Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
bot.x86.elf

Overview

General Information

Sample name:bot.x86.elf
Analysis ID:1584002
MD5:a1dd69ef6e61882be9f64655205ce00f
SHA1:d65112d59513e52804ec23a8d760c924c8d9c640
SHA256:904a4a5c2dd5e9f2b0e919214ffe038032316819d81e938638c8ab07398b50cf
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Okiru
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1584002
Start date and time:2025-01-04 02:22:04 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 28s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:bot.x86.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@16/0
Command:/tmp/bot.x86.elf
PID:6238
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • bot.x86.elf (PID: 6238, Parent: 6163, MD5: a1dd69ef6e61882be9f64655205ce00f) Arguments: /tmp/bot.x86.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
bot.x86.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    bot.x86.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
      bot.x86.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        bot.x86.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0x10704:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10718:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1072c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10740:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10754:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10768:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1077c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10790:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x107a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x107b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x107cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x107e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x107f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10808:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1081c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10830:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10844:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10858:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1086c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10880:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10894:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        bot.x86.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
        • 0x105e4:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        6238.1.0000000008048000.000000000805b000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
          6238.1.0000000008048000.000000000805b000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
            6238.1.0000000008048000.000000000805b000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              6238.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
              • 0x10704:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10718:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1072c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10740:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10754:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10768:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1077c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10790:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x107a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x107b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x107cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x107e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x107f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10808:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1081c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10830:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10844:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10858:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1086c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10880:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10894:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              6238.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
              • 0x105e4:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
              Click to see the 12 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-04T02:22:47.644018+010020304901Malware Command and Control Activity Detected192.168.2.236064889.169.4.4447925TCP
              2025-01-04T02:22:51.401367+010020304901Malware Command and Control Activity Detected192.168.2.236065089.169.4.4447925TCP
              2025-01-04T02:23:03.168552+010020304901Malware Command and Control Activity Detected192.168.2.236065289.169.4.4447925TCP
              2025-01-04T02:23:13.910709+010020304901Malware Command and Control Activity Detected192.168.2.236065489.169.4.4447925TCP
              2025-01-04T02:23:20.648690+010020304901Malware Command and Control Activity Detected192.168.2.236065689.169.4.4447925TCP
              2025-01-04T02:23:29.399000+010020304901Malware Command and Control Activity Detected192.168.2.236065889.169.4.4447925TCP
              2025-01-04T02:23:41.152330+010020304901Malware Command and Control Activity Detected192.168.2.236066089.169.4.4447925TCP
              2025-01-04T02:23:46.898439+010020304901Malware Command and Control Activity Detected192.168.2.236066289.169.4.4447925TCP
              2025-01-04T02:23:50.763107+010020304901Malware Command and Control Activity Detected192.168.2.236066489.169.4.4447925TCP
              2025-01-04T02:24:00.505985+010020304901Malware Command and Control Activity Detected192.168.2.236066689.169.4.4447925TCP
              2025-01-04T02:24:09.241179+010020304901Malware Command and Control Activity Detected192.168.2.236066889.169.4.4447925TCP
              2025-01-04T02:24:16.975757+010020304901Malware Command and Control Activity Detected192.168.2.236067089.169.4.4447925TCP
              2025-01-04T02:24:19.713364+010020304901Malware Command and Control Activity Detected192.168.2.236067289.169.4.4447925TCP
              2025-01-04T02:24:29.461466+010020304901Malware Command and Control Activity Detected192.168.2.236067489.169.4.4447925TCP
              2025-01-04T02:24:39.231194+010020304901Malware Command and Control Activity Detected192.168.2.236067689.169.4.4447925TCP
              2025-01-04T02:24:48.974428+010020304901Malware Command and Control Activity Detected192.168.2.236067889.169.4.4447925TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: bot.x86.elfAvira: detected
              Source: bot.x86.elfVirustotal: Detection: 64%Perma Link
              Source: bot.x86.elfReversingLabs: Detection: 68%
              Source: bot.x86.elfJoe Sandbox ML: detected
              Source: bot.x86.elfString: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60678 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60648 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60652 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60654 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60650 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60672 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60664 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60676 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60674 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60656 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60658 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60662 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60668 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60666 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60660 -> 89.169.4.44:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:60670 -> 89.169.4.44:47925
              Source: global trafficTCP traffic: 89.169.4.44 ports 47925,2,4,5,7,9
              Source: global trafficTCP traffic: 192.168.2.23:60648 -> 89.169.4.44:47925
              Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
              Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
              Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
              Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
              Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
              Source: global trafficDNS traffic detected: DNS query: seyfhg.work.gd
              Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

