Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
x86.elf

Overview

General Information

Sample name:x86.elf
Analysis ID:1538770
MD5:a51270cb597ae42f4cb7bea59f2f6434
SHA1:2cf91d41bd27575b5c119f7626a991f3e098f3e0
SHA256:24cdebe89f0cd9e4f7ee3ce8cb36106ac09a45d9d7fa591e330940df329fcf06
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1538770
Start date and time:2024-10-21 18:46:09 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 25s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:x86.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@17/0
  • VT rate limit hit for: x86.elf
Command:/tmp/x86.elf
PID:5452
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • x86.elf (PID: 5452, Parent: 5377, MD5: a51270cb597ae42f4cb7bea59f2f6434) Arguments: /tmp/x86.elf
    • x86.elf New Fork (PID: 5453, Parent: 5452)
      • x86.elf New Fork (PID: 5454, Parent: 5453)
      • x86.elf New Fork (PID: 5455, Parent: 5453)
        • x86.elf New Fork (PID: 5456, Parent: 5455)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
x86.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    x86.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      x86.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x9df8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9e0c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9e20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9e34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9e48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9e5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9e70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9e84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9e98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9eac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9ec0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9ed4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9ee8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9efc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9f10:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9f24:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9f38:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9f4c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9f60:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9f74:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x9f88:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      x86.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
      • 0x3800:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
      x86.elfLinux_Trojan_Mirai_88de437funknownunknown
      • 0x5142:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
      Click to see the 3 entries
      SourceRuleDescriptionAuthorStrings
      5452.1.0000000008048000.0000000008054000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5452.1.0000000008048000.0000000008054000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5452.1.0000000008048000.0000000008054000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x9df8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9e0c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9e20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9e34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9e48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9e5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9e70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9e84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9e98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9eac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9ec0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9ed4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9ee8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9efc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9f10:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9f24:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9f38:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9f4c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9f60:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9f74:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x9f88:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5452.1.0000000008048000.0000000008054000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
          • 0x3800:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
          5452.1.0000000008048000.0000000008054000.r-x.sdmpLinux_Trojan_Mirai_88de437funknownunknown
          • 0x5142:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
          Click to see the 5 entries
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-10-21T18:46:59.331447+020020304911Malware Command and Control Activity Detected192.168.2.1344702107.189.4.20158431TCP
          2024-10-21T18:47:05.762562+020020304911Malware Command and Control Activity Detected192.168.2.1344704107.189.4.20158431TCP
          2024-10-21T18:47:15.195078+020020304911Malware Command and Control Activity Detected192.168.2.1344706107.189.4.20158431TCP
          2024-10-21T18:47:24.774981+020020304911Malware Command and Control Activity Detected192.168.2.1344708107.189.4.20158431TCP
          2024-10-21T18:47:34.208270+020020304911Malware Command and Control Activity Detected192.168.2.1344710107.189.4.20158431TCP
          2024-10-21T18:47:43.639835+020020304911Malware Command and Control Activity Detected192.168.2.1344712107.189.4.20158431TCP
          2024-10-21T18:47:49.075916+020020304911Malware Command and Control Activity Detected192.168.2.1344714107.189.4.20158431TCP
          2024-10-21T18:47:56.504635+020020304911Malware Command and Control Activity Detected192.168.2.1344716107.189.4.20158431TCP
          2024-10-21T18:48:01.935587+020020304911Malware Command and Control Activity Detected192.168.2.1344718107.189.4.20158431TCP
          2024-10-21T18:48:07.370624+020020304911Malware Command and Control Activity Detected192.168.2.1344720107.189.4.20158431TCP
          2024-10-21T18:48:15.805745+020020304911Malware Command and Control Activity Detected192.168.2.1344722107.189.4.20158431TCP
          2024-10-21T18:48:24.236247+020020304911Malware Command and Control Activity Detected192.168.2.1344724107.189.4.20158431TCP
          2024-10-21T18:48:25.669952+020020304911Malware Command and Control Activity Detected192.168.2.1344726107.189.4.20158431TCP
          2024-10-21T18:48:29.104628+020020304911Malware Command and Control Activity Detected192.168.2.1344728107.189.4.20158431TCP
          2024-10-21T18:48:39.533894+020020304911Malware Command and Control Activity Detected192.168.2.1344730107.189.4.20158431TCP
          2024-10-21T18:48:47.115144+020020304911Malware Command and Control Activity Detected192.168.2.1344732107.189.4.20158431TCP
          2024-10-21T18:48:55.547188+020020304911Malware Command and Control Activity Detected192.168.2.1344734107.189.4.20158431TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: x86.elfAvira: detected
          Source: x86.elfReversingLabs: Detection: 71%
          Source: x86.elfJoe Sandbox ML: detected

