Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
bot.x86.elf

Overview

General Information

Sample name:bot.x86.elf
Analysis ID:1581991
MD5:efefe8266328151a0b2d1c387dbfc08b
SHA1:2f8026313c9065f653e18afde53da3eed593675c
SHA256:c0fcbfa617c40dbe6adb552c6c430f5db33b67d7d21bfd650343e2175a16e645
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Okiru
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Uses dynamic DNS services
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1581991
Start date and time:2024-12-29 14:41:13 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 30s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:bot.x86.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@5/0
Command:/tmp/bot.x86.elf
PID:5449
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • bot.x86.elf (PID: 5449, Parent: 5377, MD5: efefe8266328151a0b2d1c387dbfc08b) Arguments: /tmp/bot.x86.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
bot.x86.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    bot.x86.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
      bot.x86.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        bot.x86.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0xf6b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf6cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf6e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf6f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf708:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf71c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf730:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf744:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf758:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf76c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf780:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf794:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf80c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf820:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf834:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf848:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        bot.x86.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
        • 0x32f0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
        Click to see the 5 entries
        SourceRuleDescriptionAuthorStrings
        5449.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
          5449.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
            5449.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              5449.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
              • 0xf6b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf6cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf6e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf6f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf708:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf71c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf730:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf744:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf758:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf76c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf780:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf794:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf80c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf820:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf834:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf848:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              5449.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
              • 0x32f0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
              Click to see the 9 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-29T14:42:08.200341+010020304901Malware Command and Control Activity Detected192.168.2.135414434.58.44.10843957TCP
              2024-12-29T14:42:36.591653+010020304901Malware Command and Control Activity Detected192.168.2.135414634.58.44.10843957TCP
              2024-12-29T14:43:02.997585+010020304901Malware Command and Control Activity Detected192.168.2.135414834.58.44.10843957TCP
              2024-12-29T14:43:29.211270+010020304901Malware Command and Control Activity Detected192.168.2.135415034.58.44.10843957TCP
              2024-12-29T14:43:58.675051+010020304901Malware Command and Control Activity Detected192.168.2.135415234.58.44.10843957TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: bot.x86.elfAvira: detected
              Source: bot.x86.elfVirustotal: Detection: 42%Perma Link
              Source: bot.x86.elfReversingLabs: Detection: 55%
              Source: bot.x86.elfJoe Sandbox ML: detected
              Source: bot.x86.elfString: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:54148 -> 34.58.44.108:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:54152 -> 34.58.44.108:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:54144 -> 34.58.44.108:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:54146 -> 34.58.44.108:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:54150 -> 34.58.44.108:43957
              Source: global trafficTCP traffic: 34.58.44.108 ports 43957,3,4,5,7,9
              Source: unknownDNS query: name: fearmiraixd.duckdns.org
              Source: global trafficTCP traffic: 192.168.2.13:54144 -> 34.58.44.108:43957
              Source: global trafficTCP traffic: 192.168.2.13:48202 -> 185.125.190.26:443
              Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
              Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
              Source: global trafficDNS traffic detected: DNS query: fearmiraixd.duckdns.org
              Source: unknownNetwork traffic detected: HTTP traffic on port 48202 -> 443

