Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
boatnet.sh4.elf

Overview

General Information

Sample name:boatnet.sh4.elf
Analysis ID:1577824
MD5:e5d6669a161edc9db097940eb996a0cd
SHA1:8046af4533c45c5eec1f1576bc0bfeb9b2d0afb7
SHA256:37edfff53329b5314b8731ddac1f7494a123ba5e6ed8055f4859cd6d08264fd2
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:92
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample tries to kill multiple processes (SIGKILL)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1577824
Start date and time:2024-12-18 19:32:13 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 12s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:boatnet.sh4.elf
Detection:MAL
Classification:mal92.spre.troj.linELF@0/0@2/0
  • VT rate limit hit for: boatnet.sh4.elf
Command:/tmp/boatnet.sh4.elf
PID:5433
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • wrapper-2.0 (PID: 5450, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
  • wrapper-2.0 (PID: 5451, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
  • wrapper-2.0 (PID: 5452, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
  • wrapper-2.0 (PID: 5453, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
    • xfpm-power-backlight-helper (PID: 5470, Parent: 5453, MD5: 3d221ad23f28ca3259f599b1664e2427) Arguments: /usr/sbin/xfpm-power-backlight-helper --get-max-brightness
  • wrapper-2.0 (PID: 5454, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
  • wrapper-2.0 (PID: 5455, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
  • xfconfd (PID: 5472, Parent: 5471, MD5: 4c7a0d6d258bb970905b19b84abcd8e9) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
  • systemd New Fork (PID: 5482, Parent: 2935)
  • xfce4-notifyd (PID: 5482, Parent: 2935, MD5: eee956f1b227c1d5031f9c61223255d1) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
boatnet.sh4.elfJoeSecurity_Mirai_9Yara detected MiraiJoe Security
    boatnet.sh4.elfJoeSecurity_Mirai_5Yara detected MiraiJoe Security
      boatnet.sh4.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        boatnet.sh4.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0xd1e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd1fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd210:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd224:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd238:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd24c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd260:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd274:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd288:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd29c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd2b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd2c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd2d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd2ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd300:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd314:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd328:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd33c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd350:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd364:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xd378:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        boatnet.sh4.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
        • 0xd740:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
        Click to see the 2 entries
        SourceRuleDescriptionAuthorStrings
        5433.1.00007efee0400000.00007efee040f000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
          5433.1.00007efee0400000.00007efee040f000.r-x.sdmpJoeSecurity_Mirai_5Yara detected MiraiJoe Security
            5433.1.00007efee0400000.00007efee040f000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              5433.1.00007efee0400000.00007efee040f000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
              • 0xd1e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd1fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd210:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd224:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd238:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd24c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd260:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd274:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd288:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd29c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd2b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd2c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd2d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd2ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd300:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd314:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd328:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd33c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd350:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd364:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xd378:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              5433.1.00007efee0400000.00007efee040f000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
              • 0xd740:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
              Click to see the 28 entries
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: boatnet.sh4.elfAvira: detected
              Source: boatnet.sh4.elfReversingLabs: Detection: 71%
              Source: global trafficTCP traffic: 192.168.2.13:52186 -> 31.172.83.147:3778
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownTCP traffic detected without corresponding DNS query: 31.172.83.147
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

