Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
vlxx.x86.elf

Overview

General Information

Sample name:vlxx.x86.elf
Analysis ID:1579426
MD5:d4cf6488e7baf5ea3a0bed7e606d6672
SHA1:f07a4bff745edbe4dca57202387404a970f2a6f2
SHA256:effa9d68ed18240064ada35145f885db1203582298926ff348b3b6f2c47c38e8
Tags:user-elfdigest
Infos:

Detection

Mirai, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Okiru
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1579426
Start date and time:2024-12-22 09:44:11 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 53s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:vlxx.x86.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@20/0
Command:/tmp/vlxx.x86.elf
PID:5842
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • vlxx.x86.elf (PID: 5842, Parent: 5765, MD5: d4cf6488e7baf5ea3a0bed7e606d6672) Arguments: /tmp/vlxx.x86.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
vlxx.x86.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    vlxx.x86.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
      vlxx.x86.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        vlxx.x86.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0xf738:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf74c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf760:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf774:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf788:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf79c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf800:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf814:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf828:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf83c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf850:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf864:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf878:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf88c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf8a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf8b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf8c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        vlxx.x86.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
        • 0x32f0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
        Click to see the 5 entries
        SourceRuleDescriptionAuthorStrings
        5842.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
          5842.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
            5842.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              5842.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
              • 0xf738:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf74c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf760:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf774:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf788:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf79c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf800:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf814:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf828:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf83c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf850:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf864:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf878:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf88c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf8a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf8b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf8c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              5842.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
              • 0x32f0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
              Click to see the 9 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-22T09:45:29.869840+010020304901Malware Command and Control Activity Detected192.168.2.1558814147.93.12.22442597TCP
              2024-12-22T09:45:35.248299+010020304901Malware Command and Control Activity Detected192.168.2.1558816147.93.12.22442597TCP
              2024-12-22T09:45:40.635269+010020304901Malware Command and Control Activity Detected192.168.2.1558818147.93.12.22442597TCP
              2024-12-22T09:45:46.012971+010020304901Malware Command and Control Activity Detected192.168.2.1558820147.93.12.22442597TCP
              2024-12-22T09:45:51.390259+010020304901Malware Command and Control Activity Detected192.168.2.1558822147.93.12.22442597TCP
              2024-12-22T09:46:02.770043+010020304901Malware Command and Control Activity Detected192.168.2.1558824147.93.12.22442597TCP
              2024-12-22T09:46:10.148324+010020304901Malware Command and Control Activity Detected192.168.2.1558826147.93.12.22442597TCP
              2024-12-22T09:46:17.638736+010020304901Malware Command and Control Activity Detected192.168.2.1558828147.93.12.22442597TCP
              2024-12-22T09:46:26.131552+010020304901Malware Command and Control Activity Detected192.168.2.1558830147.93.12.22442597TCP
              2024-12-22T09:46:29.510231+010020304901Malware Command and Control Activity Detected192.168.2.1558832147.93.12.22442597TCP
              2024-12-22T09:46:37.902992+010020304901Malware Command and Control Activity Detected192.168.2.1558834147.93.12.22442597TCP
              2024-12-22T09:46:40.280285+010020304901Malware Command and Control Activity Detected192.168.2.1558836147.93.12.22442597TCP
              2024-12-22T09:46:42.657589+010020304901Malware Command and Control Activity Detected192.168.2.1558838147.93.12.22442597TCP
              2024-12-22T09:46:53.035159+010020304901Malware Command and Control Activity Detected192.168.2.1558840147.93.12.22442597TCP
              2024-12-22T09:46:58.400061+010020304901Malware Command and Control Activity Detected192.168.2.1558842147.93.12.22442597TCP
              2024-12-22T09:47:05.775610+010020304901Malware Command and Control Activity Detected192.168.2.1558844147.93.12.22442597TCP
              2024-12-22T09:47:10.154713+010020304901Malware Command and Control Activity Detected192.168.2.1558846147.93.12.22442597TCP
              2024-12-22T09:47:20.533379+010020304901Malware Command and Control Activity Detected192.168.2.1558848147.93.12.22442597TCP
              2024-12-22T09:47:25.900253+010020304901Malware Command and Control Activity Detected192.168.2.1558850147.93.12.22442597TCP
              2024-12-22T09:47:34.291723+010020304901Malware Command and Control Activity Detected192.168.2.1558852147.93.12.22442597TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: vlxx.x86.elfAvira: detected
              Source: vlxx.x86.elfVirustotal: Detection: 60%Perma Link
              Source: vlxx.x86.elfReversingLabs: Detection: 65%
              Source: vlxx.x86.elfJoe Sandbox ML: detected
              Source: vlxx.x86.elfString: HTTP/1.1 200 OKcundi.armcundi.arm5cundi.arm6cundi.arm7cundi.mipscundi.mpslcundi.x86_64cundi.sh4/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverwgetcurlecho/proc/proc/%d/cmdlineabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58818 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58816 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58830 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58826 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58814 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58820 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58834 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58842 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58838 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58822 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58836 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58844 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58852 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58828 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58846 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58832 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58840 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58848 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58824 -> 147.93.12.224:42597
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:58850 -> 147.93.12.224:42597
              Source: global trafficTCP traffic: 147.93.12.224 ports 42597,2,4,5,7,9
              Source: global trafficTCP traffic: 192.168.2.15:58814 -> 147.93.12.224:42597
              Source: global trafficDNS traffic detected: DNS query: era-bot.zapto.org

