Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
0tGEmgFUHk.elf

Overview

General Information

Sample name:0tGEmgFUHk.elf
renamed because original name is a hash value
Original sample name:5b91d0145d928f5b1d88fefa32453883.elf
Analysis ID:1427856
MD5:5b91d0145d928f5b1d88fefa32453883
SHA1:445d0469ccce36d09ca2861c673b83310198e101
SHA256:d8bbda334ced438055d2d337ba368af1a0ee53ccececb6c6485408e60326afcd
Tags:32elfmipsmirai
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Executes the "iptables" command to insert, remove and/or manipulate rules
Detected TCP or UDP traffic on non-standard ports
Executes commands using a shell command-line interpreter
Executes the "iptables" command used for managing IP filtering and manipulation
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1427856
Start date and time:2024-04-18 09:38:02 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 49s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:0tGEmgFUHk.elf
renamed because original name is a hash value
Original Sample Name:5b91d0145d928f5b1d88fefa32453883.elf
Detection:MAL
Classification:mal56.troj.linELF@0/0@1/0
Command:/tmp/0tGEmgFUHk.elf
PID:5441
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
listening dn0
Standard Error:
  • system is lnxubuntu20
  • 0tGEmgFUHk.elf (PID: 5441, Parent: 5358, MD5: 0083f1f0e77be34ad27f849842bbb00c) Arguments: /tmp/0tGEmgFUHk.elf
    • 0tGEmgFUHk.elf New Fork (PID: 5443, Parent: 5441)
      • 0tGEmgFUHk.elf New Fork (PID: 5449, Parent: 5443)
        • sh (PID: 5451, Parent: 5449, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
          • sh New Fork (PID: 5453, Parent: 5451)
          • iptables (PID: 5453, Parent: 5451, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
        • sh (PID: 5461, Parent: 5449, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
          • sh New Fork (PID: 5463, Parent: 5461)
          • busybox (PID: 5463, Parent: 5461, MD5: 70584dffe9cb0309eb22ba78aa54bcdc) Arguments: /bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
        • sh (PID: 5464, Parent: 5449, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
          • sh New Fork (PID: 5466, Parent: 5464)
        • sh (PID: 5467, Parent: 5449, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
          • sh New Fork (PID: 5469, Parent: 5467)
        • sh (PID: 5470, Parent: 5449, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
          • sh New Fork (PID: 5472, Parent: 5470)
          • busybox (PID: 5472, Parent: 5470, MD5: 70584dffe9cb0309eb22ba78aa54bcdc) Arguments: busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 0tGEmgFUHk.elfVirustotal: Detection: 20%Perma Link
Source: 0tGEmgFUHk.elfReversingLabs: Detection: 13%

