Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
armv5l.elf

Overview

General Information

Sample name:armv5l.elf
Analysis ID:1577634
MD5:e7b17298f65f3f57e7a54ced1ebd086c
SHA1:07c85ef3ae3ca64235fed9bc2ce798aee138c962
SHA256:a3eae8ee4664358f5549c9092d56c56b83eecd2fb0f77163f5badabcca1d8a82
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1577634
Start date and time:2024-12-18 16:12:58 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 22s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:armv5l.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/0@0/0
  • VT rate limit hit for: armv5l.elf
Command:/tmp/armv5l.elf
PID:5442
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
listening tun0
Standard Error:
  • system is lnxubuntu20
  • armv5l.elf (PID: 5442, Parent: 5368, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/armv5l.elf
  • dash New Fork (PID: 5448, Parent: 3578)
  • rm (PID: 5448, Parent: 3578, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.ftYXJYP6tI /tmp/tmp.FBWkXoeMrN /tmp/tmp.OapQiIdWqN
  • dash New Fork (PID: 5449, Parent: 3578)
  • cat (PID: 5449, Parent: 3578, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.ftYXJYP6tI
  • dash New Fork (PID: 5450, Parent: 3578)
  • head (PID: 5450, Parent: 3578, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5451, Parent: 3578)
  • tr (PID: 5451, Parent: 3578, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5452, Parent: 3578)
  • cut (PID: 5452, Parent: 3578, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5453, Parent: 3578)
  • cat (PID: 5453, Parent: 3578, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.ftYXJYP6tI
  • dash New Fork (PID: 5454, Parent: 3578)
  • head (PID: 5454, Parent: 3578, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5455, Parent: 3578)
  • tr (PID: 5455, Parent: 3578, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5456, Parent: 3578)
  • cut (PID: 5456, Parent: 3578, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5457, Parent: 3578)
  • rm (PID: 5457, Parent: 3578, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.ftYXJYP6tI /tmp/tmp.FBWkXoeMrN /tmp/tmp.OapQiIdWqN
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
armv5l.elfJoeSecurity_Mirai_9Yara detected MiraiJoe Security
    armv5l.elfJoeSecurity_Mirai_5Yara detected MiraiJoe Security
      armv5l.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
      • 0x12048:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
      armv5l.elfMirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
      • 0x11d1c:$x1: POST /cdn-cgi/
      • 0x120cc:$x2: /dev/misc/watchdog
      • 0x120bc:$x3: /dev/watchdog
      • 0x12158:$s1: LCOGQGPTGP
      • 0x12104:$s6: NKQVGLKLE
      armv5l.elfMAL_ELF_LNX_Mirai_Oct10_2Detects ELF malware Mirai relatedFlorian Roth
      • 0x11d1c:$c01: 50 4F 53 54 20 2F 63 64 6E 2D 63 67 69 2F 00 00 20 48 54 54 50 2F 31 2E 31 0D 0A 55 73 65 72 2D 41 67 65 6E 74 3A 20 00 0D 0A 48 6F 73 74 3A
      SourceRuleDescriptionAuthorStrings
      5442.1.00007f76a0017000.00007f76a002a000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
        5442.1.00007f76a0017000.00007f76a002a000.r-x.sdmpJoeSecurity_Mirai_5Yara detected MiraiJoe Security
          5442.1.00007f76a0017000.00007f76a002a000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
          • 0x12048:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
          5442.1.00007f76a0017000.00007f76a002a000.r-x.sdmpMirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
          • 0x11d1c:$x1: POST /cdn-cgi/
          • 0x120cc:$x2: /dev/misc/watchdog
          • 0x120bc:$x3: /dev/watchdog
          • 0x12158:$s1: LCOGQGPTGP
          • 0x12104:$s6: NKQVGLKLE
          5442.1.00007f76a0017000.00007f76a002a000.r-x.sdmpMAL_ELF_LNX_Mirai_Oct10_2Detects ELF malware Mirai relatedFlorian Roth
          • 0x11d1c:$c01: 50 4F 53 54 20 2F 63 64 6E 2D 63 67 69 2F 00 00 20 48 54 54 50 2F 31 2E 31 0D 0A 55 73 65 72 2D 41 67 65 6E 74 3A 20 00 0D 0A 48 6F 73 74 3A
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: armv5l.elfAvira: detected
          Source: armv5l.elfReversingLabs: Detection: 50%
          Source: unknownHTTPS traffic detected: 34.243.160.129:443 -> 192.168.2.13:50530 version: TLS 1.2
          Source: global trafficTCP traffic: 192.168.2.13:51756 -> 31.13.224.244:8888
          Source: /tmp/armv5l.elf (PID: 5442)Socket: 127.0.0.1:41286Jump to behavior
          Source: unknownTCP traffic detected without corresponding DNS query: 31.13.224.244
          Source: unknownTCP traffic detected without corresponding DNS query: 31.13.224.244
          Source: unknownTCP traffic detected without corresponding DNS query: 31.13.224.244
          Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
          Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
          Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
          Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
          Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
          Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
          Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
          Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
          Source: unknownTCP traffic detected without corresponding DNS query: 31.13.224.244
          Source: unknownTCP traffic detected without corresponding DNS query: 31.13.224.244
          Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
          Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
          Source: unknownTCP traffic detected without corresponding DNS query: 31.13.224.244
          Source: unknownTCP traffic detected without corresponding DNS query: 31.13.224.244
          Source: unknownNetwork traffic detected: HTTP traffic on port 50530 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 48202 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50530
          Source: unknownHTTPS traffic detected: 34.243.160.129:443 -> 192.168.2.13:50530 version: TLS 1.2

