Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
unix.m68k.elf

Overview

General Information

Sample name:unix.m68k.elf
Analysis ID:1584468
MD5:055d01b2868d58281ce4736c5cf10160
SHA1:6b749e4a9eabf8f052653ec21ddfc6f407b7357b
SHA256:17b080dd1e8a17d5734da98c110096a04ab969809b57197b67c2e9a8a92578b1
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:88
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample deletes itself
Uses dynamic DNS services
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1584468
Start date and time:2025-01-05 15:28:52 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 29s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:unix.m68k.elf
Detection:MAL
Classification:mal88.troj.evad.linELF@0/0@6/0
Command:/tmp/unix.m68k.elf
PID:5556
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • unix.m68k.elf (PID: 5556, Parent: 5476, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/unix.m68k.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
unix.m68k.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
    unix.m68k.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      unix.m68k.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x1deaa:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1debe:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1ded2:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1dee6:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1defa:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1df0e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1df22:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1df36:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1df4a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1df5e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1df72:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1df86:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1df9a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1dfae:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1dfc2:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1dfd6:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1dfea:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1dffe:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1e012:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1e026:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1e03a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      unix.m68k.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
      • 0x1dd7b:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
      SourceRuleDescriptionAuthorStrings
      5556.1.00007fddc8001000.00007fddc8022000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
        5556.1.00007fddc8001000.00007fddc8022000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5556.1.00007fddc8001000.00007fddc8022000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x1deaa:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1debe:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1ded2:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1dee6:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1defa:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1df0e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1df22:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1df36:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1df4a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1df5e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1df72:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1df86:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1df9a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1dfae:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1dfc2:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1dfd6:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1dfea:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1dffe:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1e012:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1e026:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1e03a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5556.1.00007fddc8001000.00007fddc8022000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
          • 0x1dd7b:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
          Process Memory Space: unix.m68k.elf PID: 5556JoeSecurity_Mirai_3Yara detected MiraiJoe Security
            Click to see the 3 entries
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: unix.m68k.elfAvira: detected
            Source: unix.m68k.elfVirustotal: Detection: 61%Perma Link
            Source: unix.m68k.elfReversingLabs: Detection: 60%

            Networking

            barindex
            Source: unknownDNS query: name: unixbot.ddns.net
            Source: global trafficTCP traffic: 192.168.2.15:38012 -> 123.253.61.116:3778
            Source: global trafficDNS traffic detected: DNS query: unixbot.ddns.net

            System Summary

            barindex
            Source: unix.m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: unix.m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
            Source: 5556.1.00007fddc8001000.00007fddc8022000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: 5556.1.00007fddc8001000.00007fddc8022000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
            Source: Process Memory Space: unix.m68k.elf PID: 5556, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: Process Memory Space: unix.m68k.elf PID: 5556, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
            Source: ELF static info symbol of initial sample.symtab present: no
            Source: unix.m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: unix.m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
            Source: 5556.1.00007fddc8001000.00007fddc8022000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: 5556.1.00007fddc8001000.00007fddc8022000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
            Source: Process Memory Space: unix.m68k.elf PID: 5556, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: Process Memory Space: unix.m68k.elf PID: 5556, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
            Source: classification engineClassification label: mal88.troj.evad.linELF@0/0@6/0
            Source: /tmp/unix.m68k.elf (PID: 5558)Directory: /tmp/.Jump to behavior
            Source: /tmp/unix.m68k.elf (PID: 5558)Directory: /tmp/..Jump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: /tmp/unix.m68k.elf (PID: 5556)File: /tmp/unix.m68k.elfJump to behavior
            Source: /tmp/unix.m68k.elf (PID: 5556)Queries kernel information via 'uname': Jump to behavior
            Source: unix.m68k.elf, 5556.1.00007ffead7fa000.00007ffead81b000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
            Source: unix.m68k.elf, 5556.1.000055561b0f0000.000055561b154000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
            Source: unix.m68k.elf, 5556.1.000055561b0f0000.000055561b154000.rw-.sdmpBinary or memory string: VU!/etc/qemu-binfmt/m68k
            Source: unix.m68k.elf, 5556.1.00007ffead7fa000.00007ffead81b000.rw-.sdmpBinary or memory string: |3x86_64/usr/bin/qemu-m68k/tmp/unix.m68k.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/unix.m68k.elf

