Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
bot.x86_64.elf

Overview

General Information

Sample name:bot.x86_64.elf
Analysis ID:1565395
MD5:ca4b642c5ddd0c813ab04bace7554370
SHA1:8e2f33cce75fd5a70e2d2319b7e6986c9969f970
SHA256:11989360279030db77917db8b9eaf5c68a6e2d5dc9bf2077406cbb8f5184cae4
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Gafgyt, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Gafgyt
Yara detected Mirai
Yara detected Okiru
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Uses dynamic DNS services
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1565395
Start date and time:2024-11-29 18:07:04 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 26s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:bot.x86_64.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@20/0
  • VT rate limit hit for: bot.x86_64.elf
Command:/tmp/bot.x86_64.elf
PID:6237
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
Bashlite, GafgytBashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.bashlite
SourceRuleDescriptionAuthorStrings
bot.x86_64.elfJoeSecurity_GafgytYara detected GafgytJoe Security
    bot.x86_64.elfJoeSecurity_OkiruYara detected OkiruJoe Security
      bot.x86_64.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
        bot.x86_64.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          bot.x86_64.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x163c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x163dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x163f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16404:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16418:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1642c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16440:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16454:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16468:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1647c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16490:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16508:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1651c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16530:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16544:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16558:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Click to see the 14 entries
          SourceRuleDescriptionAuthorStrings
          6237.1.0000000000400000.0000000000419000.r-x.sdmpJoeSecurity_GafgytYara detected GafgytJoe Security
            6237.1.0000000000400000.0000000000419000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
              6237.1.0000000000400000.0000000000419000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
                6237.1.0000000000400000.0000000000419000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
                  6237.1.0000000000400000.0000000000419000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
                  • 0x163c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x163dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x163f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16404:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16418:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x1642c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16440:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16454:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16468:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x1647c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16490:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16508:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x1651c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16530:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16544:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16558:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  Click to see the 18 entries
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-29T18:07:48.439507+010020304901Malware Command and Control Activity Detected192.168.2.2338594185.7.78.8843957TCP
                  2024-11-29T18:07:54.868006+010020304901Malware Command and Control Activity Detected192.168.2.2338596185.7.78.8843957TCP
                  2024-11-29T18:08:01.472354+010020304901Malware Command and Control Activity Detected192.168.2.2338598185.7.78.8843957TCP
                  2024-11-29T18:08:09.122627+010020304901Malware Command and Control Activity Detected192.168.2.2338600185.7.78.8843957TCP
                  2024-11-29T18:08:12.673344+010020304901Malware Command and Control Activity Detected192.168.2.2338602185.7.78.8843957TCP
                  2024-11-29T18:08:16.997112+010020304901Malware Command and Control Activity Detected192.168.2.2338604185.7.78.8843957TCP
                  2024-11-29T18:08:22.555438+010020304901Malware Command and Control Activity Detected192.168.2.2338606185.7.78.8843957TCP
                  2024-11-29T18:08:25.940968+010020304901Malware Command and Control Activity Detected192.168.2.2338608185.7.78.8843957TCP
                  2024-11-29T18:08:33.603898+010020304901Malware Command and Control Activity Detected192.168.2.2338610185.7.78.8843957TCP
                  2024-11-29T18:08:38.062285+010020304901Malware Command and Control Activity Detected192.168.2.2338612185.7.78.8843957TCP
                  2024-11-29T18:08:44.487782+010020304901Malware Command and Control Activity Detected192.168.2.2338614185.7.78.8843957TCP
                  2024-11-29T18:08:54.847684+010020304901Malware Command and Control Activity Detected192.168.2.2338616185.7.78.8843957TCP
                  2024-11-29T18:09:04.416310+010020304901Malware Command and Control Activity Detected192.168.2.2338618185.7.78.8843957TCP
                  2024-11-29T18:09:13.978790+010020304901Malware Command and Control Activity Detected192.168.2.2338620185.7.78.8843957TCP
                  2024-11-29T18:09:20.545885+010020304901Malware Command and Control Activity Detected192.168.2.2338622185.7.78.8843957TCP
                  2024-11-29T18:09:28.147518+010020304901Malware Command and Control Activity Detected192.168.2.2338624185.7.78.8843957TCP
                  2024-11-29T18:09:35.768494+010020304901Malware Command and Control Activity Detected192.168.2.2338626185.7.78.8843957TCP
                  2024-11-29T18:09:43.301562+010020304901Malware Command and Control Activity Detected192.168.2.2338628185.7.78.8843957TCP
                  2024-11-29T18:09:45.864682+010020304901Malware Command and Control Activity Detected192.168.2.2338630185.7.78.8843957TCP
                  2024-11-29T18:09:50.306114+010020304901Malware Command and Control Activity Detected192.168.2.2338632185.7.78.8843957TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: bot.x86_64.elfAvira: detected
                  Source: bot.x86_64.elfReversingLabs: Detection: 63%
                  Source: bot.x86_64.elfJoe Sandbox ML: detected
                  Source: bot.x86_64.elfString: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38596 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38608 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38600 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38606 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38626 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38602 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38612 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38604 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38618 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38598 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38614 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38616 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38622 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38628 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38624 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38620 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38630 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38632 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38610 -> 185.7.78.88:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:38594 -> 185.7.78.88:43957
                  Source: global trafficTCP traffic: 185.7.78.88 ports 43957,3,4,5,7,9
                  Source: unknownDNS query: name: evelynnk.duckdns.org
                  Source: global trafficTCP traffic: 192.168.2.23:38594 -> 185.7.78.88:43957
                  Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
                  Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
                  Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                  Source: global trafficDNS traffic detected: DNS query: evelynnk.duckdns.org
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

                  System Summary

                  barindex
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
                  Source: Process Memory Space: bot.x86_64.elf PID: 6237, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                  Source: Initial sampleString containing 'busybox' found: /bin/busybox
                  Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