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44716 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44730 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44702 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44704 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44712 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44706 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44720 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44714 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44708 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44732 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44734 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44726 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44718 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44722 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44710 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44724 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44728 -> 107.189.4.201:58431
          Source: global trafficTCP traffic: 107.189.4.201 ports 58431,1,3,4,5,8
          Source: global trafficTCP traffic: 192.168.2.13:44702 -> 107.189.4.201:58431
          Source: global trafficDNS traffic detected: DNS query: update.byeux.com

          System Summary

          barindex
          Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: Process Memory Space: x86.elf PID: 5452, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: Process Memory Space: x86.elf PID: 5452, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@17/0
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/230/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/110/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/231/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/111/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/232/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/112/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/233/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/113/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/234/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/114/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/235/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/115/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/236/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/116/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/237/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/117/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/238/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/118/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/239/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/119/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/914/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/10/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/917/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/11/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/12/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/13/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/14/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/15/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/16/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/17/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/5399/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/18/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/19/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/240/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/3095/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/120/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/241/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/121/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/242/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/1/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/122/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/243/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/2/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/123/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/244/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/3/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/124/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/245/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/1588/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/125/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/4/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/246/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/126/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/5/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/247/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/127/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/6/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/248/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/128/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/7/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/249/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/129/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/8/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/800/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/9/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/1906/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/802/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/803/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/3644/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/20/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/21/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/22/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/23/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/24/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/25/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/26/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/27/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/28/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/29/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/3420/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/1482/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/490/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/1480/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/250/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/371/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/130/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/251/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/131/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/252/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/132/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/253/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/254/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/1238/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/134/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/255/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/256/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/257/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/378/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/3413/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/258/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/259/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/1475/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/936/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/30/cmdlineJump to behavior
          Source: /tmp/x86.elf (PID: 5454)File opened: /proc/816/cmdlineJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: /tmp/x86.elf (PID: 5452)File: /tmp/x86.elfJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: x86.elf, type: SAMPLE
          Source: Yara matchFile source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: x86.elf PID: 5452, type: MEMORYSTR
          Source: Yara matchFile source: x86.elf, type: SAMPLE
          Source: Yara matchFile source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: Yara matchFile source: x86.elf, type: SAMPLE
          Source: Yara matchFile source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: x86.elf PID: 5452, type: MEMORYSTR
          Source: Yara matchFile source: x86.elf, type: SAMPLE
          Source: Yara matchFile source: 5452.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          File Deletion
          1
          OS Credential Dumping
          System Service DiscoveryRemote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538770 Sample: x86.elf Startdate: 21/10/2024 Architecture: LINUX Score: 100 20 update.byeux.com 107.189.4.201, 44702, 44704, 44706 PONYNETUS United States 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 6 other signatures 2->28 9 x86.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 x86.elf 9->12         started        process6 process7 14 x86.elf 12->14         started        16 x86.elf 12->16         started        process8 18 x86.elf 14->18         started       
          SourceDetectionScannerLabelLink
          x86.elf71%ReversingLabsLinux.Backdoor.Mirai
          x86.elf100%AviraEXP/ELF.Mirai.Z.A
          x86.elf100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          update.byeux.com
          107.189.4.201
          truetrue
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            107.189.4.201
            update.byeux.comUnited States
            53667PONYNETUStrue
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            107.189.4.201JVL2bXW1ch.elfGet hashmaliciousMirai, MoobotBrowse
              arm7.elfGet hashmaliciousMirai, MoobotBrowse
                mips.elfGet hashmaliciousMirai, MoobotBrowse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  update.byeux.comJVL2bXW1ch.elfGet hashmaliciousMirai, MoobotBrowse
                  • 107.189.4.201
                  arm7.elfGet hashmaliciousMirai, MoobotBrowse
                  • 107.189.4.201
                  mips.elfGet hashmaliciousMirai, MoobotBrowse
                  • 107.189.4.201
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  PONYNETUSdss.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 209.141.42.202
                  co.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 209.141.42.202
                  586.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 209.141.42.202
                  __min__c.elfGet hashmaliciousUnknownBrowse
                  • 205.185.117.101
                  co.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 205.185.122.67
                  x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 205.185.122.67
                  https://shoutout.wix.com/so/abP9tNDlV/c?w=3l7661HU1QXfrlxhsiEng39pDUk08HpBaevjMtJB-KM.eyJ1IjoiaHR0cHM6Ly92ZXJpZnlmaWxlcy5naXRodWIuaW8vbWFuLyIsInIiOiI1N2VlOTAzYy01NWI5LTQzMWEtMzQ0Yi1lM2Y2MTY0YTdiNDIiLCJtIjoibWFpbCIsImMiOiIzNjA5ODM5OC0zMzdiLTQyZjUtYTE5MC1iMmU1MTdiZmVkNmMifQGet hashmaliciousHTMLPhisherBrowse
                  • 162.244.94.12
                  QgmKRZO1Yp.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 205.185.122.67
                  zOSCVTuLxE.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 205.185.122.67
                  8t8VJiEGar.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 205.185.122.67
                  No context
                  No context
                  No created / dropped files found
                  File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                  Entropy (8bit):6.515353152602667
                  TrID:
                  • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                  • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                  File name:x86.elf
                  File size:47'504 bytes
                  MD5:a51270cb597ae42f4cb7bea59f2f6434
                  SHA1:2cf91d41bd27575b5c119f7626a991f3e098f3e0
                  SHA256:24cdebe89f0cd9e4f7ee3ce8cb36106ac09a45d9d7fa591e330940df329fcf06
                  SHA512:98970519b61ed83de6ec776ea0d94d525d3b8007718f34e6e5ff023a78f16a21dde3fcf50f9530e2184e80d86b019624f92d708a39fb25a67ea73721b4724853
                  SSDEEP:768:qmQx/v4HJrZWwRMQ8Llgjmh/l0QLY3psPkcb6cIYjF43ba8cmSTsCYzI6u:BQx/v4HJrZWgMQ8LllD0Q05Eb6cVj+3d
                  TLSH:24235AC4F143D5F5E85709782177BB375A32F1E52229E653C3A4DA32BC92602B926ECC
                  File Content Preview:.ELF....................d...4...........4. ...(.....................<...<...............@...@E..@E.......(..........Q.td............................U..S............h....C...[]...$.............U......=.G...t..5....dE.....dE......u........t....h<5..........