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: unix.m68k.elf, type: SAMPLE
            Source: Yara matchFile source: 5556.1.00007fddc8001000.00007fddc8022000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: unix.m68k.elf PID: 5556, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: unix.m68k.elf, type: SAMPLE
            Source: Yara matchFile source: 5556.1.00007fddc8001000.00007fddc8022000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: unix.m68k.elf PID: 5556, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
            Hidden Files and Directories
            OS Credential Dumping11
            Security Software Discovery
            Remote ServicesData from Local System1
            Non-Standard Port
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            File Deletion
            LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive11
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            No configs have been found
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Number of created Files
            • Is malicious
            • Internet
            SourceDetectionScannerLabelLink
            unix.m68k.elf61%VirustotalBrowse
            unix.m68k.elf61%ReversingLabsLinux.Trojan.Mirai
            unix.m68k.elf100%AviraEXP/ELF.Mirai.Z.A
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            unixbot.ddns.net
            123.253.61.116
            truefalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              123.253.61.116
              unixbot.ddns.netThailand
              136523COLODEE-AS-APCOLODEEDIGITALNETWORKCOLTDTHfalse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              123.253.61.116fuckunix.x86_64.elfGet hashmaliciousMiraiBrowse
                unix.arm.elfGet hashmaliciousMiraiBrowse
                  unix.x86.elfGet hashmaliciousMiraiBrowse
                    unix.sh4.elfGet hashmaliciousMiraiBrowse
                      unix.arm5.elfGet hashmaliciousMiraiBrowse
                        unix.mips.elfGet hashmaliciousMiraiBrowse
                          unix.mpsl.elfGet hashmaliciousMiraiBrowse
                            unix.x86_64.elfGet hashmaliciousMiraiBrowse
                              main.arm7.elfGet hashmaliciousMiraiBrowse
                                main.x86_64.elfGet hashmaliciousMiraiBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  unixbot.ddns.netunix.arm.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.x86.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.sh4.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.arm5.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.mips.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.arm7.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.sh4.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  COLODEE-AS-APCOLODEEDIGITALNETWORKCOLTDTHfuckunix.x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.arm.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.x86.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.sh4.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.arm5.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.mips.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  unix.x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.arm7.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  main.x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 123.253.61.116
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                                  Entropy (8bit):5.743194072824107
                                  TrID:
                                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                  File name:unix.m68k.elf
                                  File size:153'888 bytes
                                  MD5:055d01b2868d58281ce4736c5cf10160
                                  SHA1:6b749e4a9eabf8f052653ec21ddfc6f407b7357b
                                  SHA256:17b080dd1e8a17d5734da98c110096a04ab969809b57197b67c2e9a8a92578b1
                                  SHA512:55f81e3606c8bf9ed207726b027ef7844430a85b529700562daf521db8ec1973048520e32b67e34851bbc491c76dc01b04eff86a362695e71e2d902a453d5148
                                  SSDEEP:3072:2WCJu/8cYteMMxEVwVljbiVLnZ4m6e2/UbDdV6yQktiaeB:215cYtevEVvLnCl46yQmNeB
                                  TLSH:EAE33AC7F800DDFAF80AE73748534809B530BBE105925B372257797BED3A1992867E86
                                  File Content Preview:.ELF.......................D...4..W......4. ...(.......................E...E...... ........L..)L..)L..N....D...... .dt.Q............................NV..a....da.....N^NuNV..J9..wPf>"y..). QJ.g.X.#...).N."y..). QJ.f.A.....J.g.Hy...HN.X.......wPN^NuNV..N^NuN

