Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
sh4.elf

Overview

General Information

Sample name:sh4.elf
Analysis ID:1589171
MD5:140d4185010d8a2940c23cdeca6fa050
SHA1:ef7fabb1f29498ca2d48605f4389732ba0ce2516
SHA256:e2b343a08a7a868b01468f46fbfbff2d6926541c177cccc9afdca7ab34399798
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Connects to many ports of the same IP (likely port scanning)
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589171
Start date and time:2025-01-11 14:40:32 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 13s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:sh4.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@16/0
  • VT rate limit hit for: update.byeux.com
Command:/tmp/sh4.elf
PID:6264
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • sh4.elf (PID: 6264, Parent: 6189, MD5: 8943e5f8f8c280467b4472c15ae93ba9) Arguments: /tmp/sh4.elf
    • sh4.elf New Fork (PID: 6266, Parent: 6264)
      • sh4.elf New Fork (PID: 6268, Parent: 6266)
      • sh4.elf New Fork (PID: 6270, Parent: 6266)
        • sh4.elf New Fork (PID: 6272, Parent: 6270)
  • dash New Fork (PID: 6279, Parent: 4331)
  • rm (PID: 6279, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.ndebHxSOx4 /tmp/tmp.sAvHCOOAJJ /tmp/tmp.FJXjf6sxbM
  • dash New Fork (PID: 6280, Parent: 4331)
  • rm (PID: 6280, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.ndebHxSOx4 /tmp/tmp.sAvHCOOAJJ /tmp/tmp.FJXjf6sxbM
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
sh4.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    sh4.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      sh4.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xa320:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa334:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa348:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa35c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa370:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa384:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa398:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa3ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa3c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa3d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa3e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa3fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa410:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa424:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa438:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa44c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa460:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa474:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa488:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa49c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xa4b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      6264.1.00007f702c400000.00007f702c40c000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        6264.1.00007f702c400000.00007f702c40c000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          6264.1.00007f702c400000.00007f702c40c000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xa320:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa334:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa348:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa35c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa370:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa384:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa398:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa3ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa3c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa3d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa3e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa3fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa410:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa424:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa438:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa44c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa460:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa474:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa488:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa49c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xa4b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Process Memory Space: sh4.elf PID: 6264JoeSecurity_MoobotYara detected MoobotJoe Security
            Process Memory Space: sh4.elf PID: 6264JoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Click to see the 1 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-11T14:41:52.323766+010020304911Malware Command and Control Activity Detected192.168.2.2360542107.189.4.20158431TCP
              2025-01-11T14:41:57.971938+010020304911Malware Command and Control Activity Detected192.168.2.2360544107.189.4.20158431TCP
              2025-01-11T14:42:06.728403+010020304911Malware Command and Control Activity Detected192.168.2.2360546107.189.4.20158431TCP
              2025-01-11T14:42:17.513516+010020304911Malware Command and Control Activity Detected192.168.2.2360548107.189.4.20158431TCP
              2025-01-11T14:42:21.180461+010020304911Malware Command and Control Activity Detected192.168.2.2360550107.189.4.20158431TCP
              2025-01-11T14:42:31.832978+010020304911Malware Command and Control Activity Detected192.168.2.2360552107.189.4.20158431TCP
              2025-01-11T14:42:35.505483+010020304911Malware Command and Control Activity Detected192.168.2.2360554107.189.4.20158431TCP
              2025-01-11T14:42:44.180213+010020304911Malware Command and Control Activity Detected192.168.2.2360556107.189.4.20158431TCP
              2025-01-11T14:42:50.953550+010020304911Malware Command and Control Activity Detected192.168.2.2360558107.189.4.20158431TCP
              2025-01-11T14:43:00.615675+010020304911Malware Command and Control Activity Detected192.168.2.2360560107.189.4.20158431TCP
              2025-01-11T14:43:10.289735+010020304911Malware Command and Control Activity Detected192.168.2.2360562107.189.4.20158431TCP
              2025-01-11T14:43:21.956177+010020304911Malware Command and Control Activity Detected192.168.2.2360564107.189.4.20158431TCP
              2025-01-11T14:43:32.679836+010020304911Malware Command and Control Activity Detected192.168.2.2360566107.189.4.20158431TCP
              2025-01-11T14:43:40.349143+010020304911Malware Command and Control Activity Detected192.168.2.2360568107.189.4.20158431TCP
              2025-01-11T14:43:45.129339+010020304911Malware Command and Control Activity Detected192.168.2.2360570107.189.4.20158431TCP
              2025-01-11T14:43:50.786779+010020304911Malware Command and Control Activity Detected192.168.2.2360572107.189.4.20158431TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: sh4.elfAvira: detected
              Source: sh4.elfReversingLabs: Detection: 63%
              Source: sh4.elfVirustotal: Detection: 67%Perma Link

