Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
mips.elf

Overview

General Information

Sample name:mips.elf
Analysis ID:1589157
MD5:f4d93073bff0f1813d2e63919279ed07
SHA1:832ed71744ee67079ce066720a22d75483312b72
SHA256:3feeac05decb1f0ef77a2609f3727887a78411a544fc62dda7f7dc4f14aefb0a
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589157
Start date and time:2025-01-11 14:22:16 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:mips.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@19/0
Command:/tmp/mips.elf
PID:5523
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • mips.elf (PID: 5523, Parent: 5447, MD5: 0083f1f0e77be34ad27f849842bbb00c) Arguments: /tmp/mips.elf
    • mips.elf New Fork (PID: 5525, Parent: 5523)
      • mips.elf New Fork (PID: 5527, Parent: 5525)
      • mips.elf New Fork (PID: 5529, Parent: 5525)
        • mips.elf New Fork (PID: 5531, Parent: 5529)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
mips.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    mips.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      mips.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xfd04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfd18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfd2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfd40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfd54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfd68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfd7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfd90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfda4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfdb8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfdcc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfde0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfdf4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfe08:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfe1c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfe30:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfe44:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfe58:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfe6c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfe80:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xfe94:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      5523.1.00007f10c8400000.00007f10c8412000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5523.1.00007f10c8400000.00007f10c8412000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5523.1.00007f10c8400000.00007f10c8412000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xfd04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfd18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfd2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfd40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfd54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfd68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfd7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfd90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfda4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfdb8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfdcc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfde0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfdf4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfe08:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfe1c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfe30:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfe44:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfe58:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfe6c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfe80:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xfe94:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Process Memory Space: mips.elf PID: 5523JoeSecurity_Mirai_8Yara detected MiraiJoe Security
            Process Memory Space: mips.elf PID: 5523Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
            • 0x6ace:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6ae2:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6af6:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6b0a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6b1e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6b32:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6b46:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6b5a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6b6e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6b82:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6b96:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6baa:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6bbe:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6bd2:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6be6:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6bfa:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6c0e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6c22:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6c36:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6c4a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x6c5e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-11T14:23:08.547300+010020304911Malware Command and Control Activity Detected192.168.2.1435344154.213.187.1181314TCP
            2025-01-11T14:23:17.161972+010020304911Malware Command and Control Activity Detected192.168.2.1435346154.213.187.1181314TCP
            2025-01-11T14:23:23.804597+010020304911Malware Command and Control Activity Detected192.168.2.1435348154.213.187.1181314TCP
            2025-01-11T14:23:28.452388+010020304911Malware Command and Control Activity Detected192.168.2.1435350154.213.187.1181314TCP
            2025-01-11T14:23:36.198583+010020304911Malware Command and Control Activity Detected192.168.2.1435352154.213.187.1181314TCP
            2025-01-11T14:23:38.847274+010020304911Malware Command and Control Activity Detected192.168.2.1435354154.213.187.1181314TCP
            2025-01-11T14:23:45.465890+010020304911Malware Command and Control Activity Detected192.168.2.1435356154.213.187.1181314TCP
            2025-01-11T14:23:52.099239+010020304911Malware Command and Control Activity Detected192.168.2.1435358154.213.187.1181314TCP
            2025-01-11T14:24:00.711525+010020304911Malware Command and Control Activity Detected192.168.2.1435360154.213.187.1181314TCP
            2025-01-11T14:24:10.319649+010020304911Malware Command and Control Activity Detected192.168.2.1435362154.213.187.1181314TCP
            2025-01-11T14:24:11.947547+010020304911Malware Command and Control Activity Detected192.168.2.1435364154.213.187.1181314TCP
            2025-01-11T14:24:21.568440+010020304911Malware Command and Control Activity Detected192.168.2.1435366154.213.187.1181314TCP
            2025-01-11T14:24:28.191682+010020304911Malware Command and Control Activity Detected192.168.2.1435368154.213.187.1181314TCP
            2025-01-11T14:24:29.813198+010020304911Malware Command and Control Activity Detected192.168.2.1435370154.213.187.1181314TCP
            2025-01-11T14:24:37.443803+010020304911Malware Command and Control Activity Detected192.168.2.1435372154.213.187.1181314TCP
            2025-01-11T14:24:45.062666+010020304911Malware Command and Control Activity Detected192.168.2.1435374154.213.187.1181314TCP
            2025-01-11T14:24:54.702759+010020304911Malware Command and Control Activity Detected192.168.2.1435376154.213.187.1181314TCP
            2025-01-11T14:25:01.349957+010020304911Malware Command and Control Activity Detected192.168.2.1435378154.213.187.1181314TCP
            2025-01-11T14:25:09.966828+010020304911Malware Command and Control Activity Detected192.168.2.1435380154.213.187.1181314TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: mips.elfAvira: detected
            Source: mips.elfVirustotal: Detection: 55%Perma Link
            Source: mips.elfReversingLabs: Detection: 50%