Networking

barindex
Source: global trafficTCP traffic: 212.118.43.167 ports 35342,2,3,4,5,2222
Source: /bin/sh (PID: 5453)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --dport 26721 -j ACCEPTJump to behavior
Source: global trafficTCP traffic: 192.168.2.13:46366 -> 212.118.43.167:35342
Source: global trafficTCP traffic: 192.168.2.13:54708 -> 185.196.11.64:35342
Source: /bin/sh (PID: 5453)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --dport 26721 -j ACCEPTJump to behavior
Source: /tmp/0tGEmgFUHk.elf (PID: 5441)Socket: 127.0.0.1::8345Jump to behavior
Source: /tmp/0tGEmgFUHk.elf (PID: 5449)Socket: 0.0.0.0::26721Jump to behavior
Source: global trafficTCP traffic: 192.168.2.13:48202 -> 185.125.190.26:443
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 212.118.43.167
Source: unknownDNS traffic detected: queries for: dead-cheap-doma.in
Source: unknownNetwork traffic detected: HTTP traffic on port 48202 -> 443
Source: Initial sampleString containing 'busybox' found: /bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
Source: Initial sampleString containing 'busybox' found: busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
Source: Initial sampleString containing 'busybox' found: socketsetsockoptbindlisten1.1.1.1hi im here, i think/bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT/usr/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPTbusybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPTbindtoipconnectpoll/proc/net/tcp/fd0
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal56.troj.linELF@0/0@1/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5453)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --dport 26721 -j ACCEPTJump to behavior
Source: /tmp/0tGEmgFUHk.elf (PID: 5451)Shell command executed: sh -c "iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"Jump to behavior
Source: /tmp/0tGEmgFUHk.elf (PID: 5461)Shell command executed: sh -c "/bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"Jump to behavior
Source: /tmp/0tGEmgFUHk.elf (PID: 5464)Shell command executed: sh -c "/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"Jump to behavior
Source: /tmp/0tGEmgFUHk.elf (PID: 5467)Shell command executed: sh -c "/usr/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"Jump to behavior
Source: /tmp/0tGEmgFUHk.elf (PID: 5470)Shell command executed: sh -c "busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"Jump to behavior
Source: /bin/sh (PID: 5453)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --dport 26721 -j ACCEPTJump to behavior
Source: /tmp/0tGEmgFUHk.elf (PID: 5441)Queries kernel information via 'uname': Jump to behavior
Source: /bin/busybox (PID: 5463)Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/busybox (PID: 5472)Queries kernel information via 'uname': Jump to behavior
Source: 0tGEmgFUHk.elf, 5441.1.0000557306dc8000.0000557306e71000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips
Source: 0tGEmgFUHk.elf, 5441.1.0000557306dc8000.0000557306e71000.rw-.sdmpBinary or memory string: sU!/etc/qemu-binfmt/mips
Source: 0tGEmgFUHk.elf, 5441.1.00007fff9bef3000.00007fff9bf14000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips
Source: 0tGEmgFUHk.elf, 5441.1.00007fff9bef3000.00007fff9bf14000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mips/tmp/0tGEmgFUHk.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/0tGEmgFUHk.elf
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
System Network Configuration Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1427856 Sample: 0tGEmgFUHk.elf Startdate: 18/04/2024 Architecture: LINUX Score: 56 39 212.118.43.167, 2222, 35342 CITYLAN-ASRU Russian Federation 2->39 41 dead-cheap-doma.in 185.196.11.64, 35342, 54708 SIMPLECARRIERCH Switzerland 2->41 43 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 Connects to many ports of the same IP (likely port scanning) 2->47 10 0tGEmgFUHk.elf 2->10         started        signatures3 process4 process5 12 0tGEmgFUHk.elf 10->12         started        process6 14 0tGEmgFUHk.elf 12->14         started        16 0tGEmgFUHk.elf 12->16         started        process7 18 0tGEmgFUHk.elf sh 14->18         started        20 0tGEmgFUHk.elf sh 14->20         started        22 0tGEmgFUHk.elf sh 14->22         started        26 2 other processes 14->26 24 0tGEmgFUHk.elf 16->24         started        process8 28 sh iptables 18->28         started        31 sh busybox 20->31         started        33 sh busybox 22->33         started        35 sh 26->35         started        37 sh 26->37         started        signatures9 49 Executes the "iptables" command to insert, remove and/or manipulate rules 28->49
SourceDetectionScannerLabelLink
0tGEmgFUHk.elf21%VirustotalBrowse
0tGEmgFUHk.elf13%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