          System Summary

          barindex
          Source: armv5l.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: armv5l.elf, type: SAMPLEMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: armv5l.elf, type: SAMPLEMatched rule: Detects ELF malware Mirai related Author: Florian Roth
          Source: 5442.1.00007f76a0017000.00007f76a002a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
          Source: 5442.1.00007f76a0017000.00007f76a002a000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
          Source: 5442.1.00007f76a0017000.00007f76a002a000.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: armv5l.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: armv5l.elf, type: SAMPLEMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: armv5l.elf, type: SAMPLEMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
          Source: 5442.1.00007f76a0017000.00007f76a002a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
          Source: 5442.1.00007f76a0017000.00007f76a002a000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
          Source: 5442.1.00007f76a0017000.00007f76a002a000.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
          Source: classification engineClassification label: mal84.troj.evad.linELF@0/0@0/0
          Source: /usr/bin/dash (PID: 5448)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.ftYXJYP6tI /tmp/tmp.FBWkXoeMrN /tmp/tmp.OapQiIdWqNJump to behavior
          Source: /usr/bin/dash (PID: 5457)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.ftYXJYP6tI /tmp/tmp.FBWkXoeMrN /tmp/tmp.OapQiIdWqNJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: /tmp/armv5l.elf (PID: 5442)File: /tmp/armv5l.elfJump to behavior
          Source: /tmp/armv5l.elf (PID: 5442)Queries kernel information via 'uname': Jump to behavior
          Source: /tmp/armv5l.elf (PID: 5444)Queries kernel information via 'uname': Jump to behavior
          Source: armv5l.elf, 5442.1.00007ffed0fdd000.00007ffed0ffe000.rw-.sdmpBinary or memory string: Jx86_64/usr/bin/qemu-arm/tmp/armv5l.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/armv5l.elf
          Source: armv5l.elf, 5442.1.0000559d2b01c000.0000559d2b14a000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
          Source: armv5l.elf, 5442.1.0000559d2b01c000.0000559d2b14a000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
          Source: armv5l.elf, 5442.1.00007ffed0fdd000.00007ffed0ffe000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: armv5l.elf, type: SAMPLE
          Source: Yara matchFile source: 5442.1.00007f76a0017000.00007f76a002a000.r-x.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: armv5l.elf, type: SAMPLE
          Source: Yara matchFile source: 5442.1.00007f76a0017000.00007f76a002a000.r-x.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
          File Deletion
          OS Credential Dumping11
          Security Software Discovery
          Remote ServicesData from Local System1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          SourceDetectionScannerLabelLink
          armv5l.elf50%ReversingLabsLinux.Backdoor.Mirai
          armv5l.elf100%AviraLINUX/Mirai.bonb
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          185.125.190.26
          unknownUnited Kingdom
          41231CANONICAL-ASGBfalse
          31.13.224.244
          unknownBulgaria
          48584SARNICA-ASBGfalse
          34.243.160.129
          unknownUnited States
          16509AMAZON-02USfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          185.125.190.26sshd.elfGet hashmaliciousUnknownBrowse
            la.bot.sparc.elfGet hashmaliciousMiraiBrowse
              la.bot.arm.elfGet hashmaliciousMiraiBrowse
                la.bot.sh4.elfGet hashmaliciousMiraiBrowse
                  mips.elfGet hashmaliciousMiraiBrowse
                    la.bot.sparc.elfGet hashmaliciousMiraiBrowse
                      la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                        la.bot.arc.elfGet hashmaliciousMiraiBrowse
                          5544x64.elfGet hashmaliciousConnectBackBrowse
                            ppc.elfGet hashmaliciousMiraiBrowse
                              31.13.224.244mipsel.elfGet hashmaliciousMiraiBrowse
                                m68k.elfGet hashmaliciousMiraiBrowse
                                  powerpc.elfGet hashmaliciousMiraiBrowse
                                    x86_64.elfGet hashmaliciousMiraiBrowse
                                      sparc.elfGet hashmaliciousMiraiBrowse
                                        i686.elfGet hashmaliciousMiraiBrowse
                                          mips.elfGet hashmaliciousMiraiBrowse
                                            sh4.elfGet hashmaliciousMiraiBrowse
                                              armv4l.elfGet hashmaliciousMiraiBrowse
                                                armv6l.elfGet hashmaliciousMiraiBrowse
                                                  34.243.160.129rebirth.arm5.elfGet hashmaliciousGafgytBrowse
                                                    arm5.elfGet hashmaliciousGafgyt, Mirai, OkiruBrowse
                                                      atlas.arm4.elfGet hashmaliciousUnknownBrowse
                                                        vqsjh4.elfGet hashmaliciousMiraiBrowse
                                                          la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                            jwwofba5.elfGet hashmaliciousMiraiBrowse
                                                              qkehusl.elfGet hashmaliciousMiraiBrowse
                                                                x-8.6-.ISIS.elfGet hashmaliciousGafgytBrowse
                                                                  main_mpsl.elfGet hashmaliciousUnknownBrowse
                                                                    SecuriteInfo.com.Trojan.Linux.GenericKD.28459.8905.27219.elfGet hashmaliciousUnknownBrowse
                                                                      No context
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      AMAZON-02USla.bot.arm.elfGet hashmaliciousMiraiBrowse
                                                                      • 34.254.182.186
                                                                      https://launch.app/plainsartGet hashmaliciousHTMLPhisherBrowse
                                                                      • 76.76.21.21
                                                                      https://heyzine.com/flip-book/f976862c0c.htmlGet hashmaliciousUnknownBrowse
                                                                      • 35.157.30.249
                                                                      https://pluginvest.freshdesk.com/en/support/solutions/articles/157000010678-pluginvest-laadoplossingGet hashmaliciousUnknownBrowse
                                                                      • 108.158.75.74
                                                                      http://recp.mkt81.net/ctt?m=9201264&r=MjcwMzc5ODk4MTM3S0&b=0&j=MTY4MDU5NzgyOAS2&k=Language&kx=1&kt=12&kd=//docs.google.com/drawings/d/1GBvP8EGp9_63LeC_UMSYm_dkcuk4Q6yrMmrOzMDg_wk/preview?pli=1Get hashmaliciousUnknownBrowse
