Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
Kloki.arm5.elf

Overview

General Information

Sample name:Kloki.arm5.elf
Analysis ID:1584113
MD5:b5ba576df0cde88fb8eaa73f5bcbf5d6
SHA1:c83c2b9ef6f0f7d5c172be1f51e89f22375a8123
SHA256:e5a11ff5b01497755c01ae790c9758376b8abc6ef805ae142a326089728d5df9
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:68
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample tries to kill multiple processes (SIGKILL)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1584113
Start date and time:2025-01-04 09:27:25 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 28s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:Kloki.arm5.elf
Detection:MAL
Classification:mal68.spre.troj.linELF@0/21@5/0
Command:/tmp/Kloki.arm5.elf
PID:5523
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
dear
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
Kloki.arm5.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    SourceRuleDescriptionAuthorStrings
    5527.1.00007fd86c017000.00007fd86c034000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5523.1.00007fd86c017000.00007fd86c034000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: Kloki.arm5.elfAvira: detected
        Source: Kloki.arm5.elfReversingLabs: Detection: 39%
        Source: Kloki.arm5.elfString: %d/proc/self/exe/. ppid/proc/net/tcp/proc//exe/status/fd//dev/null/dev/consolesocket05self/bin/bash/bin/sh/bin/dashbashshftpwgettftpncnetcatnmaptcpdumpsocatcurlbusyboxpythonrebootechoinitcroniptablessshdtelnettelnetdtftpdrshdrexecdftpdxinetdpftp/bin/login
        Source: global trafficTCP traffic: 192.168.2.15:39086 -> 210.99.27.145:13566
        Source: global trafficTCP traffic: 192.168.2.15:39760 -> 210.99.231.37:13566
        Source: global trafficTCP traffic: 192.168.2.15:52956 -> 210.99.217.110:13566
        Source: global trafficTCP traffic: 192.168.2.15:60012 -> 210.99.252.117:13566
        Source: global trafficTCP traffic: 192.168.2.15:42408 -> 210.99.134.60:13566
        Source: global trafficTCP traffic: 192.168.2.15:33170 -> 210.99.236.230:13566
        Source: global trafficTCP traffic: 192.168.2.15:55426 -> 210.99.124.94:13566
        Source: global trafficTCP traffic: 192.168.2.15:35630 -> 210.99.68.91:13566
        Source: global trafficTCP traffic: 192.168.2.15:57602 -> 210.99.68.95:13566
        Source: global trafficTCP traffic: 192.168.2.15:47896 -> 210.99.77.3:13566
        Source: global trafficTCP traffic: 192.168.2.15:57918 -> 83.222.191.90:13566
        Source: /tmp/Kloki.arm5.elf (PID: 5523)Socket: 127.0.0.1:8341Jump to behavior
        Source: unknownDNS traffic detected: query: secure-network-rebirthltd.ru replaycode: Name error (3)
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: global trafficDNS traffic detected: DNS query: secure-network-rebirthltd.ru

        System Summary

        barindex
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5550, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5551, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5552, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5553, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5554, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5555, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5556, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5557, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5558, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5559, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5560, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5561, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5562, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5563, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5564, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5565, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5566, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5567, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5618, result: successfulJump to behavior
        Source: Initial sampleString containing 'busybox' found: busybox
        Source: Initial sampleString containing 'busybox' found: %d/proc/self/exe/. ppid/proc/net/tcp/proc//exe/status/fd//dev/null/dev/consolesocket05self/bin/bash/bin/sh/bin/dashbashshftpwgettftpncnetcatnmaptcpdumpsocatcurlbusyboxpythonrebootechoinitcroniptablessshdtelnettelnetdtftpdrshdrexecdftpdxinetdpftp/bin/login
        Source: ELF static info symbol of initial sample.symtab present: no