dead-cheap-doma.in
185.196.11.64
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    185.125.190.26
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    212.118.43.167
    unknownRussian Federation
    25308CITYLAN-ASRUtrue
    185.196.11.64
    dead-cheap-doma.inSwitzerland
    42624SIMPLECARRIERCHfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    185.125.190.26FMBz4fK3Fo.elfGet hashmaliciousGafgyt, MiraiBrowse
      QjPaP60iGb.elfGet hashmaliciousUnknownBrowse
        jPa5GP7YWR.elfGet hashmaliciousMiraiBrowse
          arm.elfGet hashmaliciousUnknownBrowse
            AkV7DALWTe.elfGet hashmaliciousMiraiBrowse
              n3l6rOHrCy.elfGet hashmaliciousMiraiBrowse
                f0OnF0zQl1.elfGet hashmaliciousMiraiBrowse
                  MP364bXXBM.elfGet hashmaliciousMiraiBrowse
                    MCKV8ZxDFs.elfGet hashmaliciousMiraiBrowse
                      5kPAYNJulv.elfGet hashmaliciousMirai, GafgytBrowse
                        212.118.43.167lhZOo8vhuI.elfGet hashmaliciousUnknownBrowse
                          uV4x1JLrrF.elfGet hashmaliciousUnknownBrowse
                            DQVl3rjqoZ.elfGet hashmaliciousGafgytBrowse
                              9jjtFFX0Tb.elfGet hashmaliciousUnknownBrowse
                                ceKWlceqnf.elfGet hashmaliciousUnknownBrowse
                                  ULDAb4NYKK.elfGet hashmaliciousUnknownBrowse
                                    PAqN0mrUbb.elfGet hashmaliciousUnknownBrowse
                                      TsjmK7qSlf.elfGet hashmaliciousUnknownBrowse
                                        ZXYyjKa6bs.elfGet hashmaliciousUnknownBrowse
                                          ZE3opQX8Ch.elfGet hashmaliciousUnknownBrowse
                                            185.196.11.64lhZOo8vhuI.elfGet hashmaliciousUnknownBrowse
                                              uV4x1JLrrF.elfGet hashmaliciousUnknownBrowse
                                                DQVl3rjqoZ.elfGet hashmaliciousGafgytBrowse
                                                  9jjtFFX0Tb.elfGet hashmaliciousUnknownBrowse
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    dead-cheap-doma.inlhZOo8vhuI.elfGet hashmaliciousUnknownBrowse
                                                    • 185.196.11.64
                                                    uV4x1JLrrF.elfGet hashmaliciousUnknownBrowse
                                                    • 185.196.11.64
                                                    DQVl3rjqoZ.elfGet hashmaliciousGafgytBrowse
                                                    • 185.196.11.64
                                                    9jjtFFX0Tb.elfGet hashmaliciousUnknownBrowse
                                                    • 185.196.11.64
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    SIMPLECARRIERCHlhZOo8vhuI.elfGet hashmaliciousUnknownBrowse
                                                    • 185.196.11.64
                                                    uV4x1JLrrF.elfGet hashmaliciousUnknownBrowse
                                                    • 185.196.11.64
                                                    DQVl3rjqoZ.elfGet hashmaliciousGafgytBrowse
                                                    • 185.196.11.64
                                                    9jjtFFX0Tb.elfGet hashmaliciousUnknownBrowse
                                                    • 185.196.11.64
                                                    dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 185.196.11.12
                                                    WC8X6qXwRB.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                    • 185.196.10.233
                                                    8p1dq7mGv1.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                    • 185.196.10.233
                                                    Dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 185.196.11.12
                                                    C6CM5vjm9f.elfGet hashmaliciousUnknownBrowse
                                                    • 185.196.9.5
                                                    tGUvOmucT1.elfGet hashmaliciousMiraiBrowse
                                                    • 185.196.9.5
                                                    CANONICAL-ASGBSecuriteInfo.com.Linux.Mirai.2599.31851.29053.elfGet hashmaliciousUnknownBrowse
                                                    • 91.189.91.42
                                                    DQVl3rjqoZ.elfGet hashmaliciousGafgytBrowse
                                                    • 91.189.91.42
                                                    Cy5Kfc2Jrx.elfGet hashmaliciousUnknownBrowse
