Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
arm.elf

Overview

General Information

Sample name:arm.elf
Analysis ID:1582157
MD5:ea5b60b7a57572b113a0069740eef8e6
SHA1:4a6d8ff6a861a7c1b69d5d8470c9ef65e83d2324
SHA256:1ebccc0e47e6f148b0179a9b77717a6e8bf427d66c41a03625c2d2f47ab48f10
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Moobot
Sample deletes itself
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1582157
Start date and time:2024-12-30 03:09:42 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 1s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:arm.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/0@18/0
  • VT rate limit hit for: wcjwcj.cn
Command:/tmp/arm.elf
PID:6253
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • arm.elf (PID: 6253, Parent: 6178, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/arm.elf
    • arm.elf New Fork (PID: 6255, Parent: 6253)
      • arm.elf New Fork (PID: 6257, Parent: 6255)
      • arm.elf New Fork (PID: 6259, Parent: 6255)
        • arm.elf New Fork (PID: 6261, Parent: 6259)
  • dash New Fork (PID: 6268, Parent: 4334)
  • rm (PID: 6268, Parent: 4334, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.l4agDrsUnE /tmp/tmp.cTpCwKJ0GN /tmp/tmp.fMDdcAUB9f
  • dash New Fork (PID: 6269, Parent: 4334)
  • rm (PID: 6269, Parent: 4334, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.l4agDrsUnE /tmp/tmp.cTpCwKJ0GN /tmp/tmp.fMDdcAUB9f
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
arm.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    arm.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      arm.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xe1a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe1b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe1cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe1e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe1f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe208:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe21c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe230:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe244:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe258:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe26c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe280:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe294:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe2a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe2bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe2d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe2e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe2f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe30c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe320:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe334:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      6253.1.00007f0750017000.00007f0750027000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        6253.1.00007f0750017000.00007f0750027000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          6253.1.00007f0750017000.00007f0750027000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xe1a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe1b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe1cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe1e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe1f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe208:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe21c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe230:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe244:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe258:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe26c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe280:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe294:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe2a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe2bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe2d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe2e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe2f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe30c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe320:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe334:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Process Memory Space: arm.elf PID: 6253JoeSecurity_MoobotYara detected MoobotJoe Security
            Process Memory Space: arm.elf PID: 6253JoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Click to see the 1 entries
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: arm.elfAvira: detected
              Source: arm.elfReversingLabs: Detection: 60%
              Source: arm.elfVirustotal: Detection: 56%Perma Link
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
              Source: unknownTCP traffic detected without corresponding DNS query: 34.249.145.219
              Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
              Source: global trafficDNS traffic detected: DNS query: wcjwcj.cn
              Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39256
              Source: unknownNetwork traffic detected: HTTP traffic on port 39256 -> 443

              System Summary

              barindex
              Source: arm.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 6253.1.00007f0750017000.00007f0750027000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: arm.elf PID: 6253, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: arm.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 6253.1.00007f0750017000.00007f0750027000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: arm.elf PID: 6253, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal84.troj.evad.linELF@0/0@18/0
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1582/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/3088/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/230/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/231/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/232/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1579/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/233/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1699/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/234/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1335/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1698/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/5819/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1334/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1576/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/2302/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/236/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/237/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/910/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/912/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/2307/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/918/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1594/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1349/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1344/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1465/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1586/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/248/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/249/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1463/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/6238/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/801/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/6239/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1900/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/491/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/252/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/253/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/254/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/255/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/256/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1599/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/257/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1477/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/379/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1476/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1475/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/936/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/2208/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/35/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1809/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/1494/cmdlineJump to behavior
              Source: /tmp/arm.elf (PID: 6257)File opened: /proc/260/cmdlineJump to behavior
              Source: /usr/bin/dash (PID: 6268)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.l4agDrsUnE /tmp/tmp.cTpCwKJ0GN /tmp/tmp.fMDdcAUB9fJump to behavior
              Source: /usr/bin/dash (PID: 6269)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.l4agDrsUnE /tmp/tmp.cTpCwKJ0GN /tmp/tmp.fMDdcAUB9fJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: /tmp/arm.elf (PID: 6253)File: /tmp/arm.elfJump to behavior
              Source: /tmp/arm.elf (PID: 6253)Queries kernel information via 'uname': Jump to behavior
              Source: arm.elf, 6253.1.00007ffd44210000.00007ffd44231000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/arm.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/arm.elf
              Source: arm.elf, 6253.1.000056382d6a2000.000056382d7d0000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
              Source: arm.elf, 6253.1.00007ffd44210000.00007ffd44231000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
              Source: arm.elf, 6253.1.000056382d6a2000.000056382d7d0000.rw-.sdmpBinary or memory string: k-8V!/etc/qemu-binfmt/arm