              System Summary

              barindex
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: Process Memory Space: vlxx.x86.elf PID: 5842, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Initial sampleString containing 'busybox' found: /bin/busybox
              Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKcundi.armcundi.arm5cundi.arm6cundi.arm7cundi.mipscundi.mpslcundi.x86_64cundi.sh4/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverwgetcurlecho/proc/proc/%d/cmdlineabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: vlxx.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: Process Memory Space: vlxx.x86.elf PID: 5842, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.linELF@0/0@20/0
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/231/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/233/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/1333/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/1695/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/911/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/914/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/19/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/1591/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/5827/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/246/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/5/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/1585/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/7/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/129/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/8/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/802/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/804/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/3407/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/5826/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/1484/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/131/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/133/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/1479/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/378/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/931/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/1595/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/812/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/933/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/3419/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/35/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/3310/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/260/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/261/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/262/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/142/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/263/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/264/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/265/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/145/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/266/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/267/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/268/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/3303/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/269/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/1486/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/1806/cmdlineJump to behavior
              Source: /tmp/vlxx.x86.elf (PID: 5845)File opened: /proc/5843/cmdlineJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: vlxx.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vlxx.x86.elf PID: 5842, type: MEMORYSTR
              Source: Yara matchFile source: vlxx.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vlxx.x86.elf PID: 5842, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: Yara matchFile source: vlxx.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vlxx.x86.elf PID: 5842, type: MEMORYSTR
              Source: Yara matchFile source: vlxx.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5842.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vlxx.x86.elf PID: 5842, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              Valid AccountsWindows Management Instrumentation1
              Scripting
              Path InterceptionDirect Volume Access1
              OS Credential Dumping
              System Service DiscoveryRemote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1579426 Sample: vlxx.x86.elf Startdate: 22/12/2024 Architecture: LINUX Score: 100 16 era-bot.zapto.org 147.93.12.224, 42597, 58814, 58816 ICN-ASUS Belgium 2->16 18 Suricata IDS alerts for network traffic 2->18 20 Malicious sample detected (through community Yara rule) 2->20 22 Antivirus / Scanner detection for submitted sample 2->22 24 6 other signatures 2->24 8 vlxx.x86.elf 2->8         started        signatures3 process4 process5 10 vlxx.x86.elf 8->10         started        process6 12 vlxx.x86.elf 10->12         started        14 vlxx.x86.elf 10->14         started       
              SourceDetectionScannerLabelLink
              vlxx.x86.elf61%VirustotalBrowse
              vlxx.x86.elf66%ReversingLabsLinux.Backdoor.Mirai
              vlxx.x86.elf100%AviraEXP/ELF.Mirai.Z.A
              vlxx.x86.elf100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              era-bot.zapto.org
              147.93.12.224
              truefalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                147.93.12.224
                era-bot.zapto.orgBelgium
                6122ICN-ASUSfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                147.93.12.224vlxx.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                  vlxx.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                    vlxx.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                      vlxx.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        vlxx.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          era-bot.zapto.orgvlxx.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                          • 147.93.12.224
                          vlxx.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                          • 147.93.12.224
                          vlxx.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                          • 147.93.12.224
                          vlxx.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                          • 147.93.12.224
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          ICN-ASUSvlxx.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                          • 147.93.12.224
                          vlxx.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                          • 147.93.12.224
                          vlxx.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                          • 147.93.12.224
                          vlxx.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                          • 147.93.12.224
                          vlxx.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                          • 147.93.12.224
                          nshkarm.elfGet hashmaliciousMiraiBrowse
                          • 165.206.43.167
                          nshkppc.elfGet hashmaliciousMiraiBrowse
                          • 207.165.106.243
                          nshmips.elfGet hashmaliciousMiraiBrowse
                          • 209.56.145.193
                          la.bot.sparc.elfGet hashmaliciousMiraiBrowse
                          • 165.206.8.54
                          x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                          • 147.93.240.115
                          No context
                          No context
                          No created / dropped files found
                          File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                          Entropy (8bit):5.710723858709366
                          TrID:
                          • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                          • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                          File name:vlxx.x86.elf
                          File size:89'672 bytes
                          MD5:d4cf6488e7baf5ea3a0bed7e606d6672
                          SHA1:f07a4bff745edbe4dca57202387404a970f2a6f2
                          SHA256:effa9d68ed18240064ada35145f885db1203582298926ff348b3b6f2c47c38e8
                          SHA512:b1d37c3e32f5e01d9c556aff5ee4612f9eeedd60908d34e43b38190fa57042a6137fda57e6ce4a909696bc39f9815c9aaae6c5de2aaf8431a198828d098e51f4
                          SSDEEP:1536:sUYl80AvyebhzEzASUR3JIaJi7M3gLkiNgKVL4GRUS3tkDNB7:sUYq0ovNHSe3JIPIWkDKVEeBMn7
                          TLSH:2A937DC5F243D0F5EC8705B15137AF379B33E0B91029EA43C3696972ECA1951EA16BAC
                          File Content Preview:.ELF....................d...4....\......4. ...(......................................................G..8...........Q.td............................U..S.......o$...h........[]...$.............U......=.....t..5....$......$.......u........t....h............

