Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
unix.mpsl.elf

Overview

General Information

Sample name:unix.mpsl.elf
Analysis ID:1584452
MD5:54d5fb82a93b2a901375b1dd7e05455a
SHA1:17e290710acd7c3a94b066d69d38d6075f8d9aec
SHA256:c82083405e20167b6e1b2aff3f7584e78c2c57fcc8382f3ad9bad734d36eead8
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:88
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample deletes itself
Uses dynamic DNS services
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1584452
Start date and time:2025-01-05 15:12:12 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 24s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:unix.mpsl.elf
Detection:MAL
Classification:mal88.troj.evad.linELF@0/0@6/0
Command:/tmp/unix.mpsl.elf
PID:5514
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • unix.mpsl.elf (PID: 5514, Parent: 5440, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/unix.mpsl.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
unix.mpsl.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
    unix.mpsl.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      unix.mpsl.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x232e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x232fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x23310:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x23324:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x23338:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x2334c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x23360:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x23374:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x23388:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x2339c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x233b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x233c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x233d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x233ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x23400:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x23414:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x23428:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x2343c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x23450:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x23464:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x23478:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      unix.mpsl.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
      • 0x231a8:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
      SourceRuleDescriptionAuthorStrings
      5514.1.00007f7f00400000.00007f7f00427000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
        5514.1.00007f7f00400000.00007f7f00427000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5514.1.00007f7f00400000.00007f7f00427000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x232e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x232fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x23310:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x23324:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x23338:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x2334c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x23360:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x23374:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x23388:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x2339c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x233b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x233c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x233d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x233ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x23400:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x23414:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x23428:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x2343c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x23450:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x23464:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x23478:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5514.1.00007f7f00400000.00007f7f00427000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
          • 0x231a8:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
          Process Memory Space: unix.mpsl.elf PID: 5514JoeSecurity_Mirai_3Yara detected MiraiJoe Security
            Click to see the 3 entries
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: unix.mpsl.elfAvira: detected
            Source: unix.mpsl.elfReversingLabs: Detection: 47%
            Source: unix.mpsl.elfVirustotal: Detection: 56%Perma Link

            Networking

            barindex
            Source: unknownDNS query: name: unixbot.ddns.net
            Source: global trafficTCP traffic: 192.168.2.14:57694 -> 123.253.61.116:3778
            Source: global trafficDNS traffic detected: DNS query: unixbot.ddns.net

            System Summary

            barindex
            Source: unix.mpsl.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: unix.mpsl.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
            Source: 5514.1.00007f7f00400000.00007f7f00427000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: 5514.1.00007f7f00400000.00007f7f00427000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
            Source: Process Memory Space: unix.mpsl.elf PID: 5514, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: Process Memory Space: unix.mpsl.elf PID: 5514, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
            Source: ELF static info symbol of initial sample.symtab present: no
            Source: unix.mpsl.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: unix.mpsl.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
            Source: 5514.1.00007f7f00400000.00007f7f00427000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: 5514.1.00007f7f00400000.00007f7f00427000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
            Source: Process Memory Space: unix.mpsl.elf PID: 5514, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: Process Memory Space: unix.mpsl.elf PID: 5514, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
            Source: classification engineClassification label: mal88.troj.evad.linELF@0/0@6/0
            Source: /tmp/unix.mpsl.elf (PID: 5516)Directory: /tmp/.Jump to behavior
            Source: /tmp/unix.mpsl.elf (PID: 5516)Directory: /tmp/..Jump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: /tmp/unix.mpsl.elf (PID: 5514)File: /tmp/unix.mpsl.elfJump to behavior
            Source: /tmp/unix.mpsl.elf (PID: 5514)Queries kernel information via 'uname': Jump to behavior
            Source: unix.mpsl.elf, 5514.1.000055b3bd3f2000.000055b3bd479000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
            Source: unix.mpsl.elf, 5514.1.000055b3bd3f2000.000055b3bd479000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
            Source: unix.mpsl.elf, 5514.1.00007fff32672000.00007fff32693000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
            Source: unix.mpsl.elf, 5514.1.00007fff32672000.00007fff32693000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/unix.mpsl.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/unix.mpsl.elf