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5550, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5551, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5552, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5553, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5554, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5555, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5556, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5557, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5558, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5559, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5560, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5561, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5562, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5563, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5564, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5565, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5566, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5567, result: successfulJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)SIGKILL sent: pid: 5618, result: successfulJump to behavior
        Source: classification engineClassification label: mal68.spre.troj.linELF@0/21@5/0
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5560/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5560/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5550/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5550/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5561/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5561/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5551/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5551/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5562/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5562/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5552/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5552/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5563/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5563/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5553/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5553/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5564/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5564/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5554/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5554/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5565/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5565/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5618/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5618/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5555/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5555/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5566/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5566/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5556/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5556/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5567/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5567/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5557/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5557/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5558/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5558/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5559/mapsJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5529)File opened: /proc/5559/cmdlineJump to behavior
        Source: /tmp/Kloki.arm5.elf (PID: 5523)Queries kernel information via 'uname': Jump to behavior
        Source: Kloki.arm5.elf, 5523.1.00007ffd67010000.00007ffd67031000.rw-.sdmpBinary or memory string: /tmp/qemu-open.7a5WSQ
        Source: Kloki.arm5.elf, 5523.1.00007ffd67010000.00007ffd67031000.rw-.sdmpBinary or memory string: V/tmp/qemu-open.7a5WSQ:5/4
        Source: Kloki.arm5.elf, 5523.1.00007ffd67010000.00007ffd67031000.rw-.sdmp, Kloki.arm5.elf, 5527.1.00007ffd67010000.00007ffd67031000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/Kloki.arm5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/Kloki.arm5.elf
        Source: Kloki.arm5.elf, 5523.1.0000560437f6f000.00005604380e6000.rw-.sdmp, Kloki.arm5.elf, 5527.1.0000560437f6f000.00005604380e6000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
        Source: Kloki.arm5.elf, 5523.1.00007ffd67010000.00007ffd67031000.rw-.sdmp, Kloki.arm5.elf, 5527.1.00007ffd67010000.00007ffd67031000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
        Source: Kloki.arm5.elf, 5523.1.0000560437f6f000.00005604380e6000.rw-.sdmp, Kloki.arm5.elf, 5527.1.0000560437f6f000.00005604380e6000.rw-.sdmpBinary or memory string: V!/etc/qemu-binfmt/arm

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: Kloki.arm5.elf, type: SAMPLE
        Source: Yara matchFile source: 5527.1.00007fd86c017000.00007fd86c034000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5523.1.00007fd86c017000.00007fd86c034000.r-x.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: Kloki.arm5.elf, type: SAMPLE