                                                                      • 99.79.158.237
                                                                      Nuevo pedido de cotizaci#U00f3n 663837 4899272.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      • 3.130.71.34
                                                                      VJQyKuHEUe.exeGet hashmaliciousUnknownBrowse
                                                                      • 3.5.237.31
                                                                      loligang.arm.elfGet hashmaliciousMiraiBrowse
                                                                      • 184.79.152.88
                                                                      sxVHUOSqVC.exeGet hashmaliciousUnknownBrowse
                                                                      • 52.95.160.49
                                                                      R0SkdJNujW.exeGet hashmaliciousUnknownBrowse
                                                                      • 52.95.162.53
                                                                      SARNICA-ASBGmipsel.elfGet hashmaliciousMiraiBrowse
                                                                      • 31.13.224.244
                                                                      m68k.elfGet hashmaliciousMiraiBrowse
                                                                      • 31.13.224.244
                                                                      powerpc.elfGet hashmaliciousMiraiBrowse
                                                                      • 31.13.224.244
                                                                      x86_64.elfGet hashmaliciousMiraiBrowse
                                                                      • 31.13.224.244
                                                                      sparc.elfGet hashmaliciousMiraiBrowse
                                                                      • 31.13.224.244
                                                                      i686.elfGet hashmaliciousMiraiBrowse
                                                                      • 31.13.224.244
                                                                      mips.elfGet hashmaliciousMiraiBrowse
                                                                      • 31.13.224.244
                                                                      sh4.elfGet hashmaliciousMiraiBrowse
                                                                      • 31.13.224.244
                                                                      armv4l.elfGet hashmaliciousMiraiBrowse
                                                                      • 31.13.224.244
                                                                      armv6l.elfGet hashmaliciousMiraiBrowse
                                                                      • 31.13.224.244
                                                                      CANONICAL-ASGBla.bot.arm6.elfGet hashmaliciousMiraiBrowse
                                                                      • 91.189.91.42
                                                                      la.bot.mips.elfGet hashmaliciousMiraiBrowse
                                                                      • 91.189.91.42
                                                                      sshd.elfGet hashmaliciousUnknownBrowse
                                                                      • 185.125.190.26
                                                                      la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                                                      • 91.189.91.42
                                                                      la.bot.sparc.elfGet hashmaliciousMiraiBrowse
                                                                      • 91.189.91.42
                                                                      la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                                                                      • 91.189.91.42
                                                                      m68k.elfGet hashmaliciousMiraiBrowse
                                                                      • 91.189.91.42
                                                                      loligang.m68k.elfGet hashmaliciousMiraiBrowse
                                                                      • 91.189.91.42
                                                                      la.bot.sparc.elfGet hashmaliciousMiraiBrowse
                                                                      • 185.125.190.26
                                                                      m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                      • 91.189.91.42
                                                                      No context
                                                                      No context
                                                                      No created / dropped files found
                                                                      File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                                                                      Entropy (8bit):6.028158661586515
                                                                      TrID:
                                                                      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                      File name:armv5l.elf
                                                                      File size:82'112 bytes
                                                                      MD5:e7b17298f65f3f57e7a54ced1ebd086c
                                                                      SHA1:07c85ef3ae3ca64235fed9bc2ce798aee138c962
                                                                      SHA256:a3eae8ee4664358f5549c9092d56c56b83eecd2fb0f77163f5badabcca1d8a82
                                                                      SHA512:07e81b9cd69b7af6bd3aa8eb5a1321e3f559232559b1047b4b44d70b8ac51ba594b8bc34e06ea8846f2e22f18f4c65afe6b3107a24307c2c475349e9a0237f86
                                                                      SSDEEP:1536:6cnGffv5skneNwYU3y8+iJVu6R49kSa/Qtejtdlli5iXmQhZvMX:AffxsG2wB3p+iW6ikSa/QteWtQhVMX
                                                                      TLSH:D1830A45FD428F11D4D932BAFA6E008D3313ABB9E3EE7112D9215F5023C699B0EB7612
                                                                      File Content Preview:.ELF..............(.........4....=......4. ...(........p.)...........................................*...*...............0...0...0.......6...............0...0...0..................Q.td..................................-...L..................@-.,@...0....S