                  ELF header

                  Class:ELF32
                  Data:2's complement, little endian
                  Version:1 (current)
                  Machine:Intel 80386
                  Version Number:0x1
                  Type:EXEC (Executable file)
                  OS/ABI:UNIX - System V
                  ABI Version:0
                  Entry Point Address:0x8048164
                  Flags:0x0
                  ELF Header Size:52
                  Program Header Offset:52
                  Program Header Size:32
                  Number of Program Headers:3
                  Section Header Offset:47104
                  Section Header Size:40
                  Number of Section Headers:10
                  Header String Table Index:9
                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                  NULL0x00x00x00x00x0000
                  .initPROGBITS0x80480940x940x1c0x00x6AX001
                  .textPROGBITS0x80480b00xb00x98660x00x6AX0016
                  .finiPROGBITS0x80519160x99160x170x00x6AX001
                  .rodataPROGBITS0x80519400x99400x1bfc0x00x2A0032
                  .ctorsPROGBITS0x80545400xb5400x80x00x3WA004
                  .dtorsPROGBITS0x80545480xb5480x80x00x3WA004
                  .dataPROGBITS0x80545600xb5600x2600x00x3WA0032
                  .bssNOBITS0x80547c00xb7c00x25800x00x3WA0032
                  .shstrtabSTRTAB0x00xb7c00x3e0x00x0001
                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                  LOAD0x00x80480000x80480000xb53c0xb53c6.55940x5R E0x1000.init .text .fini .rodata
                  LOAD0xb5400x80545400x80545400x2800x28003.39110x6RW 0x1000.ctors .dtors .data .bss
                  GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-10-21T18:46:59.331447+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344702107.189.4.20158431TCP
                  2024-10-21T18:47:05.762562+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344704107.189.4.20158431TCP
                  2024-10-21T18:47:15.195078+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344706107.189.4.20158431TCP
                  2024-10-21T18:47:24.774981+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344708107.189.4.20158431TCP
                  2024-10-21T18:47:34.208270+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344710107.189.4.20158431TCP
                  2024-10-21T18:47:43.639835+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344712107.189.4.20158431TCP
                  2024-10-21T18:47:49.075916+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344714107.189.4.20158431TCP
                  2024-10-21T18:47:56.504635+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344716107.189.4.20158431TCP
                  2024-10-21T18:48:01.935587+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344718107.189.4.20158431TCP
                  2024-10-21T18:48:07.370624+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344720107.189.4.20158431TCP
                  2024-10-21T18:48:15.805745+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344722107.189.4.20158431TCP
                  2024-10-21T18:48:24.236247+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344724107.189.4.20158431TCP
                  2024-10-21T18:48:25.669952+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344726107.189.4.20158431TCP
                  2024-10-21T18:48:29.104628+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344728107.189.4.20158431TCP
                  2024-10-21T18:48:39.533894+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344730107.189.4.20158431TCP
                  2024-10-21T18:48:47.115144+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344732107.189.4.20158431TCP
                  2024-10-21T18:48:55.547188+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344734107.189.4.20158431TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 21, 2024 18:46:59.325376987 CEST4470258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:46:59.331350088 CEST5843144702107.189.4.201192.168.2.13
                  Oct 21, 2024 18:46:59.331408978 CEST4470258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:46:59.331446886 CEST4470258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:46:59.336898088 CEST5843144702107.189.4.201192.168.2.13
                  Oct 21, 2024 18:46:59.747279882 CEST5843144702107.189.4.201192.168.2.13
                  Oct 21, 2024 18:46:59.747390032 CEST4470258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:46:59.754566908 CEST5843144702107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:05.756979942 CEST4470458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:05.762487888 CEST5843144704107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:05.762543917 CEST4470458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:05.762562037 CEST4470458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:05.767914057 CEST5843144704107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:06.179568052 CEST5843144704107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:06.179754972 CEST4470458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:06.185906887 CEST5843144704107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:15.189443111 