Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
.Sx86.elf

Overview

General Information

Sample name:.Sx86.elf
Analysis ID:1582108
MD5:3a5342fbd458daecf2de8cafd632b8b5
SHA1:28a582cb004cf41bd7ae118cc50ff546360679e7
SHA256:50fff53777f1131143236c2d17336f3c0e842155343cfb4906a9b3a9d34005a5
Tags:elfuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Machine Learning detection for sample
Sample deletes itself
Sample is packed with UPX
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Executes the "rm" command used to delete files or directories
Sample contains only a LOAD segment without any section mappings
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1582108
Start date and time:2024-12-30 02:17:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 25s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:.Sx86.elf
Detection:MAL
Classification:mal60.evad.linELF@0/0@1/0
  • VT rate limit hit for: mingleyou.top
Command:/tmp/.Sx86.elf
PID:6222
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
Hello, World!
Standard Error:
  • system is lnxubuntu20
  • .Sx86.elf (PID: 6222, Parent: 6140, MD5: 3a5342fbd458daecf2de8cafd632b8b5) Arguments: /tmp/.Sx86.elf
  • dash New Fork (PID: 6257, Parent: 4331)
  • rm (PID: 6257, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.U7WAT3gdcU /tmp/tmp.9d7nS513wN /tmp/tmp.nW9pDddFrW
  • dash New Fork (PID: 6258, Parent: 4331)
  • rm (PID: 6258, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.U7WAT3gdcU /tmp/tmp.9d7nS513wN /tmp/tmp.nW9pDddFrW
  • cleanup
SourceRuleDescriptionAuthorStrings
6222.1.0000000008048000.0000000008056000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0xb70:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
6222.1.0000000008048000.0000000008056000.r-x.sdmpLinux_Trojan_Mirai_88de437funknownunknown
  • 0x7342:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
6222.1.0000000008048000.0000000008056000.r-x.sdmpLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0xa6c1:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
6222.1.0000000008048000.0000000008056000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x8c6a:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
6222.1.0000000008048000.0000000008056000.r-x.sdmpLinux_Trojan_Mirai_8aa7b5d3unknownunknown
  • 0x7312:$a: 8B 4C 24 14 8B 74 24 0C 8B 5C 24 10 85 C9 74 0D 31 D2 8A 04 1A 88
Click to see the 5 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: .Sx86.elfJoe Sandbox ML: detected
Source: global trafficTCP traffic: 192.168.2.23:50748 -> 198.44.186.177:57899
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: global trafficDNS traffic detected: DNS query: mingleyou.top
Source: .Sx86.elfString found in binary or memory: http://upx.sf.net
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33606
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 33606 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