                          ELF header

                          Class:ELF32
                          Data:2's complement, little endian
                          Version:1 (current)
                          Machine:Intel 80386
                          Version Number:0x1
                          Type:EXEC (Executable file)
                          OS/ABI:UNIX - System V
                          ABI Version:0
                          Entry Point Address:0x8048164
                          Flags:0x0
                          ELF Header Size:52
                          Program Header Offset:52
                          Program Header Size:32
                          Number of Program Headers:3
                          Section Header Offset:89272
                          Section Header Size:40
                          Number of Section Headers:10
                          Header String Table Index:9
                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                          NULL0x00x00x00x00x0000
                          .initPROGBITS0x80480940x940x1c0x00x6AX001
                          .textPROGBITS0x80480b00xb00xf1a60x00x6AX0016
                          .finiPROGBITS0x80572560xf2560x170x00x6AX001
                          .rodataPROGBITS0x80572800xf2800x22700x00x2A0032
                          .ctorsPROGBITS0x805a4f40x114f40xc0x00x3WA004
                          .dtorsPROGBITS0x805a5000x115000x80x00x3WA004
                          .dataPROGBITS0x805a5200x115200x47580x00x3WA0032
                          .bssNOBITS0x805ec800x15c780x49ac0x00x3WA0032
                          .shstrtabSTRTAB0x00x15c780x3e0x00x0001
                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                          LOAD0x00x80480000x80480000x114f00x114f06.58360x5R E0x1000.init .text .fini .rodata
                          LOAD0x114f40x805a4f40x805a4f40x47840x91380.36500x6RW 0x1000.ctors .dtors .data .bss
                          GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2024-12-22T09:45:29.869840+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558814147.93.12.22442597TCP
                          2024-12-22T09:45:35.248299+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558816147.93.12.22442597TCP
                          2024-12-22T09:45:40.635269+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558818147.93.12.22442597TCP
                          2024-12-22T09:45:46.012971+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558820147.93.12.22442597TCP
                          2024-12-22T09:45:51.390259+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558822147.93.12.22442597TCP
                          2024-12-22T09:46:02.770043+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558824147.93.12.22442597TCP
                          2024-12-22T09:46:10.148324+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558826147.93.12.22442597TCP
                          2024-12-22T09:46:17.638736+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558828147.93.12.22442597TCP
                          2024-12-22T09:46:26.131552+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558830147.93.12.22442597TCP
                          2024-12-22T09:46:29.510231+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558832147.93.12.22442597TCP
                          2024-12-22T09:46:37.902992+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558834147.93.12.22442597TCP
                          2024-12-22T09:46:40.280285+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558836147.93.12.22442597TCP
                          2024-12-22T09:46:42.657589+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558838147.93.12.22442597TCP
                          2024-12-22T09:46:53.035159+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558840147.93.12.22442597TCP
                          2024-12-22T09:46:58.400061+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558842147.93.12.22442597TCP
                          2024-12-22T09:47:05.775610+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558844147.93.12.22442597TCP
                          2024-12-22T09:47:10.154713+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558846147.93.12.22442597TCP
                          2024-12-22T09:47:20.533379+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558848147.93.12.22442597TCP
                          2024-12-22T09:47:25.900253+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558850147.93.12.22442597TCP