        Source: Yara matchFile source: 5527.1.00007fd86c017000.00007fd86c034000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5523.1.00007fd86c017000.00007fd86c034000.r-x.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information1
        Scripting
        Valid AccountsWindows Management Instrumentation1
        Scripting
        Path InterceptionDirect Volume Access1
        OS Credential Dumping
        11
        Security Software Discovery
        Remote ServicesData from Local System1
        Non-Standard Port
        Exfiltration Over Other Network Medium1
        Service Stop
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1584113 Sample: Kloki.arm5.elf Startdate: 04/01/2025 Architecture: LINUX Score: 68 19 83.222.191.90, 13566, 57918 NET1-ASBG Bulgaria 2->19 21 210.99.252.117, 13566, 60012 NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR Korea Republic of 2->21 23 10 other IPs or domains 2->23 25 Antivirus / Scanner detection for submitted sample 2->25 27 Multi AV Scanner detection for submitted file 2->27 29 Yara detected Mirai 2->29 8 Kloki.arm5.elf 2->8         started        signatures3 process4 process5 10 Kloki.arm5.elf 8->10         started        process6 12 Kloki.arm5.elf 10->12         started        15 Kloki.arm5.elf 10->15         started        17 Kloki.arm5.elf 10->17         started        signatures7 31 Sample tries to kill multiple processes (SIGKILL) 12->31

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Kloki.arm5.elf39%ReversingLabsLinux.Backdoor.Mirai
        Kloki.arm5.elf100%AviraEXP/ELF.Mirai.W
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        secure-network-rebirthltd.ru
        unknown
        unknownfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          210.99.231.37
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.217.110
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.236.230
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.68.91
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.27.145
          unknownKorea Republic of
          17841NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKRfalse
          210.99.68.95
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.124.94
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          83.222.191.90
          unknownBulgaria
          43561NET1-ASBGfalse
          210.99.134.60
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.77.3
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.252.117
          unknownKorea Republic of
          17841NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKRfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          83.222.191.90Kloki.arm4.elfGet hashmaliciousMiraiBrowse
            mips.elfGet hashmaliciousUnknownBrowse
              ppc.elfGet hashmaliciousUnknownBrowse
                spc.elfGet hashmaliciousUnknownBrowse
                  x86_64.elfGet hashmaliciousUnknownBrowse
                    arm5.elfGet hashmaliciousUnknownBrowse
                      x86.elfGet hashmaliciousUnknownBrowse
                        arm7.elfGet hashmaliciousMiraiBrowse
                          arm4.elfGet hashmaliciousUnknownBrowse
                            m68k.elfGet hashmaliciousUnknownBrowse
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              KIXS-AS-KRKoreaTelecomKRKloki.arm4.elfGet hashmaliciousMiraiBrowse
                              • 210.99.83.44
                              Fantazy.i686.elfGet hashmaliciousUnknownBrowse
                              • 14.37.185.220
                              Fantazy.sh4.elfGet hashmaliciousUnknownBrowse
                              • 115.10.35.0
                              Fantazy.mips.elfGet hashmaliciousUnknownBrowse
                              • 222.118.184.250
                              Fantazy.spc.elfGet hashmaliciousUnknownBrowse
                              • 203.251.148.181
                              Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                              • 121.170.84.76
                              31.13.224.14-mips-2025-01-03T22_14_18.elfGet hashmaliciousMiraiBrowse
                              • 1.97.220.156
                              ppc.elfGet hashmaliciousUnknownBrowse
                              • 210.99.207.144
                              spc.elfGet hashmaliciousUnknownBrowse
                              • 210.99.43.52
                              x86_64.elfGet hashmaliciousUnknownBrowse
                              • 210.99.114.242
                              KIXS-AS-KRKoreaTelecomKRKloki.arm4.elfGet hashmaliciousMiraiBrowse
                              • 210.99.83.44
                              Fantazy.i686.elfGet hashmaliciousUnknownBrowse
                              • 14.37.185.220
                              Fantazy.sh4.elfGet hashmaliciousUnknownBrowse
