Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
zmap.arm.elf

Overview

General Information

Sample name:zmap.arm.elf
Analysis ID:1547485
MD5:8a666a51d2aeb8e106c7c9a302aa3acb
SHA1:c222cd4760966db8f2461c4dc034f9f3fe912eb2
SHA256:7b6c76af31adf965e62b5c726ea382825eb5f2aefc7e7331b192e0d4c809fe46
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Okiru
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1547485
Start date and time:2024-11-02 15:52:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 24s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:zmap.arm.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/0@2/0
  • VT rate limit hit for: zmap.arm.elf
Command:/tmp/zmap.arm.elf
PID:5530
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
VagneRHere
Standard Error:
  • system is lnxubuntu20
  • zmap.arm.elf (PID: 5530, Parent: 5452, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/zmap.arm.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
zmap.arm.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    zmap.arm.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      zmap.arm.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x10258:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1026c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10280:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10294:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x102a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x102bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x102d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x102e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x102f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1030c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10320:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10334:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10348:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1035c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10370:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10384:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x10398:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x103ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x103c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x103d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x103e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      5530.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
        5530.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5530.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x10258:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1026c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10280:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10294:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x102a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x102bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x102d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x102e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x102f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1030c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10320:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10334:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10348:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1035c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10370:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10384:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x10398:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x103ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x103c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x103d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x103e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5534.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
            5534.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Click to see the 7 entries
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: zmap.arm.elfAvira: detected
              Source: zmap.arm.elfReversingLabs: Detection: 63%
              Source: global trafficTCP traffic: 192.168.2.14:47364 -> 154.216.16.38:59962
              Source: /tmp/zmap.arm.elf (PID: 5530)Socket: 127.0.0.1:39148Jump to behavior
              Source: global trafficDNS traffic detected: DNS query: server.myway-ing.win

              System Summary

              barindex
              Source: zmap.arm.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5530.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5534.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: zmap.arm.elf PID: 5530, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: zmap.arm.elf PID: 5534, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: zmap.arm.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5530.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5534.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: zmap.arm.elf PID: 5530, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: zmap.arm.elf PID: 5534, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal84.troj.evad.linELF@0/0@2/0