              System Summary

              barindex
              Source: boatnet.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: boatnet.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
              Source: boatnet.sh4.elf, type: SAMPLEMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
              Source: boatnet.sh4.elf, type: SAMPLEMatched rule: Detects ELF malware Mirai related Author: Florian Roth
              Source: 5433.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5433.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
              Source: 5433.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
              Source: 5433.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
              Source: 5439.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5439.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
              Source: 5439.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
              Source: 5439.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
              Source: 5437.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5437.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
              Source: 5437.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
              Source: 5437.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
              Source: Process Memory Space: boatnet.sh4.elf PID: 5433, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: boatnet.sh4.elf PID: 5433, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
              Source: Process Memory Space: boatnet.sh4.elf PID: 5437, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: boatnet.sh4.elf PID: 5437, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
              Source: Process Memory Space: boatnet.sh4.elf PID: 5439, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: boatnet.sh4.elf PID: 5439, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3104, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3161, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3162, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3163, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3164, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3165, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3170, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3182, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3208, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3212, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5439, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5450, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5451, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5452, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5453, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5454, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5455, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5472, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5482, result: successfulJump to behavior
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3104, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3161, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3162, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3163, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3164, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3165, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3170, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3182, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3208, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 3212, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5439, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5450, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5451, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5452, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5453, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5454, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5455, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5472, result: successfulJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)SIGKILL sent: pid: 5482, result: successfulJump to behavior
              Source: boatnet.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: boatnet.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
              Source: boatnet.sh4.elf, type: SAMPLEMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
              Source: boatnet.sh4.elf, type: SAMPLEMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
              Source: 5433.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5433.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
              Source: 5433.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
              Source: 5433.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
              Source: 5439.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5439.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
              Source: 5439.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
              Source: 5439.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
              Source: 5437.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5437.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
              Source: 5437.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
              Source: 5437.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
              Source: Process Memory Space: boatnet.sh4.elf PID: 5433, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: boatnet.sh4.elf PID: 5433, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
              Source: Process Memory Space: boatnet.sh4.elf PID: 5437, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: boatnet.sh4.elf PID: 5437, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
              Source: Process Memory Space: boatnet.sh4.elf PID: 5439, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: boatnet.sh4.elf PID: 5439, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
              Source: classification engineClassification label: mal92.spre.troj.linELF@0/0@2/0
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5450)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5451)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5452)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5453)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/local/share/fonts/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /home/saturnino/.local/share/fonts/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /home/saturnino/.fonts/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/X11/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/cMap/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/cmap/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/opentype/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/truetype/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/type1/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/X11/Type1/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/X11/encodings/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/X11/misc/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/X11/util/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/cmap/adobe-cns1/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/cmap/adobe-gb1/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/cmap/adobe-japan1/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/cmap/adobe-japan2/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/cmap/adobe-korea1/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/opentype/malayalam/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/opentype/mathjax/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/opentype/noto/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/opentype/urw-base35/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/truetype/Gargi/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/truetype/Gubbi/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/truetype/Nakula/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/truetype/Navilu/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /usr/share/fonts/truetype/Sahadeva/.uuidJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /home/saturnino/.cacheJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /home/saturnino/.localJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Directory: /home/saturnino/.configJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5455)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5472)Directory: /home/saturnino/.cacheJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5472)Directory: /home/saturnino/.localJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5472)Directory: /home/saturnino/.configJump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5472)Directory: /home/saturnino/.configJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3122/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3117/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3114/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/5379/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/5414/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/5415/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/914/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/518/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/519/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/5274/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3771/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3134/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3375/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3132/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3095/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1745/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1866/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/884/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1982/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/765/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3246/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/767/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1906/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/802/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1748/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3648/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3420/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1482/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1480/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1755/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1238/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1875/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/2964/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3413/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1751/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1872/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/2961/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1475/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/656/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/778/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/657/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/658/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/659/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/418/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/936/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/419/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3656/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/816/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3657/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/5439/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1879/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3658/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3659/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/5570/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/5450/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/5451/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/5452/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/5453/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/5454/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/5455/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1891/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3310/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3153/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/780/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/660/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1921/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/783/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1765/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/2974/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1400/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1884/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3424/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/2972/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3147/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/2970/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1881/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3146/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3300/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1805/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1925/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1804/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1648/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1922/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3429/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3442/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3165/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3164/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3163/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3162/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/790/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3161/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/792/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/793/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/672/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1930/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/795/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/674/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/3315/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/1411/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5435)File opened: /proc/2984/cmdlineJump to behavior
              Source: /tmp/boatnet.sh4.elf (PID: 5433)Queries kernel information via 'uname': Jump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5450)Queries kernel information via 'uname': Jump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5451)Queries kernel information via 'uname': Jump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5452)Queries kernel information via 'uname': Jump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5453)Queries kernel information via 'uname': Jump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5454)Queries kernel information via 'uname': Jump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5455)Queries kernel information via 'uname': Jump to behavior
              Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5482)Queries kernel information via 'uname': Jump to behavior
              Source: boatnet.sh4.elf, 5433.1.00007ffc40fe3000.00007ffc41004000.rw-.sdmp, boatnet.sh4.elf, 5437.1.00007ffc40fe3000.00007ffc41004000.rw-.sdmp, boatnet.sh4.elf, 5439.1.00007ffc40fe3000.00007ffc41004000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sh4/tmp/boatnet.sh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/boatnet.sh4.elf
              Source: boatnet.sh4.elf, 5433.1.00007ffc40fe3000.00007ffc41004000.rw-.sdmp, boatnet.sh4.elf, 5437.1.00007ffc40fe3000.00007ffc41004000.rw-.sdmp, boatnet.sh4.elf, 5439.1.00007ffc40fe3000.00007ffc41004000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
              Source: boatnet.sh4.elf, 5433.1.000055f94e498000.000055f94e4fb000.rw-.sdmp, boatnet.sh4.elf, 5437.1.000055f94e498000.000055f94e4fb000.rw-.sdmp, boatnet.sh4.elf, 5439.1.000055f94e498000.000055f94e4fb000.rw-.sdmpBinary or memory string: U5!/etc/qemu-binfmt/sh4
              Source: boatnet.sh4.elf, 5433.1.000055f94e498000.000055f94e4fb000.rw-.sdmp, boatnet.sh4.elf, 5437.1.000055f94e498000.000055f94e4fb000.rw-.sdmp, boatnet.sh4.elf, 5439.1.000055f94e498000.000055f94e4fb000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: boatnet.sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 5433.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5439.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5437.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: boatnet.sh4.elf PID: 5433, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: boatnet.sh4.elf PID: 5437, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: boatnet.sh4.elf PID: 5439, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: boatnet.sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 5433.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5439.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5437.1.00007efee0400000.00007efee040f000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: boatnet.sh4.elf PID: 5433, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: boatnet.sh4.elf PID: 5437, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: boatnet.sh4.elf PID: 5439, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
              Hidden Files and Directories
              1
              OS Credential Dumping
              11
              Security Software Discovery
              Remote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network Medium1
              Service Stop
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1577824 Sample: boatnet.sh4.elf Startdate: 18/12/2024 Architecture: LINUX Score: 92 24 31.172.83.147, 3778, 52186, 52188 DE-FIRSTCOLOwwwfirst-colonetDE Germany 2->24 26 daisy.ubuntu.com 2->26 28 Malicious sample detected (through community Yara rule) 2->28 30 Antivirus / Scanner detection for submitted sample 2->30 32 Multi AV Scanner detection for submitted file 2->32 34 Yara detected Mirai 2->34 7 boatnet.sh4.elf 2->7         started        9 xfce4-panel wrapper-2.0 2->9         started        11 xfce4-panel wrapper-2.0 2->11         started        13 6 other processes 2->13 signatures3 process4 process5 15 boatnet.sh4.elf 7->15         started        18 boatnet.sh4.elf 7->18         started        20 boatnet.sh4.elf 7->20         started        22 wrapper-2.0 xfpm-power-backlight-helper 9->22         started        signatures6 36 Sample tries to kill multiple processes (SIGKILL) 15->36