CEST4470658431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:15.194981098 CEST5843144706107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:15.195060015 CEST4470658431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:15.195077896 CEST4470658431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:15.201592922 CEST5843144706107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:15.609827995 CEST5843144706107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:15.609946012 CEST4470658431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:15.616679907 CEST5843144706107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:24.769478083 CEST4470858431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:24.774879932 CEST5843144708107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:24.774941921 CEST4470858431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:24.774981022 CEST4470858431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:24.780544043 CEST5843144708107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:25.192048073 CEST5843144708107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:25.192256927 CEST4470858431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:25.198793888 CEST5843144708107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:34.202755928 CEST4471058431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:34.208200932 CEST5843144710107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:34.208270073 CEST4471058431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:34.208270073 CEST4471058431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:34.213700056 CEST5843144710107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:34.623647928 CEST5843144710107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:34.623867989 CEST4471058431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:34.629255056 CEST5843144710107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:43.634052992 CEST4471258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:43.639725924 CEST5843144712107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:43.639811039 CEST4471258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:43.639834881 CEST4471258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:43.647183895 CEST5843144712107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:44.058964014 CEST5843144712107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:44.059691906 CEST4471258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:44.065491915 CEST5843144712107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:49.070456982 CEST4471458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:49.075788021 CEST5843144714107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:49.075844049 CEST4471458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:49.075916052 CEST4471458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:49.081321955 CEST5843144714107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:49.489538908 CEST5843144714107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:49.489710093 CEST4471458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:49.495028973 CEST5843144714107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:56.499172926 CEST4471658431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:56.504539967 CEST5843144716107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:56.504621983 CEST4471658431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:56.504635096 CEST4471658431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:56.510024071 CEST5843144716107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:56.920581102 CEST5843144716107.189.4.201192.168.2.13
                  Oct 21, 2024 18:47:56.920836926 CEST4471658431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:47:56.926211119 CEST5843144716107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:01.930176020 CEST4471858431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:01.935504913 CEST5843144718107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:01.935570002 CEST4471858431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:01.935586929 CEST4471858431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:01.940992117 CEST5843144718107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:02.350924969 CEST5843144718107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:02.351180077 CEST4471858431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:02.356535912 CEST5843144718107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:07.364948988 CEST4472058431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:07.370517969 CEST5843144720107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:07.370624065 CEST4472058431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:07.370624065 CEST4472058431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:07.376132965 CEST5843144720107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:07.790007114 CEST5843144720107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:07.790441990 CEST4472058431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:07.796375990 CEST5843144720107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:15.800183058 CEST4472258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:15.805655956 