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60542 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60552 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60560 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60564 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60566 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60554 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60544 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60562 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60568 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60546 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60548 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60572 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60550 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60556 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60558 -> 107.189.4.201:58431
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.23:60570 -> 107.189.4.201:58431
              Source: global trafficTCP traffic: 107.189.4.201 ports 58431,1,3,4,5,8
              Source: global trafficTCP traffic: 192.168.2.23:60542 -> 107.189.4.201:58431
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
              Source: unknownTCP traffic detected without corresponding DNS query: 34.249.145.219
              Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
              Source: global trafficDNS traffic detected: DNS query: update.byeux.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39256
              Source: unknownNetwork traffic detected: HTTP traffic on port 39256 -> 443

              System Summary

              barindex
              Source: sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 6264.1.00007f702c400000.00007f702c40c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: sh4.elf PID: 6264, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 6264.1.00007f702c400000.00007f702c40c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: sh4.elf PID: 6264, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@16/0
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1582/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/3088/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/230/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/231/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/232/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1579/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/233/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1699/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/234/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1335/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1698/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1334/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1576/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/2302/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/236/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/237/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/910/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/912/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/2307/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/918/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1594/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1349/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1344/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1465/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1586/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/248/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/249/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1463/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/801/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1900/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/6251/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/491/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/252/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/253/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/254/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/255/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/256/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1599/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/257/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1477/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/379/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1476/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1475/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/6249/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/936/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/2208/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/35/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1809/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/1494/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/260/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 6268)File opened: /proc/261/cmdlineJump to behavior
              Source: /usr/bin/dash (PID: 6279)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.ndebHxSOx4 /tmp/tmp.sAvHCOOAJJ /tmp/tmp.FJXjf6sxbMJump to behavior
              Source: /usr/bin/dash (PID: 6280)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.ndebHxSOx4 /tmp/tmp.sAvHCOOAJJ /tmp/tmp.FJXjf6sxbMJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: /tmp/sh4.elf (PID: 6264)File: /tmp/sh4.elfJump to behavior
              Source: /tmp/sh4.elf (PID: 6264)Queries kernel information via 'uname': Jump to behavior
              Source: sh4.elf, 6264.1.00007fffb7d56000.00007fffb7d77000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
              Source: sh4.elf, 6264.1.000055dd483c8000.000055dd4842b000.rw-.sdmpBinary or memory string: U5!/etc/qemu-binfmt/sh4
              Source: sh4.elf, 6264.1.000055dd483c8000.000055dd4842b000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4
              Source: sh4.elf, 6264.1.00007fffb7d56000.00007fffb7d77000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sh4/tmp/sh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sh4.elf