              System Summary

              barindex
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: Process Memory Space: bot.x86.elf PID: 6238, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: bot.x86.elf PID: 6238, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
              Source: Initial sampleString containing 'busybox' found: /bin/busybox
              Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: Process Memory Space: bot.x86.elf PID: 6238, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: bot.x86.elf PID: 6238, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.linELF@0/0@16/0
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1582/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/3088/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/230/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/231/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/232/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1579/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/233/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1699/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/234/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1335/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1698/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1334/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1576/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/2302/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/236/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/237/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/910/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/912/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/2307/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/918/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/6240/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1594/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1349/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1344/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1465/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1586/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/248/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/249/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1463/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/801/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/6239/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1900/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/491/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/252/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/253/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/4507/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/254/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/255/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/256/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1599/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/257/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1477/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/379/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1476/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/1475/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/4500/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/4502/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/936/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/4504/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/2208/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 6240)File opened: /proc/35/cmdlineJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 6238, type: MEMORYSTR
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 6238, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 6238, type: MEMORYSTR
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 6238.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 6238, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              Valid AccountsWindows Management Instrumentation1
              Scripting
              Path InterceptionDirect Volume Access1
              OS Credential Dumping
              System Service DiscoveryRemote ServicesData from Local System1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
              Application Layer Protocol
              Traffic DuplicationData Destruction
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              SourceDetectionScannerLabelLink
              bot.x86.elf64%VirustotalBrowse
              bot.x86.elf68%ReversingLabsLinux.Backdoor.Mirai
              bot.x86.elf100%AviraEXP/ELF.Mirai.Z.A
              bot.x86.elf100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              seyfhg.work.gd
              89.169.4.44
              truefalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                109.202.202.202
                unknownSwitzerland
                13030INIT7CHfalse
                89.169.4.44
                seyfhg.work.gdRussian Federation
                31514INF-NET-ASRUfalse
                91.189.91.43
                unknownUnited Kingdom
                41231CANONICAL-ASGBfalse
                91.189.91.42
                unknownUnited Kingdom
                41231CANONICAL-ASGBfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                89.169.4.44bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                  bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                    bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                      bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                          bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                            bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                              Space.mpsl.elfGet hashmaliciousMiraiBrowse
                                Space.ppc.elfGet hashmaliciousMiraiBrowse
                                  Space.arm7.elfGet hashmaliciousMiraiBrowse
                                    91.189.91.43bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                      bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                        185.232.205.45-boatnet.arm-2025-01-03T23_59_46.elfGet hashmaliciousMiraiBrowse