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: /tmp/zmap.arm.elf (PID: 5530)File: /tmp/zmap.arm.elfJump to behavior
              Source: /tmp/zmap.arm.elf (PID: 5530)Queries kernel information via 'uname': Jump to behavior
              Source: zmap.arm.elf, 5530.1.00007ffe05d5a000.00007ffe05d7b000.rw-.sdmp, zmap.arm.elf, 5534.1.00007ffe05d5a000.00007ffe05d7b000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/zmap.arm.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/zmap.arm.elf
              Source: zmap.arm.elf, 5530.1.00005558934f7000.0000555893625000.rw-.sdmp, zmap.arm.elf, 5534.1.00005558934f7000.0000555893625000.rw-.sdmpBinary or memory string: XU!/etc/qemu-binfmt/arm
              Source: zmap.arm.elf, 5530.1.00005558934f7000.0000555893625000.rw-.sdmp, zmap.arm.elf, 5534.1.00005558934f7000.0000555893625000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
              Source: zmap.arm.elf, 5530.1.00007ffe05d5a000.00007ffe05d7b000.rw-.sdmp, zmap.arm.elf, 5534.1.00007ffe05d5a000.00007ffe05d7b000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: zmap.arm.elf, type: SAMPLE
              Source: Yara matchFile source: 5530.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5534.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: zmap.arm.elf PID: 5530, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: zmap.arm.elf PID: 5534, type: MEMORYSTR
              Source: Yara matchFile source: zmap.arm.elf, type: SAMPLE
              Source: Yara matchFile source: 5530.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5534.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: zmap.arm.elf PID: 5530, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: zmap.arm.elf PID: 5534, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: zmap.arm.elf, type: SAMPLE
              Source: Yara matchFile source: 5530.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5534.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: zmap.arm.elf PID: 5530, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: zmap.arm.elf PID: 5534, type: MEMORYSTR
              Source: Yara matchFile source: zmap.arm.elf, type: SAMPLE
              Source: Yara matchFile source: 5530.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5534.1.00007f0ef4017000.00007f0ef402a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: zmap.arm.elf PID: 5530, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: zmap.arm.elf PID: 5534, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
              File Deletion
              OS Credential Dumping11
              Security Software Discovery
              Remote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              zmap.arm.elf63%ReversingLabsLinux.Trojan.Mirai
              zmap.arm.elf100%AviraEXP/ELF.Mirai.Z.A
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              server.myway-ing.win
              154.216.16.38
              truefalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                154.216.16.38
                server.myway-ing.winSeychelles
                135357SKHT-ASShenzhenKatherineHengTechnologyInformationCofalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                154.216.16.38zmap.spc.elfGet hashmaliciousMirai, OkiruBrowse
                  zmap.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                    zmap.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                      zmap.ppc.elfGet hashmaliciousMirai, OkiruBrowse
                        zmap.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                          zmap.mips.elfGet hashmaliciousMirai, OkiruBrowse
                            zmap.x86.elfGet hashmaliciousOkiruBrowse
                              zmap.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                debug.dbg.elfGet hashmaliciousMirai, OkiruBrowse
                                  zmap.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    server.myway-ing.winzmap.spc.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    zmap.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    zmap.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    zmap.ppc.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    zmap.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    zmap.mips.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    zmap.x86.elfGet hashmaliciousOkiruBrowse
                                    • 154.216.16.38
                                    zmap.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    SKHT-ASShenzhenKatherineHengTechnologyInformationCozmap.spc.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    zmap.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    zmap.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    zmap.ppc.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    zmap.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    zmap.mips.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    zmap.x86.elfGet hashmaliciousOkiruBrowse
                                    • 154.216.16.38
                                    zmap.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.16.38
                                    qkehusl.elfGet hashmaliciousMiraiBrowse
                                    • 154.216.19.76
                                    jwwofba5.elfGet hashmaliciousMiraiBrowse
                                    • 154.216.19.76
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                                    Entropy (8bit):6.195319928706764
                                    TrID:
                                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                    File name:zmap.arm.elf
                                    File size:75'856 bytes
                                    MD5:8a666a51d2aeb8e106c7c9a302aa3acb
                                    SHA1:c222cd4760966db8f2461c4dc034f9f3fe912eb2
                                    SHA256:7b6c76af31adf965e62b5c726ea382825eb5f2aefc7e7331b192e0d4c809fe46
                                    SHA512:b48dd376f4e801bd6ea3351a1726a45d1b895f25f534d9d211b1023195881211f3b52f02914317899f122d71b88775e912f6092e5fe7d83565b3fd23012a04ac
                                    SSDEEP:1536:8x9OyMsgQJ9CisizmaD7QWAqsugL6AjvvY:8xKsmaAWAAKRvY
                                    TLSH:A2733A45B9815A13C6E1127BFAAE018D372523E8E3DF7217DE216F21379682F0D67E81
                                    File Content Preview:.ELF...a..........(.........4....&......4. ...(......................"..."..............."..."...".......'..........Q.td..................................-...L."...V@..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                                    ELF header