                                                    • 91.189.91.42
                                                    FMBz4fK3Fo.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                    • 185.125.190.26
                                                    Mm1cMfogm5.elfGet hashmaliciousGafgytBrowse
                                                    • 91.189.91.42
                                                    rKaMGIkd6v.elfGet hashmaliciousMiraiBrowse
                                                    • 91.189.91.42
                                                    80SO06dMRV.elfGet hashmaliciousUnknownBrowse
                                                    • 91.189.91.42
                                                    QjPaP60iGb.elfGet hashmaliciousUnknownBrowse
                                                    • 185.125.190.26
                                                    2pcIneMurs.elfGet hashmaliciousUnknownBrowse
                                                    • 91.189.91.42
                                                    jPa5GP7YWR.elfGet hashmaliciousMiraiBrowse
                                                    • 185.125.190.26
                                                    CITYLAN-ASRUlhZOo8vhuI.elfGet hashmaliciousUnknownBrowse
                                                    • 212.118.43.167
                                                    uV4x1JLrrF.elfGet hashmaliciousUnknownBrowse
                                                    • 212.118.43.167
                                                    DQVl3rjqoZ.elfGet hashmaliciousGafgytBrowse
                                                    • 212.118.43.167
                                                    9jjtFFX0Tb.elfGet hashmaliciousUnknownBrowse
                                                    • 212.118.43.167
                                                    ceKWlceqnf.elfGet hashmaliciousUnknownBrowse
                                                    • 212.118.43.167
                                                    h2LK6AsZ1I.exeGet hashmaliciousRisePro StealerBrowse
                                                    • 88.210.9.117
                                                    SecuriteInfo.com.Win32.SpywareX-gen.4316.21522.exeGet hashmaliciousDanaBotBrowse
                                                    • 88.210.13.105
                                                    SecuriteInfo.com.Win32.SpywareX-gen.4316.21522.exeGet hashmaliciousDanaBotBrowse
                                                    • 88.210.13.105
                                                    bladfin.exeGet hashmaliciousRedLine, SectopRATBrowse
                                                    • 212.118.39.73
                                                    uetfu6ZLWZ.exeGet hashmaliciousGlupteba, RedLine, SmokeLoader, StealcBrowse
                                                    • 212.118.39.73
                                                    No context
                                                    No context
                                                    No created / dropped files found
                                                    File type:ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
                                                    Entropy (8bit):4.8419646172425885
                                                    TrID:
                                                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                    File name:0tGEmgFUHk.elf
                                                    File size:228'808 bytes
                                                    MD5:5b91d0145d928f5b1d88fefa32453883
                                                    SHA1:445d0469ccce36d09ca2861c673b83310198e101
                                                    SHA256:d8bbda334ced438055d2d337ba368af1a0ee53ccececb6c6485408e60326afcd
                                                    SHA512:f4f9597b3e6035986d1bef09b461c3adeb2cbb8ee891af505d81d0299a5db806eb2e7f7e48b0a68c9e949f50f42e15e1cb468e900fda5b09462caf96c3d4852b
                                                    SSDEEP:6144:44WhL54943dsW+8ofdLOgrUiZi2PEL8aQTFb1leWKk:4VL6tPELLk
                                                    TLSH:BB24852BAE50DF59F65C87310AF76D38835A23A626E5E64AC19FC2006E3131D5C0FEB5
                                                    File Content Preview:.ELF.....................@.`...4..{......4. ...(.............@...@....lP..lP..............p<.Dp<.Dp<.......@........dt.Q............................'...................<...'......!........'9... ......................<...'..x...!... ....'9P.. .............

