Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
unix.sh4.elf

Overview

General Information

Sample name:unix.sh4.elf
Analysis ID:1584458
MD5:5606f87e699471324ca11bb9ca7c7e18
SHA1:a328b3c01db7ef30d0f63d8b6c06cadec6fcfc44
SHA256:040dfdd8cc73b4ac7b9a80a365061a89411fdc8222a5464e98eae383722977eb
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:88
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample deletes itself
Uses dynamic DNS services
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1584458
Start date and time:2025-01-05 15:20:16 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 37s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:unix.sh4.elf
Detection:MAL
Classification:mal88.troj.evad.linELF@0/0@6/0
Command:/tmp/unix.sh4.elf
PID:5586
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • unix.sh4.elf (PID: 5586, Parent: 5500, MD5: 8943e5f8f8c280467b4472c15ae93ba9) Arguments: /tmp/unix.sh4.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
unix.sh4.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
    unix.sh4.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      unix.sh4.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x15a6c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15a80:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15a94:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15aa8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15abc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15ad0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15ae4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15af8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15b0c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15b20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15b34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15b48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15b5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15b70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15b84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15b98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15bac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15bc0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15bd4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15be8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15bfc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      unix.sh4.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
      • 0x1592c:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
      SourceRuleDescriptionAuthorStrings
      5586.1.00007f38f8400000.00007f38f8419000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
        5586.1.00007f38f8400000.00007f38f8419000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5586.1.00007f38f8400000.00007f38f8419000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x15a6c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15a80:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15a94:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15aa8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15abc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15ad0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15ae4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15af8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15b0c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15b20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15b34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15b48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15b5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15b70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15b84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15b98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15bac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15bc0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15bd4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15be8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15bfc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5586.1.00007f38f8400000.00007f38f8419000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
          • 0x1592c:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
          Process Memory Space: unix.sh4.elf PID: 5586JoeSecurity_Mirai_3Yara detected MiraiJoe Security
            Click to see the 3 entries
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: unix.sh4.elfAvira: detected
            Source: unix.sh4.elfReversingLabs: Detection: 60%
            Source: unix.sh4.elfVirustotal: Detection: 60%Perma Link

            Networking

            barindex
            Source: unknownDNS query: name: unixbot.ddns.net
            Source: global trafficTCP traffic: 192.168.2.14:57700 -> 123.253.61.116:3778
            Source: global trafficDNS traffic detected: DNS query: unixbot.ddns.net