CEST5843144722107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:15.805727959 CEST4472258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:15.805744886 CEST4472258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:15.811134100 CEST5843144722107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:16.221798897 CEST5843144722107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:16.222048044 CEST4472258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:16.227523088 CEST5843144722107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:24.230771065 CEST4472458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:24.236145020 CEST5843144724107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:24.236215115 CEST4472458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:24.236247063 CEST4472458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:24.241552114 CEST5843144724107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:24.652844906 CEST5843144724107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:24.653136015 CEST4472458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:24.658684015 CEST5843144724107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:25.664448023 CEST4472658431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:25.669796944 CEST5843144726107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:25.669872999 CEST4472658431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:25.669951916 CEST4472658431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:25.675236940 CEST5843144726107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:26.088143110 CEST5843144726107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:26.088654041 CEST4472658431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:26.094249964 CEST5843144726107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:29.098598003 CEST4472858431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:29.104471922 CEST5843144728107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:29.104592085 CEST4472858431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:29.104628086 CEST4472858431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:29.110295057 CEST5843144728107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:29.518661022 CEST5843144728107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:29.518938065 CEST4472858431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:29.524527073 CEST5843144728107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:39.528249979 CEST4473058431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:39.533699036 CEST5843144730107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:39.533814907 CEST4473058431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:39.533894062 CEST4473058431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:39.539261103 CEST5843144730107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:39.948939085 CEST5843144730107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:39.949148893 CEST4473058431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:39.954555035 CEST5843144730107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:47.109235048 CEST4473258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:47.114937067 CEST5843144732107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:47.115072012 CEST4473258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:47.115144014 CEST4473258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:47.120598078 CEST5843144732107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:47.531281948 CEST5843144732107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:47.531415939 CEST4473258431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:47.536780119 CEST5843144732107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:55.541376114 CEST4473458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:55.547066927 CEST5843144734107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:55.547147036 CEST4473458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:55.547188044 CEST4473458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:55.553172112 CEST5843144734107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:55.962455034 CEST5843144734107.189.4.201192.168.2.13
                  Oct 21, 2024 18:48:55.962646961 CEST4473458431192.168.2.13107.189.4.201
                  Oct 21, 2024 18:48:55.968054056 CEST5843144734107.189.4.201192.168.2.13
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 21, 2024 18:46:59.315532923 CEST4645753192.168.2.138.8.8.8
                  Oct 21, 2024 18:46:59.325253963 CEST53464578.8.8.8192.168.2.13
                  Oct 21, 2024 18:47:05.749105930 CEST4109953192.168.2.138.8.8.8
                  Oct 21, 2024 18:47:05.756860018 CEST53410998.8.8.8192.168.2.13
                  Oct 21, 2024 18:47:15.180990934 CEST4962253192.168.2.138.8.8.8
                  Oct 21, 2024 18:47:15.189307928 CEST53496228.8.8.8192.168.2.13
                  Oct 21, 2024 18:47:24.611279011 CEST5741453192.168.2.138.8.8.8
                  Oct 21, 2024 18:47:24.769328117 CEST53574148.8.8.8192.168.2.13
                  Oct 21, 2024 18:47:34.193811893 CEST4108753192.168.2.138.8.8.8
                  Oct 21, 2024 18:47:34.202649117 CEST53410878.8.8.8192.168.2.13