                  Source: ELF static info symbol of initial sample.symtab present: no
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
                  Source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
                  Source: Process Memory Space: bot.x86_64.elf PID: 6237, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                  Source: classification engineClassification label: mal100.troj.linELF@0/0@20/0
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1582/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/3088/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/230/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/110/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/231/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/111/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/232/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1579/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/112/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/233/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1699/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/113/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/234/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1335/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1698/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/114/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/235/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1334/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1576/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/2302/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/115/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/236/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/116/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/237/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/117/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/118/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/910/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/119/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/6226/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/912/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/10/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/2307/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/11/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/918/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/12/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/13/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/14/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/15/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/16/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/17/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/18/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1594/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/120/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/121/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1349/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/122/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/243/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/123/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/2/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/124/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/3/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/4/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/125/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/126/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1344/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1465/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1586/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/127/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/6/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/248/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/128/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/249/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1463/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/800/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/6238/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/9/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/801/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/6239/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/20/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/21/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1900/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/22/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/23/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/24/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/25/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/26/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/27/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/28/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/29/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/491/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/250/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/130/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/251/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/252/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/132/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/253/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/254/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/255/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/256/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1599/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/257/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1477/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/379/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/258/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1476/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/259/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1475/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/936/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/30/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/2208/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/35/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1809/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/1494/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6239)File opened: /proc/260/cmdlineJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 6237, type: MEMORYSTR
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 6237, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 6237, type: MEMORYSTR
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 6237.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 6237, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  Valid AccountsWindows Management Instrumentation1
                  Scripting
                  Path InterceptionDirect Volume Access1
                  OS Credential Dumping
                  System Service DiscoveryRemote ServicesData from Local System1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture12
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  No configs have been found
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Number of created Files
                  • Is malicious
                  • Internet
                  SourceDetectionScannerLabelLink
                  bot.x86_64.elf63%ReversingLabsLinux.Backdoor.Mirai
                  bot.x86_64.elf100%AviraEXP/ELF.Mirai.Z.A
                  bot.x86_64.elf100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  evelynnk.duckdns.org
                  185.7.78.88
                  truefalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    185.7.78.88
                    evelynnk.duckdns.orgNetherlands
                    43350NFORCENLfalse
                    109.202.202.202
                    unknownSwitzerland
                    13030INIT7CHfalse
                    91.189.91.43
                    unknownUnited Kingdom
                    41231CANONICAL-ASGBfalse
                    91.189.91.42
                    unknownUnited Kingdom
                    41231CANONICAL-ASGBfalse
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    185.7.78.88bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                      bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                          bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                            bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                              bot.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                  bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                    bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                      bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                        109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                        • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                        91.189.91.43bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                          bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                            bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                              bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                armv7l.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                  ppc64.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                    mips64el.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                      ppc64el.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                        arm6.elfGet hashmaliciousMiraiBrowse