              System Summary

              barindex
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: Process Memory Space: bot.x86.elf PID: 5449, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Initial sampleString containing 'busybox' found: /bin/busybox
              Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: Process Memory Space: bot.x86.elf PID: 5449, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.linELF@0/0@5/0
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/230/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/231/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/232/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/233/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/234/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/236/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/237/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/238/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/239/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/914/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/5398/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/19/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/240/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/3095/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/241/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/242/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/244/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/245/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/246/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/5/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/247/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/248/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/7/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/249/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/129/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/8/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/1906/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/802/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/3420/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/1482/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/1480/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/371/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/131/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/252/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/253/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/254/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/1238/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/134/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/255/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/256/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/257/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/378/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/3413/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/1475/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/936/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/816/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5451)File opened: /proc/5294/cmdlineJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5449, type: MEMORYSTR
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5449, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5449, type: MEMORYSTR
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5449.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5449, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              Valid AccountsWindows Management Instrumentation1
              Scripting
              Path InterceptionDirect Volume Access1
              OS Credential Dumping
              System Service DiscoveryRemote ServicesData from Local System1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture12
              Application Layer Protocol
              Traffic DuplicationData Destruction
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              SourceDetectionScannerLabelLink
              bot.x86.elf43%VirustotalBrowse
              bot.x86.elf55%ReversingLabsLinux.Backdoor.Mirai
              bot.x86.elf100%AviraEXP/ELF.Mirai.Z.A
              bot.x86.elf100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              fearmiraixd.duckdns.org
              34.58.44.108
              truefalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                185.125.190.26
                unknownUnited Kingdom
                41231CANONICAL-ASGBfalse
                34.58.44.108
                fearmiraixd.duckdns.orgUnited States
                2686ATGS-MMD-ASUSfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                185.125.190.26armv6l.elfGet hashmaliciousMiraiBrowse
                  x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                    bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                      bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        armv7l.elfGet hashmaliciousMiraiBrowse
                          bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                            main_mips.elfGet hashmaliciousMiraiBrowse
                              main_arm.elfGet hashmaliciousMiraiBrowse
                                Aqua.dbg.elfGet hashmaliciousUnknownBrowse
                                  arm5.elfGet hashmaliciousUnknownBrowse
                                    34.58.44.108bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                      bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                        bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                          bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                            bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                              bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                  bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                                    bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      fearmiraixd.duckdns.orgbot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      ATGS-MMD-ASUSbot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                                      • 34.58.44.108
                                                      bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 34.58.44.108
                                                      db0fa4b8db0333367e9bda3ab68b8042.sh4.elfGet hashmaliciousMirai, GafgytBrowse
                                                      • 48.3.10.119
                                                      CANONICAL-ASGBarmv6l.elfGet hashmaliciousMiraiBrowse
                                                      • 185.125.190.26
                                                      mips64.elfGet hashmaliciousMiraiBrowse
                                                      • 91.189.91.42
                                                      arm6l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                      • 91.189.91.42
                                                      mips.elfGet hashmaliciousMiraiBrowse
                                                      • 91.189.91.42
                                                      x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                      • 185.125.190.26
                                                      bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 185.125.190.26
                                                      bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 185.125.190.26
                                                      mipsel.elfGet hashmaliciousMiraiBrowse
                                                      • 91.189.91.42
                                                      bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                      • 91.189.91.42
                                                      armv4l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                      • 91.189.91.42
                                                      No context
                                                      No context
                                                      No created / dropped files found
                                                      File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                                      Entropy (8bit):5.712574282355725
                                                      TrID:
                                                      • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                                      • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                                      File name:bot.x86.elf
                                                      File size:89'608 bytes
                                                      MD5:efefe8266328151a0b2d1c387dbfc08b
                                                      SHA1:2f8026313c9065f653e18afde53da3eed593675c
                                                      SHA256:c0fcbfa617c40dbe6adb552c6c430f5db33b67d7d21bfd650343e2175a16e645
                                                      SHA512:fea487c2179564d702e0a2d3013cfcf5b4cc8559423481f34de56a89b2eb1582b33392de53a05b9f277cc7455ff08488c9242e418c0c5216809149f69e5f59c4
                                                      SSDEEP:1536:xpG2cWAcCghsZcWU3S8rsStqU1gQI68jne8Fs8F2c/dw8SAwHEoSrtAjA0xZ:xpG3WrCEjWUiQLZ98FIcK8SFk1IA0x
                                                      TLSH:8C937CC5F683D4F5EC9705B1113BAB375B33F0B52029EA43C769A932ECA1510EA16B9C
                                                      File Content Preview:.ELF....................d...4...x\......4. ...(......................................................G..8...........Q.td............................U..S......./$...h........[]...$.............U......=@....t..5...................u........t....h............