            System Summary

            barindex
            Source: unix.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: unix.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
            Source: 5586.1.00007f38f8400000.00007f38f8419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: 5586.1.00007f38f8400000.00007f38f8419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
            Source: Process Memory Space: unix.sh4.elf PID: 5586, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: Process Memory Space: unix.sh4.elf PID: 5586, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
            Source: ELF static info symbol of initial sample.symtab present: no
            Source: unix.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: unix.sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
            Source: 5586.1.00007f38f8400000.00007f38f8419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: 5586.1.00007f38f8400000.00007f38f8419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
            Source: Process Memory Space: unix.sh4.elf PID: 5586, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: Process Memory Space: unix.sh4.elf PID: 5586, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
            Source: classification engineClassification label: mal88.troj.evad.linELF@0/0@6/0
            Source: /tmp/unix.sh4.elf (PID: 5588)Directory: /tmp/.Jump to behavior
            Source: /tmp/unix.sh4.elf (PID: 5588)Directory: /tmp/..Jump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: /tmp/unix.sh4.elf (PID: 5586)File: /tmp/unix.sh4.elfJump to behavior
            Source: /tmp/unix.sh4.elf (PID: 5586)Queries kernel information via 'uname': Jump to behavior
            Source: unix.sh4.elf, 5586.1.00007ffd31f94000.00007ffd31fb5000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sh4/tmp/unix.sh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/unix.sh4.elf
            Source: unix.sh4.elf, 5586.1.00007ffd31f94000.00007ffd31fb5000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
            Source: unix.sh4.elf, 5586.1.000055c7641fc000.000055c76425f000.rw-.sdmpBinary or memory string: U5!/etc/qemu-binfmt/sh4
            Source: unix.sh4.elf, 5586.1.000055c7641fc000.000055c76425f000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: unix.sh4.elf, type: SAMPLE
            Source: Yara matchFile source: 5586.1.00007f38f8400000.00007f38f8419000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: unix.sh4.elf PID: 5586, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: unix.sh4.elf, type: SAMPLE
            Source: Yara matchFile source: 5586.1.00007f38f8400000.00007f38f8419000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: unix.sh4.elf PID: 5586, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
            Hidden Files and Directories
            OS Credential Dumping11
            Security Software Discovery
            Remote ServicesData from Local System1
            Non-Standard Port
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            File Deletion
            LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive11
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            No configs have been found
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Number of created Files
            • Is malicious
            • Internet
            SourceDetectionScannerLabelLink
            unix.sh4.elf61%ReversingLabsLinux.Trojan.Mirai
            unix.sh4.elf60%VirustotalBrowse
            unix.sh4.elf100%AviraEXP/ELF.Mirai.Z.A
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            unixbot.ddns.net
            123.253.61.116
            truefalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              123.253.61.116
              unixbot.ddns.netThailand
              136523COLODEE-AS-APCOLODEEDIGITALNETWORKCOLTDTHfalse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              123.253.61.116unix.arm5.elfGet hashmaliciousMiraiBrowse
                unix.mips.elfGet hashmaliciousMiraiBrowse
                  unix.mpsl.elfGet hashmaliciousMiraiBrowse
                    unix.x86_64.elfGet hashmaliciousMiraiBrowse
                      main.arm7.elfGet hashmaliciousMiraiBrowse
                        main.x86_64.elfGet hashmaliciousMiraiBrowse
                          main.sh4.elfGet hashmaliciousMiraiBrowse
                            fuckunix.arm7.elfGet hashmaliciousMiraiBrowse
                              main.mpsl.elfGet hashmaliciousMiraiBrowse
                                fuckunix.x86.elfGet hashmaliciousMiraiBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  unixbot.ddns.netunix.arm5.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.mips.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.arm7.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.sh4.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.x86.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.arm.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  COLODEE-AS-APCOLODEEDIGITALNETWORKCOLTDTHunix.arm5.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.mips.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.arm7.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.sh4.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  fuckunix.arm7.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  fuckunix.x86.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
                                  Entropy (8bit):6.263253501279219
                                  TrID:
                                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                  File name:unix.sh4.elf
                                  File size:120'672 bytes
                                  MD5:5606f87e699471324ca11bb9ca7c7e18
                                  SHA1:a328b3c01db7ef30d0f63d8b6c06cadec6fcfc44
                                  SHA256:040dfdd8cc73b4ac7b9a80a365061a89411fdc8222a5464e98eae383722977eb
                                  SHA512:6d1f0529c1b3934cf1eb14697cbc8743ce8bce20d6ceb9de267902a38be6b89419bea9598ac8fcfbb5e8b3dd5c8d16899edcad2d4b65835bc1fa37818b733fb9
                                  SSDEEP:1536:5N6/8bCUQ5Y5ubKsRLAsCazPDE7HWqrUzK6UojvXX/mOu+10DAz:5MUbCsuGMLAsbPDOHWGU26lmO/aAz
                                  TLSH:B1C36AB3D829AF58C555C0B4F0B08F756F13A59182872FBE19A6C3B64047C8DF606BB8
                                  File Content Preview:.ELF..............*.......@.4...........4. ...(...............@...@.P...P...............T...T.B.T.B..N..............Q.td............................././"O.n........#.*@........#.*@lQ...o&O.n...l..............................././.../.a"O.!...n...a.b("...q.

