Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
zmap.sh4.elf

Overview

General Information

Sample name:zmap.sh4.elf
Analysis ID:1576094
MD5:af2dc6922e80f3748d14b56e9c36feaf
SHA1:d83d9f4e3202c40cb6d2f73f1e81da016ade6b09
SHA256:be1741932847a13a985fe3756f3e28d352c59de074b6c0abc2eec208574e0827
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Okiru
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1576094
Start date and time:2024-12-16 14:42:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 29s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:zmap.sh4.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/0@2/0
  • VT rate limit hit for: zmap.sh4.elf
Command:/tmp/zmap.sh4.elf
PID:5428
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
VagneRHere
Standard Error:
  • system is lnxubuntu20
  • zmap.sh4.elf (PID: 5428, Parent: 5356, MD5: 8943e5f8f8c280467b4472c15ae93ba9) Arguments: /tmp/zmap.sh4.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
zmap.sh4.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    zmap.sh4.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      zmap.sh4.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xd548:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd55c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd570:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd584:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd598:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd5ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd5c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd5d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd5e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd5fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd610:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd624:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd638:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd64c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd660:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd674:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd688:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd69c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd6b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd6c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd6d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      5432.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
        5432.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5432.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xd548:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd55c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd570:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd584:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd598:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd5ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd5c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd5d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd5e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd5fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd610:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd624:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd638:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd64c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd660:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd674:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd688:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd69c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd6b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd6c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd6d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5428.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
            5428.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Click to see the 7 entries
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: zmap.sh4.elfAvira: detected
              Source: zmap.sh4.elfReversingLabs: Detection: 57%
              Source: global trafficTCP traffic: 192.168.2.13:35454 -> 185.196.11.47:59962
              Source: /tmp/zmap.sh4.elf (PID: 5428)Socket: 127.0.0.1:39148Jump to behavior
              Source: global trafficDNS traffic detected: DNS query: servers.vlrt-gap.com

              System Summary

              barindex
              Source: zmap.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5432.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5428.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: zmap.sh4.elf PID: 5428, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: zmap.sh4.elf PID: 5432, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: zmap.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5432.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5428.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: zmap.sh4.elf PID: 5428, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: zmap.sh4.elf PID: 5432, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal84.troj.evad.linELF@0/0@2/0