                                                      ELF header

                                                      Class:ELF32
                                                      Data:2's complement, little endian
                                                      Version:1 (current)
                                                      Machine:Intel 80386
                                                      Version Number:0x1
                                                      Type:EXEC (Executable file)
                                                      OS/ABI:UNIX - System V
                                                      ABI Version:0
                                                      Entry Point Address:0x8048164
                                                      Flags:0x0
                                                      ELF Header Size:52
                                                      Program Header Offset:52
                                                      Program Header Size:32
                                                      Number of Program Headers:3
                                                      Section Header Offset:89208
                                                      Section Header Size:40
                                                      Number of Section Headers:10
                                                      Header String Table Index:9
                                                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                      NULL0x00x00x00x00x0000
                                                      .initPROGBITS0x80480940x940x1c0x00x6AX001
                                                      .textPROGBITS0x80480b00xb00xf1360x00x6AX0016
                                                      .finiPROGBITS0x80571e60xf1e60x170x00x6AX001
                                                      .rodataPROGBITS0x80572000xf2000x22b00x00x2A0032
                                                      .ctorsPROGBITS0x805a4b40x114b40xc0x00x3WA004
                                                      .dtorsPROGBITS0x805a4c00x114c00x80x00x3WA004
                                                      .dataPROGBITS0x805a4e00x114e00x47580x00x3WA0032
                                                      .bssNOBITS0x805ec400x15c380x49ac0x00x3WA0032
                                                      .shstrtabSTRTAB0x00x15c380x3e0x00x0001
                                                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                      LOAD0x00x80480000x80480000x114b00x114b06.58680x5R E0x1000.init .text .fini .rodata
                                                      LOAD0x114b40x805a4b40x805a4b40x47840x91380.36160x6RW 0x1000.ctors .dtors .data .bss
                                                      GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2024-12-29T14:42:08.200341+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.135414434.58.44.10843957TCP
                                                      2024-12-29T14:42:36.591653+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.135414634.58.44.10843957TCP
                                                      2024-12-29T14:43:02.997585+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.135414834.58.44.10843957TCP
                                                      2024-12-29T14:43:29.211270+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.135415034.58.44.10843957TCP
                                                      2024-12-29T14:43:58.675051+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.135415234.58.44.10843957TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 29, 2024 14:42:08.079135895 CET5414443957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:42:08.200227022 CET439575414434.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:42:08.200340986 CET5414443957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:42:08.200340986 CET5414443957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:42:08.321381092 CET439575414434.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:42:17.516916037 CET48202443192.168.2.13185.125.190.26
                                                      Dec 29, 2024 14:42:18.208945036 CET5414443957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:42:18.329948902 CET439575414434.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:42:30.136560917 CET439575414434.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:42:30.136639118 CET5414443957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:42:30.257512093 CET439575414434.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:42:36.470396996 CET5414643957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:42:36.591306925 CET439575414634.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:42:36.591653109 CET5414643957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:42:36.591653109 CET5414643957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:42:36.712558031 CET439575414634.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:42:47.980824947 CET48202443192.168.2.13185.125.190.26
