Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
debug.dbg.elf

Overview

General Information

Sample name:debug.dbg.elf
Analysis ID:1576126
MD5:26b5dcf45af8da6946cd105da9278d17
SHA1:192368781bc07ef7656ab5bd473498277e9221d3
SHA256:58ae44588d4bc2d3c7d376900403ea0874958641c452fd24d58d7307104e3b4f
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:88
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Okiru
Machine Learning detection for sample
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1576126
Start date and time:2024-12-16 15:08:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 39s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:debug.dbg.elf
Detection:MAL
Classification:mal88.troj.evad.linELF@0/0@4/0
  • VT rate limit hit for: debug.dbg.elf
Command:/tmp/debug.dbg.elf
PID:5428
Exit Code:
Exit Code Info:
Killed:True
Standard Output:
VagneRHere
[Session] >> debug mode, pid: 5428
[Session] >> We Are The Only Process On This System!
(watchdog) >> failed to find a valid watchdog driver, bailing out
Standard Error:
  • system is lnxubuntu20
  • debug.dbg.elf (PID: 5428, Parent: 5355, MD5: 26b5dcf45af8da6946cd105da9278d17) Arguments: /tmp/debug.dbg.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
debug.dbg.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    debug.dbg.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      debug.dbg.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xdb6c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdb80:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdb94:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdba8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdbbc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdbd0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdbe4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdbf8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdc0c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdc20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdc34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdc48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdc5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdc70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdc84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdc98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdcac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdcc0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdcd4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdce8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdcfc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      debug.dbg.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
      • 0xb20:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
      debug.dbg.elfLinux_Trojan_Mirai_88de437funknownunknown
      • 0x8bf2:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
      Click to see the 3 entries
      SourceRuleDescriptionAuthorStrings
      5430.1.0000000008048000.0000000008059000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
        5430.1.0000000008048000.0000000008059000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5430.1.0000000008048000.0000000008059000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xdb6c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdb80:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdb94:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdba8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdbbc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdbd0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdbe4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdbf8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdc0c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdc20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdc34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdc48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdc5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdc70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdc84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdc98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdcac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdcc0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdcd4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdce8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdcfc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5430.1.0000000008048000.0000000008059000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
          • 0xb20:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
          5430.1.0000000008048000.0000000008059000.r-x.sdmpLinux_Trojan_Mirai_88de437funknownunknown
          • 0x8bf2:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
          Click to see the 17 entries
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: debug.dbg.elfAvira: detected
          Source: debug.dbg.elfReversingLabs: Detection: 47%
          Source: debug.dbg.elfJoe Sandbox ML: detected
          Source: global trafficTCP traffic: 192.168.2.13:35450 -> 185.196.11.47:59962
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: servers.vlrt-gap.com
          Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

          System Summary

          barindex
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: Process Memory Space: debug.dbg.elf PID: 5428, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: debug.dbg.elf PID: 5430, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: Process Memory Space: debug.dbg.elf PID: 5428, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: debug.dbg.elf PID: 5430, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal88.troj.evad.linELF@0/0@4/0