                                          185.232.205.45-boatnet.mpsl-2025-01-03T23_59_46.elfGet hashmaliciousMiraiBrowse
                                            boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                              91.188.254.21-mips-2024-12-27T14_00_54.elfGet hashmaliciousUnknownBrowse
                                                bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                  mips.elfGet hashmaliciousUnknownBrowse
                                                    Mozi.m.elfGet hashmaliciousMiraiBrowse
                                                      bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        seyfhg.work.gdbot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.ppc.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 89.169.4.44
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        CANONICAL-ASGBbot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 91.189.91.42
                                                        bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 91.189.91.42
                                                        185.232.205.45-boatnet.arm-2025-01-03T23_59_46.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        185.232.205.45-boatnet.mips-2025-01-03T23_59_45.elfGet hashmaliciousMiraiBrowse
                                                        • 185.125.190.26
                                                        185.232.205.45-boatnet.mpsl-2025-01-03T23_59_46.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        185.232.205.45-boatnet.m68k-2025-01-03T23_59_48.elfGet hashmaliciousMiraiBrowse
                                                        • 185.125.190.26
                                                        boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        154.216.18.23-boatnet.arm-2025-01-03T11_40_59.elfGet hashmaliciousMiraiBrowse
                                                        • 185.125.190.26
                                                        91.188.254.21-mips-2024-12-27T14_00_54.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 91.189.91.42
                                                        INF-NET-ASRUbot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 89.169.4.44
                                                        downloaded_exe.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                        • 5.35.36.120
                                                        Corporate_Code_of_Ethics_and_Business_Conduct_Policy_2024.pdf.lnk.d.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                        • 5.35.36.120
                                                        main.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                        • 5.35.36.120
                                                        INIT7CHbot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 109.202.202.202
                                                        bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 109.202.202.202
                                                        185.232.205.45-boatnet.arm-2025-01-03T23_59_46.elfGet hashmaliciousMiraiBrowse
                                                        • 109.202.202.202
                                                        185.232.205.45-boatnet.mpsl-2025-01-03T23_59_46.elfGet hashmaliciousMiraiBrowse
                                                        • 109.202.202.202
                                                        boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                        • 109.202.202.202
                                                        91.188.254.21-mips-2024-12-27T14_00_54.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 109.202.202.202
                                                        mips.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        Mozi.m.elfGet hashmaliciousMiraiBrowse
                                                        • 109.202.202.202
                                                        bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                        • 109.202.202.202
                                                        No context
                                                        No context
                                                        No created / dropped files found
                                                        File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                                        Entropy (8bit):5.77220580654577
                                                        TrID:
                                                        • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                                        • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                                        File name:bot.x86.elf
                                                        File size:93'768 bytes
                                                        MD5:a1dd69ef6e61882be9f64655205ce00f
                                                        SHA1:d65112d59513e52804ec23a8d760c924c8d9c640
                                                        SHA256:904a4a5c2dd5e9f2b0e919214ffe038032316819d81e938638c8ab07398b50cf
                                                        SHA512:7a13381e7b9e2f3f0fedfb4ea538900a9d8e0135b58902d9328731733aaa35ce2196491284a45574613bcdfff3c9488771fe34aa07d6d3b313253c3987972fb6
                                                        SSDEEP:1536:oFd1IRgCXUzx7t0fMqlHgQEiyhcg+7ju72wPZnWhZS5xtY+g:oFdmR9XUzxh0fMgHgQEimEjLAdew5bg
                                                        TLSH:C4936BC4F243E5F1EC5709B16137EB374B32F0BA111AEA43C7699972DCA2541DA06B9C
                                                        File Content Preview:.ELF....................d...4....l......4. ...(......................$...$...............$...........G..8...........Q.td............................U..S.......o4...h....c...[]...$.............U......=.....t..5....$......$.......u........t....h............