                                                      Dec 29, 2024 14:42:58.534085989 CET439575414634.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:42:58.534287930 CET5414643957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:42:58.655301094 CET439575414634.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:43:02.876097918 CET5414843957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:43:02.997448921 CET439575414834.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:43:02.997523069 CET5414843957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:43:02.997585058 CET5414843957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:43:03.118707895 CET439575414834.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:43:24.952470064 CET439575414834.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:43:24.952613115 CET5414843957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:43:25.074328899 CET439575414834.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:43:29.090094090 CET5415043957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:43:29.211105108 CET439575415034.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:43:29.211239100 CET5415043957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:43:29.211270094 CET5415043957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:43:29.332366943 CET439575415034.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:43:39.220766068 CET5415043957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:43:39.341928959 CET439575415034.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:43:51.212779045 CET439575415034.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:43:51.212949038 CET5415043957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:43:51.333931923 CET439575415034.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:43:58.554017067 CET5415243957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:43:58.674946070 CET439575415234.58.44.108192.168.2.13
                                                      Dec 29, 2024 14:43:58.675013065 CET5415243957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:43:58.675050974 CET5415243957192.168.2.1334.58.44.108
                                                      Dec 29, 2024 14:43:58.796077967 CET439575415234.58.44.108192.168.2.13
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 29, 2024 14:42:05.745729923 CET4998153192.168.2.138.8.8.8
                                                      Dec 29, 2024 14:42:08.079020977 CET53499818.8.8.8192.168.2.13
                                                      Dec 29, 2024 14:42:36.137523890 CET6028653192.168.2.138.8.8.8
                                                      Dec 29, 2024 14:42:36.470210075 CET53602868.8.8.8192.168.2.13
                                                      Dec 29, 2024 14:43:02.535686970 CET5406453192.168.2.138.8.8.8
                                                      Dec 29, 2024 14:43:02.875916958 CET53540648.8.8.8192.168.2.13
                                                      Dec 29, 2024 14:43:28.953831911 CET4870953192.168.2.138.8.8.8
                                                      Dec 29, 2024 14:43:29.089940071 CET53487098.8.8.8192.168.2.13
                                                      Dec 29, 2024 14:43:58.214162111 CET4565953192.168.2.138.8.8.8
                                                      Dec 29, 2024 14:43:58.553895950 CET53456598.8.8.8192.168.2.13
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Dec 29, 2024 14:42:05.745729923 CET192.168.2.138.8.8.80xe7baStandard query (0)fearmiraixd.duckdns.orgA (IP address)IN (0x0001)false
                                                      Dec 29, 2024 14:42:36.137523890 CET192.168.2.138.8.8.80x89bdStandard query (0)fearmiraixd.duckdns.orgA (IP address)IN (0x0001)false
                                                      Dec 29, 2024 14:43:02.535686970 CET192.168.2.138.8.8.80xd4c8Standard query (0)fearmiraixd.duckdns.orgA (IP address)IN (0x0001)false
                                                      Dec 29, 2024 14:43:28.953831911 CET192.168.2.138.8.8.80x72ceStandard query (0)fearmiraixd.duckdns.orgA (IP address)IN (0x0001)false
                                                      Dec 29, 2024 14:43:58.214162111 CET192.168.2.138.8.8.80x3d30Standard query (0)fearmiraixd.duckdns.orgA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Dec 29, 2024 14:42:08.079020977 CET8.8.8.8192.168.2.130xe7baNo error (0)fearmiraixd.duckdns.org34.58.44.108A (IP address)IN (0x0001)false
                                                      Dec 29, 2024 14:42:36.470210075 CET8.8.8.8192.168.2.130x89bdNo error (0)fearmiraixd.duckdns.org34.58.44.108A (IP address)IN (0x0001)false
                                                      Dec 29, 2024 14:43:02.875916958 CET8.8.8.8192.168.2.130xd4c8No error (0)fearmiraixd.duckdns.org34.58.44.108A (IP address)IN (0x0001)false
                                                      Dec 29, 2024 14:43:29.089940071 CET8.8.8.8192.168.2.130x72ceNo error (0)fearmiraixd.duckdns.org34.58.44.108A (IP address)IN (0x0001)false
                                                      Dec 29, 2024 14:43:58.553895950 CET8.8.8.8192.168.2.130x3d30No error (0)fearmiraixd.duckdns.org34.58.44.108A (IP address)IN (0x0001)false

                                                      System Behavior

                                                      Start time (UTC):13:42:04
                                                      Start date (UTC):29/12/2024
                                                      Path:/tmp/bot.x86.elf
                                                      Arguments:/tmp/bot.x86.elf
                                                      File size:89608 bytes
                                                      MD5 hash:efefe8266328151a0b2d1c387dbfc08b

                                                      Start time (UTC):13:42:04
                                                      Start date (UTC):29/12/2024
                                                      Path:/tmp/bot.x86.elf
                                                      Arguments:-
                                                      File size:89608 bytes
                                                      MD5 hash:efefe8266328151a0b2d1c387dbfc08b

                                                      Start time (UTC):13:42:04
                                                      Start date (UTC):29/12/2024
                                                      Path:/tmp/bot.x86.elf
                                                      Arguments:-
                                                      File size:89608 bytes
                                                      MD5 hash:efefe8266328151a0b2d1c387dbfc08b