriteInfo.com.Win32.SpywareX-gen.4316.21522.exeGet hashmaliciousDanaBotBrowse
                                • 88.210.13.105
                                bladfin.exeGet hashmaliciousRedLine, SectopRATBrowse
                                • 212.118.39.73
                                uetfu6ZLWZ.exeGet hashmaliciousGlupteba, RedLine, SmokeLoader, StealcBrowse
                                • 212.118.39.73
                                16GAuqLUFK.exeGet hashmaliciousGlupteba, RedLine, SmokeLoader, StealcBrowse
                                • 212.118.39.73
                                PLUSTELECOM-ASRUfile.exeGet hashmaliciousPrivateLoader, PureLog StealerBrowse
                                • 77.105.147.130
                                yqeO67O9gY.elfGet hashmaliciousMiraiBrowse
                                • 77.105.140.109
                                676767.exeGet hashmaliciousRemcosBrowse
                                • 77.105.132.92
                                setup.exeGet hashmaliciousPureLog Stealer, RHADAMANTHYSBrowse
                                • 77.105.147.130
                                3.exeGet hashmaliciousLummaC, RemcosBrowse
                                • 77.105.132.92
                                2.exeGet hashmaliciousAsyncRAT, RemcosBrowse
                                • 77.105.132.92
                                1.exeGet hashmaliciousLummaC, RemcosBrowse
                                • 77.105.132.92
                                9cwmL9qtUZ.exeGet hashmaliciousRemcosBrowse
                                • 77.105.132.92
                                MedicationRoy.exeGet hashmaliciousAsyncRAT, RemcosBrowse
                                • 77.105.132.92
                                5_MedicationRoy.exeGet hashmaliciousAsyncRAT, RemcosBrowse
                                • 77.105.132.92
                                No context
                                No context
                                No created / dropped files found
                                File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                                Entropy (8bit):6.05900241146694
                                TrID:
                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                File name:lhZOo8vhuI.elf
                                File size:96'200 bytes
                                MD5:0fe8b4c612a6e8c840579328a02dc93f
                                SHA1:9db360adc86b08b60ac07d9d2c7e3458ca184312
                                SHA256:ce0f6a0246f408a1ca1ec77fc7e7341756d4d5dead481f219bc7c3627f2425d3
                                SHA512:57905f05a18a4b2dc3b989dd4478955dd779e3cc2748a50b405ef8dfabf578bb31ec5232723707378f7155c773a51aaa2638d5e10f65cd348423c9ae1af70108
                                SSDEEP:1536:s4omC3eg0wN0l9bqlMQsqNHpFIBryA1t7ge6systBLIfQ0J3HvOpe4oEQ1It3R+F:svmIegj0ltQs7xZ71623dZTY
                                TLSH:DE932902F5D698FDC046C1714B9F9136EA32F85C12347ABF2794FB621E7EE215A2DA40
                                File Content Preview:.ELF..............>.......@.....@.......Hu..........@.8...@.......................@.......@......d.......d........ .............@s......@sa.....@sa....................... .....Q.td....................................................P.b.....B..X...........