                                                          .i.elfGet hashmaliciousUnknownBrowse
                                                            91.189.91.42bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                              bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                  bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                    armv7l.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                      ppc64.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                        mips64el.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                          ppc64el.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                            arm6.elfGet hashmaliciousMiraiBrowse
                                                                              .i.elfGet hashmaliciousUnknownBrowse
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                evelynnk.duckdns.orgbot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                bot.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                NFORCENLbot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                bot.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                https://files-pdf-73j.pages.dev/?e=donal.oneill@camida.comGet hashmaliciousHTMLPhisherBrowse
                                                                                • 185.66.143.73
                                                                                splarm7.elfGet hashmaliciousUnknownBrowse
                                                                                • 46.166.134.123
                                                                                bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 185.7.78.88
                                                                                CANONICAL-ASGBbot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 91.189.91.42
                                                                                bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 91.189.91.42
                                                                                bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 91.189.91.42
                                                                                bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 91.189.91.42
                                                                                armv7l.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 91.189.91.42
                                                                                bot.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                • 185.125.190.26
                                                                                ppc64.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 91.189.91.42
                                                                                mips64el.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 91.189.91.42
                                                                                ppc64el.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 91.189.91.42
                                                                                arc.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 185.125.190.26
                                                                                CANONICAL-ASGBbot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 91.189.91.42
                                                                                bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 91.189.91.42
                                                                                bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 91.189.91.42
                                                                                bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 91.189.91.42
                                                                                armv7l.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 91.189.91.42
                                                                                bot.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                • 185.125.190.26
                                                                                ppc64.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 91.189.91.42
                                                                                mips64el.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 91.189.91.42
                                                                                ppc64el.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 91.189.91.42
                                                                                arc.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 185.125.190.26
                                                                                INIT7CHbot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 109.202.202.202
                                                                                bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 109.202.202.202
                                                                                bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 109.202.202.202
                                                                                bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                                                • 109.202.202.202
                                                                                armv7l.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 109.202.202.202
                                                                                ppc64.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 109.202.202.202
                                                                                mips64el.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 109.202.202.202
                                                                                ppc64el.elfGet hashmaliciousMuhstik, TsunamiBrowse
                                                                                • 109.202.202.202
                                                                                arm6.elfGet hashmaliciousMiraiBrowse
                                                                                • 109.202.202.202
                                                                                .i.elfGet hashmaliciousUnknownBrowse
                                                                                • 109.202.202.202
                                                                                No context
                                                                                No context
                                                                                No created / dropped files found
                                                                                File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                                                                                Entropy (8bit):5.223462176154841
                                                                                TrID:
                                                                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                                File name:bot.x86_64.elf
                                                                                File size:139'576 bytes
                                                                                MD5:ca4b642c5ddd0c813ab04bace7554370
                                                                                SHA1:8e2f33cce75fd5a70e2d2319b7e6986c9969f970
                                                                                SHA256:11989360279030db77917db8b9eaf5c68a6e2d5dc9bf2077406cbb8f5184cae4
                                                                                SHA512:a268d6b812845a6bf806f2cf8117e2e4d130f15bea03bea812d287503191615bfefb57ce5c844cde1ad6021a696611e78f8bea55dd261bd5dae53f407677dfc9
                                                                                SSDEEP:3072:tGtwnNiaOnUTYFKPT9OSQ7AOaogjV2iZlBWCg8iASQPdL:tGtwnNiaOnUTSuLyoSQPd
                                                                                TLSH:5FD33A17B5C180FDC4DAC5B44F9EF536DD32B1AC1238B16B2BD4AA221E4AE315F1DA50
                                                                                File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@...............................................Q.......Q.....x....... ...............Q.td....................................................H...._.....]..H........