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 6264.1.00007f702c400000.00007f702c40c000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: sh4.elf PID: 6264, type: MEMORYSTR
              Source: Yara matchFile source: sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 6264.1.00007f702c400000.00007f702c40c000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: sh4.elf PID: 6264, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: Yara matchFile source: sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 6264.1.00007f702c400000.00007f702c40c000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: sh4.elf PID: 6264, type: MEMORYSTR
              Source: Yara matchFile source: sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 6264.1.00007f702c400000.00007f702c40c000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: sh4.elf PID: 6264, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
              File Deletion
              1
              OS Credential Dumping
              11
              Security Software Discovery
              Remote ServicesData from Local System1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
              Application Layer Protocol
              Traffic DuplicationData Destruction
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589171 Sample: sh4.elf Startdate: 11/01/2025 Architecture: LINUX Score: 100 24 update.byeux.com 107.189.4.201, 58431, 60542, 60544 PONYNETUS United States 2->24 26 109.202.202.202, 80 INIT7CH Switzerland 2->26 28 2 other IPs or domains 2->28 30 Suricata IDS alerts for network traffic 2->30 32 Malicious sample detected (through community Yara rule) 2->32 34 Antivirus / Scanner detection for submitted sample 2->34 36 5 other signatures 2->36 9 sh4.elf 2->9         started        12 dash rm 2->12         started        14 dash rm 2->14         started        signatures3 process4 signatures5 38 Sample deletes itself 9->38 16 sh4.elf 9->16         started        process6 process7 18 sh4.elf 16->18         started        20 sh4.elf 16->20         started        process8 22 sh4.elf 18->22         started       
              SourceDetectionScannerLabelLink
              sh4.elf63%ReversingLabsLinux.Trojan.Mirai
              sh4.elf67%VirustotalBrowse
              sh4.elf100%AviraEXP/ELF.Mirai.Z.A
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              update.byeux.com
              107.189.4.201
              truetrue
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                107.189.4.201
                update.byeux.comUnited States
                53667PONYNETUStrue
                34.249.145.219
                unknownUnited States
                16509AMAZON-02USfalse
                109.202.202.202
                unknownSwitzerland
                13030INIT7CHfalse
                91.189.91.42
                unknownUnited Kingdom
                41231CANONICAL-ASGBfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                107.189.4.201mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                  x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                    x86.elfGet hashmaliciousMirai, MoobotBrowse
                      JVL2bXW1ch.elfGet hashmaliciousMirai, MoobotBrowse
                        arm7.elfGet hashmaliciousMirai, MoobotBrowse
                          mips.elfGet hashmaliciousMirai, MoobotBrowse
                            34.249.145.219Space.mips.elfGet hashmaliciousUnknownBrowse
                              boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                  mpsl.elfGet hashmaliciousMiraiBrowse
                                    la.bot.arm5.elfGet hashmaliciousMiraiBrowse
                                      main_arm.elfGet hashmaliciousMiraiBrowse
                                        main_m68k.elfGet hashmaliciousMiraiBrowse
                                          i586.elfGet hashmaliciousUnknownBrowse
                                            ppc.elfGet hashmaliciousUnknownBrowse
                                              hidakibest.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                                • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                                91.189.91.42spc.elfGet hashmaliciousMirai, MoobotBrowse
                                                  arm5.elfGet hashmaliciousUnknownBrowse
                                                    mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                                      ARMV6L.elfGet hashmaliciousUnknownBrowse
                                                        I586.elfGet hashmaliciousUnknownBrowse
                                                          POWERPC.elfGet hashmaliciousUnknownBrowse
                                                            SH4.elfGet hashmaliciousUnknownBrowse
                                                              sss.elfGet hashmaliciousGafgytBrowse
                                                                ARMV5L.elfGet hashmaliciousUnknownBrowse
                                                                  SPARC.elfGet hashmaliciousUnknownBrowse
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    update.byeux.commpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                                                    • 107.189.4.201
                                                                    x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                                                                    • 107.189.4.201
                                                                    x86.elfGet hashmaliciousMirai, MoobotBrowse
                                                                    • 107.189.4.201
                                                                    JVL2bXW1ch.elfGet hashmaliciousMirai, MoobotBrowse
                                                                    • 107.189.4.201
                                                                    arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                                    • 107.189.4.201
                                                                    mips.elfGet hashmaliciousMirai, MoobotBrowse
                                                                    • 107.189.4.201
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    CANONICAL-ASGBspc.elfGet hashmaliciousMirai, MoobotBrowse
                                                                    • 91.189.91.42
                                                                    arm5.elfGet hashmaliciousUnknownBrowse
                                                                    • 91.189.91.42
                                                                    mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                                                    • 91.189.91.42
                                                                    ARMV6L.elfGet hashmaliciousUnknownBrowse
                                                                    • 91.189.91.42
                                                                    I586.elfGet hashmaliciousUnknownBrowse
                                                                    • 91.189.91.42
                                                                    POWERPC.elfGet hashmaliciousUnknownBrowse
                                                                    • 91.189.91.42
                                                                    SH4.elfGet hashmaliciousUnknownBrowse
                                                                    • 91.189.91.42
                                                                    sst.elfGet hashmaliciousGafgytBrowse
                                                                    • 185.125.190.26
                                                                    sss.elfGet hashmaliciousGafgytBrowse
                                                                    • 91.189.91.42
                                                                    ARMV5L.elfGet hashmaliciousUnknownBrowse