                              • 115.10.35.0
                              Fantazy.mips.elfGet hashmaliciousUnknownBrowse
                              • 222.118.184.250
                              Fantazy.spc.elfGet hashmaliciousUnknownBrowse
                              • 203.251.148.181
                              Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                              • 121.170.84.76
                              31.13.224.14-mips-2025-01-03T22_14_18.elfGet hashmaliciousMiraiBrowse
                              • 1.97.220.156
                              ppc.elfGet hashmaliciousUnknownBrowse
                              • 210.99.207.144
                              spc.elfGet hashmaliciousUnknownBrowse
                              • 210.99.43.52
                              x86_64.elfGet hashmaliciousUnknownBrowse
                              • 210.99.114.242
                              KIXS-AS-KRKoreaTelecomKRKloki.arm4.elfGet hashmaliciousMiraiBrowse
                              • 210.99.83.44
                              Fantazy.i686.elfGet hashmaliciousUnknownBrowse
                              • 14.37.185.220
                              Fantazy.sh4.elfGet hashmaliciousUnknownBrowse
                              • 115.10.35.0
                              Fantazy.mips.elfGet hashmaliciousUnknownBrowse
                              • 222.118.184.250
                              Fantazy.spc.elfGet hashmaliciousUnknownBrowse
                              • 203.251.148.181
                              Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                              • 121.170.84.76
                              31.13.224.14-mips-2025-01-03T22_14_18.elfGet hashmaliciousMiraiBrowse
                              • 1.97.220.156
                              ppc.elfGet hashmaliciousUnknownBrowse
                              • 210.99.207.144
                              spc.elfGet hashmaliciousUnknownBrowse
                              • 210.99.43.52
                              x86_64.elfGet hashmaliciousUnknownBrowse
                              • 210.99.114.242
                              KIXS-AS-KRKoreaTelecomKRKloki.arm4.elfGet hashmaliciousMiraiBrowse
                              • 210.99.83.44
                              Fantazy.i686.elfGet hashmaliciousUnknownBrowse
                              • 14.37.185.220
                              Fantazy.sh4.elfGet hashmaliciousUnknownBrowse
                              • 115.10.35.0
                              Fantazy.mips.elfGet hashmaliciousUnknownBrowse
                              • 222.118.184.250
                              Fantazy.spc.elfGet hashmaliciousUnknownBrowse
                              • 203.251.148.181
                              Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                              • 121.170.84.76
                              31.13.224.14-mips-2025-01-03T22_14_18.elfGet hashmaliciousMiraiBrowse
                              • 1.97.220.156
                              ppc.elfGet hashmaliciousUnknownBrowse
                              • 210.99.207.144
                              spc.elfGet hashmaliciousUnknownBrowse
                              • 210.99.43.52
                              x86_64.elfGet hashmaliciousUnknownBrowse
                              • 210.99.114.242
                              No context
                              No context
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Reputation:low
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Reputation:low
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):274
                              Entropy (8bit):3.6253904167979933
                              Encrypted:false
                              SSDEEP:6:T4gcaFFPkKQ/VFT/VUB4caFFPB3VFT/VjmsVot/VOArB/VH:2ankKwviBlanVVFyl
                              MD5:BF382AB7DFFC432D9A73DD0331030B98
                              SHA1:C77FA556579A20D31CD71997CE644109C87657A0
                              SHA-256:0B1E553C6920648E8695E02E4697BB5E254876FBF9CA2AF5441B1078373911A5
                              SHA-512:ECD69F9441181C690BB07CC879DA3E02016D80FF2D1F61F2016032CAD127AAD73DD7FC3CBA372D2D876FB344764FC302C1DC1EB677E7CE2ADD610F032FC1DA21
                              Malicious:false
                              Reputation:low
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/Kloki.arm5.elf.2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/Kloki.arm5.elf.32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Reputation:low
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Reputation:low
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Reputation:low
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Reputation:low