                                                                                ELF header

                                                                                Class:ELF64
                                                                                Data:2's complement, little endian
                                                                                Version:1 (current)
                                                                                Machine:Advanced Micro Devices X86-64
                                                                                Version Number:0x1
                                                                                Type:EXEC (Executable file)
                                                                                OS/ABI:UNIX - System V
                                                                                ABI Version:0
                                                                                Entry Point Address:0x400194
                                                                                Flags:0x0
                                                                                ELF Header Size:64
                                                                                Program Header Offset:64
                                                                                Program Header Size:56
                                                                                Number of Program Headers:3
                                                                                Section Header Offset:138936
                                                                                Section Header Size:64
                                                                                Number of Section Headers:10
                                                                                Header String Table Index:9
                                                                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                                NULL0x00x00x00x00x0000
                                                                                .initPROGBITS0x4000e80xe80x130x00x6AX001
                                                                                .textPROGBITS0x4001000x1000x15dd60x00x6AX0016
                                                                                .finiPROGBITS0x415ed60x15ed60xe0x00x6AX001
                                                                                .rodataPROGBITS0x415f000x15f000x30c00x00x2A0032
                                                                                .ctorsPROGBITS0x5190000x190000x180x00x3WA008
                                                                                .dtorsPROGBITS0x5190180x190180x100x00x3WA008
                                                                                .dataPROGBITS0x5190400x190400x8e380x00x3WA0032
                                                                                .bssNOBITS0x521e800x21e780x72a00x00x3WA0032
                                                                                .shstrtabSTRTAB0x00x21e780x3e0x00x0001
                                                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                                LOAD0x00x4000000x4000000x18fc00x18fc06.39710x5R E0x100000.init .text .fini .rodata
                                                                                LOAD0x190000x5190000x5190000x8e780x101200.22720x6RW 0x100000.ctors .dtors .data .bss
                                                                                GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2024-11-29T18:07:48.439507+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338594185.7.78.8843957TCP
                                                                                2024-11-29T18:07:54.868006+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338596185.7.78.8843957TCP
                                                                                2024-11-29T18:08:01.472354+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338598185.7.78.8843957TCP
                                                                                2024-11-29T18:08:09.122627+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338600185.7.78.8843957TCP
                                                                                2024-11-29T18:08:12.673344+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338602185.7.78.8843957TCP
                                                                                2024-11-29T18:08:16.997112+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338604185.7.78.8843957TCP
                                                                                2024-11-29T18:08:22.555438+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338606185.7.78.8843957TCP
                                                                                2024-11-29T18:08:25.940968+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338608185.7.78.8843957TCP
                                                                                2024-11-29T18:08:33.603898+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338610185.7.78.8843957TCP
                                                                                2024-11-29T18:08:38.062285+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338612185.7.78.8843957TCP
                                                                                2024-11-29T18:08:44.487782+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338614185.7.78.8843957TCP
                                                                                2024-11-29T18:08:54.847684+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338616185.7.78.8843957TCP
                                                                                2024-11-29T18:09:04.416310+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338618185.7.78.8843957TCP
                                                                                2024-11-29T18:09:13.978790+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338620185.7.78.8843957TCP
                                                                                2024-11-29T18:09:20.545885+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338622185.7.78.8843957TCP
                                                                                2024-11-29T18:09:28.147518+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338624185.7.78.8843957TCP
                                                                                2024-11-29T18:09:35.768494+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338626185.7.78.8843957TCP
                                                                                2024-11-29T18:09:43.301562+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338628185.7.78.8843957TCP
                                                                                2024-11-29T18:09:45.864682+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338630185.7.78.8843957TCP
                                                                                2024-11-29T18:09:50.306114+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.2338632185.7.78.8843957TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Nov 29, 2024 18:07:48.318298101 CET3859443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:07:48.438476086 CET4395738594185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:07:48.438543081 CET3859443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:07:48.439507008 CET3859443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:07:48.559418917 CET4395738594185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:07:49.598728895 CET4395738594185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:07:49.598833084 CET3859443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:07:49.718883038 CET4395738594185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:07:50.238861084 CET43928443192.168.2.2391.189.91.42
