Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
Space.ppc.elf

Overview

General Information

Sample name:Space.ppc.elf
Analysis ID:1584235
MD5:40052c38313b754b164a97667ab72290
SHA1:d0862bafeb73e4522d937b110cd0644f074cf3f7
SHA256:901ca08af61eb6a5829b9d8cb1fc102c2fcf9eee9b6a57620059d1f86b78d1c1
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:72
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1584235
Start date and time:2025-01-04 23:17:05 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 29s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:Space.ppc.elf
Detection:MAL
Classification:mal72.troj.linELF@0/0@0/0
Command:/tmp/Space.ppc.elf
PID:5427
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
Space.ppc.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    Space.ppc.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0xf88c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf8a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf8b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf8c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf8dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf8f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf904:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf918:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf92c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf940:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf954:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf968:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf97c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf990:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf9a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf9b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf9cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf9e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xf9f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xfa08:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xfa1c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    SourceRuleDescriptionAuthorStrings
    5427.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5427.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xf88c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf8a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf8b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf8c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf8dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf8f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf904:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf918:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf92c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf940:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf954:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf968:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf97c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf990:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf9a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf9b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf9cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf9e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xf9f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfa08:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfa1c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5431.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        5431.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0xf88c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf8a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf8b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf8c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf8dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf8f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf904:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf918:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf92c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf940:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf954:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf968:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf97c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf990:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf9a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf9b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf9cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf9e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf9f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xfa08:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xfa1c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        5429.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          Click to see the 11 entries
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Space.ppc.elfAvira: detected
          Source: Space.ppc.elfVirustotal: Detection: 61%Perma Link
          Source: global trafficTCP traffic: 192.168.2.13:46068 -> 79.133.46.252:3778
          Source: global trafficTCP traffic: 192.168.2.13:48202 -> 185.125.190.26:443
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownTCP traffic detected without corresponding DNS query: 79.133.46.252
          Source: unknownNetwork traffic detected: HTTP traffic on port 48202 -> 443