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              boatnet.sh4.elf71%ReversingLabsLinux.Trojan.Mirai
              boatnet.sh4.elf100%AviraLINUX/Mirai.bonb
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              daisy.ubuntu.com
              162.213.35.24
              truefalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                31.172.83.147
                unknownGermany
                44066DE-FIRSTCOLOwwwfirst-colonetDEfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                31.172.83.147boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                  main_x86.elfGet hashmaliciousMiraiBrowse
                    boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                      boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                        boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                          boatnet.x86.elfGet hashmaliciousMiraiBrowse
                            boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                              boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                  boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    daisy.ubuntu.comla.bot.mips.elfGet hashmaliciousMiraiBrowse
                                    • 162.213.35.24
                                    la.bot.arm6.elfGet hashmaliciousMiraiBrowse
                                    • 162.213.35.24
                                    boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                    • 162.213.35.24
                                    la.bot.arm.elfGet hashmaliciousMiraiBrowse
                                    • 162.213.35.25
                                    3.elfGet hashmaliciousUnknownBrowse
                                    • 162.213.35.24
                                    la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                                    • 162.213.35.25
                                    loligang.arm5.elfGet hashmaliciousMiraiBrowse
                                    • 162.213.35.25
                                    arm5.nn-20241218-1651.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 162.213.35.24
                                    la.bot.m68k.elfGet hashmaliciousMiraiBrowse
                                    • 162.213.35.24
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    DE-FIRSTCOLOwwwfirst-colonetDEboatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                    • 31.172.83.147
                                    236236236.elfGet hashmaliciousUnknownBrowse
                                    • 91.228.155.204
                                    main_x86.elfGet hashmaliciousMiraiBrowse
                                    • 31.172.83.147
                                    armv6l.elfGet hashmaliciousMiraiBrowse
                                    • 159.102.93.110
                                    file.exeGet hashmaliciousAmadeyBrowse
                                    • 2.59.132.186
                                    elitebotnet.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 159.101.5.77
                                    AyqwnIUrcz.exeGet hashmaliciousUnknownBrowse
                                    • 159.100.18.192
                                    copia111224mp.htaGet hashmaliciousUnknownBrowse
                                    • 159.100.18.13
                                    boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                    • 31.172.83.147
                                    boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                    • 31.172.83.147
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
                                    Entropy (8bit):6.844730804879409
                                    TrID:
                                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                    File name:boatnet.sh4.elf
                                    File size:61'040 bytes
                                    MD5:e5d6669a161edc9db097940eb996a0cd
                                    SHA1:8046af4533c45c5eec1f1576bc0bfeb9b2d0afb7
                                    SHA256:37edfff53329b5314b8731ddac1f7494a123ba5e6ed8055f4859cd6d08264fd2
                                    SHA512:d8e0ee6e46dd70bb011921c2b3534a5de6fa75c0eac9d22903316cf1033d85befb2e3d988a643aa0c03a2eb495bc7041758c1d01d5512121fa8d58c9b40bd101
                                    SSDEEP:768:M/m61kGPW+N+Q5HeeBBa9SU2e/WQe/xeFtSLr8U/UsfKati1Nbq9sGqC0ogKxXK0:M/fFPlUkbaI+YcQGsf/wPJ8gqKCCk
                                    TLSH:D4539D31E01E8A94C5964134B45CCE781F13E1C8B3932EF66BE386B12457AA8FA15FF5
                                    File Content Preview:.ELF..............*.......@.4...........4. ...(...............@...@.t...t...............x...x.A.x.A.(...<...........Q.td............................././"O.n........#.*@........#.*@L....o&O.n...l..............................././.../.a"O.!...n...a.b("...q.