                                                    ELF header

                                                    Class:ELF32
                                                    Data:2's complement, big endian
                                                    Version:1 (current)
                                                    Machine:MIPS R3000
                                                    Version Number:0x1
                                                    Type:EXEC (Executable file)
                                                    OS/ABI:UNIX - System V
                                                    ABI Version:0
                                                    Entry Point Address:0x400260
                                                    Flags:0x1007
                                                    ELF Header Size:52
                                                    Program Header Offset:52
                                                    Program Header Size:32
                                                    Number of Program Headers:3
                                                    Section Header Offset:228248
                                                    Section Header Size:40
                                                    Number of Section Headers:14
                                                    Header String Table Index:13
                                                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                    NULL0x00x00x00x00x0000
                                                    .initPROGBITS0x4000940x940x7c0x00x6AX004
                                                    .textPROGBITS0x4001100x1100x34ff00x00x6AX0016
                                                    .finiPROGBITS0x4351000x351000x4c0x00x6AX004
                                                    .rodataPROGBITS0x4351500x351500x1b000x00x2A0016
                                                    .ctorsPROGBITS0x44703c0x3703c0x80x00x3WA004
                                                    .dtorsPROGBITS0x4470440x370440x80x00x3WA004
                                                    .data.rel.roPROGBITS0x4470500x370500x4040x00x3WA004
                                                    .dataPROGBITS0x4474580x374580xfc0x00x3WA008
                                                    .gotPROGBITS0x4475600x375600x5d40x40x10000003WAp0016
                                                    .sbssNOBITS0x447b340x37b340x200x00x10000003WAp004
                                                    .bssNOBITS0x447b600x37b340xc1c0x00x3WA0016
                                                    .mdebug.abi32PROGBITS0x2880x37b340x00x00x0001
                                                    .shstrtabSTRTAB0x00x37b340x640x00x0001
                                                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                    LOAD0x00x4000000x4000000x36c500x36c504.84250x5R E0x10000.init .text .fini .rodata
                                                    LOAD0x3703c0x44703c0x44703c0xaf80x17404.75970x6RW 0x10000.ctors .dtors .data.rel.ro .data .got .sbss .bss
                                                    GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Apr 18, 2024 09:39:00.964175940 CEST4636635342192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:01.966756105 CEST4636635342192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:02.148236036 CEST407222222192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:03.150749922 CEST407222222192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:03.982758045 CEST4636635342192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:05.166739941 CEST407222222192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:05.454767942 CEST48202443192.168.2.13185.125.190.26
                                                    Apr 18, 2024 09:39:08.014722109 CEST4636635342192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:09.294745922 CEST407222222192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:16.980166912 CEST4637035342192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:17.486716032 CEST407222222192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:17.998781919 CEST4637035342192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:20.018753052 CEST4637035342192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:24.142837048 CEST4637035342192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:33.199157000 CEST5470835342192.168.2.13185.196.11.64
                                                    Apr 18, 2024 09:39:33.408513069 CEST3534254708185.196.11.64192.168.2.13
                                                    Apr 18, 2024 09:39:33.408983946 CEST5470835342192.168.2.13185.196.11.64
                                                    Apr 18, 2024 09:39:33.410638094 CEST5470835342192.168.2.13185.196.11.64
                                                    Apr 18, 2024 09:39:33.618666887 CEST407222222192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:39:33.621157885 CEST3534254708185.196.11.64192.168.2.13
                                                    Apr 18, 2024 09:39:33.621391058 CEST5470835342192.168.2.13185.196.11.64
                                                    Apr 18, 2024 09:39:33.830204010 CEST3534254708185.196.11.64192.168.2.13
                                                    Apr 18, 2024 09:39:36.178978920 CEST48202443192.168.2.13185.125.190.26
                                                    Apr 18, 2024 09:39:48.832907915 CEST3534254708185.196.11.64192.168.2.13
                                                    Apr 18, 2024 09:39:48.833523989 CEST5470835342192.168.2.13185.196.11.64
                                                    Apr 18, 2024 09:40:04.044321060 CEST3534254708185.196.11.64192.168.2.13
                                                    Apr 18, 2024 09:40:04.045073986 CEST5470835342192.168.2.13185.196.11.64
                                                    Apr 18, 2024 09:40:06.894599915 CEST407222222192.168.2.13212.118.43.167
                                                    Apr 18, 2024 09:40:19.264317036 CEST3534254708185.196.11.64192.168.2.13
                                                    Apr 18, 2024 09:40:19.264952898 CEST5470835342192.168.2.13185.196.11.64
                                                    Apr 18, 2024 09:40:34.476227045 CEST3534254708185.196.11.64192.168.2.13
                                                    Apr 18, 2024 09:40:34.476393938 CEST5470835342192.168.2.13185.196.11.64
                                                    Apr 18, 2024 09:40:48.475121021 CEST5470835342192.168.2.13185.196.11.64
                                                    Apr 18, 2024 09:40:48.684853077 CEST3534254708185.196.11.64192.168.2.13
                                                    Apr 18, 2024 09:40:48.684883118 CEST3534254708185.196.11.64192.168.2.13
                                                    Apr 18, 2024 09:40:48.684988976 CEST5470835342192.168.2.13185.196.11.64
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Apr 18, 2024 09:39:32.996887922 CEST5802953192.168.2.13195.10.195.195
                                                    Apr 18, 2024 09:39:33.196301937 CEST5358029195.10.195.195192.168.2.13
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Apr 18, 2024 09:39:32.996887922 CEST192.168.2.13195.10.195.1950xca0bStandard query (0)dead-cheap-doma.inA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Apr 18, 2024 09:39:33.196301937 CEST195.10.195.195192.168.2.130xca0bNo error (0)dead-cheap-doma.in185.196.11.64A (IP address)IN (0x0001)false