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35346 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35372 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35374 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35352 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35358 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35356 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35344 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35368 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35348 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35364 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35362 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35366 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35350 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35380 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35378 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35376 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35370 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35354 -> 154.213.187.118:1314
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35360 -> 154.213.187.118:1314
            Source: global trafficTCP traffic: 192.168.2.14:35344 -> 154.213.187.118:1314
            Source: global trafficDNS traffic detected: DNS query: webhorizon.icu

            System Summary

            barindex
            Source: mips.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: 5523.1.00007f10c8400000.00007f10c8412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: Process Memory Space: mips.elf PID: 5523, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: ELF static info symbol of initial sample.symtab present: no
            Source: mips.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: 5523.1.00007f10c8400000.00007f10c8412000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: Process Memory Space: mips.elf PID: 5523, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@19/0
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/1583/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/2672/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/110/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/3759/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/111/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/112/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/113/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/234/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/1577/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/114/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/235/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/115/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/116/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/117/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/118/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/119/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/3756/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/3757/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/10/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/917/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/3758/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/11/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/12/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/13/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/14/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/15/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/16/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/17/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/18/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/19/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/1593/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/240/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/120/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/3094/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/121/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/242/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/3406/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/1/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/122/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/243/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/2/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/123/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/244/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/1589/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/3/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/124/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/245/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/1588/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/125/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/4/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/246/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/3402/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/126/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/5/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/247/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/127/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/6/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/248/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/128/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/7/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/249/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/8/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/129/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/800/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/9/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/801/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/803/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/20/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/806/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/21/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/807/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/928/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/22/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/23/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/24/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/25/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/26/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/27/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/28/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/29/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/3420/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/490/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/250/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/130/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/251/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/131/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/252/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/132/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/253/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/254/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/255/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/135/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/256/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/1599/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/257/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/378/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/258/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/3412/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/259/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/30/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/35/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/1371/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/260/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/261/cmdlineJump to behavior