                                                                    • 91.189.91.42
                                                                    INIT7CHspc.elfGet hashmaliciousMirai, MoobotBrowse
                                                                    • 109.202.202.202
                                                                    arm5.elfGet hashmaliciousUnknownBrowse
                                                                    • 109.202.202.202
                                                                    mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                                                    • 109.202.202.202
                                                                    ARMV6L.elfGet hashmaliciousUnknownBrowse
                                                                    • 109.202.202.202
                                                                    I586.elfGet hashmaliciousUnknownBrowse
                                                                    • 109.202.202.202
                                                                    POWERPC.elfGet hashmaliciousUnknownBrowse
                                                                    • 109.202.202.202
                                                                    SH4.elfGet hashmaliciousUnknownBrowse
                                                                    • 109.202.202.202
                                                                    sss.elfGet hashmaliciousGafgytBrowse
                                                                    • 109.202.202.202
                                                                    ARMV5L.elfGet hashmaliciousUnknownBrowse
                                                                    • 109.202.202.202
                                                                    SPARC.elfGet hashmaliciousUnknownBrowse
                                                                    • 109.202.202.202
                                                                    AMAZON-02USres.x86.elfGet hashmaliciousUnknownBrowse
                                                                    • 18.134.184.155
                                                                    Space.mips.elfGet hashmaliciousUnknownBrowse
                                                                    • 34.249.145.219
                                                                    QsBdpe1gK5.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                    • 54.67.42.145
                                                                    HN1GiQ5tF7.exeGet hashmaliciousFormBookBrowse
                                                                    • 13.248.169.48
                                                                    qbSIgCrCgw.exeGet hashmaliciousFormBookBrowse
                                                                    • 13.248.169.48
                                                                    8L6MBxaJ2m.exeGet hashmaliciousFormBookBrowse
                                                                    • 13.248.169.48
                                                                    6.elfGet hashmaliciousUnknownBrowse
                                                                    • 54.122.159.233
                                                                    SH4.elfGet hashmaliciousUnknownBrowse
                                                                    • 54.171.230.55
                                                                    3.elfGet hashmaliciousUnknownBrowse
                                                                    • 13.214.70.119
                                                                    z6tNjJC614.exeGet hashmaliciousFormBookBrowse
                                                                    • 13.248.169.48
                                                                    PONYNETUSuShK30bvrV.exeGet hashmaliciousRemcosBrowse
                                                                    • 172.86.115.221
                                                                    miori.spc.elfGet hashmaliciousUnknownBrowse
                                                                    • 107.189.6.73
                                                                    cZO.exeGet hashmaliciousUnknownBrowse
                                                                    • 107.189.28.6
                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                    • 205.185.126.56
                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                    • 205.185.126.56
                                                                    file.exeGet hashmaliciousGhostRat, NitolBrowse
                                                                    • 198.98.57.188
                                                                    lx64.elfGet hashmaliciousUnknownBrowse
                                                                    • 205.185.126.56
                                                                    https://u48917305.ct.sendgrid.net/ls/click?upn=u001.ztQPJiWtq2gO8V-2Ftd7SxY9UCAq3VScTPSloeIw5UEMPd6e3nbPRvJ98moPTqmrdQ1eNbvwZHJ-2BEb4HrooVFNCTltmXW6SgRONKSmPzdFoWfDQT97cczFZ0vj7M2xBd2izDTi-2BL-2BoVqB8yVzV2GW7vOPvy3s9yVghrOS5vs-2BSnWyzJMkXQxVEReq4oLCDet7QAOvo_JkpSD-2Bg6VoLAQppUKMb-2BxDh4v4nbOeQFT31aoN-2FLkhvFCzY6wdlGM7RTNIi47OKR1tTaghG8tTKssArDNPSXAfX9wO6nsZ2FHn-2FunyaOti-2FaII-2FnbKYDXJOImW-2Bs9f4tYnWj8rqO7L0kp4KNRHBDo0iHoL8DEOGc8GMtzqzsIqERel6-2FxJyY4DBnsnUTOc2I4HCPKA6lxcCEXMtxEA1-2FnQ-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                                    • 198.251.89.144
                                                                    arm6.elfGet hashmaliciousMirai, MoobotBrowse
                                                                    • 209.141.47.117
                                                                    JkICQ13OOY.dllGet hashmaliciousUnknownBrowse
                                                                    • 107.189.14.43
                                                                    No context
                                                                    No context
                                                                    No created / dropped files found
                                                                    File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
                                                                    Entropy (8bit):6.7483652184030305
                                                                    TrID:
                                                                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                    File name:sh4.elf
                                                                    File size:50'480 bytes
                                                                    MD5:140d4185010d8a2940c23cdeca6fa050
                                                                    SHA1:ef7fabb1f29498ca2d48605f4389732ba0ce2516
                                                                    SHA256:e2b343a08a7a868b01468f46fbfbff2d6926541c177cccc9afdca7ab34399798
                                                                    SHA512:bc6a720d750c6186ece4d0ae4a6b3a57163ee859d0162f0eabab95571985b54ce9ed1d3b2d2dc30a193fbf7e1c4a6f1b8cb3bc0803086f89f0bc1861ff2006cd
                                                                    SSDEEP:768:DahKJele1YyHpBCh59sG2XpMFErCLElK1HKvawoBn02/CB5mVNfbRhDhwn5I:DasJgs/Hipn4MIzK1HKyfBL/CBqRQn5
                                                                    TLSH:BE337C73E91B5E90C45640B0B1249E351F23F0D883532EBB19AAC6B564A3DACF905FF9
                                                                    File Content Preview:.ELF..............*.......@.4...........4. ...(...............@...@...........................A...A.`...4%..........Q.td............................././"O.n........#.*@........#.*@,....o&O.n...l..............................././.../.a"O.!...n...a.b("...q.