          System Summary

          barindex
          Source: Space.ppc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5427.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5431.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5429.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5441.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: Space.ppc.elf PID: 5427, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: Space.ppc.elf PID: 5429, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: Space.ppc.elf PID: 5431, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Process Memory Space: Space.ppc.elf PID: 5441, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: Initial sampleString containing 'busybox' found: /bin/busybox
          Source: Initial sampleString containing 'busybox' found: /proc/net/tcp/proc/proc/%d/exe/proc/%s/statusrName:%s/bin/busybox/bin/systemd/usr/bintest/tmp/condi/tmp/zxcr9999/tmp/condinetwork/var/condibot/var/zxcr9999/var/CondiBot/var/condinet/bin/watchdog.x86.x86_64.arm.arm5.arm6.arm7.mips.mipsel.sh4.ppc79.133.46.252
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: Space.ppc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5427.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5431.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5429.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5441.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: Space.ppc.elf PID: 5427, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: Space.ppc.elf PID: 5429, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: Space.ppc.elf PID: 5431, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: Process Memory Space: Space.ppc.elf PID: 5441, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal72.troj.linELF@0/0@0/0
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/230/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/110/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/231/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/3759/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/111/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/232/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/112/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/233/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/113/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/234/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/114/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/235/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/115/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/236/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/116/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/237/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/117/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/238/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/118/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/239/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/119/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/914/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/10/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/917/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/11/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/12/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/13/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/14/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/15/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/16/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/17/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/18/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/19/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/240/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/3095/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/120/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/241/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/121/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/242/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/1/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/122/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/243/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/2/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/123/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/244/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/3/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/124/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/245/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/1588/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/125/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/4/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/246/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/126/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/5/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/247/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/127/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/6/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/248/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/128/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/7/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/249/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/129/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/8/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/800/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/5269/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/9/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/1906/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/802/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/803/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/20/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/21/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/22/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/23/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/24/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/25/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/26/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/27/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/28/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/29/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/3420/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/1482/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/490/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/1480/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/250/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/371/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/130/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/251/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/131/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/252/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/132/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/253/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/254/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/1238/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/134/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/255/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/256/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/257/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/378/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/3413/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/258/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/259/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/1475/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/936/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/30/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)File opened: /proc/816/statusJump to behavior
          Source: /tmp/Space.ppc.elf (PID: 5427)Queries kernel information via 'uname': Jump to behavior
          Source: Space.ppc.elf, 5427.1.00007ffc96313000.00007ffc96334000.rw-.sdmp, Space.ppc.elf, 5429.1.00007ffc96313000.00007ffc96334000.rw-.sdmp, Space.ppc.elf, 5431.1.00007ffc96313000.00007ffc96334000.rw-.sdmp, Space.ppc.elf, 5441.1.00007ffc96313000.00007ffc96334000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-ppc/tmp/Space.ppc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/Space.ppc.elf
          Source: Space.ppc.elf, 5429.1.00005583f40c9000.00005583f4179000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc11!hotpluggableq