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: unix.mpsl.elf, type: SAMPLE
            Source: Yara matchFile source: 5514.1.00007f7f00400000.00007f7f00427000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: unix.mpsl.elf PID: 5514, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: unix.mpsl.elf, type: SAMPLE
            Source: Yara matchFile source: 5514.1.00007f7f00400000.00007f7f00427000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: unix.mpsl.elf PID: 5514, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
            Hidden Files and Directories
            OS Credential Dumping11
            Security Software Discovery
            Remote ServicesData from Local System1
            Non-Standard Port
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            File Deletion
            LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive11
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            No configs have been found
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Number of created Files
            • Is malicious
            • Internet
            SourceDetectionScannerLabelLink
            unix.mpsl.elf47%ReversingLabsLinux.Trojan.Mirai
            unix.mpsl.elf56%VirustotalBrowse
            unix.mpsl.elf100%AviraEXP/ELF.Mirai.Z.A
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            unixbot.ddns.net
            123.253.61.116
            truefalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              123.253.61.116
              unixbot.ddns.netThailand
              136523COLODEE-AS-APCOLODEEDIGITALNETWORKCOLTDTHfalse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              123.253.61.116main.arm7.elfGet hashmaliciousMiraiBrowse
                main.x86_64.elfGet hashmaliciousMiraiBrowse
                  main.sh4.elfGet hashmaliciousMiraiBrowse
                    fuckunix.arm7.elfGet hashmaliciousMiraiBrowse
                      main.mpsl.elfGet hashmaliciousMiraiBrowse
                        fuckunix.x86.elfGet hashmaliciousMiraiBrowse
                          main.x86.elfGet hashmaliciousMiraiBrowse
                            main.arm.elfGet hashmaliciousMiraiBrowse
                              main.mips.elfGet hashmaliciousMiraiBrowse
                                fuckunix.arm.elfGet hashmaliciousMiraiBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  unixbot.ddns.netmain.arm7.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.sh4.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.x86.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.arm.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.mips.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.ppc.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.m68k.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.arm5.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  COLODEE-AS-APCOLODEEDIGITALNETWORKCOLTDTHmain.arm7.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.sh4.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  fuckunix.arm7.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  fuckunix.x86.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.x86.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.arm.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.mips.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  fuckunix.arm.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
                                  Entropy (8bit):5.140632171020282
                                  TrID:
                                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                  File name:unix.mpsl.elf
                                  File size:179'308 bytes
                                  MD5:54d5fb82a93b2a901375b1dd7e05455a
                                  SHA1:17e290710acd7c3a94b066d69d38d6075f8d9aec
                                  SHA256:c82083405e20167b6e1b2aff3f7584e78c2c57fcc8382f3ad9bad734d36eead8
                                  SHA512:baad101483c6716812a0625df43e1125e37add09450688ac9cfae73e8f926ff9bb181e7a515fc0935cec5b1997cc6f04632851e62b33ae2b89f12676b6ce4463
                                  SSDEEP:3072:CWrjUWJmVswkwgrXte+keFV46eqn/mGG:C4BJmHkwiXteqEfqOG
                                  TLSH:E704E806AB550FBBCCAFDD3702E90B0239CC555B22A53B363678D928F54E50B49E3C68
                                  File Content Preview:.ELF....................`.@.4...<.......4. ...(...............@...@..a...a...............a...aF..aF. X..\...........Q.td...............................<./.'!......'.......................<./.'!...$.........9'.. ........................<./.'!... ........)9