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: /tmp/zmap.sh4.elf (PID: 5428)File: /tmp/zmap.sh4.elfJump to behavior
              Source: /tmp/zmap.sh4.elf (PID: 5428)Queries kernel information via 'uname': Jump to behavior
              Source: zmap.sh4.elf, 5428.1.00007ffc3d02f000.00007ffc3d050000.rw-.sdmp, zmap.sh4.elf, 5432.1.00007ffc3d02f000.00007ffc3d050000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sh4/tmp/zmap.sh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/zmap.sh4.elf
              Source: zmap.sh4.elf, 5428.1.00007ffc3d02f000.00007ffc3d050000.rw-.sdmp, zmap.sh4.elf, 5432.1.00007ffc3d02f000.00007ffc3d050000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
              Source: zmap.sh4.elf, 5428.1.000055864da01000.000055864da64000.rw-.sdmp, zmap.sh4.elf, 5432.1.000055864da01000.000055864da64000.rw-.sdmpBinary or memory string: U5!/etc/qemu-binfmt/sh4
              Source: zmap.sh4.elf, 5428.1.000055864da01000.000055864da64000.rw-.sdmp, zmap.sh4.elf, 5432.1.000055864da01000.000055864da64000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: zmap.sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 5432.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5428.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: zmap.sh4.elf PID: 5428, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: zmap.sh4.elf PID: 5432, type: MEMORYSTR
              Source: Yara matchFile source: zmap.sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 5432.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5428.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: zmap.sh4.elf PID: 5428, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: zmap.sh4.elf PID: 5432, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: zmap.sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 5432.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5428.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: zmap.sh4.elf PID: 5428, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: zmap.sh4.elf PID: 5432, type: MEMORYSTR
              Source: Yara matchFile source: zmap.sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 5432.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5428.1.00007fa8dc400000.00007fa8dc410000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: zmap.sh4.elf PID: 5428, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: zmap.sh4.elf PID: 5432, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
              File Deletion
              OS Credential Dumping11
              Security Software Discovery
              Remote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              SourceDetectionScannerLabelLink
              zmap.sh4.elf58%ReversingLabsLinux.Exploit.Mirai
              zmap.sh4.elf100%AviraEXP/ELF.Mirai.Z.A
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              servers.vlrt-gap.com
              185.196.11.47
              truefalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                185.196.11.47
                servers.vlrt-gap.comSwitzerland
                42624SIMPLECARRIERCHfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                185.196.11.47zmap.spc.elfGet hashmaliciousMirai, OkiruBrowse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  servers.vlrt-gap.comzmap.spc.elfGet hashmaliciousMirai, OkiruBrowse
                  • 185.196.11.47
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  SIMPLECARRIERCHzmap.spc.elfGet hashmaliciousMirai, OkiruBrowse
                  • 185.196.11.47
                  7rTjhbfF6L.exeGet hashmaliciousUnknownBrowse
                  • 185.196.9.156
                  93z4kPX7B6.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                  • 185.196.9.150
                  GZC0n65Ggl.exeGet hashmaliciousAgentTeslaBrowse
                  • 185.196.9.150
                  mG93k6iBl4.exeGet hashmaliciousAgentTeslaBrowse
                  • 185.196.9.150
                  Z4ChhoiwJW.exeGet hashmaliciousAgentTeslaBrowse
                  • 185.196.9.150
                  7Zur2FiS0p.exeGet hashmaliciousAgentTeslaBrowse
                  • 185.196.9.150
                  Hlx2hL1z8B.exeGet hashmaliciousAgentTeslaBrowse
                  • 185.196.9.150
                  KqJ1zWlHp1.exeGet hashmaliciousAgentTeslaBrowse
                  • 185.196.9.150
                  #U00d6deme.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                  • 185.196.9.150
                  No context
                  No context
                  No created / dropped files found
                  File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
                  Entropy (8bit):6.906907786878497
                  TrID:
                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                  File name:zmap.sh4.elf
                  File size:64'316 bytes
                  MD5:af2dc6922e80f3748d14b56e9c36feaf
                  SHA1:d83d9f4e3202c40cb6d2f73f1e81da016ade6b09
                  SHA256:be1741932847a13a985fe3756f3e28d352c59de074b6c0abc2eec208574e0827
                  SHA512:11ab390cecb8614ffe50366480b6f7c56ba1756c95f72b901262dc0e255b03605d5d07c744a3b0339f941d1c377653e1d9685752be977267feabb900cf26a849
                  SSDEEP:1536:axqlNEqXAcC9s/mRH2Gy2BX3tlzYN2KWNxXrCZQCZr2JZ:axQ+cAcC9s/mRH2Gy2BX9l83W3CZQpJZ
                  TLSH:E7539E76E42A2984C5450434A0B88F741FA3B1C4935B6EFB1ADDC6B5604BEBCF449FE4
                  File Content Preview:.ELF..............*.......@.4...........4. ...(...............@...@...........................A...A......'..........Q.td............................././"O.n........#.*@........#.*@,....o&O.n...l..............................././.../.a"O.!...n...a.b("...q.