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: arm.elf, type: SAMPLE
              Source: Yara matchFile source: 6253.1.00007f0750017000.00007f0750027000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: arm.elf PID: 6253, type: MEMORYSTR
              Source: Yara matchFile source: arm.elf, type: SAMPLE
              Source: Yara matchFile source: 6253.1.00007f0750017000.00007f0750027000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: arm.elf PID: 6253, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: arm.elf, type: SAMPLE
              Source: Yara matchFile source: 6253.1.00007f0750017000.00007f0750027000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: arm.elf PID: 6253, type: MEMORYSTR
              Source: Yara matchFile source: arm.elf, type: SAMPLE
              Source: Yara matchFile source: 6253.1.00007f0750017000.00007f0750027000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: arm.elf PID: 6253, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
              File Deletion
              1
              OS Credential Dumping
              11
              Security Software Discovery
              Remote ServicesData from Local System1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1582157 Sample: arm.elf Startdate: 30/12/2024 Architecture: LINUX Score: 84 24 109.202.202.202, 80 INIT7CH Switzerland 2->24 26 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->26 28 2 other IPs or domains 2->28 30 Malicious sample detected (through community Yara rule) 2->30 32 Antivirus / Scanner detection for submitted sample 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 2 other signatures 2->36 9 arm.elf 2->9         started        12 dash rm 2->12         started        14 dash rm 2->14         started        signatures3 process4 signatures5 38 Sample deletes itself 9->38 16 arm.elf 9->16         started        process6 process7 18 arm.elf 16->18         started        20 arm.elf 16->20         started        process8 22 arm.elf 18->22         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              arm.elf61%ReversingLabsLinux.Trojan.Mirai
              arm.elf56%VirustotalBrowse
              arm.elf100%AviraEXP/ELF.Mirai.Z.A
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              wcjwcj.cn
              69.165.74.109
              truefalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                34.249.145.219
                unknownUnited States
                16509AMAZON-02USfalse
                109.202.202.202
                unknownSwitzerland
                13030INIT7CHfalse
                91.189.91.42
                unknownUnited Kingdom
                41231CANONICAL-ASGBfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                34.249.145.219rebirth.ppc.elfGet hashmaliciousGafgytBrowse
                  dlr.arm7.elfGet hashmaliciousMiraiBrowse
                    udpmpsl.elfGet hashmaliciousUnknownBrowse
                      bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        main_mpsl.elfGet hashmaliciousMiraiBrowse
                          ub8ehJSePAfc9FYqZIT6.arm7.elfGet hashmaliciousMiraiBrowse
                            telnet.arm7.elfGet hashmaliciousUnknownBrowse
                              main_arm7.elfGet hashmaliciousMiraiBrowse
                                boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                  arm6.elfGet hashmaliciousMirai, MoobotBrowse
                                    109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                    • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                    91.189.91.42rebirth.ppc.elfGet hashmaliciousGafgytBrowse
                                      dlr.arm7.elfGet hashmaliciousMiraiBrowse
                                        .Sm68k.elfGet hashmaliciousUnknownBrowse
                                          m68k.elfGet hashmaliciousUnknownBrowse
                                            main_mpsl.elfGet hashmaliciousMiraiBrowse
                                              .Sx86_64.elfGet hashmaliciousUnknownBrowse
                                                udpmpsl.elfGet hashmaliciousUnknownBrowse
                                                  .Sarm.elfGet hashmaliciousUnknownBrowse
                                                    dc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                      rebirth.i686.elfGet hashmaliciousGafgytBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        wcjwcj.cnarm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 69.165.74.109
                                                        mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 69.165.74.109
                                                        JgR39HaU3e.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 154.9.29.154
                                                        n2pg2vVhEO.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 154.9.29.154
                                                        J6yrFHwNuC.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 154.9.29.154
                                                        sg123JWcuU.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 154.9.29.154
                                                        HePOITlRYk.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 154.9.29.154
                                                        4GI3jkntqw.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 154.9.29.154