                                    ELF header

                                    Class:ELF32
                                    Data:2's complement, little endian
                                    Version:1 (current)
                                    Machine:<unknown>
                                    Version Number:0x1
                                    Type:EXEC (Executable file)
                                    OS/ABI:UNIX - System V
                                    ABI Version:0
                                    Entry Point Address:0x4001a0
                                    Flags:0x9
                                    ELF Header Size:52
                                    Program Header Offset:52
                                    Program Header Size:32
                                    Number of Program Headers:3
                                    Section Header Offset:60640
                                    Section Header Size:40
                                    Number of Section Headers:10
                                    Header String Table Index:9
                                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                    NULL0x00x00x00x00x0000
                                    .initPROGBITS0x4000940x940x300x00x6AX004
                                    .textPROGBITS0x4000e00xe00xd0600x00x6AX0032
                                    .finiPROGBITS0x40d1400xd1400x240x00x6AX004
                                    .rodataPROGBITS0x40d1640xd1640x19100x00x2A004
                                    .ctorsPROGBITS0x41ea780xea780x80x00x3WA004
                                    .dtorsPROGBITS0x41ea800xea800x80x00x3WA004
                                    .dataPROGBITS0x41ea8c0xea8c0x2140x00x3WA004
                                    .bssNOBITS0x41eca00xeca00x3140x00x3WA004
                                    .shstrtabSTRTAB0x00xeca00x3e0x00x0001
                                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                    LOAD0x00x4000000x4000000xea740xea746.88220x5R E0x10000.init .text .fini .rodata
                                    LOAD0xea780x41ea780x41ea780x2280x53c2.99410x6RW 0x10000.ctors .dtors .data .bss
                                    GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 18, 2024 19:33:07.649964094 CET521863778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:07.770162106 CET37785218631.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:07.770266056 CET521863778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:07.783802986 CET521863778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:07.909828901 CET37785218631.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:07.909950972 CET521863778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:08.029678106 CET37785218631.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:09.040838957 CET37785218631.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:09.040966988 CET521863778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:09.041132927 CET521863778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:09.042658091 CET521883778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:09.162440062 CET37785218831.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:09.162591934 CET521883778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:09.166960001 CET521883778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:09.288150072 CET37785218831.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:09.288290977 CET521883778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:09.407841921 CET37785218831.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:10.421072006 CET37785218831.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:10.421260118 CET521883778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:10.421399117 CET521883778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:10.421986103 CET521903778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:10.541615009 CET37785219031.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:10.541815996 CET521903778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:10.543282986 CET521903778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:10.663072109 CET37785219031.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:10.663330078 CET521903778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:10.789994955 CET37785219031.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:11.799637079 CET37785219031.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:11.799899101 CET521903778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:11.799930096 CET521903778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:11.802700996 CET521923778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:11.922342062 CET37785219231.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:11.922570944 CET521923778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:11.924526930 CET521923778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:12.044039011 CET37785219231.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:12.044378042 CET521923778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:12.163964987 CET37785219231.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:13.111752033 CET521923778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:13.193541050 CET37785219231.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:13.193630934 CET521923778192.168.2.1331.172.83.147
                                    Dec 18, 2024 19:33:13.232177973 CET37785219231.172.83.147192.168.2.13
                                    Dec 18, 2024 19:33:13.232244968 CET521923778192.168.2.1331.172.83.147
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 18, 2024 19:35:47.564222097 CET3507453192.168.2.131.1.1.1
                                    Dec 18, 2024 19:35:47.564327955 CET5071553192.168.2.131.1.1.1
                                    Dec 18, 2024 19:35:47.791378975 CET53350741.1.1.1192.168.2.13
                                    Dec 18, 2024 19:35:48.413105011 CET53507151.1.1.1192.168.2.13
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Dec 18, 2024 19:35:47.564222097 CET192.168.2.131.1.1.10x51a7Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                    Dec 18, 2024 19:35:47.564327955 CET192.168.2.131.1.1.10xaa05Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 18, 2024 19:35:47.791378975 CET1.1.1.1192.168.2.130x51a7No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                    Dec 18, 2024 19:35:47.791378975 CET1.1.1.1192.168.2.130x51a7No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                                    System Behavior

                                    Start time (UTC):18:33:07
                                    Start date (UTC):18/12/2024
                                    Path:/tmp/boatnet.sh4.elf
                                    Arguments:/tmp/boatnet.sh4.elf
                                    File size:4139976 bytes
                                    MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                    Start time (UTC):18:33:07
                                    Start date (UTC):18/12/2024
                                    Path:/tmp/boatnet.sh4.elf
                                    Arguments:-
                                    File size:4139976 bytes
                                    MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                    Start time (UTC):18:33:07
                                    Start date (UTC):18/12/2024
                                    Path:/tmp/boatnet.sh4.elf
                                    Arguments:-
                                    File size:4139976 bytes
                                    MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                    Start time (UTC):18:33:07
                                    Start date (UTC):18/12/2024
                                    Path:/tmp/boatnet.sh4.elf
                                    Arguments:-
                                    File size:4139976 bytes
                                    MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                    Start time (UTC):18:33:12
                                    Start date (UTC):18/12/2024
                                    Path:/usr/bin/xfce4-panel
                                    Arguments:-
                                    File size:375768 bytes
                                    MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                    Start time (UTC):18:33:12
                                    Start date (UTC):18/12/2024
                                    Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                    Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
                                    File size:35136 bytes
                                    MD5 hash:ac0b8a906f359a8ae102244738682e76