                                  ELF header

                                  Class:ELF32
                                  Data:2's complement, little endian
                                  Version:1 (current)
                                  Machine:<unknown>
                                  Version Number:0x1
                                  Type:EXEC (Executable file)
                                  OS/ABI:UNIX - System V
                                  ABI Version:0
                                  Entry Point Address:0x4001a0
                                  Flags:0x9
                                  ELF Header Size:52
                                  Program Header Offset:52
                                  Program Header Size:32
                                  Number of Program Headers:3
                                  Section Header Offset:120232
                                  Section Header Size:40
                                  Number of Section Headers:11
                                  Header String Table Index:10
                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                  NULL0x00x00x00x00x0000
                                  .initPROGBITS0x4000940x940x300x00x6AX004
                                  .textPROGBITS0x4000e00xe00x151800x00x6AX0032
                                  .finiPROGBITS0x4152600x152600x240x00x6AX004
                                  .rodataPROGBITS0x4152840x152840x34cc0x00x2A004
                                  .ctorsPROGBITS0x4287540x187540xc0x00x3WA004
                                  .dtorsPROGBITS0x4287600x187600x80x00x3WA004
                                  .dataPROGBITS0x4287800x187800x4dd00x00x3WA0032
                                  .gotPROGBITS0x42d5500x1d5500x140x40x3WA004
                                  .bssNOBITS0x42d5640x1d5640x569c0x00x3WA004
                                  .shstrtabSTRTAB0x00x1d5640x430x00x0001
                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                  LOAD0x00x4000000x4000000x187500x187506.93520x5R E0x10000.init .text .fini .rodata
                                  LOAD0x187540x4287540x4287540x4e100xa4ac0.83250x6RW 0x10000.ctors .dtors .data .got .bss
                                  GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 5, 2025 15:21:22.349153042 CET577003778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:21:22.353955984 CET377857700123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:21:22.354062080 CET577003778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:21:22.354969978 CET577003778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:21:22.359709978 CET377857700123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:21:22.359786034 CET577003778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:21:22.364587069 CET377857700123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:21:32.364844084 CET577003778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:21:32.369735956 CET377857700123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:21:43.737082958 CET377857700123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:21:43.737881899 CET577003778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:21:43.742732048 CET377857700123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:21:44.750411987 CET577023778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:21:44.755203962 CET377857702123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:21:44.755270004 CET577023778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:21:44.756454945 CET577023778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:21:44.761275053 CET377857702123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:21:44.761336088 CET577023778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:21:44.766087055 CET377857702123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:06.156311035 CET377857702123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:06.156630039 CET577023778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:06.161418915 CET377857702123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:07.166821003 CET577043778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:07.171654940 CET377857704123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:07.171734095 CET577043778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:07.172355890 CET577043778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:07.177078009 CET377857704123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:07.177125931 CET577043778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:07.181873083 CET377857704123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:28.533934116 CET377857704123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:28.534254074 CET577043778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:28.539150000 CET377857704123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:29.544780016 CET577063778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:29.549628019 CET377857706123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:29.549679041 CET577063778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:29.550595999 CET577063778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:29.555349112 CET377857706123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:29.555407047 CET577063778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:29.560223103 CET377857706123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:39.560564995 CET577063778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:39.565639973 CET377857706123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:50.906342030 CET377857706123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:50.906668901 CET577063778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:50.911474943 CET377857706123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:51.916227102 CET577083778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:51.921112061 CET377857708123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:51.921190023 CET577083778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:51.921892881 CET577083778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:51.926748991 CET377857708123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:22:51.926798105 CET577083778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:22:51.931519985 CET377857708123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:23:13.301364899 CET377857708123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:23:13.301728010 CET577083778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:23:13.306576967 CET377857708123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:23:14.311618090 CET577103778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:23:14.316507101 CET377857710123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:23:14.316565990 CET577103778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:23:14.317624092 CET577103778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:23:14.322355032 CET377857710123.253.61.116192.168.2.14
                                  Jan 5, 2025 15:23:14.322408915 CET577103778192.168.2.14123.253.61.116
                                  Jan 5, 2025 15:23:14.327208042 CET377857710123.253.61.116192.168.2.14
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 5, 2025 15:21:22.341428995 CET5283853192.168.2.148.8.8.8
                                  Jan 5, 2025 15:21:22.348421097 CET53528388.8.8.8192.168.2.14
                                  Jan 5, 2025 15:21:44.741312027 CET4867053192.168.2.148.8.8.8
                                  Jan 5, 2025 15:21:44.749933958 CET53486708.8.8.8192.168.2.14
                                  Jan 5, 2025 15:22:07.159073114 CET3774353192.168.2.148.8.8.8
                                  Jan 5, 2025 15:22:07.166275978 CET53377438.8.8.8192.168.2.14
                                  Jan 5, 2025 15:22:29.536830902 CET3985353192.168.2.148.8.8.8
                                  Jan 5, 2025 15:22:29.544286966 CET53398538.8.8.8192.168.2.14
                                  Jan 5, 2025 15:22:51.908802032 CET3858553192.168.2.148.8.8.8
                                  Jan 5, 2025 15:22:51.915853977 CET53385858.8.8.8192.168.2.14
                                  Jan 5, 2025 15:23:14.303786993 CET3407353192.168.2.148.8.8.8
                                  Jan 5, 2025 15:23:14.311039925 CET53340738.8.8.8192.168.2.14
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 5, 2025 15:21:22.341428995 CET192.168.2.148.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:21:44.741312027 CET192.168.2.148.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:22:07.159073114 CET192.168.2.148.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:22:29.536830902 CET192.168.2.148.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:22:51.908802032 CET192.168.2.148.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:23:14.303786993 CET192.168.2.148.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 5, 2025 15:21:22.348421097 CET8.8.8.8192.168.2.140x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:21:44.749933958 CET8.8.8.8192.168.2.140x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:22:07.166275978 CET8.8.8.8192.168.2.140x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:22:29.544286966 CET8.8.8.8192.168.2.140x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:22:51.915853977 CET8.8.8.8192.168.2.140x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:23:14.311039925 CET8.8.8.8192.168.2.140x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false

                                  System Behavior

                                  Start time (UTC):14:21:15
                                  Start date (UTC):05/01/2025
                                  Path:/tmp/unix.sh4.elf
                                  Arguments:/tmp/unix.sh4.elf
                                  File size:4139976 bytes
                                  MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                  Start time (UTC):14:21:15
                                  Start date (UTC):05/01/2025
                                  Path:/tmp/unix.sh4.elf
                                  Arguments:-
                                  File size:4139976 bytes
                                  MD5 hash:8943e5f8f8c280467b4472c15ae93ba9