                          2024-12-22T09:47:34.291723+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1558852147.93.12.22442597TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 22, 2024 09:45:29.750097990 CET5881442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:29.869626999 CET4259758814147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:29.869786024 CET5881442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:29.869839907 CET5881442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:29.989299059 CET4259758814147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:30.990530014 CET4259758814147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:30.990612030 CET5881442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:31.110223055 CET4259758814147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:35.128364086 CET5881642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:35.248132944 CET4259758816147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:35.248210907 CET5881642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:35.248298883 CET5881642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:35.367862940 CET4259758816147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:36.376915932 CET4259758816147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:36.377063990 CET5881642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:36.496587038 CET4259758816147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:40.515466928 CET5881842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:40.635054111 CET4259758818147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:40.635198116 CET5881842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:40.635268927 CET5881842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:40.754806995 CET4259758818147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:41.758202076 CET4259758818147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:41.758285046 CET5881842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:41.877799988 CET4259758818147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:45.893146992 CET5882042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:46.012809992 CET4259758820147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:46.012938976 CET5882042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:46.012970924 CET5882042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:46.132447958 CET4259758820147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:47.135428905 CET4259758820147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:47.135570049 CET5882042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:47.255166054 CET4259758820147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:51.270474911 CET5882242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:51.390027046 CET4259758822147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:51.390175104 CET5882242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:51.390259027 CET5882242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:51.509835958 CET4259758822147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:52.511414051 CET4259758822147.93.12.224192.168.2.15
                          Dec 22, 2024 09:45:52.511537075 CET5882242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:45:52.631160021 CET4259758822147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:02.647406101 CET5882442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:02.769917011 CET4259758824147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:02.770042896 CET5882442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:02.770042896 CET5882442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:02.889703989 CET4259758824147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:03.892654896 CET4259758824147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:03.892817974 CET5882442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:04.012824059 CET4259758824147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:10.028460026 CET5882642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:10.148159027 CET4259758826147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:10.148323059 CET5882642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:10.148324013 CET5882642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:10.267987013 CET4259758826147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:11.268975019 CET4259758826147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:11.269114971 CET5882642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:11.388673067 CET4259758826147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:17.518963099 CET5882842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:17.638619900 CET4259758828147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:17.638705969 CET5882842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:17.638736010 CET5882842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:17.758296013 CET4259758828147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:18.760056973 CET4259758828147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:18.760303974 CET5882842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:18.879959106 CET4259758828147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:26.011611938 CET5883042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:26.131371975 CET4259758830147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:26.131551981 CET5883042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:26.131551981 CET5883042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:26.251245022 CET4259758830147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:27.254324913 CET4259758830147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:27.254462957 CET5883042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:27.374165058 CET4259758830147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:29.390429974 CET5883242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:29.510149956 