                                                                      ELF header

                                                                      Class:ELF32
                                                                      Data:2's complement, little endian
                                                                      Version:1 (current)
                                                                      Machine:ARM
                                                                      Version Number:0x1
                                                                      Type:EXEC (Executable file)
                                                                      OS/ABI:UNIX - System V
                                                                      ABI Version:0
                                                                      Entry Point Address:0x8194
                                                                      Flags:0x4000002
                                                                      ELF Header Size:52
                                                                      Program Header Offset:52
                                                                      Program Header Size:32
                                                                      Number of Program Headers:5
                                                                      Section Header Offset:81392
                                                                      Section Header Size:40
                                                                      Number of Section Headers:18
                                                                      Header String Table Index:17
                                                                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                      NULL0x00x00x00x00x0000
                                                                      .initPROGBITS0x80d40xd40x100x00x6AX004
                                                                      .textPROGBITS0x80f00xf00x11be80x00x6AX0016
                                                                      .finiPROGBITS0x19cd80x11cd80x100x00x6AX004
                                                                      .rodataPROGBITS0x19ce80x11ce80xc000x00x2A004
                                                                      .ARM.extabPROGBITS0x1a8e80x128e80x180x00x2A004
                                                                      .ARM.exidxARM_EXIDX0x1a9000x129000x1180x00x82AL204
                                                                      .eh_framePROGBITS0x230000x130000x40x00x3WA004
                                                                      .tbssNOBITS0x230040x130040x80x00x403WAT004
                                                                      .init_arrayINIT_ARRAY0x230040x130040x40x00x3WA004
                                                                      .fini_arrayFINI_ARRAY0x230080x130080x40x00x3WA004
                                                                      .jcrPROGBITS0x2300c0x1300c0x40x00x3WA004
                                                                      .gotPROGBITS0x230100x130100xa80x40x3WA004
                                                                      .dataPROGBITS0x230b80x130b80x3440x00x3WA004
                                                                      .bssNOBITS0x233fc0x133fc0x32e40x00x3WA004
                                                                      .commentPROGBITS0x00x133fc0x94c0x00x0001
                                                                      .ARM.attributesARM_ATTRIBUTES0x00x13d480x160x00x0001
                                                                      .shstrtabSTRTAB0x00x13d5e0x910x00x0001
                                                                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                      EXIDX0x129000x1a9000x1a9000x1180x1184.42290x4R 0x4.ARM.exidx
                                                                      LOAD0x00x80000x80000x12a180x12a186.07040x5R E0x8000.init .text .fini .rodata .ARM.extab .ARM.exidx
                                                                      LOAD0x130000x230000x230000x3fc0x36e03.88430x6RW 0x8000.eh_frame .tbss .init_array .fini_array .jcr .got .data .bss
                                                                      TLS0x130040x230040x230040x00x80.00000x4R 0x4.tbss
                                                                      GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Dec 18, 2024 16:13:37.810671091 CET517568888192.168.2.1331.13.224.244