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Reputation:low
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):274
                              Entropy (8bit):3.6253904167979933
                              Encrypted:false
                              SSDEEP:6:T4gcaFFPkKQ/VFT/VUB4caFFPB3VFT/VjmsVot/VOArB/VH:2ankKwviBlanVVFyl
                              MD5:BF382AB7DFFC432D9A73DD0331030B98
                              SHA1:C77FA556579A20D31CD71997CE644109C87657A0
                              SHA-256:0B1E553C6920648E8695E02E4697BB5E254876FBF9CA2AF5441B1078373911A5
                              SHA-512:ECD69F9441181C690BB07CC879DA3E02016D80FF2D1F61F2016032CAD127AAD73DD7FC3CBA372D2D876FB344764FC302C1DC1EB677E7CE2ADD610F032FC1DA21
                              Malicious:false
                              Reputation:low
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/Kloki.arm5.elf.2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/Kloki.arm5.elf.32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Reputation:low
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              Process:/tmp/Kloki.arm5.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):248
                              Entropy (8bit):3.2815994326827544
                              Encrypted:false
                              SSDEEP:6:T4gcaFFLQ/VFT/VUB4caFF3VFT/VjmsVot/VOArB/VH:2azwviBlavVFyl
                              MD5:D227A485263FDB230F89D8C1E0C608DA
                              SHA1:417418639138B4C678A8C13DDA7740EF2C69780B
                              SHA-256:43802412153E65685DFDC098522DEE97FBCC9CE68C2ABA707E6C4B1CFB02B017
                              SHA-512:08784C6B2159432F03CFA79C5E4092EF96A7BF395B19A62DF192C4B81912E7ABFC3589C26CF9BC899F79762B9EF6A9EFC75812C581BDA608B7FB225E7E1E85D0
                              Malicious:false
                              Preview:8000-25000 r-xp 00000000 fd:00 531563 /tmp/..2d000-32000 rw-p 0001d000 fd:00 531563 /tmp/..32000-38000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                              File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                              Entropy (8bit):5.5434581463918144
                              TrID:
                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                              File name:Kloki.arm5.elf
                              File size:137'824 bytes
                              MD5:b5ba576df0cde88fb8eaa73f5bcbf5d6
                              SHA1:c83c2b9ef6f0f7d5c172be1f51e89f22375a8123
                              SHA256:e5a11ff5b01497755c01ae790c9758376b8abc6ef805ae142a326089728d5df9
                              SHA512:4461ffddc7bf2b0c9c8a716f23a4fea3f87fa0fb2c0d30a92a006e20b3fd5cd1cb06966bffc89668a25178101c28f8f0eb1b5a8158d105cdb73fe8f0d575720d
                              SSDEEP:1536:FlDRbk3iQCx7L9v18rFcQPEdCSfOCV1H4VeJTJ69DFM3uYGaYvluJwywK7oi7eWq:FlDLQ67LscdzWS4CN69W+YRUEneny
                              TLSH:93D31A85FC908F27C6D512BBFB5E428C372A17A8D2EE71039D256F25378A45B0E37242
                              File Content Preview:.ELF...a..........(.........4...........4. ...(.....................$...$............................H..............Q.td..................................-...L."....k..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                              ELF header

                              Class:ELF32
                              Data:2's complement, little endian
                              Version:1 (current)
                              Machine:ARM
                              Version Number:0x1
                              Type:EXEC (Executable file)
                              OS/ABI:ARM - ABI
                              ABI Version:0
                              Entry Point Address:0x8190
                              Flags:0x2
                              ELF Header Size:52
                              Program Header Offset:52
                              Program Header Size:32
                              Number of Program Headers:3
                              Section Header Offset:137424
                              Section Header Size:40
                              Number of Section Headers:10
                              Header String Table Index:9
                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                              NULL0x00x00x00x00x0000
                              .initPROGBITS0x80940x940x180x00x6AX004
                              .textPROGBITS0x80b00xb00x1ae500x00x6AX0016
                              .finiPROGBITS0x22f000x1af000x140x00x6AX004
                              .rodataPROGBITS0x22f140x1af140x20100x00x2A004
                              .ctorsPROGBITS0x2d0000x1d0000xc0x00x3WA004