CET4259758832147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:29.510231018 CET5883242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:29.510231018 CET5883242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:29.629889965 CET4259758832147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:30.632283926 CET4259758832147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:30.632452965 CET5883242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:30.752316952 CET4259758832147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:37.783328056 CET5883442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:37.902879953 CET4259758834147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:37.902967930 CET5883442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:37.902992010 CET5883442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:38.022623062 CET4259758834147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:39.024209976 CET4259758834147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:39.024329901 CET5883442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:39.144157887 CET4259758834147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:40.160634041 CET5883642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:40.280184984 CET4259758836147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:40.280266047 CET5883642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:40.280284882 CET5883642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:40.399825096 CET4259758836147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:41.401607990 CET4259758836147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:41.401731968 CET5883642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:41.521258116 CET4259758836147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:42.537316084 CET5883842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:42.657469988 CET4259758838147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:42.657569885 CET5883842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:42.657588959 CET5883842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:42.777122021 CET4259758838147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:43.778593063 CET4259758838147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:43.778701067 CET5883842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:43.898163080 CET4259758838147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:52.915108919 CET5884042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:53.035057068 CET4259758840147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:53.035159111 CET5884042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:53.035159111 CET5884042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:53.154784918 CET4259758840147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:54.155998945 CET4259758840147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:54.156124115 CET5884042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:54.275747061 CET4259758840147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:58.280427933 CET5884242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:58.399950027 CET4259758842147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:58.400060892 CET5884242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:58.400060892 CET5884242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:58.519598961 CET4259758842147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:59.520220041 CET4259758842147.93.12.224192.168.2.15
                          Dec 22, 2024 09:46:59.520355940 CET5884242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:46:59.639894962 CET4259758842147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:05.655994892 CET5884442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:05.775504112 CET4259758844147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:05.775609970 CET5884442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:05.775609970 CET5884442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:05.895185947 CET4259758844147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:06.899558067 CET4259758844147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:06.899760008 CET5884442597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:07.019289017 CET4259758844147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:10.035084963 CET5884642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:10.154604912 CET4259758846147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:10.154712915 CET5884642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:10.154712915 CET5884642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:10.274280071 CET4259758846147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:11.277174950 CET4259758846147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:11.277326107 CET5884642597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:11.397057056 CET4259758846147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:20.413698912 CET5884842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:20.533258915 CET4259758848147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:20.533377886 CET5884842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:20.533379078 