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        CANONICAL-ASGBrebirth.ppc.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        dlr.arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        .Sm68k.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        m68k.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        main_mpsl.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        .Sx86_64.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        x86.elfGet hashmaliciousUnknownBrowse
                                                        • 185.125.190.26
                                                        udpmpsl.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        .Sarm.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        dc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        • 91.189.91.42
                                                        INIT7CHrebirth.ppc.elfGet hashmaliciousGafgytBrowse
                                                        • 109.202.202.202
                                                        dlr.arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 109.202.202.202
                                                        .Sm68k.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        m68k.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        main_mpsl.elfGet hashmaliciousMiraiBrowse
                                                        • 109.202.202.202
                                                        .Sx86_64.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        udpmpsl.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        .Sarm.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        dc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        • 109.202.202.202
                                                        rebirth.i686.elfGet hashmaliciousGafgytBrowse
                                                        • 109.202.202.202
                                                        AMAZON-02USrebirth.ppc.elfGet hashmaliciousGafgytBrowse
                                                        • 34.249.145.219
                                                        dlr.arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 34.249.145.219
                                                        udpmpsl.elfGet hashmaliciousUnknownBrowse
                                                        • 34.249.145.219
                                                        .Sx86.elfGet hashmaliciousUnknownBrowse
                                                        • 54.171.230.55
                                                        loligang.spc.elfGet hashmaliciousMiraiBrowse
                                                        • 108.146.236.114
                                                        loligang.mips.elfGet hashmaliciousMiraiBrowse
                                                        • 18.167.172.156
                                                        loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                                                        • 13.221.153.208
                                                        loligang.arm.elfGet hashmaliciousMiraiBrowse
                                                        • 13.245.236.62
                                                        loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 44.229.110.130
                                                        loligang.x86.elfGet hashmaliciousMiraiBrowse
                                                        • 63.34.74.29
                                                        No context
                                                        No context
                                                        No created / dropped files found
                                                        File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                                                        Entropy (8bit):6.101722680058916
                                                        TrID:
                                                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                        File name:arm.elf
                                                        File size:65'400 bytes
                                                        MD5:ea5b60b7a57572b113a0069740eef8e6
                                                        SHA1:4a6d8ff6a861a7c1b69d5d8470c9ef65e83d2324
                                                        SHA256:1ebccc0e47e6f148b0179a9b77717a6e8bf427d66c41a03625c2d2f47ab48f10
                                                        SHA512:d8ef32089fad4b8f2058f7ce2d1b6c924ffb762a96967e888669fd7883ee1903cc133b5a4ddc59b5b7e3f319c92b7e5b4c3d5496a73265d00498bd1e3bda46b7
                                                        SSDEEP:1536:g8YF8Nc8e1CA6aqjr6unrpT/qt9Yp5y6BrvFnj:/YaaapTyt+pskFnj
                                                        TLSH:79533941F8815623C6D112BBF76E42CD3B2623E8E2DF72179D219F203B8692B0D67E55
                                                        File Content Preview:.ELF...a..........(.........4...........4. ...(.....................<...<...............@...@...@...h...<%..........Q.td..................................-...L."....7..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                                                        ELF header