                                  ELF header

                                  Class:ELF32
                                  Data:2's complement, little endian
                                  Version:1 (current)
                                  Machine:MIPS R3000
                                  Version Number:0x1
                                  Type:EXEC (Executable file)
                                  OS/ABI:UNIX - System V
                                  ABI Version:0
                                  Entry Point Address:0x400260
                                  Flags:0x1007
                                  ELF Header Size:52
                                  Program Header Offset:52
                                  Program Header Size:32
                                  Number of Program Headers:3
                                  Section Header Offset:178748
                                  Section Header Size:40
                                  Number of Section Headers:14
                                  Header String Table Index:13
                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                  NULL0x00x00x00x00x0000
                                  .initPROGBITS0x4000940x940x8c0x00x6AX004
                                  .textPROGBITS0x4001200x1200x229200x00x6AX0016
                                  .finiPROGBITS0x422a400x22a400x5c0x00x6AX004
                                  .rodataPROGBITS0x422aa00x22aa00x37140x00x2A0016
                                  .ctorsPROGBITS0x4661b80x261b80xc0x00x3WA004
                                  .dtorsPROGBITS0x4661c40x261c40x80x00x3WA004
                                  .data.rel.roPROGBITS0x4661d00x261d00x680x00x3WA004
                                  .dataPROGBITS0x4662400x262400x4e500x00x3WA0032
                                  .gotPROGBITS0x46b0900x2b0900x9480x40x10000003WAp0016
                                  .sbssNOBITS0x46b9d80x2b9d80x600x00x10000003WAp004
                                  .bssNOBITS0x46ba400x2b9d80x57d40x00x3WA0016
                                  .mdebug.abi32PROGBITS0x12000x2b9d80x00x00x0001
                                  .shstrtabSTRTAB0x00x2b9d80x640x00x0001
                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                  LOAD0x00x4000000x4000000x261b40x261b45.51350x5R E0x10000.init .text .fini .rodata
                                  LOAD0x261b80x4661b80x4661b80x58200xb05c1.41230x6RW 0x10000.ctors .dtors .data.rel.ro .data .got .sbss .bss
                                  GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 5, 2025 15:13:05.863281012 CET576943778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:05.868036985 CET377857694123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:05.868102074 CET576943778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:06.893239021 CET576943778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:06.897994041 CET377857694123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:06.898075104 CET576943778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:06.899095058 CET576943778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:06.903868914 CET377857694123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:06.903932095 CET576943778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:06.908704996 CET377857694123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:16.908991098 CET576943778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:16.913898945 CET377857694123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:28.287897110 CET377857694123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:28.288450956 CET576943778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:28.288896084 CET576943778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:28.293636084 CET377857694123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:29.330127954 CET576963778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:29.334908962 CET377857696123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:29.335022926 CET576963778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:29.335763931 CET576963778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:29.340523005 CET377857696123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:29.340584040 CET576963778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:29.345374107 CET377857696123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:50.694802999 CET377857696123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:50.695030928 CET576963778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:50.699820995 CET377857696123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:51.704715014 CET576983778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:51.709530115 CET377857698123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:51.709630966 CET576983778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:51.710243940 CET576983778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:51.714998960 CET377857698123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:13:51.715094090 CET576983778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:13:51.719849110 CET377857698123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:13.068497896 CET377857698123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:13.068969965 CET576983778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:13.073837996 CET377857698123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:14.079539061 CET577003778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:14.085150003 CET377857700123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:14.085248947 CET577003778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:14.086273909 CET577003778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:14.090996981 CET377857700123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:14.091054916 CET577003778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:14.095825911 CET377857700123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:24.096019030 CET577003778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:24.100835085 CET377857700123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:35.444852114 CET377857700123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:35.445471048 CET577003778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:35.450259924 CET377857700123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:36.489099979 CET577023778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:36.494261026 CET377857702123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:36.494366884 CET577023778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:36.495028973 CET577023778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:36.499825954 CET377857702123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:36.499907017 CET577023778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:36.504714966 CET377857702123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:57.871654987 CET377857702123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:57.872140884 CET577023778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:57.876959085 CET377857702123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:58.915337086 CET577043778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:58.920205116 CET377857704123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:58.920311928 CET577043778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:58.921375036 CET577043778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:58.926125050 CET377857704123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:14:58.926194906 CET577043778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:14:58.931013107 CET377857704123.253.61.116192.168.2.14
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 5, 2025 15:13:05.853703022 CET5038553192.168.2.148.8.8.8
                                  Jan 5, 2025 15:13:05.862185001 CET53503858.8.8.8192.168.2.14
                                  Jan 5, 2025 15:13:29.291475058 CET5056353192.168.2.148.8.8.8
                                  Jan 5, 2025 15:13:29.329660892 CET53505638.8.8.8192.168.2.14
                                  Jan 5, 2025 15:13:51.696842909 CET5112653192.168.2.148.8.8.8
                                  Jan 5, 2025 15:13:51.704299927 CET53511268.8.8.8192.168.2.14
                                  Jan 5, 2025 15:14:14.071857929 CET5136153192.168.2.148.8.8.8
                                  Jan 5, 2025 15:14:14.078906059 CET53513618.8.8.8192.168.2.14
                                  Jan 5, 2025 15:14:36.448369980 CET3638253192.168.2.148.8.8.8
                                  Jan 5, 2025 15:14:36.488575935 CET53363828.8.8.8192.168.2.14
                                  Jan 5, 2025 15:14:58.875076056 CET3522753192.168.2.148.8.8.8
                                  Jan 5, 2025 15:14:58.914556980 CET53352278.8.8.8192.168.2.14
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 5, 2025 15:13:05.853703022 CET192.168.2.148.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:13:29.291475058 CET192.168.2.148.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:13:51.696842909 CET192.168.2.148.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:14:14.071857929 CET192.168.2.148.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:14:36.448369980 CET192.168.2.148.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:14:58.875076056 CET192.168.2.148.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 5, 2025 15:13:05.862185001 CET8.8.8.8192.168.2.140x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:13:29.329660892 CET8.8.8.8192.168.2.140x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:13:51.704299927 CET8.8.8.8192.168.2.140x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:14:14.078906059 CET8.8.8.8192.168.2.140x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:14:36.488575935 CET8.8.8.8192.168.2.140x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:14:58.914556980 CET8.8.8.8192.168.2.140x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false

                                  System Behavior

                                  Start time (UTC):14:12:58
                                  Start date (UTC):05/01/2025
                                  Path:/tmp/unix.mpsl.elf
                                  Arguments:/tmp/unix.mpsl.elf
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  Start time (UTC):14:12:58
                                  Start date (UTC):05/01/2025
                                  Path:/tmp/unix.mpsl.elf
                                  Arguments:-
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9