          Source: Space.ppc.elf, 5427.1.00005583f40c9000.00005583f4179000.rw-.sdmp, Space.ppc.elf, 5431.1.00005583f40c9000.00005583f4179000.rw-.sdmp, Space.ppc.elf, 5441.1.00005583f40c9000.00005583f4179000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc1
          Source: Space.ppc.elf, 5427.1.00005583f40c9000.00005583f4179000.rw-.sdmp, Space.ppc.elf, 5429.1.00005583f40c9000.00005583f4179000.rw-.sdmp, Space.ppc.elf, 5431.1.00005583f40c9000.00005583f4179000.rw-.sdmp, Space.ppc.elf, 5441.1.00005583f40c9000.00005583f4179000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
          Source: Space.ppc.elf, 5427.1.00007ffc96313000.00007ffc96334000.rw-.sdmp, Space.ppc.elf, 5429.1.00007ffc96313000.00007ffc96334000.rw-.sdmp, Space.ppc.elf, 5431.1.00007ffc96313000.00007ffc96334000.rw-.sdmp, Space.ppc.elf, 5441.1.00007ffc96313000.00007ffc96334000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Space.ppc.elf, type: SAMPLE
          Source: Yara matchFile source: 5427.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5431.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5429.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5441.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Space.ppc.elf PID: 5427, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Space.ppc.elf PID: 5429, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Space.ppc.elf PID: 5431, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Space.ppc.elf PID: 5441, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Space.ppc.elf, type: SAMPLE
          Source: Yara matchFile source: 5427.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5431.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5429.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: 5441.1.00007f0ccc001000.00007f0ccc014000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Space.ppc.elf PID: 5427, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Space.ppc.elf PID: 5429, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Space.ppc.elf PID: 5431, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Space.ppc.elf PID: 5441, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
          OS Credential Dumping
          11
          Security Software Discovery
          Remote ServicesData from Local System1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1584235 Sample: Space.ppc.elf Startdate: 04/01/2025 Architecture: LINUX Score: 72 20 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->20 22 79.133.46.252, 3778, 46068, 46070 AT-FIRSTCOLOAustriaAT Germany 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 Yara detected Mirai 2->30 8 Space.ppc.elf 2->8         started        signatures3 process4 process5 10 Space.ppc.elf 8->10         started        12 Space.ppc.elf 8->12         started        14 Space.ppc.elf 8->14         started        process6 16 Space.ppc.elf 10->16         started        18 Space.ppc.elf 10->18         started       
          SourceDetectionScannerLabelLink
          Space.ppc.elf61%VirustotalBrowse
          Space.ppc.elf100%AviraLINUX/Mirai.bonb
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          185.125.190.26
          unknownUnited Kingdom
          41231CANONICAL-ASGBfalse
          79.133.46.252
          unknownGermany
          203833AT-FIRSTCOLOAustriaATfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          185.125.190.26la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
            185.232.205.45-boatnet.mips-2025-01-03T23_59_45.elfGet hashmaliciousMiraiBrowse
              185.232.205.45-boatnet.m68k-2025-01-03T23_59_48.elfGet hashmaliciousMiraiBrowse
                154.216.18.23-boatnet.arm-2025-01-03T11_40_59.elfGet hashmaliciousMiraiBrowse
                  arc.elfGet hashmaliciousUnknownBrowse
                    mips.elfGet hashmaliciousUnknownBrowse
                      i586.elfGet hashmaliciousMiraiBrowse
                        spc.elfGet hashmaliciousUnknownBrowse
                          x86.elfGet hashmaliciousMiraiBrowse
                            armv6l.elfGet hashmaliciousMiraiBrowse
                              79.133.46.252Space.mpsl.elfGet hashmaliciousUnknownBrowse
                              • /hiddenbin/Space.mpsl
                              Space.x86.elfGet hashmaliciousUnknownBrowse
                              • /hiddenbin/Space.x86
                              Space.mips.elfGet hashmaliciousUnknownBrowse
                              • /hiddenbin/Space.mips
                              Space.arm7.elfGet hashmaliciousUnknownBrowse
                              • /hiddenbin/Space.arm7
                              Space.arm6.elfGet hashmaliciousUnknownBrowse
                              • /hiddenbin/Space.arm6
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              AT-FIRSTCOLOAustriaATSpace.ppc.elfGet hashmaliciousMiraiBrowse
                              • 79.133.46.252
                              Space.mpsl.elfGet hashmaliciousUnknownBrowse
                              • 79.133.46.252
                              Space.x86.elfGet hashmaliciousUnknownBrowse
                              • 79.133.46.252
                              Space.mips.elfGet hashmaliciousUnknownBrowse
                              • 79.133.46.252
                              Space.arm7.elfGet hashmaliciousUnknownBrowse
                              • 79.133.46.252
                              Space.arm6.elfGet hashmaliciousUnknownBrowse
                              • 79.133.46.252
                              mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              • 79.133.33.157
                              SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeGet hashmaliciousUnknownBrowse
                              • 159.100.29.29
                              SecuriteInfo.com.W32.ABTrojan.TFWF-7096.22699.18150.exeGet hashmaliciousUnknownBrowse
                              • 159.100.29.29
                              boatnet.mips.elfGet hashmaliciousMiraiBrowse
                              • 79.133.46.243
                              CANONICAL-ASGBsshd.elfGet hashmaliciousUnknownBrowse
                              • 91.189.91.42
                              Linux4.7.elfGet hashmaliciousUnknownBrowse
                              • 91.189.91.42
                              Space.arm5.elfGet hashmaliciousUnknownBrowse
                              • 91.189.91.42
                              Space.ppc.elfGet hashmaliciousMiraiBrowse
                              • 91.189.91.42
                              fenty.arm4.elfGet hashmaliciousMiraiBrowse
                              • 91.189.91.42
                              main_sh4.elfGet hashmaliciousMiraiBrowse
                              • 91.189.91.42
                              arm7.elfGet hashmaliciousMiraiBrowse
                              • 91.189.91.42
                              .i.elfGet hashmaliciousUnknownBrowse
                              • 91.189.91.42
                              arm.elfGet hashmaliciousMiraiBrowse
                              • 91.189.91.42
                              main_sh4.elfGet hashmaliciousMiraiBrowse
                              • 91.189.91.42
                              No context
                              No context
                              No created / dropped files found
                              File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
                              Entropy (8bit):6.308799962750238
                              TrID:
                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                              File name:Space.ppc.elf
                              File size:76'016 bytes
                              MD5:40052c38313b754b164a97667ab72290
                              SHA1:d0862bafeb73e4522d937b110cd0644f074cf3f7
                              SHA256:901ca08af61eb6a5829b9d8cb1fc102c2fcf9eee9b6a57620059d1f86b78d1c1
                              SHA512:52884b1a9abd254b14d0ab9e8acc156c00c2da19b2bcc8140bff60490f2a191314604e4e65215911a708a89668e61f015a219174872242ad54db476628a12976
                              SSDEEP:1536:kMUowUbNpk9FgE3NqBQ7IEpF+RPHXg8jbg8:k1owANKpL7IEL+Zrg8
                              TLSH:60735C01B34C0D47C1571DB02A3F2BD69BAFE9D122E4FA852A5F9B469172E33154EEC8
                              File Content Preview:.ELF...........................4..'......4. ...(......................#L..#L..............#P..#P..#P...t..).........dt.Q.............................!..|......$H...H......$8!. |...N.. .!..|.......?.........'@..../...@..\?.....#l.+../...A..$8...})....#lN..