            Source: /tmp/mips.elf (PID: 5527)File opened: /proc/262/cmdlineJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: /tmp/mips.elf (PID: 5523)File: /tmp/mips.elfJump to behavior
            Source: /tmp/mips.elf (PID: 5523)Queries kernel information via 'uname': Jump to behavior
            Source: mips.elf, 5523.1.00007ffd14f90000.00007ffd14fb1000.rw-.sdmpBinary or memory string: V_0x86_64/usr/bin/qemu-mips/tmp/mips.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/mips.elf
            Source: mips.elf, 5523.1.000055c54af53000.000055c54afda000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mips
            Source: mips.elf, 5523.1.000055c54af53000.000055c54afda000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips
            Source: mips.elf, 5523.1.00007ffd14f90000.00007ffd14fb1000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: mips.elf, type: SAMPLE
            Source: Yara matchFile source: 5523.1.00007f10c8400000.00007f10c8412000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mips.elf PID: 5523, type: MEMORYSTR
            Source: Yara matchFile source: mips.elf, type: SAMPLE
            Source: Yara matchFile source: 5523.1.00007f10c8400000.00007f10c8412000.r-x.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: Yara matchFile source: mips.elf, type: SAMPLE
            Source: Yara matchFile source: 5523.1.00007f10c8400000.00007f10c8412000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: mips.elf PID: 5523, type: MEMORYSTR
            Source: Yara matchFile source: mips.elf, type: SAMPLE
            Source: Yara matchFile source: 5523.1.00007f10c8400000.00007f10c8412000.r-x.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
            File Deletion
            1
            OS Credential Dumping
            11
            Security Software Discovery
            Remote ServicesData from Local System1
            Non-Standard Port
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            No configs have been found
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Number of created Files
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589157 Sample: mips.elf Startdate: 11/01/2025 Architecture: LINUX Score: 100 20 webhorizon.icu 154.213.187.118, 1314, 35344, 35346 DDOSING-BGP-NETWORKUS Seychelles 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 4 other signatures 2->28 9 mips.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 mips.elf 9->12         started        process6 process7 14 mips.elf 12->14         started        16 mips.elf 12->16         started        process8 18 mips.elf 14->18         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            mips.elf56%VirustotalBrowse
            mips.elf50%ReversingLabsLinux.Trojan.Mirai
            mips.elf100%AviraEXP/ELF.Mirai.Z.A
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            webhorizon.icu
            154.213.187.118
            truefalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              154.213.187.118
              webhorizon.icuSeychelles
              22769DDOSING-BGP-NETWORKUSfalse
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              webhorizon.icuarm.elfGet hashmaliciousMirai, MoobotBrowse
              • 38.55.246.3
              m68k.elfGet hashmaliciousMirai, MoobotBrowse
              • 38.55.246.3
              ppc.elfGet hashmaliciousMirai, MoobotBrowse
              • 38.55.246.3
              mpsl.elfGet hashmaliciousMirai, MoobotBrowse
              • 38.55.246.3
              debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
              • 38.55.246.3
              x86_64.elfGet hashmaliciousMirai, MoobotBrowse
              • 38.55.246.3
              arm7.elfGet hashmaliciousMirai, MoobotBrowse
              • 38.55.246.3
              sh4.elfGet hashmaliciousMirai, MoobotBrowse
              • 38.55.246.3
              mips.elfGet hashmaliciousMirai, MoobotBrowse
              • 38.55.246.3
              spc.elfGet hashmaliciousMirai, MoobotBrowse
              • 38.55.246.3
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              DDOSING-BGP-NETWORKUS4.elfGet hashmaliciousUnknownBrowse
              • 41.93.138.131
              armv5l.elfGet hashmaliciousUnknownBrowse
              • 41.93.222.47
              gmpsl.elfGet hashmaliciousUnknownBrowse
              • 154.213.187.125
              garm5.elfGet hashmaliciousUnknownBrowse
              • 154.213.187.125
              garm7.elfGet hashmaliciousMiraiBrowse
              • 154.213.187.125
              garm.elfGet hashmaliciousUnknownBrowse
              • 154.213.187.125
              gmips.elfGet hashmaliciousUnknownBrowse
              • 154.213.187.125
              byte.x86.elfGet hashmaliciousMirai, OkiruBrowse
              • 154.213.190.254
              byte.ppc.elfGet hashmaliciousMirai, OkiruBrowse
              • 154.213.190.254
              byte.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
              • 154.213.190.246
              No context
              No context
              No created / dropped files found
              File type:ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
              Entropy (8bit):5.395836814014891
              TrID:
              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
              File name:mips.elf
              File size:76'384 bytes
              MD5:f4d93073bff0f1813d2e63919279ed07
              SHA1:832ed71744ee67079ce066720a22d75483312b72
              SHA256:3feeac05decb1f0ef77a2609f3727887a78411a544fc62dda7f7dc4f14aefb0a
              SHA512:7b560236b882b764df5e2f23bc4a8027ae4f75b2020edb97dead7a52176484b3833a6c11198b2baca176785ed9cb797cf36d0b88ab2c42f05be44f51b4f5991a
              SSDEEP:768:uOHdEN88rdOdkr06mCpddIgGg/vPQKTQCQmZzck7XDSWbT2tAjUv5yzmRef8yWRH:aL5d5gLazT7vLU5e/W6nQ9D
              TLSH:6673951A6E628FADF759833447B78E21AB5833D627D1D641E26CD6002F7034E641FFA8
              File Content Preview:.ELF.....................@.`...4..(X.....4. ...(.............@...@........................ ..E ..E .......* ........dt.Q............................<...'......!'.......................<...'......!... ....'9... ......................<...'......!........'9.