                                  ELF header

                                  Class:ELF32
                                  Data:2's complement, big endian
                                  Version:1 (current)
                                  Machine:MC68000
                                  Version Number:0x1
                                  Type:EXEC (Executable file)
                                  OS/ABI:UNIX - System V
                                  ABI Version:0
                                  Entry Point Address:0x80000144
                                  Flags:0x0
                                  ELF Header Size:52
                                  Program Header Offset:52
                                  Program Header Size:32
                                  Number of Program Headers:3
                                  Section Header Offset:153488
                                  Section Header Size:40
                                  Number of Section Headers:10
                                  Header String Table Index:9
                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                  NULL0x00x00x00x00x0000
                                  .initPROGBITS0x800000940x940x140x00x6AX002
                                  .textPROGBITS0x800000a80xa80x1d6420x00x6AX004
                                  .finiPROGBITS0x8001d6ea0x1d6ea0xe0x00x6AX002
                                  .rodataPROGBITS0x8001d6f80x1d6f80x324d0x00x2A002
                                  .ctorsPROGBITS0x8002294c0x2094c0xc0x00x3WA004
                                  .dtorsPROGBITS0x800229580x209580x80x00x3WA004
                                  .dataPROGBITS0x800229800x209800x4dd00x00x3WA0032
                                  .bssNOBITS0x800277500x257500x56400x00x3WA004
                                  .shstrtabSTRTAB0x00x257500x3e0x00x0001
                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                  LOAD0x00x800000000x800000000x209450x209456.15850x5R E0x2000.init .text .fini .rodata
                                  LOAD0x2094c0x8002294c0x8002294c0x4e040xa4440.97500x6RW 0x2000.ctors .dtors .data .bss
                                  GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 5, 2025 15:29:53.457079887 CET380123778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:29:53.463912010 CET377838012123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:29:53.463965893 CET380123778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:29:53.465192080 CET380123778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:29:53.472197056 CET377838012123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:29:53.472238064 CET380123778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:29:53.477778912 CET377838012123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:30:03.475400925 CET380123778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:30:03.480300903 CET377838012123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:30:14.860757113 CET377838012123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:30:14.861196041 CET380123778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:30:14.865966082 CET377838012123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:30:15.871090889 CET380143778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:30:15.875906944 CET377838014123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:30:15.875961065 CET380143778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:30:15.876681089 CET380143778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:30:15.881460905 CET377838014123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:30:15.881503105 CET380143778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:30:15.886284113 CET377838014123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:30:37.250267029 CET377838014123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:30:37.250493050 CET380143778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:30:37.255289078 CET377838014123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:30:38.293087006 CET380163778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:30:38.297930956 CET377838016123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:30:38.297991991 CET380163778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:30:38.298912048 CET380163778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:30:38.303725958 CET377838016123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:30:38.303771973 CET380163778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:30:38.308518887 CET377838016123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:30:59.705673933 CET377838016123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:30:59.706096888 CET380163778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:30:59.711014986 CET377838016123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:00.748750925 CET380183778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:00.753566027 CET377838018123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:00.753679037 CET380183778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:00.754401922 CET380183778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:00.759145975 CET377838018123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:00.759226084 CET380183778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:00.763989925 CET377838018123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:10.764297009 CET380183778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:10.769237995 CET377838018123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:22.173141003 CET377838018123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:22.173518896 CET380183778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:22.178325891 CET377838018123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:23.273411989 CET380203778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:23.279834032 CET377838020123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:23.279917002 CET380203778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:23.280706882 CET380203778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:23.288145065 CET377838020123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:23.288203001 CET380203778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:23.295396090 CET377838020123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:44.638616085 CET377838020123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:44.639020920 CET380203778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:44.643853903 CET377838020123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:45.680437088 CET380223778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:45.685276985 CET377838022123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:45.685348034 CET380223778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:45.686352968 CET380223778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:45.691065073 CET377838022123.253.61.116192.168.2.15
                                  Jan 5, 2025 15:31:45.691124916 CET380223778192.168.2.15123.253.61.116
                                  Jan 5, 2025 15:31:45.695894003 CET377838022123.253.61.116192.168.2.15
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 5, 2025 15:29:53.417067051 CET4670153192.168.2.158.8.8.8
                                  Jan 5, 2025 15:29:53.456031084 CET53467018.8.8.8192.168.2.15
                                  Jan 5, 2025 15:30:15.863754988 CET4993053192.168.2.158.8.8.8
                                  Jan 5, 2025 15:30:15.870665073 CET53499308.8.8.8192.168.2.15
                                  Jan 5, 2025 15:30:38.252679110 CET4058953192.168.2.158.8.8.8
                                  Jan 5, 2025 15:30:38.292401075 CET53405898.8.8.8192.168.2.15
                                  Jan 5, 2025 15:31:00.708770037 CET3716953192.168.2.158.8.8.8
                                  Jan 5, 2025 15:31:00.748027086 CET53371698.8.8.8192.168.2.15
                                  Jan 5, 2025 15:31:23.176244974 CET5187053192.168.2.158.8.8.8
                                  Jan 5, 2025 15:31:23.272475004 CET53518708.8.8.8192.168.2.15
                                  Jan 5, 2025 15:31:45.641509056 CET4160153192.168.2.158.8.8.8
                                  Jan 5, 2025 15:31:45.679766893 CET53416018.8.8.8192.168.2.15
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 5, 2025 15:29:53.417067051 CET192.168.2.158.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:30:15.863754988 CET192.168.2.158.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:30:38.252679110 CET192.168.2.158.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:31:00.708770037 CET192.168.2.158.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:31:23.176244974 CET192.168.2.158.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:31:45.641509056 CET192.168.2.158.8.8.80x0Standard query (0)unixbot.ddns.netA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 5, 2025 15:29:53.456031084 CET8.8.8.8192.168.2.150x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:30:15.870665073 CET8.8.8.8192.168.2.150x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:30:38.292401075 CET8.8.8.8192.168.2.150x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:31:00.748027086 CET8.8.8.8192.168.2.150x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:31:23.272475004 CET8.8.8.8192.168.2.150x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false
                                  Jan 5, 2025 15:31:45.679766893 CET8.8.8.8192.168.2.150x0No error (0)unixbot.ddns.net123.253.61.116A (IP address)IN (0x0001)false

                                  System Behavior

                                  Start time (UTC):14:29:46
                                  Start date (UTC):05/01/2025
                                  Path:/tmp/unix.m68k.elf
                                  Arguments:/tmp/unix.m68k.elf
                                  File size:4463432 bytes
                                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                  Start time (UTC):14:29:46
                                  Start date (UTC):05/01/2025
                                  Path:/tmp/unix.m68k.elf
                                  Arguments:-
                                  File size:4463432 bytes
                                  MD5 hash:cd177594338c77b895ae27c33f8f86cc