                                                    System Behavior

                                                    Start time (UTC):07:38:55
                                                    Start date (UTC):18/04/2024
                                                    Path:/tmp/0tGEmgFUHk.elf
                                                    Arguments:/tmp/0tGEmgFUHk.elf
                                                    File size:5777432 bytes
                                                    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                                                    Start time (UTC):07:38:55
                                                    Start date (UTC):18/04/2024
                                                    Path:/tmp/0tGEmgFUHk.elf
                                                    Arguments:-
                                                    File size:5777432 bytes
                                                    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                                                    Start time (UTC):07:38:55
                                                    Start date (UTC):18/04/2024
                                                    Path:/tmp/0tGEmgFUHk.elf
                                                    Arguments:-
                                                    File size:5777432 bytes
                                                    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                                                    Start time (UTC):07:38:55
                                                    Start date (UTC):18/04/2024
                                                    Path:/tmp/0tGEmgFUHk.elf
                                                    Arguments:-
                                                    File size:5777432 bytes
                                                    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                                                    Start time (UTC):07:38:59
                                                    Start date (UTC):18/04/2024
                                                    Path:/tmp/0tGEmgFUHk.elf
                                                    Arguments:-
                                                    File size:5777432 bytes
                                                    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                                                    Start time (UTC):07:38:59
                                                    Start date (UTC):18/04/2024
                                                    Path:/tmp/0tGEmgFUHk.elf
                                                    Arguments:-
                                                    File size:5777432 bytes
                                                    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                                                    Start time (UTC):07:38:59
                                                    Start date (UTC):18/04/2024
                                                    Path:/bin/sh
                                                    Arguments:sh -c "iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
                                                    File size:129816 bytes
                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                    Start time (UTC):07:38:59
                                                    Start date (UTC):18/04/2024
                                                    Path:/bin/sh
                                                    Arguments:-
                                                    File size:129816 bytes
                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                    Start time (UTC):07:38:59
                                                    Start date (UTC):18/04/2024
                                                    Path:/usr/sbin/iptables
                                                    Arguments:iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
                                                    File size:99296 bytes
                                                    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

                                                    Start time (UTC):07:39:00
                                                    Start date (UTC):18/04/2024
                                                    Path:/tmp/0tGEmgFUHk.elf
                                                    Arguments:-
                                                    File size:5777432 bytes
                                                    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                                                    Start time (UTC):07:39:00
                                                    Start date (UTC):18/04/2024
                                                    Path:/bin/sh
                                                    Arguments:sh -c "/bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
                                                    File size:129816 bytes
                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                    Start time (UTC):07:39:00
                                                    Start date (UTC):18/04/2024
                                                    Path:/bin/sh
                                                    Arguments:-
                                                    File size:129816 bytes
                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                    Start time (UTC):07:39:00
                                                    Start date (UTC):18/04/2024
                                                    Path:/bin/busybox
                                                    Arguments:/bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
                                                    File size:2172376 bytes
                                                    MD5 hash:70584dffe9cb0309eb22ba78aa54bcdc

                                                    Start time (UTC):07:39:00
                                                    Start date (UTC):18/04/2024
                                                    Path:/tmp/0tGEmgFUHk.elf
                                                    Arguments:-
                                                    File size:5777432 bytes
                                                    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                                                    Start time (UTC):07:39:00
                                                    Start date (UTC):18/04/2024
                                                    Path:/bin/sh
                                                    Arguments:sh -c "/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
                                                    File size:129816 bytes
                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                    Start time (UTC):07:39:00
                                                    Start date (UTC):18/04/2024
                                                    Path:/bin/sh
                                                    Arguments:-
                                                    File size:129816 bytes
                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                    Start time (UTC):07:39:00
                                                    Start date (UTC):18/04/2024
                                                    Path:/tmp/0tGEmgFUHk.elf
                                                    Arguments:-
                                                    File size:5777432 bytes
                                                    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                                                    Start time (UTC):07:39:00
                                                    Start date (UTC):18/04/2024
                                                    Path:/bin/sh
                                                    Arguments:sh -c "/usr/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
                                                    File size:129816 bytes
                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                    Start time (UTC):07:39:00
                                                    Start date (UTC):18/04/2024
                                                    Path:/bin/sh
                                                    Arguments:-
                                                    File size:129816 bytes
                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                    Start time (UTC):07:39:00
                                                    Start date (UTC):18/04/2024
                                                    Path:/tmp/0tGEmgFUHk.elf
                                                    Arguments:-
                                                    File size:5777432 bytes
                                                    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                                                    Start time (UTC):07:39:00
                                                    Start date (UTC):18/04/2024
                                                    Path:/bin/sh
                                                    Arguments:sh -c "busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT"
                                                    File size:129816 bytes
                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                    Start time (UTC):07:39:01
                                                    Start date (UTC):18/04/2024
                                                    Path:/bin/sh
                                                    Arguments:-
                                                    File size:129816 bytes
                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                    Start time (UTC):07:39:01
                                                    Start date (UTC):18/04/2024
                                                    Path:/usr/bin/busybox
                                                    Arguments:busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
                                                    File size:2172376 bytes
                                                    MD5 hash:70584dffe9cb0309eb22ba78aa54bcdc