                                                                                Nov 29, 2024 18:07:54.747193098 CET3859643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:07:54.867362976 CET4395738596185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:07:54.867409945 CET3859643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:07:54.868005991 CET3859643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:07:54.987880945 CET4395738596185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:07:55.614159107 CET42836443192.168.2.2391.189.91.43
                                                                                Nov 29, 2024 18:07:56.011820078 CET4395738596185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:07:56.011904955 CET3859643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:07:56.132222891 CET4395738596185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:07:57.149974108 CET4251680192.168.2.23109.202.202.202
                                                                                Nov 29, 2024 18:08:01.351043940 CET3859843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:01.471323967 CET4395738598185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:01.471422911 CET3859843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:01.472353935 CET3859843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:01.592359066 CET4395738598185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:02.664314032 CET4395738598185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:02.664434910 CET3859843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:02.784503937 CET4395738598185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:09.000984907 CET3860043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:09.121875048 CET4395738600185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:09.121937037 CET3860043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:09.122627020 CET3860043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:09.242535114 CET4395738600185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:10.217473030 CET4395738600185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:10.217684031 CET3860043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:10.337708950 CET4395738600185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:11.740087986 CET43928443192.168.2.2391.189.91.42
                                                                                Nov 29, 2024 18:08:12.552531958 CET3860243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:12.672507048 CET4395738602185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:12.672652006 CET3860243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:12.673343897 CET3860243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:12.793309927 CET4395738602185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:13.738915920 CET4395738602185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:13.739038944 CET3860243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:13.859040022 CET4395738602185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:16.876112938 CET3860443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:16.996181965 CET4395738604185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:16.996263981 CET3860443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:16.997112036 CET3860443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:17.116981030 CET4395738604185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:18.099222898 CET4395738604185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:18.099360943 CET3860443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:18.219882011 CET4395738604185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:21.978672981 CET42836443192.168.2.2391.189.91.43
                                                                                Nov 29, 2024 18:08:22.434444904 CET3860643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:22.554446936 CET4395738606185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:22.554507971 CET3860643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:22.555438042 CET3860643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:22.675343990 CET4395738606185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:23.682534933 CET4395738606185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:23.682851076 CET3860643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:23.802855968 CET4395738606185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:25.819797039 CET3860843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:25.940032005 CET4395738608185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:25.940232038 CET3860843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:25.940968037 CET3860843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:26.061515093 CET4395738608185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:27.146203995 CET4395738608185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:27.146409035 CET3860843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:27.266705990 CET4395738608185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:28.121923923 CET4251680192.168.2.23109.202.202.202
                                                                                Nov 29, 2024 18:08:33.483236074 CET3861043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:33.603243113 CET4395738610185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:33.603327036 CET3861043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:33.603898048 CET3861043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:33.723937035 CET4395738610185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:34.795090914 CET4395738610185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:34.795227051 CET3861043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:34.915371895 CET4395738610185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:37.941095114 CET3861243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:38.061558008 CET4395738612185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:38.061645985 CET3861243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:38.062284946 CET3861243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:38.182499886 CET4395738612185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:39.226540089 CET4395738612185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:39.226766109 CET3861243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:39.346982002 CET4395738612185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:44.366627932 CET3861443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:44.486814976 CET4395738614185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:44.486871958 CET3861443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:44.487782001 CET3861443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:44.607696056 CET4395738614185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:45.597990036 CET4395738614185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:45.598247051 CET3861443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:45.718295097 CET4395738614185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:52.694597006 CET43928443192.168.2.2391.189.91.42