              ELF header

              Class:ELF32
              Data:2's complement, big endian
              Version:1 (current)
              Machine:MIPS R3000
              Version Number:0x1
              Type:EXEC (Executable file)
              OS/ABI:UNIX - System V
              ABI Version:0
              Entry Point Address:0x400260
              Flags:0x1007
              ELF Header Size:52
              Program Header Offset:52
              Program Header Size:32
              Number of Program Headers:3
              Section Header Offset:75864
              Section Header Size:40
              Number of Section Headers:13
              Header String Table Index:12
              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
              NULL0x00x00x00x00x0000
              .initPROGBITS0x4000940x940x8c0x00x6AX004
              .textPROGBITS0x4001200x1200xfaa00x00x6AX0016
              .finiPROGBITS0x40fbc00xfbc00x5c0x00x6AX004
              .rodataPROGBITS0x40fc200xfc200x1af00x00x2A0016
              .ctorsPROGBITS0x4520000x120000x80x00x3WA004
              .dtorsPROGBITS0x4520080x120080x80x00x3WA004
              .dataPROGBITS0x4520200x120200x3a00x00x3WA0016
              .gotPROGBITS0x4523c00x123c00x4400x40x10000003WAp0016
              .sbssNOBITS0x4528000x128000x1c0x00x10000003WAp004
              .bssNOBITS0x4528200x128000x22000x00x3WA0016
              .mdebug.abi32PROGBITS0x9000x128000x00x00x0001
              .shstrtabSTRTAB0x00x128000x570x00x0001
              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
              LOAD0x00x4000000x4000000x117100x117105.54350x5R E0x10000.init .text .fini .rodata
              LOAD0x120000x4520000x4520000x8000x2a203.73050x6RW 0x10000.ctors .dtors .data .got .sbss .bss
              GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2025-01-11T14:23:08.547300+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435344154.213.187.1181314TCP
              2025-01-11T14:23:17.161972+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435346154.213.187.1181314TCP
              2025-01-11T14:23:23.804597+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435348154.213.187.1181314TCP
              2025-01-11T14:23:28.452388+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435350154.213.187.1181314TCP
              2025-01-11T14:23:36.198583+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435352154.213.187.1181314TCP
              2025-01-11T14:23:38.847274+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435354154.213.187.1181314TCP
              2025-01-11T14:23:45.465890+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435356154.213.187.1181314TCP
              2025-01-11T14:23:52.099239+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435358154.213.187.1181314TCP
              2025-01-11T14:24:00.711525+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435360154.213.187.1181314TCP
              2025-01-11T14:24:10.319649+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435362154.213.187.1181314TCP
              2025-01-11T14:24:11.947547+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435364154.213.187.1181314TCP
              2025-01-11T14:24:21.568440+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435366154.213.187.1181314TCP
              2025-01-11T14:24:28.191682+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435368154.213.187.1181314TCP
              2025-01-11T14:24:29.813198+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435370154.213.187.1181314TCP
              2025-01-11T14:24:37.443803+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435372154.213.187.1181314TCP
              2025-01-11T14:24:45.062666+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435374154.213.187.1181314TCP
              2025-01-11T14:24:54.702759+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435376154.213.187.1181314TCP
              2025-01-11T14:25:01.349957+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435378154.213.187.1181314TCP
              2025-01-11T14:25:09.966828+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435380154.213.187.1181314TCP
              TimestampSource PortDest PortSource IPDest IP
              Jan 11, 2025 14:23:08.538638115 CET353441314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:08.543567896 CET131435344154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:08.543633938 CET353441314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:08.547300100 CET353441314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:08.552213907 CET131435344154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:09.144376040 CET131435344154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:09.144656897 CET353441314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:09.151113033 CET131435344154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:17.155910969 CET353461314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:17.160975933 CET131435346154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:17.161051989 CET353461314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:17.161972046 CET353461314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:17.166841030 CET131435346154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:17.782470942 CET131435346154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:17.782910109 CET353461314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:17.791292906 CET131435346154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:23.797938108 CET353481314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:23.803145885 CET131435348154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:23.803232908 CET353481314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:23.804596901 CET353481314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:23.809415102 CET131435348154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:24.433610916 CET131435348154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:24.433806896 CET353481314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:24.438652039 