CET5884842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:20.653008938 CET4259758848147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:21.655556917 CET4259758848147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:21.655716896 CET5884842597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:21.775249004 CET4259758848147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:25.780498028 CET5885042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:25.900075912 CET4259758850147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:25.900252104 CET5885042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:25.900253057 CET5885042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:26.020299911 CET4259758850147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:27.022166014 CET4259758850147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:27.022275925 CET5885042597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:27.141830921 CET4259758850147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:34.171925068 CET5885242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:34.291615009 CET4259758852147.93.12.224192.168.2.15
                          Dec 22, 2024 09:47:34.291692972 CET5885242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:34.291723013 CET5885242597192.168.2.15147.93.12.224
                          Dec 22, 2024 09:47:34.411962032 CET4259758852147.93.12.224192.168.2.15
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 22, 2024 09:45:29.600027084 CET6026653192.168.2.158.8.8.8
                          Dec 22, 2024 09:45:29.749838114 CET53602668.8.8.8192.168.2.15
                          Dec 22, 2024 09:45:34.993801117 CET5389853192.168.2.158.8.8.8
                          Dec 22, 2024 09:45:35.128165007 CET53538988.8.8.8192.168.2.15
                          Dec 22, 2024 09:45:40.380386114 CET4361253192.168.2.158.8.8.8
                          Dec 22, 2024 09:45:40.514440060 CET53436128.8.8.8192.168.2.15
                          Dec 22, 2024 09:45:45.759251118 CET4410553192.168.2.158.8.8.8
                          Dec 22, 2024 09:45:45.892963886 CET53441058.8.8.8192.168.2.15
                          Dec 22, 2024 09:45:51.136508942 CET5356453192.168.2.158.8.8.8
                          Dec 22, 2024 09:45:51.270339966 CET53535648.8.8.8192.168.2.15
                          Dec 22, 2024 09:46:02.512887955 CET5485553192.168.2.158.8.8.8
                          Dec 22, 2024 09:46:02.647217035 CET53548558.8.8.8192.168.2.15
                          Dec 22, 2024 09:46:09.894368887 CET4833953192.168.2.158.8.8.8
                          Dec 22, 2024 09:46:10.028311968 CET53483398.8.8.8192.168.2.15
                          Dec 22, 2024 09:46:17.270613909 CET4411753192.168.2.158.8.8.8
                          Dec 22, 2024 09:46:17.518841028 CET53441178.8.8.8192.168.2.15
                          Dec 22, 2024 09:46:25.761739016 CET4620953192.168.2.158.8.8.8
                          Dec 22, 2024 09:46:26.011414051 CET53462098.8.8.8192.168.2.15
                          Dec 22, 2024 09:46:29.256180048 CET5653753192.168.2.158.8.8.8
                          Dec 22, 2024 09:46:29.390279055 CET53565378.8.8.8192.168.2.15
                          Dec 22, 2024 09:46:37.634067059 CET5932453192.168.2.158.8.8.8
                          Dec 22, 2024 09:46:37.783149958 CET53593248.8.8.8192.168.2.15
                          Dec 22, 2024 09:46:40.025935888 CET5166653192.168.2.158.8.8.8
                          Dec 22, 2024 09:46:40.160490990 CET53516668.8.8.8192.168.2.15
                          Dec 22, 2024 09:46:42.403392076 CET5089753192.168.2.158.8.8.8
                          Dec 22, 2024 09:46:42.537184000 CET53508978.8.8.8192.168.2.15
                          Dec 22, 2024 09:46:52.780369997 CET4967553192.168.2.158.8.8.8
                          Dec 22, 2024 09:46:52.914997101 CET53496758.8.8.8192.168.2.15
                          Dec 22, 2024 09:46:58.157766104 CET4915453192.168.2.158.8.8.8
                          Dec 22, 2024 09:46:58.280293941 CET53491548.8.8.8192.168.2.15
                          Dec 22, 2024 09:47:05.521936893 CET5992953192.168.2.158.8.8.8
                          Dec 22, 2024 09:47:05.655837059 CET53599298.8.8.8192.168.2.15
                          Dec 22, 2024 09:47:09.901248932 CET5808953192.168.2.158.8.8.8
                          Dec 22, 2024 09:47:10.034970045 CET53580898.8.8.8192.168.2.15
                          Dec 22, 2024 09:47:20.278727055 CET5860253192.168.2.158.8.8.8
                          Dec 22, 2024 09:47:20.413585901 CET53586028.8.8.8192.168.2.15
                          Dec 22, 2024 09:47:25.657542944 CET5954253192.168.2.158.8.8.8
                          Dec 22, 2024 09:47:25.780365944 CET53595428.8.8.8192.168.2.15
                          Dec 22, 2024 09:47:34.023561954 CET5318353192.168.2.158.8.8.8
                          Dec 22, 2024 09:47:34.171827078 CET53531838.8.8.8192.168.2.15