                                                                                Nov 29, 2024 18:08:54.726496935 CET3861643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:54.846915960 CET4395738616185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:54.847021103 CET3861643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:54.847683907 CET3861643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:54.967679977 CET4395738616185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:55.960243940 CET4395738616185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:08:55.960392952 CET3861643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:08:56.080349922 CET4395738616185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:04.295414925 CET3861843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:04.415472031 CET4395738618185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:04.415671110 CET3861843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:04.416310072 CET3861843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:04.536215067 CET4395738618185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:05.524995089 CET4395738618185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:05.525249958 CET3861843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:05.645833969 CET4395738618185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:13.858112097 CET3862043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:13.978116989 CET4395738620185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:13.978188992 CET3862043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:13.978790045 CET3862043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:14.098805904 CET4395738620185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:15.084867954 CET4395738620185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:15.085000038 CET3862043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:15.204966068 CET4395738620185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:20.424319983 CET3862243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:20.545277119 CET4395738622185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:20.545336962 CET3862243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:20.545885086 CET3862243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:20.666702986 CET4395738622185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:21.685569048 CET4395738622185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:21.685719013 CET3862243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:21.805679083 CET4395738622185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:28.024997950 CET3862443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:28.146836996 CET4395738624185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:28.146909952 CET3862443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:28.147517920 CET3862443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:28.267591953 CET4395738624185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:29.311296940 CET4395738624185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:29.311429977 CET3862443957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:29.431577921 CET4395738624185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:35.647840977 CET3862643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:35.767822027 CET4395738626185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:35.767900944 CET3862643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:35.768493891 CET3862643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:35.888603926 CET4395738626185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:39.843622923 CET4395738626185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:39.843765974 CET3862643957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:39.963911057 CET4395738626185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:43.180706024 CET3862843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:43.300777912 CET4395738628185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:43.300863028 CET3862843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:43.301562071 CET3862843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:43.421551943 CET4395738628185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:44.406965971 CET4395738628185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:44.407088995 CET3862843957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:44.527385950 CET4395738628185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:45.743855953 CET3863043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:45.863843918 CET4395738630185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:45.863943100 CET3863043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:45.864681959 CET3863043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:45.984726906 CET4395738630185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:47.046317101 CET4395738630185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:47.046457052 CET3863043957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:47.166428089 CET4395738630185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:50.183541059 CET3863243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:50.305424929 CET4395738632185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:50.305499077 CET3863243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:50.306113958 CET3863243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:50.426117897 CET4395738632185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:51.395232916 CET4395738632185.7.78.88192.168.2.23
                                                                                Nov 29, 2024 18:09:51.395333052 CET3863243957192.168.2.23185.7.78.88
                                                                                Nov 29, 2024 18:09:51.515309095 CET4395738632185.7.78.88192.168.2.23
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Nov 29, 2024 18:07:47.983350039 CET3998153192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:07:48.317809105 CET53399818.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:07:54.607450962 CET3788553192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:07:54.741868019 CET53378858.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:08:01.013339043 CET5056053192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:08:01.350425005 CET53505608.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:08:08.665878057 CET3918253192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:08:09.000219107 CET53391828.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:08:12.219119072 CET3296553192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:08:12.552089930 CET53329658.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:08:16.740864038 CET5473353192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:08:16.875663042 CET53547338.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:08:22.100856066 CET4993053192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:08:22.434026003 CET53499308.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:08:25.684827089 CET3678753192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:08:25.819247007 CET53367878.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:08:33.147403955 CET5938753192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:08:33.482755899 CET53593878.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:08:37.796672106 CET4474953192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:08:37.940637112 CET53447498.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:08:44.228173971 CET3523353192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:08:44.366000891 CET53352338.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:08:54.598934889 CET4362753192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:08:54.725872040 CET53436278.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:09:03.961167097 CET5812253192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:09:04.294883966 CET53581228.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:09:13.525820017 CET3589853192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:09:13.857592106 CET53358988.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:09:20.085906982 CET5742553192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:09:20.423890114 CET53574258.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:09:27.686841011 CET4853753192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:09:28.024508953 CET53485378.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:09:35.312259912 CET4052453192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:09:35.647299051 CET53405248.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:09:42.845045090 CET4832853192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:09:43.180087090 CET53483288.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:09:45.408873081 CET4531553192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:09:45.743144035 CET53453158.8.8.8192.168.2.23