                                ELF header

                                Class:ELF64
                                Data:2's complement, little endian
                                Version:1 (current)
                                Machine:Advanced Micro Devices X86-64
                                Version Number:0x1
                                Type:EXEC (Executable file)
                                OS/ABI:UNIX - System V
                                ABI Version:0
                                Entry Point Address:0x400194
                                Flags:0x0
                                ELF Header Size:64
                                Program Header Offset:64
                                Program Header Size:56
                                Number of Program Headers:3
                                Section Header Offset:95560
                                Section Header Size:64
                                Number of Section Headers:10
                                Header String Table Index:9
                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                NULL0x00x00x00x00x0000
                                .initPROGBITS0x4000e80xe80xd0x00x6AX001
                                .textPROGBITS0x4001000x1000x142f20x00x6AX0016
                                .finiPROGBITS0x4143f20x143f20x80x00x6AX001
                                .rodataPROGBITS0x4144000x144000x209c0x00x2A0032
                                .ctorsPROGBITS0x6173400x173400x100x00x3WA008
                                .dtorsPROGBITS0x6173500x173500x100x00x3WA008
                                .dataPROGBITS0x6173800x173800x1880x00x3WA0032
                                .bssNOBITS0x6175200x175080x10200x00x3WA0032
                                .shstrtabSTRTAB0x00x175080x3e0x00x0001
                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                LOAD0x00x4000000x4000000x1649c0x1649c6.24660x5R E0x200000.init .text .fini .rodata
                                LOAD0x173400x6173400x6173400x1c80x12002.03610x6RW 0x200000.ctors .dtors .data .bss
                                GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                                TimestampSource PortDest PortSource IPDest IP
                                Apr 18, 2024 09:34:29.547693968 CEST5176435342192.168.2.15212.118.43.167
                                Apr 18, 2024 09:34:30.013180971 CEST454062222192.168.2.15212.118.43.167
                                Apr 18, 2024 09:34:30.576541901 CEST5176435342192.168.2.15212.118.43.167
                                Apr 18, 2024 09:34:31.024454117 CEST454062222192.168.2.15212.118.43.167
                                Apr 18, 2024 09:34:32.592410088 CEST5176435342192.168.2.15212.118.43.167
                                Apr 18, 2024 09:34:33.040400982 CEST454062222192.168.2.15212.118.43.167
                                Apr 18, 2024 09:34:36.784265995 CEST5176435342192.168.2.15212.118.43.167
                                Apr 18, 2024 09:34:37.296255112 CEST454062222192.168.2.15212.118.43.167
                                Apr 18, 2024 09:34:45.487982988 CEST454062222192.168.2.15212.118.43.167
                                Apr 18, 2024 09:34:45.560221910 CEST5118435342192.168.2.1577.105.138.202
                                Apr 18, 2024 09:34:46.575984001 CEST5118435342192.168.2.1577.105.138.202
                                Apr 18, 2024 09:34:48.592176914 CEST5118435342192.168.2.1577.105.138.202
                                Apr 18, 2024 09:34:52.655817032 CEST5118435342192.168.2.1577.105.138.202
                                Apr 18, 2024 09:35:01.571630001 CEST5177035342192.168.2.15212.118.43.167
                                Apr 18, 2024 09:35:01.615454912 CEST454062222192.168.2.15212.118.43.167
                                Apr 18, 2024 09:35:02.575592041 CEST5177035342192.168.2.15212.118.43.167
                                Apr 18, 2024 09:35:04.591507912 CEST5177035342192.168.2.15212.118.43.167
                                Apr 18, 2024 09:35:08.783334017 CEST5177035342192.168.2.15212.118.43.167
                                Apr 18, 2024 09:35:17.796627998 CEST4116235342192.168.2.15185.196.11.64
                                Apr 18, 2024 09:35:18.005686998 CEST3534241162185.196.11.64192.168.2.15
                                Apr 18, 2024 09:35:18.005987883 CEST4116235342192.168.2.15185.196.11.64
                                Apr 18, 2024 09:35:18.005987883 CEST4116235342192.168.2.15185.196.11.64
                                Apr 18, 2024 09:35:18.215215921 CEST3534241162185.196.11.64192.168.2.15
                                Apr 18, 2024 09:35:18.215429068 CEST4116235342192.168.2.15185.196.11.64
                                Apr 18, 2024 09:35:18.424547911 CEST3534241162185.196.11.64192.168.2.15
                                Apr 18, 2024 09:35:33.429012060 CEST3534241162185.196.11.64192.168.2.15
                                Apr 18, 2024 09:35:33.429205894 CEST4116235342192.168.2.15185.196.11.64
                                Apr 18, 2024 09:35:34.130521059 CEST454062222192.168.2.15212.118.43.167
                                Apr 18, 2024 09:35:48.673243046 CEST3534241162185.196.11.64192.168.2.15
                                Apr 18, 2024 09:35:48.673461914 CEST4116235342192.168.2.15185.196.11.64
                                Apr 18, 2024 09:36:03.885189056 CEST3534241162185.196.11.64192.168.2.15
                                Apr 18, 2024 09:36:03.885375023 CEST4116235342192.168.2.15185.196.11.64
                                Apr 18, 2024 09:36:18.033094883 CEST4116235342192.168.2.15185.196.11.64
                                Apr 18, 2024 09:36:18.242377043 CEST3534241162185.196.11.64192.168.2.15
                                Apr 18, 2024 09:36:18.242645979 CEST3534241162185.196.11.64192.168.2.15
                                Apr 18, 2024 09:36:18.242849112 CEST4116235342192.168.2.15185.196.11.64
                                TimestampSource PortDest PortSource IPDest IP
                                Apr 18, 2024 09:35:17.583282948 CEST3362953192.168.2.15194.36.144.87
                                Apr 18, 2024 09:35:17.796202898 CEST5333629194.36.144.87192.168.2.15
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Apr 18, 2024 09:35:17.583282948 CEST192.168.2.15194.36.144.870xfb6Standard query (0)dead-cheap-doma.inA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Apr 18, 2024 09:35:17.796202898 CEST194.36.144.87192.168.2.150xfb6No error (0)dead-cheap-doma.in185.196.11.64A (IP address)IN (0x0001)false