                                                        Class:ELF32
                                                        Data:2's complement, little endian
                                                        Version:1 (current)
                                                        Machine:ARM
                                                        Version Number:0x1
                                                        Type:EXEC (Executable file)
                                                        OS/ABI:ARM - ABI
                                                        ABI Version:0
                                                        Entry Point Address:0x8190
                                                        Flags:0x202
                                                        ELF Header Size:52
                                                        Program Header Offset:52
                                                        Program Header Size:32
                                                        Number of Program Headers:3
                                                        Section Header Offset:65000
                                                        Section Header Size:40
                                                        Number of Section Headers:10
                                                        Header String Table Index:9
                                                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                        NULL0x00x00x00x00x0000
                                                        .initPROGBITS0x80940x940x180x00x6AX004
                                                        .textPROGBITS0x80b00xb00xdff00x00x6AX0016
                                                        .finiPROGBITS0x160a00xe0a00x140x00x6AX004
                                                        .rodataPROGBITS0x160b40xe0b40x19880x00x2A004
                                                        .ctorsPROGBITS0x1fa400xfa400x80x00x3WA004
                                                        .dtorsPROGBITS0x1fa480xfa480x80x00x3WA004
                                                        .dataPROGBITS0x1fa540xfa540x3540x00x3WA004
                                                        .bssNOBITS0x1fda80xfda80x21d40x00x3WA004
                                                        .shstrtabSTRTAB0x00xfda80x3e0x00x0001
                                                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                        LOAD0x00x80000x80000xfa3c0xfa3c6.13670x5R E0x8000.init .text .fini .rodata
                                                        LOAD0xfa400x1fa400x1fa400x3680x253c2.66720x6RW 0x8000.ctors .dtors .data .bss
                                                        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Dec 30, 2024 03:10:59.119738102 CET43928443192.168.2.2391.189.91.42
                                                        Dec 30, 2024 03:11:10.068387032 CET4433925634.249.145.219192.168.2.23
                                                        Dec 30, 2024 03:11:10.068811893 CET39256443192.168.2.2334.249.145.219
                                                        Dec 30, 2024 03:11:10.073712111 CET4433925634.249.145.219192.168.2.23
                                                        Dec 30, 2024 03:11:14.221688986 CET4251680192.168.2.23109.202.202.202
                                                        Dec 30, 2024 03:11:20.364773989 CET43928443192.168.2.2391.189.91.42
                                                        Dec 30, 2024 03:12:01.319305897 CET43928443192.168.2.2391.189.91.42
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Dec 30, 2024 03:10:58.914630890 CET3515953192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:10:58.921689034 CET53351598.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:11:06.932111979 CET5844953192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:11:07.197700977 CET53584498.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:11:08.201312065 CET4745853192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:11:08.208668947 CET53474588.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:11:12.211517096 CET4089653192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:11:12.218161106 CET53408968.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:11:28.224395037 CET5561553192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:11:28.231564045 CET53556158.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:11:31.234663963 CET5245653192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:11:31.241863012 CET53524568.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:11:33.245567083 CET5787053192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:11:33.487581015 CET53578708.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:11:42.490349054 CET5224953192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:11:42.498013020 CET53522498.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:11:47.501225948 CET5987653192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:11:47.508434057 CET53598768.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:11:53.511981964 CET3324753192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:11:53.518810034 CET53332478.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:11:57.522625923 CET4818353192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:11:57.529520035 CET53481838.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:12:00.533853054 CET4229953192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:12:00.541326046 CET53422998.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:12:11.546942949 CET6022553192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:12:11.554169893 CET53602258.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:12:14.558264017 CET3684153192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:12:14.565561056 CET53368418.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:12:37.573765039 CET4646853192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:12:37.580558062 CET53464688.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:12:54.589083910 CET3903953192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:12:54.596101046 CET53390398.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:13:01.600198030 CET3978253192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:13:01.607167006 CET53397828.8.8.8192.168.2.23
                                                        Dec 30, 2024 03:13:02.612175941 CET5735653192.168.2.238.8.8.8
                                                        Dec 30, 2024 03:13:02.619115114 CET53573568.8.8.8192.168.2.23
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Dec 30, 2024 03:10:58.914630890 CET192.168.2.238.8.8.80x90daStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:06.932111979 CET192.168.2.238.8.8.80x71e0Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:08.201312065 CET192.168.2.238.8.8.80xd8acStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:12.211517096 CET192.168.2.238.8.8.80x9dcStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:28.224395037 CET192.168.2.238.8.8.80x8c86Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:31.234663963 CET192.168.2.238.8.8.80xd6f1Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:33.245567083 CET192.168.2.238.8.8.80xe878Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:42.490349054 CET192.168.2.238.8.8.80x886cStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:47.501225948 CET192.168.2.238.8.8.80x7885Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:53.511981964 CET192.168.2.238.8.8.80xe676Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:57.522625923 CET192.168.2.238.8.8.80xd369Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:12:00.533853054 CET192.168.2.238.8.8.80x4250Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:12:11.546942949 CET192.168.2.238.8.8.80x8491Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:12:14.558264017 CET192.168.2.238.8.8.80xd4dfStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:12:37.573765039 CET192.168.2.238.8.8.80xa917Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:12:54.589083910 CET192.168.2.238.8.8.80x598cStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:13:01.600198030 CET192.168.2.238.8.8.80x8e20Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:13:02.612175941 CET192.168.2.238.8.8.80x9e96Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Dec 30, 2024 03:10:58.921689034 CET8.8.8.8192.168.2.230x90daNo error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:07.197700977 CET8.8.8.8192.168.2.230x71e0No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:08.208668947 CET8.8.8.8192.168.2.230xd8acNo error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:12.218161106 CET8.8.8.8192.168.2.230x9dcNo error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:28.231564045 CET8.8.8.8192.168.2.230x8c86No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:31.241863012 CET8.8.8.8192.168.2.230xd6f1No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:33.487581015 CET8.8.8.8192.168.2.230xe878No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:42.498013020 CET8.8.8.8192.168.2.230x886cNo error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:47.508434057 CET8.8.8.8192.168.2.230x7885No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:53.518810034 CET8.8.8.8192.168.2.230xe676No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:11:57.529520035 CET8.8.8.8192.168.2.230xd369No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:12:00.541326046 CET8.8.8.8192.168.2.230x4250No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:12:11.554169893 CET8.8.8.8192.168.2.230x8491No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:12:14.565561056 CET8.8.8.8192.168.2.230xd4dfNo error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:12:37.580558062 CET8.8.8.8192.168.2.230xa917No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:12:54.596101046 CET8.8.8.8192.168.2.230x598cNo error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:13:01.607167006 CET8.8.8.8192.168.2.230x8e20No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 03:13:02.619115114 CET8.8.8.8192.168.2.230x9e96No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false