                                                        ELF header

                                                        Class:ELF32
                                                        Data:2's complement, little endian
                                                        Version:1 (current)
                                                        Machine:Intel 80386
                                                        Version Number:0x1
                                                        Type:EXEC (Executable file)
                                                        OS/ABI:UNIX - System V
                                                        ABI Version:0
                                                        Entry Point Address:0x8048164
                                                        Flags:0x0
                                                        ELF Header Size:52
                                                        Program Header Offset:52
                                                        Program Header Size:32
                                                        Number of Program Headers:3
                                                        Section Header Offset:93368
                                                        Section Header Size:40
                                                        Number of Section Headers:10
                                                        Header String Table Index:9
                                                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                        NULL0x00x00x00x00x0000
                                                        .initPROGBITS0x80480940x940x1c0x00x6AX001
                                                        .textPROGBITS0x80480b00xb00xfe860x00x6AX0016
                                                        .finiPROGBITS0x8057f360xff360x170x00x6AX001
                                                        .rodataPROGBITS0x8057f600xff600x25900x00x2A0032
                                                        .ctorsPROGBITS0x805b4f40x124f40xc0x00x3WA004
                                                        .dtorsPROGBITS0x805b5000x125000x80x00x3WA004
                                                        .dataPROGBITS0x805b5200x125200x47580x00x3WA0032
                                                        .bssNOBITS0x805fc800x16c780x49ac0x00x3WA0032
                                                        .shstrtabSTRTAB0x00x16c780x3e0x00x0001
                                                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                        LOAD0x00x80480000x80480000x124f00x124f06.60500x5R E0x1000.init .text .fini .rodata
                                                        LOAD0x124f40x805b4f40x805b4f40x47840x91380.36420x6RW 0x1000.ctors .dtors .data .bss
                                                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2025-01-04T02:22:47.644018+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236064889.169.4.4447925TCP
                                                        2025-01-04T02:22:51.401367+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236065089.169.4.4447925TCP
                                                        2025-01-04T02:23:03.168552+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236065289.169.4.4447925TCP
                                                        2025-01-04T02:23:13.910709+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236065489.169.4.4447925TCP
                                                        2025-01-04T02:23:20.648690+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236065689.169.4.4447925TCP
                                                        2025-01-04T02:23:29.399000+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236065889.169.4.4447925TCP
                                                        2025-01-04T02:23:41.152330+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236066089.169.4.4447925TCP
                                                        2025-01-04T02:23:46.898439+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236066289.169.4.4447925TCP
                                                        2025-01-04T02:23:50.763107+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236066489.169.4.4447925TCP
                                                        2025-01-04T02:24:00.505985+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236066689.169.4.4447925TCP
                                                        2025-01-04T02:24:09.241179+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236066889.169.4.4447925TCP
                                                        2025-01-04T02:24:16.975757+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236067089.169.4.4447925TCP
                                                        2025-01-04T02:24:19.713364+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236067289.169.4.4447925TCP
                                                        2025-01-04T02:24:29.461466+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236067489.169.4.4447925TCP
                                                        2025-01-04T02:24:39.231194+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236067689.169.4.4447925TCP
                                                        2025-01-04T02:24:48.974428+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.236067889.169.4.4447925TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 4, 2025 02:22:47.639082909 CET6064847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:22:47.643953085 CET479256064889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:22:47.644001961 CET6064847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:22:47.644017935 CET6064847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:22:47.648873091 CET479256064889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:22:49.387691021 CET479256064889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:22:49.387801886 CET6064847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:22:49.392616034 CET479256064889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:22:50.388900995 CET43928443192.168.2.2391.189.91.42
                                                        Jan 4, 2025 02:22:51.396459103 CET6065047925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:22:51.401271105 CET479256065089.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:22:51.401350021 CET6065047925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:22:51.401366949 CET6065047925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:22:51.406124115 CET479256065089.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:22:53.157037973 CET479256065089.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:22:53.157138109 CET6065047925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:22:53.162038088 CET479256065089.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:22:56.020163059 CET42836443192.168.2.2391.189.91.43
                                                        Jan 4, 2025 02:22:57.555932999 CET4251680192.168.2.23109.202.202.202
                                                        Jan 4, 2025 02:23:03.163605928 CET6065247925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:03.168473005 CET479256065289.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:03.168529034 CET6065247925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:03.168551922 CET6065247925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:03.173351049 CET479256065289.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:04.898114920 CET479256065289.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:04.898268938 CET6065247925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:04.903100967 CET479256065289.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:10.354134083 CET43928443192.168.2.2391.189.91.42