                                System Behavior

                                Start time (UTC):07:34:26
                                Start date (UTC):18/04/2024
                                Path:/tmp/lhZOo8vhuI.elf
                                Arguments:/tmp/lhZOo8vhuI.elf
                                File size:96200 bytes
                                MD5 hash:0fe8b4c612a6e8c840579328a02dc93f

                                Start time (UTC):07:34:26
                                Start date (UTC):18/04/2024
                                Path:/tmp/lhZOo8vhuI.elf
                                Arguments:-
                                File size:96200 bytes
                                MD5 hash:0fe8b4c612a6e8c840579328a02dc93f

                                Start time (UTC):07:34:26
                                Start date (UTC):18/04/2024
                                Path:/tmp/lhZOo8vhuI.elf
                                Arguments:-
                                File size:96200 bytes
                                MD5 hash:0fe8b4c612a6e8c840579328a02dc93f

                                Start time (UTC):07:34:26
                                Start date (UTC):18/04/2024
                                Path:/tmp/lhZOo8vhuI.elf
                                Arguments:-
                                File size:96200 bytes
                                MD5 hash:0fe8b4c612a6e8c840579328a02dc93f

                                Start time (UTC):07:34:28
                                Start date (UTC):18/04/2024
                                Path:/tmp/lhZOo8vhuI.elf
                                Arguments:-
                                File size:96200 bytes
                                MD5 hash:0fe8b4c612a6e8c840579328a02dc93f

                                Start time (UTC):07:34:28
                                Start date (UTC):18/04/2024
                                Path:/tmp/lhZOo8vhuI.elf
                                Arguments:-
                                File size:96200 bytes
                                MD5 hash:0fe8b4c612a6e8c840579328a02dc93f

                                Start time (UTC):07:34:28
                                Start date (UTC):18/04/2024
                                Path:/bin/sh
                                Arguments:sh -c "iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):07:34:28
                                Start date (UTC):18/04/2024
                                Path:/bin/sh
                                Arguments:-
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):07:34:28
                                Start date (UTC):18/04/2024
                                Path:/usr/sbin/iptables
                                Arguments:iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
                                File size:99296 bytes
                                MD5 hash:1ab05fef765b6342cdfadaa5275b33af

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/tmp/lhZOo8vhuI.elf
                                Arguments:-
                                File size:96200 bytes
                                MD5 hash:0fe8b4c612a6e8c840579328a02dc93f

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/bin/sh
                                Arguments:sh -c "/bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/bin/sh
                                Arguments:-
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/bin/busybox
                                Arguments:/bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
                                File size:2172376 bytes
                                MD5 hash:70584dffe9cb0309eb22ba78aa54bcdc

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/tmp/lhZOo8vhuI.elf
                                Arguments:-
                                File size:96200 bytes
                                MD5 hash:0fe8b4c612a6e8c840579328a02dc93f

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/bin/sh
                                Arguments:sh -c "/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/bin/sh
                                Arguments:-
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/tmp/lhZOo8vhuI.elf
                                Arguments:-
                                File size:96200 bytes
                                MD5 hash:0fe8b4c612a6e8c840579328a02dc93f

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/bin/sh
                                Arguments:sh -c "/usr/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/bin/sh
                                Arguments:-
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/tmp/lhZOo8vhuI.elf
                                Arguments:-
                                File size:96200 bytes
                                MD5 hash:0fe8b4c612a6e8c840579328a02dc93f

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/bin/sh
                                Arguments:sh -c "busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/bin/sh
                                Arguments:-
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):07:34:29
                                Start date (UTC):18/04/2024
                                Path:/usr/bin/busybox
                                Arguments:busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
                                File size:2172376 bytes
                                MD5 hash:70584dffe9cb0309eb22ba78aa54bcdc