                              ELF header

                              Class:ELF32
                              Data:2's complement, big endian
                              Version:1 (current)
                              Machine:PowerPC
                              Version Number:0x1
                              Type:EXEC (Executable file)
                              OS/ABI:UNIX - System V
                              ABI Version:0
                              Entry Point Address:0x100001f0
                              Flags:0x0
                              ELF Header Size:52
                              Program Header Offset:52
                              Program Header Size:32
                              Number of Program Headers:3
                              Section Header Offset:75536
                              Section Header Size:40
                              Number of Section Headers:12
                              Header String Table Index:11
                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                              NULL0x00x00x00x00x0000
                              .initPROGBITS0x100000940x940x240x00x6AX004
                              .textPROGBITS0x100000b80xb80xf6600x00x6AX004
                              .finiPROGBITS0x1000f7180xf7180x200x00x6AX004
                              .rodataPROGBITS0x1000f7380xf7380x2c140x00x2A008
                              .ctorsPROGBITS0x100223500x123500x80x00x3WA004
                              .dtorsPROGBITS0x100223580x123580x80x00x3WA004
                              .dataPROGBITS0x100223680x123680x3140x00x3WA008
                              .sdataPROGBITS0x1002267c0x1267c0x480x00x3WA004
                              .sbssNOBITS0x100226c40x126c40x7c0x00x3WA004
                              .bssNOBITS0x100227400x126c40x25a40x00x3WA004
                              .shstrtabSTRTAB0x00x126c40x4b0x00x0001
                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                              LOAD0x00x100000000x100000000x1234c0x1234c6.35000x5R E0x10000.init .text .fini .rodata
                              LOAD0x123500x100223500x100223500x3740x29942.89020x6RW 0x10000.ctors .dtors .data .sdata .sbss .bss
                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 4, 2025 23:17:44.781289101 CET460683778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:17:44.786195993 CET37784606879.133.46.252192.168.2.13
                              Jan 4, 2025 23:17:44.786315918 CET460683778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:17:44.792427063 CET460683778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:17:44.797202110 CET37784606879.133.46.252192.168.2.13
                              Jan 4, 2025 23:17:44.797298908 CET460683778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:17:44.802083015 CET37784606879.133.46.252192.168.2.13
                              Jan 4, 2025 23:17:50.597028017 CET460703778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:17:50.601876020 CET37784607079.133.46.252192.168.2.13
                              Jan 4, 2025 23:17:50.601946115 CET460703778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:17:50.655664921 CET460703778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:17:50.660415888 CET37784607079.133.46.252192.168.2.13
                              Jan 4, 2025 23:17:50.660470009 CET460703778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:17:50.665256023 CET37784607079.133.46.252192.168.2.13
                              Jan 4, 2025 23:17:54.802805901 CET460683778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:17:54.807909012 CET37784606879.133.46.252192.168.2.13
                              Jan 4, 2025 23:17:57.327471972 CET48202443192.168.2.13185.125.190.26
                              Jan 4, 2025 23:18:00.665863037 CET460703778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:00.670675993 CET37784607079.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:06.192101002 CET37784606879.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:06.192593098 CET460683778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:06.197395086 CET37784606879.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:07.194816113 CET460723778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:07.199609995 CET37784607279.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:07.199673891 CET460723778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:07.200357914 CET460723778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:07.205097914 CET37784607279.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:07.205137968 CET460723778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:07.209927082 CET37784607279.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:11.983356953 CET37784607079.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:11.984070063 CET460703778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:11.988847017 CET37784607079.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:12.986038923 CET460743778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:12.990818977 CET37784607479.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:12.990906000 CET460743778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:12.991957903 CET460743778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:12.996670961 CET37784607479.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:12.996731997 CET460743778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:13.001470089 CET37784607479.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:28.559520006 CET48202443192.168.2.13185.125.190.26
                              Jan 4, 2025 23:18:28.592972994 CET37784607279.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:28.593197107 CET460723778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:28.597956896 CET37784607279.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:29.595480919 CET460763778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:29.600287914 CET37784607679.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:29.600378990 CET460763778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:29.601291895 CET460763778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:29.606040001 CET37784607679.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:29.606106043 CET460763778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:29.610954046 CET37784607679.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:34.395667076 CET37784607479.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:34.395906925 CET460743778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:34.400682926 CET37784607479.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:35.397733927 CET460783778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:35.402595997 CET37784607879.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:35.402651072 CET460783778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:35.403285980 CET460783778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:35.408150911 CET37784607879.