                                                        Jan 4, 2025 02:23:13.905771971 CET6065447925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:13.910624027 CET479256065489.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:13.910682917 CET6065447925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:13.910708904 CET6065447925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:13.915540934 CET479256065489.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:15.636121988 CET479256065489.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:15.636356115 CET6065447925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:15.641163111 CET479256065489.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:20.643713951 CET6065647925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:20.648576021 CET479256065689.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:20.648653030 CET6065647925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:20.648689985 CET6065647925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:20.653477907 CET479256065689.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:22.386001110 CET479256065689.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:22.386265039 CET6065647925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:22.391129971 CET479256065689.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:22.640501022 CET42836443192.168.2.2391.189.91.43
                                                        Jan 4, 2025 02:23:28.783602953 CET4251680192.168.2.23109.202.202.202
                                                        Jan 4, 2025 02:23:29.394161940 CET6065847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:29.398907900 CET479256065889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:29.398987055 CET6065847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:29.398999929 CET6065847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:29.403796911 CET479256065889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:31.140343904 CET479256065889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:31.140508890 CET6065847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:31.145394087 CET479256065889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:41.147484064 CET6066047925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:41.152261972 CET479256066089.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:41.152314901 CET6066047925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:41.152329922 CET6066047925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:41.157157898 CET479256066089.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:42.885814905 CET479256066089.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:42.886053085 CET6066047925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:42.890893936 CET479256066089.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:46.893465042 CET6066247925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:46.898324013 CET479256066289.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:46.898381948 CET6066247925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:46.898438931 CET6066247925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:46.903256893 CET479256066289.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:48.637757063 CET479256066289.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:48.637917995 CET6066247925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:48.642781019 CET479256066289.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:50.758198023 CET6066447925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:50.762999058 CET479256066489.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:50.763062954 CET6066447925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:50.763107061 CET6066447925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:50.767873049 CET479256066489.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:51.308473110 CET43928443192.168.2.2391.189.91.42
                                                        Jan 4, 2025 02:23:52.493573904 CET479256066489.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:23:52.493748903 CET6066447925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:23:52.498529911 CET479256066489.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:00.501069069 CET6066647925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:00.505892992 CET479256066689.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:00.505970955 CET6066647925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:00.505985022 CET6066647925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:00.510798931 CET479256066689.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:02.229165077 CET479256066689.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:02.229252100 CET6066647925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:02.234070063 CET479256066689.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:09.236203909 CET6066847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:09.241079092 CET479256066889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:09.241178989 CET6066847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:09.241178989 CET6066847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:09.245965004 CET479256066889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:10.962368011 CET479256066889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:10.962502956 CET6066847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:10.967322111 CET479256066889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:16.970758915 CET6067047925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:16.975650072 CET479256067089.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:16.975708961 CET6067047925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:16.975756884 CET6067047925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:16.980554104 CET479256067089.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:18.699841976 CET479256067089.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:18.700067043 CET6067047925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:18.704828978 CET479256067089.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:19.708529949 CET6067247925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:19.713289022 CET479256067289.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:19.713346958 CET6067247925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:19.713363886 CET6067247925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:19.718202114 CET479256067289.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:21.448937893 CET479256067289.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:21.449163914 CET6067247925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:21.454011917 CET479256067289.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:29.456604958 CET6067447925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:29.461395025 CET479256067489.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:29.461447954 CET6067447925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:29.461466074 CET6067447925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:29.466316938 CET479256067489.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:31.218897104 CET479256067489.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:31.219019890 CET6067447925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:31.223866940 CET479256067489.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:39.226309061 CET6067647925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:39.231123924 CET479256067689.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:39.231179953 CET6067647925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:39.231194019 CET6067647925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:39.235972881 CET479256067689.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:40.962235928 CET479256067689.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:40.962347984 CET6067647925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:40.967171907 CET479256067689.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:48.969441891 CET6067847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:48.974349022 CET479256067889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:48.974401951 CET6067847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:48.974427938 CET6067847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:48.979238987 CET479256067889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:50.698307991 CET479256067889.169.4.44192.168.2.23