System Summary

barindex
Source: 6222.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 6222.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 6222.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 6222.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 6222.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 6224.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 6224.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 6224.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 6224.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 6224.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: LOAD without section mappingsProgram segment: 0xc01000
Source: 6222.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 6222.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 6222.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 6222.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 6222.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 6224.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 6224.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 6224.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 6224.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 6224.1.0000000008048000.0000000008056000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: classification engineClassification label: mal60.evad.linELF@0/0@1/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
Source: /usr/bin/dash (PID: 6257)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.U7WAT3gdcU /tmp/tmp.9d7nS513wN /tmp/tmp.nW9pDddFrWJump to behavior
Source: /usr/bin/dash (PID: 6258)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.U7WAT3gdcU /tmp/tmp.9d7nS513wN /tmp/tmp.nW9pDddFrWJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/.Sx86.elf (PID: 6222)File: /tmp/.Sx86.elfJump to behavior
Source: .Sx86.elfSubmission file: segment LOAD with 7.8751 entropy (max. 8.0)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Obfuscated Files or Information
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
File Deletion
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1582108 Sample: .Sx86.elf Startdate: 30/12/2024 Architecture: LINUX Score: 60 21 mingleyou.top 198.44.186.177, 50748, 57899 VPSQUANUS United States 2->21 23 109.202.202.202, 80 INIT7CH Switzerland 2->23 25 3 other IPs or domains 2->25 27 Malicious sample detected (through community Yara rule) 2->27 29 Machine Learning detection for sample 2->29 31 Sample is packed with UPX 2->31 8 .Sx86.elf 2->8         started        11 dash rm 2->11         started        13 dash rm 2->13         started        signatures3 process4 signatures5 33 Sample deletes itself 8->33 15 .Sx86.elf 8->15         started        process6 process7 17 .Sx86.elf 15->17         started        19 .Sx86.elf 15->19         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
.Sx86.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
mingleyou.top
198.44.186.177
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.net.Sx86.elffalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      54.171.230.55
      unknownUnited States
      16509AMAZON-02USfalse
      198.44.186.177
      mingleyou.topUnited States
      62468VPSQUANUSfalse
      109.202.202.202
      unknownSwitzerland
      13030INIT7CHfalse
      91.189.91.43
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      91.189.91.42
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      54.171.230.55Aqua.x86.elfGet hashmaliciousUnknownBrowse
        mips64.elfGet hashmaliciousMiraiBrowse
          m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
            i586.elfGet hashmaliciousMiraiBrowse
              Aqua.arm7.elfGet hashmaliciousMiraiBrowse
                Aqua.arm7.elfGet hashmaliciousMiraiBrowse
                  arm6.elfGet hashmaliciousGafgytBrowse
                    wlw68k.elfGet hashmaliciousMiraiBrowse
                      nshkarm5.elfGet hashmaliciousUnknownBrowse
                        arm6.elfGet hashmaliciousGafgytBrowse
                          109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                          • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                          91.189.91.43bin.sh.elfGet hashmaliciousMiraiBrowse
                            dlr.mips.elfGet hashmaliciousMiraiBrowse
                              main_arm.elfGet hashmaliciousMiraiBrowse
                                DemonGen-linux-amd64.elfGet hashmaliciousUnknownBrowse
                                  arm5.elfGet hashmaliciousMiraiBrowse
                                    i.elfGet hashmaliciousUnknownBrowse
                                      arm6.elfGet hashmaliciousMirai, MoobotBrowse
                                        Aqua.mips.elfGet hashmaliciousUnknownBrowse
                                          i.elfGet hashmaliciousUnknownBrowse
                                            109.71.252.43-boatnet.ppc-2024-12-28T20_30_37.elfGet hashmaliciousMiraiBrowse
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              AMAZON-02USloligang.spc.elfGet hashmaliciousMiraiBrowse
                                              • 108.146.236.114
                                              loligang.mips.elfGet hashmaliciousMiraiBrowse
                                              • 18.167.172.156
                                              loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                                              • 13.221.153.208
                                              loligang.arm.elfGet hashmaliciousMiraiBrowse
                                              • 13.245.236.62
                                              loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                              • 44.229.110.130
                                              loligang.x86.elfGet hashmaliciousMiraiBrowse
                                              • 63.34.74.29
                                              spc.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 35.152.59.44
                                              arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 34.211.99.21
                                              dsoft.exeGet hashmaliciousPython Stealer, Creal StealerBrowse
                                              • 45.112.123.126
                                              sh4.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 13.225.38.160
                                              INIT7CHbin.sh.elfGet hashmaliciousMiraiBrowse
                                              • 109.202.202.202
                                              dlr.mips.elfGet hashmaliciousMiraiBrowse
                                              • 109.202.202.202
                                              main_arm.elfGet hashmaliciousMiraiBrowse
                                              • 109.202.202.202
                                              DemonGen-linux-amd64.elfGet hashmaliciousUnknownBrowse
                                              • 109.202.202.202
                                              arm5.elfGet hashmaliciousMiraiBrowse
                                              • 109.202.202.202
                                              i.elfGet hashmaliciousUnknownBrowse
                                              • 109.202.202.202
                                              arm6.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 109.202.202.202
                                              Aqua.mips.elfGet hashmaliciousUnknownBrowse
                                              • 109.202.202.202
                                              i.elfGet hashmaliciousUnknownBrowse
                                              • 109.202.202.202
                                              109.71.252.43-boatnet.ppc-2024-12-28T20_30_37.elfGet hashmaliciousMiraiBrowse
                                              • 109.202.202.202
                                              VPSQUANUS44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeGet hashmaliciousUnknownBrowse
                                              • 156.224.26.128
                                              CnjMEmbChO.exeGet hashmaliciousUnknownBrowse
                                              • 198.44.170.193
                                              Fqae7BLq4m.exeGet hashmaliciousUnknownBrowse
                                              • 43.250.172.42
                                              236236236.elfGet hashmaliciousUnknownBrowse
                                              • 154.91.51.168
                                              x.batGet hashmaliciousUnknownBrowse
                                              • 103.230.121.81
                                              product.batGet hashmaliciousUnknownBrowse
                                              • 103.230.121.81
                                              test.exeGet hashmaliciousUnknownBrowse
                                              • 103.230.121.81
                                              Filezilla-stage2.exeGet hashmaliciousUnknownBrowse
                                              • 103.230.121.81
                                              rebirth.dbg.elfGet hashmaliciousMirai, OkiruBrowse
                                              • 103.252.20.25
                                              mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                              • 103.122.177.128
                                              No context
                                              No context
                                              No created / dropped files found
                                              File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
                                              Entropy (8bit):7.8704226717715
                                              TrID:
                                              • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                              • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                              File name:.Sx86.elf
                                              File size:30'268 bytes
                                              MD5:3a5342fbd458daecf2de8cafd632b8b5
                                              SHA1:28a582cb004cf41bd7ae118cc50ff546360679e7
                                              SHA256:50fff53777f1131143236c2d17336f3c0e842155343cfb4906a9b3a9d34005a5
                                              SHA512:04f310f5cb951a4645f4471b312e05af7a7576015709005dbdf2fd5f79b00ccac52d457962953991f438dd9919612440bbcc6e77cbd11557a6eb958727466c11
                                              SSDEEP:768:AQgYAFi5xZF1RQ/Xl1vVGaPoWZ+aHBqmuAaxe:AQgYKi7ZFMtEYoS+aHB+e
                                              TLSH:52D2F1FBBBDD9CE2C48A21770E1BD11C80F344A167CCE15AB5DC0642B562258D075765
                                              File Content Preview:.ELF....................P}..4...........4. ...(.....................3u..3u..........................................Q.td...............................4UPX!........P...P.......Z........?d..ELF.......d.......4....4. (.......k.-.#................`.....)d..l