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:35.408198118 CET460783778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:35.412991047 CET37784607879.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:50.984239101 CET37784607679.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:50.984620094 CET460763778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:50.989401102 CET37784607679.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:51.987138033 CET460803778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:51.992065907 CET37784608079.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:51.992173910 CET460803778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:51.993480921 CET460803778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:51.998307943 CET37784608079.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:51.998369932 CET460803778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:52.003463030 CET37784608079.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:56.816226006 CET37784607879.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:56.816387892 CET460783778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:56.821192980 CET37784607879.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:57.817740917 CET460823778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:57.822532892 CET37784608279.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:57.822643995 CET460823778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:57.823369980 CET460823778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:57.828146935 CET37784608279.133.46.252192.168.2.13
                              Jan 4, 2025 23:18:57.828197956 CET460823778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:18:57.832958937 CET37784608279.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:01.998706102 CET460803778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:02.003823042 CET37784608079.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:07.833445072 CET460823778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:07.838357925 CET37784608279.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:13.364286900 CET37784608079.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:13.364690065 CET460803778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:13.369491100 CET37784608079.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:14.367368937 CET460843778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:14.372236967 CET37784608479.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:14.372343063 CET460843778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:14.373569012 CET460843778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:14.379301071 CET37784608479.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:14.379369974 CET460843778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:14.384820938 CET37784608479.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:19.254997969 CET37784608279.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:19.255184889 CET460823778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:19.259957075 CET37784608279.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:20.257280111 CET460863778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:20.263099909 CET37784608679.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:20.263223886 CET460863778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:20.264336109 CET460863778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:20.269146919 CET37784608679.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:20.269212008 CET460863778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:20.274069071 CET37784608679.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:35.771827936 CET37784608479.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:35.772000074 CET460843778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:35.776798010 CET37784608479.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:36.773731947 CET460883778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:36.778865099 CET37784608879.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:36.778980017 CET460883778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:36.780107975 CET460883778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:36.784846067 CET37784608879.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:36.784908056 CET460883778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:36.790004015 CET37784608879.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:41.662547112 CET37784608679.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:41.662693977 CET460863778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:41.667474985 CET37784608679.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:42.664345980 CET460903778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:42.669104099 CET37784609079.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:42.669164896 CET460903778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:42.669774055 CET460903778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:42.674504995 CET37784609079.133.46.252192.168.2.13
                              Jan 4, 2025 23:19:42.674576044 CET460903778192.168.2.1379.133.46.252
                              Jan 4, 2025 23:19:42.679348946 CET37784609079.133.46.252192.168.2.13

                              System Behavior

                              Start time (UTC):22:17:43
                              Start date (UTC):04/01/2025
                              Path:/tmp/Space.ppc.elf
                              Arguments:/tmp/Space.ppc.elf
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6

                              Start time (UTC):22:17:44
                              Start date (UTC):04/01/2025
                              Path:/tmp/Space.ppc.elf
                              Arguments:-
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6

                              Start time (UTC):22:17:44
                              Start date (UTC):04/01/2025
                              Path:/tmp/Space.ppc.elf
                              Arguments:-
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6

                              Start time (UTC):22:17:44
                              Start date (UTC):04/01/2025
                              Path:/tmp/Space.ppc.elf
                              Arguments:-
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6

                              Start time (UTC):22:17:49
                              Start date (UTC):04/01/2025
                              Path:/tmp/Space.ppc.elf
                              Arguments:-
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6

                              Start time (UTC):22:17:49
                              Start date (UTC):04/01/2025
                              Path:/tmp/Space.ppc.elf
                              Arguments:-
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6