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Dec 22, 2024 09:45:29.600027084 CET192.168.2.158.8.8.80x21d5Standard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:45:34.993801117 CET192.168.2.158.8.8.80xbcaStandard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:45:40.380386114 CET192.168.2.158.8.8.80xa17bStandard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:45:45.759251118 CET192.168.2.158.8.8.80x68e6Standard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:45:51.136508942 CET192.168.2.158.8.8.80x2c92Standard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:02.512887955 CET192.168.2.158.8.8.80xbcf7Standard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:09.894368887 CET192.168.2.158.8.8.80xef52Standard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:17.270613909 CET192.168.2.158.8.8.80xfd5cStandard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:25.761739016 CET192.168.2.158.8.8.80x12ceStandard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:29.256180048 CET192.168.2.158.8.8.80x5aecStandard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:37.634067059 CET192.168.2.158.8.8.80xf604Standard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:40.025935888 CET192.168.2.158.8.8.80xa7c9Standard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:42.403392076 CET192.168.2.158.8.8.80x7e97Standard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:52.780369997 CET192.168.2.158.8.8.80x328Standard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:58.157766104 CET192.168.2.158.8.8.80xcabeStandard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:47:05.521936893 CET192.168.2.158.8.8.80x7b43Standard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:47:09.901248932 CET192.168.2.158.8.8.80x6911Standard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:47:20.278727055 CET192.168.2.158.8.8.80xeb06Standard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:47:25.657542944 CET192.168.2.158.8.8.80xed71Standard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          Dec 22, 2024 09:47:34.023561954 CET192.168.2.158.8.8.80x43daStandard query (0)era-bot.zapto.orgA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Dec 22, 2024 09:45:29.749838114 CET8.8.8.8192.168.2.150x21d5No error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:45:35.128165007 CET8.8.8.8192.168.2.150xbcaNo error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:45:40.514440060 CET8.8.8.8192.168.2.150xa17bNo error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:45:45.892963886 CET8.8.8.8192.168.2.150x68e6No error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:45:51.270339966 CET8.8.8.8192.168.2.150x2c92No error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:02.647217035 CET8.8.8.8192.168.2.150xbcf7No error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:10.028311968 CET8.8.8.8192.168.2.150xef52No error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:17.518841028 CET8.8.8.8192.168.2.150xfd5cNo error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:26.011414051 CET8.8.8.8192.168.2.150x12ceNo error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:29.390279055 CET8.8.8.8192.168.2.150x5aecNo error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:37.783149958 CET8.8.8.8192.168.2.150xf604No error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:40.160490990 CET8.8.8.8192.168.2.150xa7c9No error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:42.537184000 CET8.8.8.8192.168.2.150x7e97No error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:52.914997101 CET8.8.8.8192.168.2.150x328No error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:46:58.280293941 CET8.8.8.8192.168.2.150xcabeNo error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:47:05.655837059 CET8.8.8.8192.168.2.150x7b43No error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:47:10.034970045 CET8.8.8.8192.168.2.150x6911No error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:47:20.413585901 CET8.8.8.8192.168.2.150xeb06No error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:47:25.780365944 CET8.8.8.8192.168.2.150xed71No error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false
                          Dec 22, 2024 09:47:34.171827078 CET8.8.8.8192.168.2.150x43daNo error (0)era-bot.zapto.org147.93.12.224A (IP address)IN (0x0001)false

                          System Behavior

                          Start time (UTC):08:45:28
                          Start date (UTC):22/12/2024
                          Path:/tmp/vlxx.x86.elf
                          Arguments:/tmp/vlxx.x86.elf
                          File size:89672 bytes
                          MD5 hash:d4cf6488e7baf5ea3a0bed7e606d6672

                          Start time (UTC):08:45:28
                          Start date (UTC):22/12/2024
                          Path:/tmp/vlxx.x86.elf
                          Arguments:-
                          File size:89672 bytes
                          MD5 hash:d4cf6488e7baf5ea3a0bed7e606d6672

                          Start time (UTC):08:45:28
                          Start date (UTC):22/12/2024
                          Path:/tmp/vlxx.x86.elf
                          Arguments:-
                          File size:89672 bytes
                          MD5 hash:d4cf6488e7baf5ea3a0bed7e606d6672

                          Start time (UTC):08:45:28
                          Start date (UTC):22/12/2024
                          Path:/tmp/vlxx.x86.elf
                          Arguments:-
                          File size:89672 bytes
                          MD5 hash:d4cf6488e7baf5ea3a0bed7e606d6672