                                                                      Dec 18, 2024 16:13:37.930237055 CET88885175631.13.224.244192.168.2.13
                                                                      Dec 18, 2024 16:13:37.930445910 CET517568888192.168.2.1331.13.224.244
                                                                      Dec 18, 2024 16:13:37.937243938 CET517568888192.168.2.1331.13.224.244
                                                                      Dec 18, 2024 16:13:38.056711912 CET88885175631.13.224.244192.168.2.13
                                                                      Dec 18, 2024 16:13:40.456705093 CET4435053034.243.160.129192.168.2.13
                                                                      Dec 18, 2024 16:13:40.456758022 CET4435053034.243.160.129192.168.2.13
                                                                      Dec 18, 2024 16:13:40.456773996 CET4435053034.243.160.129192.168.2.13
                                                                      Dec 18, 2024 16:13:40.456871033 CET50530443192.168.2.1334.243.160.129
                                                                      Dec 18, 2024 16:13:40.456916094 CET50530443192.168.2.1334.243.160.129
                                                                      Dec 18, 2024 16:13:40.457743883 CET50530443192.168.2.1334.243.160.129
                                                                      Dec 18, 2024 16:13:40.577208996 CET4435053034.243.160.129192.168.2.13
                                                                      Dec 18, 2024 16:13:40.866955042 CET4435053034.243.160.129192.168.2.13
                                                                      Dec 18, 2024 16:13:40.867072105 CET50530443192.168.2.1334.243.160.129
                                                                      Dec 18, 2024 16:13:40.867248058 CET50530443192.168.2.1334.243.160.129
                                                                      Dec 18, 2024 16:13:40.987557888 CET4435053034.243.160.129192.168.2.13
                                                                      Dec 18, 2024 16:13:41.413798094 CET4435053034.243.160.129192.168.2.13
                                                                      Dec 18, 2024 16:13:41.414005041 CET50530443192.168.2.1334.243.160.129
                                                                      Dec 18, 2024 16:13:41.415137053 CET50530443192.168.2.1334.243.160.129
                                                                      Dec 18, 2024 16:13:41.535404921 CET4435053034.243.160.129192.168.2.13
                                                                      Dec 18, 2024 16:13:41.535466909 CET50530443192.168.2.1334.243.160.129
                                                                      Dec 18, 2024 16:13:47.946182966 CET517568888192.168.2.1331.13.224.244
                                                                      Dec 18, 2024 16:13:48.065895081 CET88885175631.13.224.244192.168.2.13
                                                                      Dec 18, 2024 16:13:48.337966919 CET88885175631.13.224.244192.168.2.13
                                                                      Dec 18, 2024 16:13:48.338085890 CET517568888192.168.2.1331.13.224.244
                                                                      Dec 18, 2024 16:13:49.067223072 CET48202443192.168.2.13185.125.190.26
                                                                      Dec 18, 2024 16:14:21.323292971 CET48202443192.168.2.13185.125.190.26
                                                                      Dec 18, 2024 16:14:48.387238979 CET517568888192.168.2.1331.13.224.244
                                                                      Dec 18, 2024 16:14:48.506963015 CET88885175631.13.224.244192.168.2.13
                                                                      Dec 18, 2024 16:14:48.779326916 CET88885175631.13.224.244192.168.2.13
                                                                      Dec 18, 2024 16:14:48.779547930 CET517568888192.168.2.1331.13.224.244
                                                                      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                      Dec 18, 2024 16:13:40.456773996 CET34.243.160.129443192.168.2.1350530CN=motd.ubuntu.com CN=R11, O=Let's Encrypt, C=USCN=R11, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USMon Oct 21 10:21:37 CEST 2024 Wed Mar 13 01:00:00 CET 2024Sun Jan 19 09:21:36 CET 2025 Sat Mar 13 00:59:59 CET 2027
                                                                      CN=R11, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USWed Mar 13 01:00:00 CET 2024Sat Mar 13 00:59:59 CET 2027