                                                        System Behavior

                                                        Start time (UTC):02:10:57
                                                        Start date (UTC):30/12/2024
                                                        Path:/tmp/arm.elf
                                                        Arguments:/tmp/arm.elf
                                                        File size:4956856 bytes
                                                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                        Start time (UTC):02:10:57
                                                        Start date (UTC):30/12/2024
                                                        Path:/tmp/arm.elf
                                                        Arguments:-
                                                        File size:4956856 bytes
                                                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                        Start time (UTC):02:10:57
                                                        Start date (UTC):30/12/2024
                                                        Path:/tmp/arm.elf
                                                        Arguments:-
                                                        File size:4956856 bytes
                                                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                        Start time (UTC):02:10:57
                                                        Start date (UTC):30/12/2024
                                                        Path:/tmp/arm.elf
                                                        Arguments:-
                                                        File size:4956856 bytes
                                                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                        Start time (UTC):02:10:57
                                                        Start date (UTC):30/12/2024
                                                        Path:/tmp/arm.elf
                                                        Arguments:-
                                                        File size:4956856 bytes
                                                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                        Start time (UTC):02:11:08
                                                        Start date (UTC):30/12/2024
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):02:11:08
                                                        Start date (UTC):30/12/2024
                                                        Path:/usr/bin/rm
                                                        Arguments:rm -f /tmp/tmp.l4agDrsUnE /tmp/tmp.cTpCwKJ0GN /tmp/tmp.fMDdcAUB9f
                                                        File size:72056 bytes
                                                        MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                        Start time (UTC):02:11:08
                                                        Start date (UTC):30/12/2024
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):02:11:08
                                                        Start date (UTC):30/12/2024
                                                        Path:/usr/bin/rm
                                                        Arguments:rm -f /tmp/tmp.l4agDrsUnE /tmp/tmp.cTpCwKJ0GN /tmp/tmp.fMDdcAUB9f
                                                        File size:72056 bytes
                                                        MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b