                                    Start time (UTC):18:33:12
                                    Start date (UTC):18/12/2024
                                    Path:/usr/bin/xfce4-panel
                                    Arguments:-
                                    File size:375768 bytes
                                    MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                    Start time (UTC):18:33:12
                                    Start date (UTC):18/12/2024
                                    Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                    Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
                                    File size:35136 bytes
                                    MD5 hash:ac0b8a906f359a8ae102244738682e76

                                    Start time (UTC):18:33:12
                                    Start date (UTC):18/12/2024
                                    Path:/usr/bin/xfce4-panel
                                    Arguments:-
                                    File size:375768 bytes
                                    MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                    Start time (UTC):18:33:12
                                    Start date (UTC):18/12/2024
                                    Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                    Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
                                    File size:35136 bytes
                                    MD5 hash:ac0b8a906f359a8ae102244738682e76

                                    Start time (UTC):18:33:12
                                    Start date (UTC):18/12/2024
                                    Path:/usr/bin/xfce4-panel
                                    Arguments:-
                                    File size:375768 bytes
                                    MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                    Start time (UTC):18:33:12
                                    Start date (UTC):18/12/2024
                                    Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                    Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
                                    File size:35136 bytes
                                    MD5 hash:ac0b8a906f359a8ae102244738682e76

                                    Start time (UTC):18:33:18
                                    Start date (UTC):18/12/2024
                                    Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                    Arguments:-
                                    File size:35136 bytes
                                    MD5 hash:ac0b8a906f359a8ae102244738682e76

                                    Start time (UTC):18:33:19
                                    Start date (UTC):18/12/2024
                                    Path:/usr/sbin/xfpm-power-backlight-helper
                                    Arguments:/usr/sbin/xfpm-power-backlight-helper --get-max-brightness
                                    File size:14656 bytes
                                    MD5 hash:3d221ad23f28ca3259f599b1664e2427

                                    Start time (UTC):18:33:12
                                    Start date (UTC):18/12/2024
                                    Path:/usr/bin/xfce4-panel
                                    Arguments:-
                                    File size:375768 bytes
                                    MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                    Start time (UTC):18:33:12
                                    Start date (UTC):18/12/2024
                                    Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                    Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
                                    File size:35136 bytes
                                    MD5 hash:ac0b8a906f359a8ae102244738682e76

                                    Start time (UTC):18:33:12
                                    Start date (UTC):18/12/2024
                                    Path:/usr/bin/xfce4-panel
                                    Arguments:-
                                    File size:375768 bytes
                                    MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                    Start time (UTC):18:33:12
                                    Start date (UTC):18/12/2024
                                    Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                    Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
                                    File size:35136 bytes
                                    MD5 hash:ac0b8a906f359a8ae102244738682e76

                                    Start time (UTC):18:33:19
                                    Start date (UTC):18/12/2024
                                    Path:/usr/bin/dbus-daemon
                                    Arguments:-
                                    File size:249032 bytes
                                    MD5 hash:3089d47e3f3ab84cd81c48fd406d7a8c

                                    Start time (UTC):18:33:19
                                    Start date (UTC):18/12/2024
                                    Path:/usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
                                    Arguments:/usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
                                    File size:112880 bytes
                                    MD5 hash:4c7a0d6d258bb970905b19b84abcd8e9

                                    Start time (UTC):18:33:23
                                    Start date (UTC):18/12/2024
                                    Path:/usr/lib/systemd/systemd
                                    Arguments:-
                                    File size:1620224 bytes
                                    MD5 hash:9b2bec7092a40488108543f9334aab75

                                    Start time (UTC):18:33:23
                                    Start date (UTC):18/12/2024
                                    Path:/usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
                                    Arguments:/usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
                                    File size:112872 bytes
                                    MD5 hash:eee956f1b227c1d5031f9c61223255d1