                                                                      System Behavior

                                                                      Start time (UTC):15:13:36
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/tmp/armv5l.elf
                                                                      Arguments:/tmp/armv5l.elf
                                                                      File size:4956856 bytes
                                                                      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                                      Start time (UTC):15:13:37
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/tmp/armv5l.elf
                                                                      Arguments:-
                                                                      File size:4956856 bytes
                                                                      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/dash
                                                                      Arguments:-
                                                                      File size:129816 bytes
                                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/rm
                                                                      Arguments:rm -f /tmp/tmp.ftYXJYP6tI /tmp/tmp.FBWkXoeMrN /tmp/tmp.OapQiIdWqN
                                                                      File size:72056 bytes
                                                                      MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/dash
                                                                      Arguments:-
                                                                      File size:129816 bytes
                                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/cat
                                                                      Arguments:cat /tmp/tmp.ftYXJYP6tI
                                                                      File size:43416 bytes
                                                                      MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/dash
                                                                      Arguments:-
                                                                      File size:129816 bytes
                                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/head
                                                                      Arguments:head -n 10
                                                                      File size:47480 bytes
                                                                      MD5 hash:fd96a67145172477dd57131396fc9608

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/dash
                                                                      Arguments:-
                                                                      File size:129816 bytes
                                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/tr
                                                                      Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                                                                      File size:51544 bytes
                                                                      MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/dash
                                                                      Arguments:-
                                                                      File size:129816 bytes
                                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/cut
                                                                      Arguments:cut -c -80
                                                                      File size:47480 bytes
                                                                      MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/dash
                                                                      Arguments:-
                                                                      File size:129816 bytes
                                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/cat
                                                                      Arguments:cat /tmp/tmp.ftYXJYP6tI
                                                                      File size:43416 bytes
                                                                      MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/dash
                                                                      Arguments:-
                                                                      File size:129816 bytes
                                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/head
                                                                      Arguments:head -n 10
                                                                      File size:47480 bytes
                                                                      MD5 hash:fd96a67145172477dd57131396fc9608

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/dash
                                                                      Arguments:-
                                                                      File size:129816 bytes
                                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/tr
                                                                      Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                                                                      File size:51544 bytes
                                                                      MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/dash
                                                                      Arguments:-
                                                                      File size:129816 bytes
                                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/cut
                                                                      Arguments:cut -c -80
                                                                      File size:47480 bytes
                                                                      MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/dash
                                                                      Arguments:-
                                                                      File size:129816 bytes
                                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                      Start time (UTC):15:13:40
                                                                      Start date (UTC):18/12/2024
                                                                      Path:/usr/bin/rm
                                                                      Arguments:rm -f /tmp/tmp.ftYXJYP6tI /tmp/tmp.FBWkXoeMrN /tmp/tmp.OapQiIdWqN
                                                                      File size:72056 bytes
                                                                      MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b