                              .dtorsPROGBITS0x2d00c0x1d00c0x80x00x3WA004
                              .dataPROGBITS0x2d0200x1d0200x48700x00x3WA0032
                              .bssNOBITS0x318900x218900x55600x00x3WA004
                              .shstrtabSTRTAB0x00x218900x3e0x00x0001
                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                              LOAD0x00x80000x80000x1cf240x1cf246.04390x5R E0x8000.init .text .fini .rodata
                              LOAD0x1d0000x2d0000x2d0000x48900x9df00.33460x6RW 0x8000.ctors .dtors .data .bss
                              GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 4, 2025 09:28:04.613796949 CET3908613566192.168.2.15210.99.27.145
                              Jan 4, 2025 09:28:04.616744041 CET3976013566192.168.2.15210.99.231.37
                              Jan 4, 2025 09:28:04.618786097 CET1356639086210.99.27.145192.168.2.15
                              Jan 4, 2025 09:28:04.618839979 CET3908613566192.168.2.15210.99.27.145
                              Jan 4, 2025 09:28:04.619447947 CET5295613566192.168.2.15210.99.217.110
                              Jan 4, 2025 09:28:04.621568918 CET1356639760210.99.231.37192.168.2.15
                              Jan 4, 2025 09:28:04.621607065 CET3976013566192.168.2.15210.99.231.37
                              Jan 4, 2025 09:28:04.621618032 CET6001213566192.168.2.15210.99.252.117
                              Jan 4, 2025 09:28:04.624270916 CET1356652956210.99.217.110192.168.2.15
                              Jan 4, 2025 09:28:04.624344110 CET5295613566192.168.2.15210.99.217.110
                              Jan 4, 2025 09:28:04.624376059 CET4240813566192.168.2.15210.99.134.60
                              Jan 4, 2025 09:28:04.626390934 CET1356660012210.99.252.117192.168.2.15
                              Jan 4, 2025 09:28:04.626441956 CET6001213566192.168.2.15210.99.252.117
                              Jan 4, 2025 09:28:04.626662016 CET3317013566192.168.2.15210.99.236.230
                              Jan 4, 2025 09:28:04.629199028 CET1356642408210.99.134.60192.168.2.15
                              Jan 4, 2025 09:28:04.629261971 CET4240813566192.168.2.15210.99.134.60
                              Jan 4, 2025 09:28:04.629407883 CET5542613566192.168.2.15210.99.124.94
                              Jan 4, 2025 09:28:04.631449938 CET3563013566192.168.2.15210.99.68.91
                              Jan 4, 2025 09:28:04.631460905 CET1356633170210.99.236.230192.168.2.15
                              Jan 4, 2025 09:28:04.631494999 CET3317013566192.168.2.15210.99.236.230
                              Jan 4, 2025 09:28:04.634176970 CET5760213566192.168.2.15210.99.68.95
                              Jan 4, 2025 09:28:04.634186029 CET1356655426210.99.124.94192.168.2.15
                              Jan 4, 2025 09:28:04.634227991 CET5542613566192.168.2.15210.99.124.94
                              Jan 4, 2025 09:28:04.636224985 CET4789613566192.168.2.15210.99.77.3
                              Jan 4, 2025 09:28:04.636277914 CET1356635630210.99.68.91192.168.2.15
                              Jan 4, 2025 09:28:04.636337042 CET3563013566192.168.2.15210.99.68.91
                              Jan 4, 2025 09:28:04.639010906 CET1356657602210.99.68.95192.168.2.15
                              Jan 4, 2025 09:28:04.639069080 CET5760213566192.168.2.15210.99.68.95
                              Jan 4, 2025 09:28:04.641036987 CET1356647896210.99.77.3192.168.2.15
                              Jan 4, 2025 09:28:04.641072035 CET4789613566192.168.2.15210.99.77.3
                              Jan 4, 2025 09:28:04.691530943 CET5791813566192.168.2.1583.222.191.90
                              Jan 4, 2025 09:28:04.697046041 CET135665791883.222.191.90192.168.2.15
                              Jan 4, 2025 09:28:04.697103977 CET5791813566192.168.2.1583.222.191.90
                              Jan 4, 2025 09:28:04.698293924 CET5791813566192.168.2.1583.222.191.90
                              Jan 4, 2025 09:28:04.703114986 CET135665791883.222.191.90192.168.2.15
                              Jan 4, 2025 09:28:04.703156948 CET5791813566192.168.2.1583.222.191.90
                              Jan 4, 2025 09:28:04.707952976 CET135665791883.222.191.90192.168.2.15
                              Jan 4, 2025 09:28:14.708131075 CET5791813566192.168.2.1583.222.191.90
                              Jan 4, 2025 09:28:14.713000059 CET135665791883.222.191.90192.168.2.15
                              Jan 4, 2025 09:28:14.909244061 CET135665791883.222.191.90192.168.2.15
                              Jan 4, 2025 09:28:14.909291983 CET5791813566192.168.2.1583.222.191.90
                              Jan 4, 2025 09:28:15.277390003 CET135665791883.222.191.90192.168.2.15