                  Oct 21, 2024 18:47:43.625487089 CEST4020853192.168.2.138.8.8.8
                  Oct 21, 2024 18:47:43.633817911 CEST53402088.8.8.8192.168.2.13
                  Oct 21, 2024 18:47:49.062283039 CEST5169753192.168.2.138.8.8.8
                  Oct 21, 2024 18:47:49.070327044 CEST53516978.8.8.8192.168.2.13
                  Oct 21, 2024 18:47:56.491159916 CEST4523353192.168.2.138.8.8.8
                  Oct 21, 2024 18:47:56.499037981 CEST53452338.8.8.8192.168.2.13
                  Oct 21, 2024 18:48:01.922209978 CEST5619953192.168.2.138.8.8.8
                  Oct 21, 2024 18:48:01.930025101 CEST53561998.8.8.8192.168.2.13
                  Oct 21, 2024 18:48:07.352684975 CEST5037453192.168.2.138.8.8.8
                  Oct 21, 2024 18:48:07.364348888 CEST53503748.8.8.8192.168.2.13
                  Oct 21, 2024 18:48:15.792056084 CEST4740453192.168.2.138.8.8.8
                  Oct 21, 2024 18:48:15.799968004 CEST53474048.8.8.8192.168.2.13
                  Oct 21, 2024 18:48:24.223299026 CEST4054753192.168.2.138.8.8.8
                  Oct 21, 2024 18:48:24.230541945 CEST53405478.8.8.8192.168.2.13
                  Oct 21, 2024 18:48:25.654392958 CEST4341253192.168.2.138.8.8.8
                  Oct 21, 2024 18:48:25.664289951 CEST53434128.8.8.8192.168.2.13
                  Oct 21, 2024 18:48:29.090467930 CEST4358353192.168.2.138.8.8.8
                  Oct 21, 2024 18:48:29.098448038 CEST53435838.8.8.8192.168.2.13
                  Oct 21, 2024 18:48:39.520365000 CEST3538953192.168.2.138.8.8.8
                  Oct 21, 2024 18:48:39.527983904 CEST53353898.8.8.8192.168.2.13
                  Oct 21, 2024 18:48:46.950469971 CEST4667753192.168.2.138.8.8.8
                  Oct 21, 2024 18:48:47.109000921 CEST53466778.8.8.8192.168.2.13
                  Oct 21, 2024 18:48:55.532656908 CEST5777453192.168.2.138.8.8.8
                  Oct 21, 2024 18:48:55.541291952 CEST53577748.8.8.8192.168.2.13
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Oct 21, 2024 18:46:59.315532923 CEST192.168.2.138.8.8.80x4483Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:05.749105930 CEST192.168.2.138.8.8.80x1189Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:15.180990934 CEST192.168.2.138.8.8.80x7ac0Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:24.611279011 CEST192.168.2.138.8.8.80x397bStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:34.193811893 CEST192.168.2.138.8.8.80xd094Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:43.625487089 CEST192.168.2.138.8.8.80x5c68Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:49.062283039 CEST192.168.2.138.8.8.80xfc1aStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:56.491159916 CEST192.168.2.138.8.8.80xbf2bStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:01.922209978 CEST192.168.2.138.8.8.80xc32Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:07.352684975 CEST192.168.2.138.8.8.80x1bd1Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:15.792056084 CEST192.168.2.138.8.8.80x1292Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:24.223299026 CEST192.168.2.138.8.8.80x38a4Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:25.654392958 CEST192.168.2.138.8.8.80x90c5Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:29.090467930 CEST192.168.2.138.8.8.80x96baStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:39.520365000 CEST192.168.2.138.8.8.80x1628Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:46.950469971 CEST192.168.2.138.8.8.80x158eStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:55.532656908 CEST192.168.2.138.8.8.80xa0f3Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 21, 2024 18:46:59.325253963 CEST8.8.8.8192.168.2.130x4483No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:05.756860018 CEST8.8.8.8192.168.2.130x1189No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:15.189307928 CEST8.8.8.8192.168.2.130x7ac0No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:24.769328117 CEST8.8.8.8192.168.2.130x397bNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:34.202649117 CEST8.8.8.8192.168.2.130xd094No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:43.633817911 CEST8.8.8.8192.168.2.130x5c68No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:49.070327044 CEST8.8.8.8192.168.2.130xfc1aNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:56.499037981 CEST8.8.8.8192.168.2.130xbf2bNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:01.930025101 CEST8.8.8.8192.168.2.130xc32No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:07.364348888 CEST8.8.8.8192.168.2.130x1bd1No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:15.799968004 CEST8.8.8.8192.168.2.130x1292No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:24.230541945 CEST8.8.8.8192.168.2.130x38a4No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:25.664289951 CEST8.8.8.8192.168.2.130x90c5No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:29.098448038 CEST8.8.8.8192.168.2.130x96baNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:39.527983904 CEST8.8.8.8192.168.2.130x1628No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:47.109000921 CEST8.8.8.8192.168.2.130x158eNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:55.541291952 CEST8.8.8.8192.168.2.130xa0f3No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false