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: /tmp/debug.dbg.elf (PID: 5428)File: /tmp/debug.dbg.elfJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: debug.dbg.elf, type: SAMPLE
          Source: Yara matchFile source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: debug.dbg.elf PID: 5428, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: debug.dbg.elf PID: 5430, type: MEMORYSTR
          Source: Yara matchFile source: debug.dbg.elf, type: SAMPLE
          Source: Yara matchFile source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: debug.dbg.elf PID: 5428, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: debug.dbg.elf PID: 5430, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: debug.dbg.elf, type: SAMPLE
          Source: Yara matchFile source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: debug.dbg.elf PID: 5428, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: debug.dbg.elf PID: 5430, type: MEMORYSTR
          Source: Yara matchFile source: debug.dbg.elf, type: SAMPLE
          Source: Yara matchFile source: 5430.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5428.1.0000000008048000.0000000008059000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: debug.dbg.elf PID: 5428, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: debug.dbg.elf PID: 5430, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          File Deletion
          OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          SourceDetectionScannerLabelLink
          debug.dbg.elf47%ReversingLabsLinux.Backdoor.Mirai
          debug.dbg.elf100%AviraEXP/ELF.Mirai.Z.A
          debug.dbg.elf100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          daisy.ubuntu.com
          162.213.35.25
          truefalse
            high
            servers.vlrt-gap.com
            185.196.11.47
            truefalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              185.196.11.47
              servers.vlrt-gap.comSwitzerland
              42624SIMPLECARRIERCHfalse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              185.196.11.47zmap.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                zmap.arm.elfGet hashmaliciousMirai, OkiruBrowse
                  zmap.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                    zmap.spc.elfGet hashmaliciousMirai, OkiruBrowse
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      daisy.ubuntu.comzmap.arm6.elfGet hashmaliciousMirai, OkiruBrowse
                      • 162.213.35.25
                      mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                      • 162.213.35.25
                      x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                      • 162.213.35.25
                      powerpc.elfGet hashmaliciousGafgyt, MiraiBrowse
                      • 162.213.35.25
                      armv7l.elfGet hashmaliciousGafgyt, MiraiBrowse
                      • 162.213.35.25
                      8lSWx5kumf.elfGet hashmaliciousUnknownBrowse
                      • 162.213.35.25
                      UrVQpxwfbD.elfGet hashmaliciousUnknownBrowse
                      • 162.213.35.24
                      JvkHaM3iKq.elfGet hashmaliciousUnknownBrowse
                      • 162.213.35.25
                      tonGZTd9mB.elfGet hashmaliciousUnknownBrowse
                      • 162.213.35.24
                      43cJfyWWpz.elfGet hashmaliciousUnknownBrowse
                      • 162.213.35.24
                      servers.vlrt-gap.comzmap.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                      • 185.196.11.47
                      zmap.arm.elfGet hashmaliciousMirai, OkiruBrowse
                      • 185.196.11.47
                      zmap.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                      • 185.196.11.47
                      zmap.spc.elfGet hashmaliciousMirai, OkiruBrowse
                      • 185.196.11.47
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      SIMPLECARRIERCHzmap.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                      • 185.196.11.47
                      zmap.arm.elfGet hashmaliciousMirai, OkiruBrowse
                      • 185.196.11.47
                      zmap.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                      • 185.196.11.47
                      zmap.spc.elfGet hashmaliciousMirai, OkiruBrowse
                      • 185.196.11.47
                      7rTjhbfF6L.exeGet hashmaliciousUnknownBrowse
                      • 185.196.9.156
                      93z4kPX7B6.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                      • 185.196.9.150
                      GZC0n65Ggl.exeGet hashmaliciousAgentTeslaBrowse
                      • 185.196.9.150
                      mG93k6iBl4.exeGet hashmaliciousAgentTeslaBrowse
                      • 185.196.9.150
                      Z4ChhoiwJW.exeGet hashmaliciousAgentTeslaBrowse
                      • 185.196.9.150
                      7Zur2FiS0p.exeGet hashmaliciousAgentTeslaBrowse
                      • 185.196.9.150
                      No context
                      No context
                      No created / dropped files found
                      File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                      Entropy (8bit):6.453517897143666
                      TrID:
                      • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                      • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                      File name:debug.dbg.elf
                      File size:70'832 bytes
                      MD5:26b5dcf45af8da6946cd105da9278d17
                      SHA1:192368781bc07ef7656ab5bd473498277e9221d3
                      SHA256:58ae44588d4bc2d3c7d376900403ea0874958641c452fd24d58d7307104e3b4f
                      SHA512:3f82f7e284c55ca5e0b6c65ad96fb99152eafc431ca5e35a84c446e7aa3e192b9f6a6eeab399dae9e67b48d8122626ceedfd51c986acbf6af7ff9dc629b8da72
                      SSDEEP:1536:bSKRI7C2wEI5Z5u68+I/UCCPB4+7EsKoZxogcahTxDPoui7N1OF9Qmjj:bSKRI7C2wEI5fxCCp4+7EsKoZegcahTl
                      TLSH:BF635BC4F943C8B6FD160630217BEB775FB2F1B91358EE43D7A89972E862641E501A8C
                      File Content Preview:.ELF....................d...4... .......4. ...(......................................................... *..........Q.td............................U..S.......w....h....S...[]...$.............U......=.....t..5....$......$.......u........t....h............