CET131435348154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:28.445430040 CET353501314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:28.450325012 CET131435350154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:28.450403929 CET353501314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:28.452388048 CET353501314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:28.457288980 CET131435350154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:29.046149015 CET131435350154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:29.046391010 CET353501314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:29.051414967 CET131435350154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:36.192826033 CET353521314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:36.197649002 CET131435352154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:36.197721004 CET353521314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:36.198582888 CET353521314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:36.203330994 CET131435352154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:36.828567028 CET131435352154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:36.828893900 CET353521314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:36.833746910 CET131435352154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:38.840815067 CET353541314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:38.845772982 CET131435354154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:38.845853090 CET353541314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:38.847274065 CET353541314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:38.852121115 CET131435354154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:39.449703932 CET131435354154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:39.449955940 CET353541314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:39.450047970 CET353541314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:39.454933882 CET131435354154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:45.460349083 CET353561314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:45.465203047 CET131435356154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:45.465296984 CET353561314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:45.465889931 CET353561314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:45.470705032 CET131435356154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:46.081067085 CET131435356154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:46.081300020 CET353561314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:46.086126089 CET131435356154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:52.093147993 CET353581314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:52.098170996 CET131435358154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:52.098225117 CET353581314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:52.099239111 CET353581314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:52.104195118 CET131435358154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:52.693476915 CET131435358154.213.187.118192.168.2.14
              Jan 11, 2025 14:23:52.693660975 CET353581314192.168.2.14154.213.187.118
              Jan 11, 2025 14:23:52.698878050 CET131435358154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:00.705185890 CET353601314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:00.710170031 CET131435360154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:00.710254908 CET353601314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:00.711524963 CET353601314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:00.716375113 CET131435360154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:01.302527905 CET131435360154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:01.303170919 CET353601314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:01.308017015 CET131435360154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:10.313239098 CET353621314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:10.318183899 CET131435362154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:10.318281889 CET353621314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:10.319648981 CET353621314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:10.324506044 CET131435362154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:10.929775953 CET131435362154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:10.930202961 CET353621314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:10.935106039 CET131435362154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:11.941158056 CET353641314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:11.946094036 CET131435364154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:11.946176052 CET353641314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:11.947546959 CET353641314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:11.952430964 CET131435364154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:12.550178051 CET131435364154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:12.550404072 CET353641314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:12.555310011 CET131435364154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:21.561908960 CET353661314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:21.566899061 CET131435366154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:21.567023993 CET353661314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:21.568439960 CET353661314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:21.573290110 CET131435366154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:22.173579931 CET131435366154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:22.173979044 CET353661314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:22.178920984 CET131435366154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:28.185384035 CET353681314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:28.190274000 CET131435368154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:28.190359116 CET353681314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:28.191682100 