                  ELF header

                  Class:ELF32
                  Data:2's complement, little endian
                  Version:1 (current)
                  Machine:<unknown>
                  Version Number:0x1
                  Type:EXEC (Executable file)
                  OS/ABI:UNIX - System V
                  ABI Version:0
                  Entry Point Address:0x4001a0
                  Flags:0x9
                  ELF Header Size:52
                  Program Header Offset:52
                  Program Header Size:32
                  Number of Program Headers:3
                  Section Header Offset:63916
                  Section Header Size:40
                  Number of Section Headers:10
                  Header String Table Index:9
                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                  NULL0x00x00x00x00x0000
                  .initPROGBITS0x4000940x940x300x00x6AX004
                  .textPROGBITS0x4000e00xe00xd4400x00x6AX0032
                  .finiPROGBITS0x40d5200xd5200x240x00x6AX004
                  .rodataPROGBITS0x40d5440xd5440x20840x00x2A004
                  .ctorsPROGBITS0x41f5cc0xf5cc0x80x00x3WA004
                  .dtorsPROGBITS0x41f5d40xf5d40x80x00x3WA004
                  .dataPROGBITS0x41f5e00xf5e00x38c0x00x3WA004
                  .bssNOBITS0x41f96c0xf96c0x24300x00x3WA004
                  .shstrtabSTRTAB0x00xf96c0x3e0x00x0001
                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                  LOAD0x00x4000000x4000000xf5c80xf5c86.95340x5R E0x10000.init .text .fini .rodata
                  LOAD0xf5cc0x41f5cc0x41f5cc0x3a00x27d03.12370x6RW 0x10000.ctors .dtors .data .bss
                  GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                  TimestampSource PortDest PortSource IPDest IP
                  Dec 16, 2024 14:43:00.271640062 CET3545459962192.168.2.13185.196.11.47
                  Dec 16, 2024 14:43:00.392823935 CET5996235454185.196.11.47192.168.2.13
                  Dec 16, 2024 14:43:00.393290997 CET3545459962192.168.2.13185.196.11.47
                  Dec 16, 2024 14:43:00.394742966 CET3545459962192.168.2.13185.196.11.47
                  Dec 16, 2024 14:43:00.514801979 CET5996235454185.196.11.47192.168.2.13
                  Dec 16, 2024 14:43:00.515288115 CET3545459962192.168.2.13185.196.11.47
                  Dec 16, 2024 14:43:00.635533094 CET5996235454185.196.11.47192.168.2.13
                  Dec 16, 2024 14:43:01.672908068 CET5996235454185.196.11.47192.168.2.13
                  Dec 16, 2024 14:43:01.673279047 CET3545459962192.168.2.13185.196.11.47
                  Dec 16, 2024 14:43:01.673638105 CET3545459962192.168.2.13185.196.11.47
                  Dec 16, 2024 14:43:01.811300993 CET3545659962192.168.2.13185.196.11.47
                  Dec 16, 2024 14:43:01.933232069 CET5996235456185.196.11.47192.168.2.13
                  Dec 16, 2024 14:43:01.933398962 CET3545659962192.168.2.13185.196.11.47
                  Dec 16, 2024 14:43:01.935086966 CET3545659962192.168.2.13185.196.11.47
                  Dec 16, 2024 14:43:02.055186987 CET5996235456185.196.11.47192.168.2.13
                  Dec 16, 2024 14:43:02.055413008 CET3545659962192.168.2.13185.196.11.47
                  Dec 16, 2024 14:43:02.175673962 CET5996235456185.196.11.47192.168.2.13
                  Dec 16, 2024 14:43:11.945664883 CET3545659962192.168.2.13185.196.11.47
                  Dec 16, 2024 14:43:12.065999985 CET5996235456185.196.11.47192.168.2.13
                  Dec 16, 2024 14:43:12.356600046 CET5996235456185.196.11.47192.168.2.13
                  Dec 16, 2024 14:43:12.357034922 CET3545659962192.168.2.13185.196.11.47
                  Dec 16, 2024 14:44:12.414717913 CET3545659962192.168.2.13185.196.11.47
                  Dec 16, 2024 14:44:12.534944057 CET5996235456185.196.11.47192.168.2.13
                  Dec 16, 2024 14:44:12.824853897 CET5996235456185.196.11.47192.168.2.13
                  Dec 16, 2024 14:44:12.825274944 CET3545659962192.168.2.13185.196.11.47
                  TimestampSource PortDest PortSource IPDest IP
                  Dec 16, 2024 14:42:59.870434999 CET4886053192.168.2.138.8.8.8
                  Dec 16, 2024 14:43:00.269661903 CET53488608.8.8.8192.168.2.13
                  Dec 16, 2024 14:43:01.675076008 CET3416853192.168.2.138.8.8.8
                  Dec 16, 2024 14:43:01.809864998 CET53341688.8.8.8192.168.2.13
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Dec 16, 2024 14:42:59.870434999 CET192.168.2.138.8.8.80x7183Standard query (0)servers.vlrt-gap.comA (IP address)IN (0x0001)false
                  Dec 16, 2024 14:43:01.675076008 CET192.168.2.138.8.8.80x6a4eStandard query (0)servers.vlrt-gap.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Dec 16, 2024 14:43:00.269661903 CET8.8.8.8192.168.2.130x7183No error (0)servers.vlrt-gap.com185.196.11.47A (IP address)IN (0x0001)false
                  Dec 16, 2024 14:43:01.809864998 CET8.8.8.8192.168.2.130x6a4eNo error (0)servers.vlrt-gap.com185.196.11.47A (IP address)IN (0x0001)false

                  System Behavior

                  Start time (UTC):13:42:58
                  Start date (UTC):16/12/2024
                  Path:/tmp/zmap.sh4.elf
                  Arguments:/tmp/zmap.sh4.elf
                  File size:4139976 bytes
                  MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                  Start time (UTC):13:42:58
                  Start date (UTC):16/12/2024
                  Path:/tmp/zmap.sh4.elf
                  Arguments:-
                  File size:4139976 bytes
                  MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                  Start time (UTC):13:42:58
                  Start date (UTC):16/12/2024
                  Path:/tmp/zmap.sh4.elf
                  Arguments:-
                  File size:4139976 bytes
                  MD5 hash:8943e5f8f8c280467b4472c15ae93ba9