                      ELF header

                      Class:ELF32
                      Data:2's complement, little endian
                      Version:1 (current)
                      Machine:Intel 80386
                      Version Number:0x1
                      Type:EXEC (Executable file)
                      OS/ABI:UNIX - System V
                      ABI Version:0
                      Entry Point Address:0x8048164
                      Flags:0x0
                      ELF Header Size:52
                      Program Header Offset:52
                      Program Header Size:32
                      Number of Program Headers:3
                      Section Header Offset:70432
                      Section Header Size:40
                      Number of Section Headers:10
                      Header String Table Index:9
                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                      NULL0x00x00x00x00x0000
                      .initPROGBITS0x80480940x940x1c0x00x6AX001
                      .textPROGBITS0x80480b00xb00xd9760x00x6AX0016
                      .finiPROGBITS0x8055a260xda260x170x00x6AX001
                      .rodataPROGBITS0x8055a400xda400x2bdc0x00x2A0032
                      .ctorsPROGBITS0x80590000x110000x80x00x3WA004
                      .dtorsPROGBITS0x80590080x110080x80x00x3WA004
                      .dataPROGBITS0x80590200x110200x2c00x00x3WA0032
                      .bssNOBITS0x80592e00x112e00x27400x00x3WA0032
                      .shstrtabSTRTAB0x00x112e00x3e0x00x0001
                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                      LOAD0x00x80480000x80480000x1061c0x1061c6.62190x5R E0x1000.init .text .fini .rodata
                      LOAD0x110000x80590000x80590000x2e00x2a203.76970x6RW 0x1000.ctors .dtors .data .bss
                      GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 16, 2024 15:08:56.885770082 CET3545059962192.168.2.13185.196.11.47
                      Dec 16, 2024 15:08:57.006700993 CET5996235450185.196.11.47192.168.2.13
                      Dec 16, 2024 15:08:57.006840944 CET3545059962192.168.2.13185.196.11.47
                      Dec 16, 2024 15:08:57.006886005 CET3545059962192.168.2.13185.196.11.47
                      Dec 16, 2024 15:08:57.126658916 CET5996235450185.196.11.47192.168.2.13
                      Dec 16, 2024 15:08:57.126801968 CET3545059962192.168.2.13185.196.11.47
                      Dec 16, 2024 15:08:57.247669935 CET5996235450185.196.11.47192.168.2.13
                      Dec 16, 2024 15:08:58.285420895 CET5996235450185.196.11.47192.168.2.13
                      Dec 16, 2024 15:08:58.285712957 CET3545059962192.168.2.13185.196.11.47
                      Dec 16, 2024 15:08:58.285712957 CET3545059962192.168.2.13185.196.11.47
                      Dec 16, 2024 15:08:58.420083046 CET3545259962192.168.2.13185.196.11.47
                      Dec 16, 2024 15:08:58.539995909 CET5996235452185.196.11.47192.168.2.13
                      Dec 16, 2024 15:08:58.540154934 CET3545259962192.168.2.13185.196.11.47
                      Dec 16, 2024 15:08:58.540237904 CET3545259962192.168.2.13185.196.11.47
                      Dec 16, 2024 15:08:58.662105083 CET5996235452185.196.11.47192.168.2.13
                      Dec 16, 2024 15:08:58.662405968 CET3545259962192.168.2.13185.196.11.47
                      Dec 16, 2024 15:08:58.783272028 CET5996235452185.196.11.47192.168.2.13
                      Dec 16, 2024 15:09:08.546917915 CET3545259962192.168.2.13185.196.11.47
                      Dec 16, 2024 15:09:08.666728973 CET5996235452185.196.11.47192.168.2.13
                      Dec 16, 2024 15:09:08.956975937 CET5996235452185.196.11.47192.168.2.13
                      Dec 16, 2024 15:09:08.957247019 CET3545259962192.168.2.13185.196.11.47
                      Dec 16, 2024 15:09:40.737667084 CET3545259962192.168.2.13185.196.11.47
                      Dec 16, 2024 15:09:40.858195066 CET5996235452185.196.11.47192.168.2.13
                      Dec 16, 2024 15:09:40.858287096 CET3545259962192.168.2.13185.196.11.47
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 16, 2024 15:08:56.751081944 CET3602853192.168.2.138.8.8.8
                      Dec 16, 2024 15:08:56.885327101 CET53360288.8.8.8192.168.2.13
                      Dec 16, 2024 15:08:58.285846949 CET5152053192.168.2.138.8.8.8
                      Dec 16, 2024 15:08:58.419897079 CET53515208.8.8.8192.168.2.13
                      Dec 16, 2024 15:11:41.481530905 CET3611153192.168.2.131.1.1.1
                      Dec 16, 2024 15:11:41.481652021 CET3283953192.168.2.131.1.1.1
                      Dec 16, 2024 15:11:41.709012985 CET53328391.1.1.1192.168.2.13
                      Dec 16, 2024 15:11:41.710849047 CET53361111.1.1.1192.168.2.13
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Dec 16, 2024 15:08:56.751081944 CET192.168.2.138.8.8.80x9d5dStandard query (0)servers.vlrt-gap.comA (IP address)IN (0x0001)false
                      Dec 16, 2024 15:08:58.285846949 CET192.168.2.138.8.8.80x615dStandard query (0)servers.vlrt-gap.comA (IP address)IN (0x0001)false
                      Dec 16, 2024 15:11:41.481530905 CET192.168.2.131.1.1.10x5817Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                      Dec 16, 2024 15:11:41.481652021 CET192.168.2.131.1.1.10x703bStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Dec 16, 2024 15:08:56.885327101 CET8.8.8.8192.168.2.130x9d5dNo error (0)servers.vlrt-gap.com185.196.11.47A (IP address)IN (0x0001)false
                      Dec 16, 2024 15:08:58.419897079 CET8.8.8.8192.168.2.130x615dNo error (0)servers.vlrt-gap.com185.196.11.47A (IP address)IN (0x0001)false
                      Dec 16, 2024 15:11:41.710849047 CET1.1.1.1192.168.2.130x5817No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                      Dec 16, 2024 15:11:41.710849047 CET1.1.1.1192.168.2.130x5817No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                      System Behavior

                      Start time (UTC):14:08:55
                      Start date (UTC):16/12/2024
                      Path:/tmp/debug.dbg.elf
                      Arguments:/tmp/debug.dbg.elf
                      File size:70832 bytes
                      MD5 hash:26b5dcf45af8da6946cd105da9278d17

                      Start time (UTC):14:08:56
                      Start date (UTC):16/12/2024
                      Path:/tmp/debug.dbg.elf
                      Arguments:-
                      File size:70832 bytes
                      MD5 hash:26b5dcf45af8da6946cd105da9278d17