CET353681314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:28.198859930 CET131435368154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:28.795207024 CET131435368154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:28.795648098 CET353681314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:28.800597906 CET131435368154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:29.806551933 CET353701314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:29.811580896 CET131435370154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:29.811731100 CET353701314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:29.813198090 CET353701314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:29.818439960 CET131435370154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:30.423161983 CET131435370154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:30.423618078 CET353701314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:30.428579092 CET131435370154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:37.436074972 CET353721314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:37.441710949 CET131435372154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:37.441883087 CET353721314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:37.443803072 CET353721314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:37.448698044 CET131435372154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:38.044032097 CET131435372154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:38.044276953 CET353721314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:38.049154997 CET131435372154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:45.056248903 CET353741314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:45.061129093 CET131435374154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:45.061263084 CET353741314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:45.062665939 CET353741314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:45.067456961 CET131435374154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:45.684629917 CET131435374154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:45.684952974 CET353741314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:45.689836025 CET131435374154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:54.696403980 CET353761314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:54.701294899 CET131435376154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:54.701421022 CET353761314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:54.702759027 CET353761314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:54.707545042 CET131435376154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:55.331191063 CET131435376154.213.187.118192.168.2.14
              Jan 11, 2025 14:24:55.331635952 CET353761314192.168.2.14154.213.187.118
              Jan 11, 2025 14:24:55.338890076 CET131435376154.213.187.118192.168.2.14
              Jan 11, 2025 14:25:01.343481064 CET353781314192.168.2.14154.213.187.118
              Jan 11, 2025 14:25:01.348448038 CET131435378154.213.187.118192.168.2.14
              Jan 11, 2025 14:25:01.348541975 CET353781314192.168.2.14154.213.187.118
              Jan 11, 2025 14:25:01.349956989 CET353781314192.168.2.14154.213.187.118
              Jan 11, 2025 14:25:01.354824066 CET131435378154.213.187.118192.168.2.14
              Jan 11, 2025 14:25:01.948879004 CET131435378154.213.187.118192.168.2.14
              Jan 11, 2025 14:25:01.948983908 CET353781314192.168.2.14154.213.187.118
              Jan 11, 2025 14:25:01.953905106 CET131435378154.213.187.118192.168.2.14
              Jan 11, 2025 14:25:09.960345984 CET353801314192.168.2.14154.213.187.118
              Jan 11, 2025 14:25:09.965334892 CET131435380154.213.187.118192.168.2.14
              Jan 11, 2025 14:25:09.965461016 CET353801314192.168.2.14154.213.187.118
              Jan 11, 2025 14:25:09.966828108 CET353801314192.168.2.14154.213.187.118
              Jan 11, 2025 14:25:09.971707106 CET131435380154.213.187.118192.168.2.14
              Jan 11, 2025 14:25:10.564635992 CET131435380154.213.187.118192.168.2.14
              Jan 11, 2025 14:25:10.564958096 CET353801314192.168.2.14154.213.187.118
              Jan 11, 2025 14:25:10.569799900 CET131435380154.213.187.118192.168.2.14
              TimestampSource PortDest PortSource IPDest IP
              Jan 11, 2025 14:23:08.364846945 CET5633453192.168.2.148.8.8.8
              Jan 11, 2025 14:23:08.536569118 CET53563348.8.8.8192.168.2.14
              Jan 11, 2025 14:23:17.148391962 CET5927253192.168.2.148.8.8.8
              Jan 11, 2025 14:23:17.155160904 CET53592728.8.8.8192.168.2.14
              Jan 11, 2025 14:23:23.786027908 CET4358453192.168.2.148.8.8.8
              Jan 11, 2025 14:23:23.797193050 CET53435848.8.8.8192.168.2.14
              Jan 11, 2025 14:23:28.437335968 CET3715653192.168.2.148.8.8.8
              Jan 11, 2025 14:23:28.444549084 CET53371568.8.8.8192.168.2.14
              Jan 11, 2025 14:23:36.049566984 CET3759053192.168.2.148.8.8.8
              Jan 11, 2025 14:23:36.192104101 CET53375908.8.8.8192.168.2.14
              Jan 11, 2025 14:23:38.832686901 CET4002653192.168.2.148.8.8.8
              Jan 11, 2025 14:23:38.840039968 CET53400268.8.8.8192.168.2.14
              Jan 11, 2025 14:23:45.452146053 CET4133053192.168.2.148.8.8.8
              Jan 11, 2025 14:23:45.459968090 CET53413308.8.8.8192.168.2.14
              Jan 11, 2025 14:23:52.084491968 CET5251353192.168.2.148.8.8.8
              Jan 11, 2025 14:23:52.091924906 CET53525138.8.8.8192.168.2.14
              Jan 11, 2025 14:24:00.696541071 CET3485053192.168.2.148.8.8.8
              Jan 11, 2025 14:24:00.704272985 CET53348508.8.8.8192.168.2.14
              Jan 11, 2025 14:24:10.305325985 CET4044553192.168.2.148.8.8.8
              Jan 11, 2025 14:24:10.312380075 CET53404458.8.8.8192.168.2.14
              Jan 11, 2025 14:24:11.933640003 CET5213453192.168.2.148.8.8.8
              Jan 11, 2025 14:24:11.940479040 CET53521348.8.8.8192.168.2.14
              Jan 11, 2025 14:24:21.554042101 CET5029553192.168.2.148.8.8.8