                                    Class:ELF32
                                    Data:2's complement, little endian
                                    Version:1 (current)
                                    Machine:ARM
                                    Version Number:0x1
                                    Type:EXEC (Executable file)
                                    OS/ABI:ARM - ABI
                                    ABI Version:0
                                    Entry Point Address:0x8190
                                    Flags:0x202
                                    ELF Header Size:52
                                    Program Header Offset:52
                                    Program Header Size:32
                                    Number of Program Headers:3
                                    Section Header Offset:75456
                                    Section Header Size:40
                                    Number of Section Headers:10
                                    Header String Table Index:9
                                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                    NULL0x00x00x00x00x0000
                                    .initPROGBITS0x80940x940x180x00x6AX004
                                    .textPROGBITS0x80b00xb00x101900x00x6AX0016
                                    .finiPROGBITS0x182400x102400x140x00x6AX004
                                    .rodataPROGBITS0x182540x102540x20840x00x2A004
                                    .ctorsPROGBITS0x222dc0x122dc0x80x00x3WA004
                                    .dtorsPROGBITS0x222e40x122e40x80x00x3WA004
                                    .dataPROGBITS0x222f00x122f00x3900x00x3WA004
                                    .bssNOBITS0x226800x126800x24300x00x3WA004
                                    .shstrtabSTRTAB0x00x126800x3e0x00x0001
                                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                    LOAD0x00x80000x80000x122d80x122d86.22420x5R E0x8000.init .text .fini .rodata
                                    LOAD0x122dc0x222dc0x222dc0x3a40x27d43.06120x6RW 0x8000.ctors .dtors .data .bss
                                    GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 2, 2024 15:52:57.713927031 CET4736459962192.168.2.14154.216.16.38
                                    Nov 2, 2024 15:52:57.718924999 CET5996247364154.216.16.38192.168.2.14
                                    Nov 2, 2024 15:52:57.718981028 CET4736459962192.168.2.14154.216.16.38
                                    Nov 2, 2024 15:52:57.723392010 CET4736459962192.168.2.14154.216.16.38
                                    Nov 2, 2024 15:52:57.728622913 CET5996247364154.216.16.38192.168.2.14
                                    Nov 2, 2024 15:52:57.728672028 CET4736459962192.168.2.14154.216.16.38
                                    Nov 2, 2024 15:52:57.734658003 CET5996247364154.216.16.38192.168.2.14
                                    Nov 2, 2024 15:52:58.621623993 CET5996247364154.216.16.38192.168.2.14
                                    Nov 2, 2024 15:52:58.621745110 CET4736459962192.168.2.14154.216.16.38
                                    Nov 2, 2024 15:52:58.621881008 CET4736459962192.168.2.14154.216.16.38
                                    Nov 2, 2024 15:52:58.631005049 CET4736659962192.168.2.14154.216.16.38
                                    Nov 2, 2024 15:52:58.637541056 CET5996247366154.216.16.38192.168.2.14
                                    Nov 2, 2024 15:52:58.637588978 CET4736659962192.168.2.14154.216.16.38
                                    Nov 2, 2024 15:52:58.638561964 CET4736659962192.168.2.14154.216.16.38
                                    Nov 2, 2024 15:52:58.644211054 CET5996247366154.216.16.38192.168.2.14
                                    Nov 2, 2024 15:52:58.644252062 CET4736659962192.168.2.14154.216.16.38
                                    Nov 2, 2024 15:52:58.649207115 CET5996247366154.216.16.38192.168.2.14
                                    Nov 2, 2024 15:53:08.648746967 CET4736659962192.168.2.14154.216.16.38
                                    Nov 2, 2024 15:53:08.653649092 CET5996247366154.216.16.38192.168.2.14
                                    Nov 2, 2024 15:53:08.916524887 CET5996247366154.216.16.38192.168.2.14
                                    Nov 2, 2024 15:53:08.916937113 CET4736659962192.168.2.14154.216.16.38
                                    Nov 2, 2024 15:54:08.975380898 CET4736659962192.168.2.14154.216.16.38
                                    Nov 2, 2024 15:54:08.980487108 CET5996247366154.216.16.38192.168.2.14
                                    Nov 2, 2024 15:54:09.244000912 CET5996247366154.216.16.38192.168.2.14
                                    Nov 2, 2024 15:54:09.244234085 CET4736659962192.168.2.14154.216.16.38
                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 2, 2024 15:52:57.699204922 CET3913853192.168.2.148.8.8.8
                                    Nov 2, 2024 15:52:57.706398010 CET53391388.8.8.8192.168.2.14
                                    Nov 2, 2024 15:52:58.623122931 CET3669853192.168.2.148.8.8.8
                                    Nov 2, 2024 15:52:58.630543947 CET53366988.8.8.8192.168.2.14
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Nov 2, 2024 15:52:57.699204922 CET192.168.2.148.8.8.80xea50Standard query (0)server.myway-ing.winA (IP address)IN (0x0001)false
                                    Nov 2, 2024 15:52:58.623122931 CET192.168.2.148.8.8.80x7c07Standard query (0)server.myway-ing.winA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Nov 2, 2024 15:52:57.706398010 CET8.8.8.8192.168.2.140xea50No error (0)server.myway-ing.win154.216.16.38A (IP address)IN (0x0001)false
                                    Nov 2, 2024 15:52:58.630543947 CET8.8.8.8192.168.2.140x7c07No error (0)server.myway-ing.win154.216.16.38A (IP address)IN (0x0001)false

                                    System Behavior

                                    Start time (UTC):14:52:56
                                    Start date (UTC):02/11/2024
                                    Path:/tmp/zmap.arm.elf
                                    Arguments:/tmp/zmap.arm.elf
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):14:52:56
                                    Start date (UTC):02/11/2024
                                    Path:/tmp/zmap.arm.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):14:52:56
                                    Start date (UTC):02/11/2024
                                    Path:/tmp/zmap.arm.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1