                                                                                Nov 29, 2024 18:09:50.048127890 CET4544253192.168.2.238.8.8.8
                                                                                Nov 29, 2024 18:09:50.183139086 CET53454428.8.8.8192.168.2.23
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Nov 29, 2024 18:07:47.983350039 CET192.168.2.238.8.8.80xf33Standard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:07:54.607450962 CET192.168.2.238.8.8.80x1738Standard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:01.013339043 CET192.168.2.238.8.8.80x5561Standard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:08.665878057 CET192.168.2.238.8.8.80x8f7bStandard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:12.219119072 CET192.168.2.238.8.8.80xeb5cStandard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:16.740864038 CET192.168.2.238.8.8.80x3608Standard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:22.100856066 CET192.168.2.238.8.8.80x8f0Standard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:25.684827089 CET192.168.2.238.8.8.80x3f8aStandard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:33.147403955 CET192.168.2.238.8.8.80xeac1Standard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:37.796672106 CET192.168.2.238.8.8.80x98Standard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:44.228173971 CET192.168.2.238.8.8.80xff2eStandard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:54.598934889 CET192.168.2.238.8.8.80x483Standard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:03.961167097 CET192.168.2.238.8.8.80x10c4Standard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:13.525820017 CET192.168.2.238.8.8.80x7e82Standard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:20.085906982 CET192.168.2.238.8.8.80x29fStandard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:27.686841011 CET192.168.2.238.8.8.80xff6Standard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:35.312259912 CET192.168.2.238.8.8.80x305fStandard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:42.845045090 CET192.168.2.238.8.8.80x3f7bStandard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:45.408873081 CET192.168.2.238.8.8.80xb3a5Standard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:50.048127890 CET192.168.2.238.8.8.80xb084Standard query (0)evelynnk.duckdns.orgA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Nov 29, 2024 18:07:48.317809105 CET8.8.8.8192.168.2.230xf33No error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:07:54.741868019 CET8.8.8.8192.168.2.230x1738No error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:01.350425005 CET8.8.8.8192.168.2.230x5561No error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:09.000219107 CET8.8.8.8192.168.2.230x8f7bNo error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:12.552089930 CET8.8.8.8192.168.2.230xeb5cNo error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:16.875663042 CET8.8.8.8192.168.2.230x3608No error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:22.434026003 CET8.8.8.8192.168.2.230x8f0No error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:25.819247007 CET8.8.8.8192.168.2.230x3f8aNo error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:33.482755899 CET8.8.8.8192.168.2.230xeac1No error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:37.940637112 CET8.8.8.8192.168.2.230x98No error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:44.366000891 CET8.8.8.8192.168.2.230xff2eNo error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:08:54.725872040 CET8.8.8.8192.168.2.230x483No error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:04.294883966 CET8.8.8.8192.168.2.230x10c4No error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:13.857592106 CET8.8.8.8192.168.2.230x7e82No error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:20.423890114 CET8.8.8.8192.168.2.230x29fNo error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:28.024508953 CET8.8.8.8192.168.2.230xff6No error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:35.647299051 CET8.8.8.8192.168.2.230x305fNo error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:43.180087090 CET8.8.8.8192.168.2.230x3f7bNo error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:45.743144035 CET8.8.8.8192.168.2.230xb3a5No error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                                                                                Nov 29, 2024 18:09:50.183139086 CET8.8.8.8192.168.2.230xb084No error (0)evelynnk.duckdns.org185.7.78.88A (IP address)IN (0x0001)false

                                                                                System Behavior

                                                                                Start time (UTC):17:07:46
                                                                                Start date (UTC):29/11/2024
                                                                                Path:/tmp/bot.x86_64.elf
                                                                                Arguments:/tmp/bot.x86_64.elf
                                                                                File size:139576 bytes
                                                                                MD5 hash:ca4b642c5ddd0c813ab04bace7554370

                                                                                Start time (UTC):17:07:46
                                                                                Start date (UTC):29/11/2024
                                                                                Path:/tmp/bot.x86_64.elf
                                                                                Arguments:-
                                                                                File size:139576 bytes
                                                                                MD5 hash:ca4b642c5ddd0c813ab04bace7554370

                                                                                Start time (UTC):17:07:46
                                                                                Start date (UTC):29/11/2024
                                                                                Path:/tmp/bot.x86_64.elf
                                                                                Arguments:-
                                                                                File size:139576 bytes
                                                                                MD5 hash:ca4b642c5ddd0c813ab04bace7554370