                  System Behavior

                  Start time (UTC):16:46:58
                  Start date (UTC):21/10/2024
                  Path:/tmp/x86.elf
                  Arguments:/tmp/x86.elf
                  File size:47504 bytes
                  MD5 hash:a51270cb597ae42f4cb7bea59f2f6434

                  Start time (UTC):16:46:58
                  Start date (UTC):21/10/2024
                  Path:/tmp/x86.elf
                  Arguments:-
                  File size:47504 bytes
                  MD5 hash:a51270cb597ae42f4cb7bea59f2f6434

                  Start time (UTC):16:46:58
                  Start date (UTC):21/10/2024
                  Path:/tmp/x86.elf
                  Arguments:-
                  File size:47504 bytes
                  MD5 hash:a51270cb597ae42f4cb7bea59f2f6434

                  Start time (UTC):16:46:58
                  Start date (UTC):21/10/2024
                  Path:/tmp/x86.elf
                  Arguments:-
                  File size:47504 bytes
                  MD5 hash:a51270cb597ae42f4cb7bea59f2f6434

                  Start time (UTC):16:46:58
                  Start date (UTC):21/10/2024
                  Path:/tmp/x86.elf
                  Arguments:-
                  File size:47504 bytes
                  MD5 hash:a51270cb597ae42f4cb7bea59f2f6434