                              Jan 4, 2025 09:28:15.277441978 CET5791813566192.168.2.1583.222.191.90
                              Jan 4, 2025 09:29:15.322087049 CET5791813566192.168.2.1583.222.191.90
                              Jan 4, 2025 09:29:15.326960087 CET135665791883.222.191.90192.168.2.15
                              Jan 4, 2025 09:29:15.523343086 CET135665791883.222.191.90192.168.2.15
                              Jan 4, 2025 09:29:15.523495913 CET5791813566192.168.2.1583.222.191.90
                              Jan 4, 2025 09:29:16.278165102 CET135665791883.222.191.90192.168.2.15
                              Jan 4, 2025 09:29:16.278228998 CET5791813566192.168.2.1583.222.191.90
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 4, 2025 09:28:04.647123098 CET5926853192.168.2.158.8.8.8
                              Jan 4, 2025 09:28:04.654388905 CET53592688.8.8.8192.168.2.15
                              Jan 4, 2025 09:28:04.656744003 CET5438153192.168.2.158.8.8.8
                              Jan 4, 2025 09:28:04.663901091 CET53543818.8.8.8192.168.2.15
                              Jan 4, 2025 09:28:04.666084051 CET4502653192.168.2.158.8.8.8
                              Jan 4, 2025 09:28:04.673032045 CET53450268.8.8.8192.168.2.15
                              Jan 4, 2025 09:28:04.675301075 CET5414253192.168.2.158.8.8.8
                              Jan 4, 2025 09:28:04.681931973 CET53541428.8.8.8192.168.2.15
                              Jan 4, 2025 09:28:04.683082104 CET5272353192.168.2.158.8.8.8
                              Jan 4, 2025 09:28:04.690933943 CET53527238.8.8.8192.168.2.15
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 4, 2025 09:28:04.647123098 CET192.168.2.158.8.8.80xea84Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                              Jan 4, 2025 09:28:04.656744003 CET192.168.2.158.8.8.80xea84Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                              Jan 4, 2025 09:28:04.666084051 CET192.168.2.158.8.8.80xea84Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                              Jan 4, 2025 09:28:04.675301075 CET192.168.2.158.8.8.80xea84Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                              Jan 4, 2025 09:28:04.683082104 CET192.168.2.158.8.8.80xea84Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 4, 2025 09:28:04.654388905 CET8.8.8.8192.168.2.150xea84Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
                              Jan 4, 2025 09:28:04.663901091 CET8.8.8.8192.168.2.150xea84Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
                              Jan 4, 2025 09:28:04.673032045 CET8.8.8.8192.168.2.150xea84Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
                              Jan 4, 2025 09:28:04.681931973 CET8.8.8.8192.168.2.150xea84Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
                              Jan 4, 2025 09:28:04.690933943 CET8.8.8.8192.168.2.150xea84Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false

                              System Behavior

                              Start time (UTC):08:28:02
                              Start date (UTC):04/01/2025
                              Path:/tmp/Kloki.arm5.elf
                              Arguments:/tmp/Kloki.arm5.elf
                              File size:4956856 bytes
                              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                              Start time (UTC):08:28:02
                              Start date (UTC):04/01/2025
                              Path:/tmp/Kloki.arm5.elf
                              Arguments:-
                              File size:4956856 bytes
                              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                              Start time (UTC):08:28:02
                              Start date (UTC):04/01/2025
                              Path:/tmp/Kloki.arm5.elf
                              Arguments:-
                              File size:4956856 bytes
                              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                              Start time (UTC):08:28:03
                              Start date (UTC):04/01/2025
                              Path:/tmp/Kloki.arm5.elf
                              Arguments:-
                              File size:4956856 bytes
                              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                              Start time (UTC):08:28:03
                              Start date (UTC):04/01/2025
                              Path:/tmp/Kloki.arm5.elf
                              Arguments:-
                              File size:4956856 bytes
                              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1