              Jan 11, 2025 14:24:21.561202049 CET53502958.8.8.8192.168.2.14
              Jan 11, 2025 14:24:28.177939892 CET3477453192.168.2.148.8.8.8
              Jan 11, 2025 14:24:28.184515953 CET53347748.8.8.8192.168.2.14
              Jan 11, 2025 14:24:29.798953056 CET3925553192.168.2.148.8.8.8
              Jan 11, 2025 14:24:29.805792093 CET53392558.8.8.8192.168.2.14
              Jan 11, 2025 14:24:37.427352905 CET3298353192.168.2.148.8.8.8
              Jan 11, 2025 14:24:37.434700966 CET53329838.8.8.8192.168.2.14
              Jan 11, 2025 14:24:45.048321962 CET4853553192.168.2.148.8.8.8
              Jan 11, 2025 14:24:45.055443048 CET53485358.8.8.8192.168.2.14
              Jan 11, 2025 14:24:54.688553095 CET3468253192.168.2.148.8.8.8
              Jan 11, 2025 14:24:54.695646048 CET53346828.8.8.8192.168.2.14
              Jan 11, 2025 14:25:01.335469961 CET3739953192.168.2.148.8.8.8
              Jan 11, 2025 14:25:01.342690945 CET53373998.8.8.8192.168.2.14
              Jan 11, 2025 14:25:09.952420950 CET5737153192.168.2.148.8.8.8
              Jan 11, 2025 14:25:09.959686041 CET53573718.8.8.8192.168.2.14
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Jan 11, 2025 14:23:08.364846945 CET192.168.2.148.8.8.80x565bStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:17.148391962 CET192.168.2.148.8.8.80x639bStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:23.786027908 CET192.168.2.148.8.8.80x971dStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:28.437335968 CET192.168.2.148.8.8.80x7bd3Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:36.049566984 CET192.168.2.148.8.8.80xcadaStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:38.832686901 CET192.168.2.148.8.8.80x7b9dStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:45.452146053 CET192.168.2.148.8.8.80x75daStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:52.084491968 CET192.168.2.148.8.8.80x52acStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:00.696541071 CET192.168.2.148.8.8.80x2259Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:10.305325985 CET192.168.2.148.8.8.80xa6c6Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:11.933640003 CET192.168.2.148.8.8.80x67a4Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:21.554042101 CET192.168.2.148.8.8.80x967cStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:28.177939892 CET192.168.2.148.8.8.80x1d2fStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:29.798953056 CET192.168.2.148.8.8.80xa40cStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:37.427352905 CET192.168.2.148.8.8.80x67eStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:45.048321962 CET192.168.2.148.8.8.80x94bcStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:54.688553095 CET192.168.2.148.8.8.80xaf5eStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:25:01.335469961 CET192.168.2.148.8.8.80x364aStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              Jan 11, 2025 14:25:09.952420950 CET192.168.2.148.8.8.80x2637Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Jan 11, 2025 14:23:08.536569118 CET8.8.8.8192.168.2.140x565bNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:17.155160904 CET8.8.8.8192.168.2.140x639bNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:23.797193050 CET8.8.8.8192.168.2.140x971dNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:28.444549084 CET8.8.8.8192.168.2.140x7bd3No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:36.192104101 CET8.8.8.8192.168.2.140xcadaNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:38.840039968 CET8.8.8.8192.168.2.140x7b9dNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:45.459968090 CET8.8.8.8192.168.2.140x75daNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:23:52.091924906 CET8.8.8.8192.168.2.140x52acNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:00.704272985 CET8.8.8.8192.168.2.140x2259No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:10.312380075 CET8.8.8.8192.168.2.140xa6c6No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:11.940479040 CET8.8.8.8192.168.2.140x67a4No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:21.561202049 CET8.8.8.8192.168.2.140x967cNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:28.184515953 CET8.8.8.8192.168.2.140x1d2fNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:29.805792093 CET8.8.8.8192.168.2.140xa40cNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:37.434700966 CET8.8.8.8192.168.2.140x67eNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:45.055443048 CET8.8.8.8192.168.2.140x94bcNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:24:54.695646048 CET8.8.8.8192.168.2.140xaf5eNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:25:01.342690945 CET8.8.8.8192.168.2.140x364aNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
              Jan 11, 2025 14:25:09.959686041 CET8.8.8.8192.168.2.140x2637No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false

              System Behavior

              Start time (UTC):13:23:07
              Start date (UTC):11/01/2025
              Path:/tmp/mips.elf
              Arguments:/tmp/mips.elf
              File size:5777432 bytes
              MD5 hash:0083f1f0e77be34ad27f849842bbb00c

              Start time (UTC):13:23:07
              Start date (UTC):11/01/2025
              Path:/tmp/mips.elf
              Arguments:-
              File size:5777432 bytes
              MD5 hash:0083f1f0e77be34ad27f849842bbb00c

              Start time (UTC):13:23:07
              Start date (UTC):11/01/2025
              Path:/tmp/mips.elf
              Arguments:-
              File size:5777432 bytes
              MD5 hash:0083f1f0e77be34ad27f849842bbb00c

              Start time (UTC):13:23:07
              Start date (UTC):11/01/2025
              Path:/tmp/mips.elf
              Arguments:-
              File size:5777432 bytes
              MD5 hash:0083f1f0e77be34ad27f849842bbb00c

              Start time (UTC):13:23:07
              Start date (UTC):11/01/2025
              Path:/tmp/mips.elf
              Arguments:-
              File size:5777432 bytes
              MD5 hash:0083f1f0e77be34ad27f849842bbb00c