                                                        Jan 4, 2025 02:24:50.698431969 CET6067847925192.168.2.2389.169.4.44
                                                        Jan 4, 2025 02:24:50.703285933 CET479256067889.169.4.44192.168.2.23
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 4, 2025 02:22:47.631731987 CET4853553192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:22:47.639007092 CET53485358.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:22:51.389561892 CET3833653192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:22:51.396375895 CET53383368.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:23:03.156910896 CET3531653192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:23:03.163512945 CET53353168.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:23:13.898441076 CET4353853192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:23:13.905663967 CET53435388.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:23:20.637068033 CET4134553192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:23:20.643627882 CET53413458.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:23:29.386604071 CET4290853192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:23:29.394071102 CET53429088.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:23:41.140542984 CET3727253192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:23:41.147394896 CET53372728.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:23:46.886953115 CET3677153192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:23:46.893326998 CET53367718.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:23:50.639139891 CET3637453192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:23:50.758044004 CET53363748.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:24:00.493999958 CET4579753192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:24:00.500979900 CET53457978.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:24:09.229507923 CET6051953192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:24:09.236113071 CET53605198.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:24:16.963181973 CET3959653192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:24:16.970614910 CET53395968.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:24:19.700896978 CET3834753192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:24:19.708430052 CET53383478.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:24:29.449428082 CET5379253192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:24:29.456520081 CET53537928.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:24:39.219327927 CET3320253192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:24:39.226207018 CET53332028.8.8.8192.168.2.23
                                                        Jan 4, 2025 02:24:48.962434053 CET3557253192.168.2.238.8.8.8
                                                        Jan 4, 2025 02:24:48.969351053 CET53355728.8.8.8192.168.2.23
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Jan 4, 2025 02:22:47.631731987 CET192.168.2.238.8.8.80x4752Standard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:22:51.389561892 CET192.168.2.238.8.8.80x915eStandard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:03.156910896 CET192.168.2.238.8.8.80x5dfbStandard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:13.898441076 CET192.168.2.238.8.8.80x15d4Standard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:20.637068033 CET192.168.2.238.8.8.80xf436Standard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:29.386604071 CET192.168.2.238.8.8.80xc9b7Standard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:41.140542984 CET192.168.2.238.8.8.80x104Standard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:46.886953115 CET192.168.2.238.8.8.80xbf0cStandard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:50.639139891 CET192.168.2.238.8.8.80x6d44Standard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:00.493999958 CET192.168.2.238.8.8.80xbc1Standard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:09.229507923 CET192.168.2.238.8.8.80x410dStandard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:16.963181973 CET192.168.2.238.8.8.80xfc88Standard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:19.700896978 CET192.168.2.238.8.8.80xaa63Standard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:29.449428082 CET192.168.2.238.8.8.80xd52Standard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:39.219327927 CET192.168.2.238.8.8.80x5bffStandard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:48.962434053 CET192.168.2.238.8.8.80xb784Standard query (0)seyfhg.work.gdA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Jan 4, 2025 02:22:47.639007092 CET8.8.8.8192.168.2.230x4752No error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:22:51.396375895 CET8.8.8.8192.168.2.230x915eNo error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:03.163512945 CET8.8.8.8192.168.2.230x5dfbNo error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:13.905663967 CET8.8.8.8192.168.2.230x15d4No error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:20.643627882 CET8.8.8.8192.168.2.230xf436No error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:29.394071102 CET8.8.8.8192.168.2.230xc9b7No error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:41.147394896 CET8.8.8.8192.168.2.230x104No error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:46.893326998 CET8.8.8.8192.168.2.230xbf0cNo error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:23:50.758044004 CET8.8.8.8192.168.2.230x6d44No error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:00.500979900 CET8.8.8.8192.168.2.230xbc1No error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:09.236113071 CET8.8.8.8192.168.2.230x410dNo error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:16.970614910 CET8.8.8.8192.168.2.230xfc88No error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:19.708430052 CET8.8.8.8192.168.2.230xaa63No error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:29.456520081 CET8.8.8.8192.168.2.230xd52No error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:39.226207018 CET8.8.8.8192.168.2.230x5bffNo error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false
                                                        Jan 4, 2025 02:24:48.969351053 CET8.8.8.8192.168.2.230xb784No error (0)seyfhg.work.gd89.169.4.44A (IP address)IN (0x0001)false

                                                        System Behavior

                                                        Start time (UTC):01:22:46
                                                        Start date (UTC):04/01/2025
                                                        Path:/tmp/bot.x86.elf
                                                        Arguments:/tmp/bot.x86.elf
                                                        File size:93768 bytes
                                                        MD5 hash:a1dd69ef6e61882be9f64655205ce00f

                                                        Start time (UTC):01:22:46
                                                        Start date (UTC):04/01/2025
                                                        Path:/tmp/bot.x86.elf
                                                        Arguments:-
                                                        File size:93768 bytes
                                                        MD5 hash:a1dd69ef6e61882be9f64655205ce00f

                                                        Start time (UTC):01:22:46
                                                        Start date (UTC):04/01/2025
                                                        Path:/tmp/bot.x86.elf
                                                        Arguments:-
                                                        File size:93768 bytes
                                                        MD5 hash:a1dd69ef6e61882be9f64655205ce00f