                                              ELF header

                                              Class:ELF32
                                              Data:2's complement, little endian
                                              Version:1 (current)
                                              Machine:Intel 80386
                                              Version Number:0x1
                                              Type:EXEC (Executable file)
                                              OS/ABI:UNIX - Linux
                                              ABI Version:0
                                              Entry Point Address:0xc07d50
                                              Flags:0x0
                                              ELF Header Size:52
                                              Program Header Offset:52
                                              Program Header Size:32
                                              Number of Program Headers:3
                                              Section Header Offset:0
                                              Section Header Size:40
                                              Number of Section Headers:0
                                              Header String Table Index:0
                                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                              LOAD0x00xc010000xc010000x75330x75337.87510x5R E0x1000
                                              LOAD0x9000x80589000x80589000x00x00.00000x6RW 0x1000
                                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 30, 2024 02:17:49.198154926 CET5074857899192.168.2.23198.44.186.177
                                              Dec 30, 2024 02:17:49.202965975 CET5789950748198.44.186.177192.168.2.23
                                              Dec 30, 2024 02:17:49.203032970 CET5074857899192.168.2.23198.44.186.177
                                              Dec 30, 2024 02:17:49.203058004 CET5074857899192.168.2.23198.44.186.177
                                              Dec 30, 2024 02:17:49.207847118 CET5789950748198.44.186.177192.168.2.23
                                              Dec 30, 2024 02:17:49.207904100 CET5074857899192.168.2.23198.44.186.177
                                              Dec 30, 2024 02:17:49.212666988 CET5789950748198.44.186.177192.168.2.23
                                              Dec 30, 2024 02:17:51.240613937 CET43928443192.168.2.2391.189.91.42
                                              Dec 30, 2024 02:17:56.615889072 CET42836443192.168.2.2391.189.91.43
                                              Dec 30, 2024 02:17:58.151658058 CET4251680192.168.2.23109.202.202.202
                                              Dec 30, 2024 02:17:59.205327034 CET5074857899192.168.2.23198.44.186.177
                                              Dec 30, 2024 02:17:59.210860014 CET5789950748198.44.186.177192.168.2.23
                                              Dec 30, 2024 02:17:59.504345894 CET5789950748198.44.186.177192.168.2.23
                                              Dec 30, 2024 02:17:59.504475117 CET5074857899192.168.2.23198.44.186.177
                                              Dec 30, 2024 02:17:59.964148998 CET5789950748198.44.186.177192.168.2.23
                                              Dec 30, 2024 02:17:59.964222908 CET5074857899192.168.2.23198.44.186.177
                                              Dec 30, 2024 02:18:12.997611046 CET43928443192.168.2.2391.189.91.42
                                              Dec 30, 2024 02:18:19.594177008 CET33606443192.168.2.2354.171.230.55
                                              Dec 30, 2024 02:18:19.599801064 CET4433360654.171.230.55192.168.2.23
                                              Dec 30, 2024 02:18:19.599900961 CET33606443192.168.2.2354.171.230.55
                                              Dec 30, 2024 02:18:23.236169100 CET42836443192.168.2.2391.189.91.43
                                              Dec 30, 2024 02:18:29.379436016 CET4251680192.168.2.23109.202.202.202
                                              Dec 30, 2024 02:18:53.952043056 CET43928443192.168.2.2391.189.91.42
                                              Dec 30, 2024 02:19:00.013358116 CET5074857899192.168.2.23198.44.186.177
                                              Dec 30, 2024 02:19:00.018769026 CET5789950748198.44.186.177192.168.2.23
                                              Dec 30, 2024 02:19:00.311718941 CET5789950748198.44.186.177192.168.2.23
                                              Dec 30, 2024 02:19:00.311794043 CET5074857899192.168.2.23198.44.186.177
                                              Dec 30, 2024 02:19:00.964665890 CET5789950748198.44.186.177192.168.2.23
                                              Dec 30, 2024 02:19:00.964750051 CET5074857899192.168.2.23198.44.186.177
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 30, 2024 02:17:48.658448935 CET4524053192.168.2.238.8.8.8
                                              Dec 30, 2024 02:17:49.198043108 CET53452408.8.8.8192.168.2.23
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Dec 30, 2024 02:17:48.658448935 CET192.168.2.238.8.8.80x0Standard query (0)mingleyou.topA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Dec 30, 2024 02:17:49.198043108 CET8.8.8.8192.168.2.230x0No error (0)mingleyou.top198.44.186.177A (IP address)IN (0x0001)false

                                              System Behavior

                                              Start time (UTC):01:17:47
                                              Start date (UTC):30/12/2024
                                              Path:/tmp/.Sx86.elf
                                              Arguments:/tmp/.Sx86.elf
                                              File size:30268 bytes
                                              MD5 hash:3a5342fbd458daecf2de8cafd632b8b5

                                              Start time (UTC):01:17:47
                                              Start date (UTC):30/12/2024
                                              Path:/tmp/.Sx86.elf
                                              Arguments:-
                                              File size:30268 bytes
                                              MD5 hash:3a5342fbd458daecf2de8cafd632b8b5

                                              Start time (UTC):01:17:47
                                              Start date (UTC):30/12/2024
                                              Path:/tmp/.Sx86.elf
                                              Arguments:-
                                              File size:30268 bytes
                                              MD5 hash:3a5342fbd458daecf2de8cafd632b8b5

                                              Start time (UTC):01:17:47
                                              Start date (UTC):30/12/2024
                                              Path:/tmp/.Sx86.elf
                                              Arguments:-
                                              File size:30268 bytes
                                              MD5 hash:3a5342fbd458daecf2de8cafd632b8b5

                                              Start time (UTC):01:18:18
                                              Start date (UTC):30/12/2024
                                              Path:/usr/bin/dash
                                              Arguments:-
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time (UTC):01:18:18
                                              Start date (UTC):30/12/2024
                                              Path:/usr/bin/rm
                                              Arguments:rm -f /tmp/tmp.U7WAT3gdcU /tmp/tmp.9d7nS513wN /tmp/tmp.nW9pDddFrW
                                              File size:72056 bytes
                                              MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                              Start time (UTC):01:18:18
                                              Start date (UTC):30/12/2024
                                              Path:/usr/bin/dash
                                              Arguments:-
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time (UTC):01:18:18
                                              Start date (UTC):30/12/2024
                                              Path:/usr/bin/rm
                                              Arguments:rm -f /tmp/tmp.U7WAT3gdcU /tmp/tmp.9d7nS513wN /tmp/tmp.nW9pDddFrW
                                              File size:72056 bytes
                                              MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b