                                                                    ELF header

                                                                    Class:ELF32
                                                                    Data:2's complement, little endian
                                                                    Version:1 (current)
                                                                    Machine:<unknown>
                                                                    Version Number:0x1
                                                                    Type:EXEC (Executable file)
                                                                    OS/ABI:UNIX - System V
                                                                    ABI Version:0
                                                                    Entry Point Address:0x4001a0
                                                                    Flags:0x9
                                                                    ELF Header Size:52
                                                                    Program Header Offset:52
                                                                    Program Header Size:32
                                                                    Number of Program Headers:3
                                                                    Section Header Offset:50080
                                                                    Section Header Size:40
                                                                    Number of Section Headers:10
                                                                    Header String Table Index:9
                                                                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                    NULL0x00x00x00x00x0000
                                                                    .initPROGBITS0x4000940x940x300x00x6AX004
                                                                    .textPROGBITS0x4000e00xe00xa1400x00x6AX0032
                                                                    .finiPROGBITS0x40a2200xa2200x240x00x6AX004
                                                                    .rodataPROGBITS0x40a2440xa2440x197c0x00x2A004
                                                                    .ctorsPROGBITS0x41c0000xc0000x80x00x3WA004
                                                                    .dtorsPROGBITS0x41c0080xc0080x80x00x3WA004
                                                                    .dataPROGBITS0x41c0140xc0140x34c0x00x3WA004
                                                                    .bssNOBITS0x41c3600xc3600x21d40x00x3WA004
                                                                    .shstrtabSTRTAB0x00xc3600x3e0x00x0001
                                                                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                    LOAD0x00x4000000x4000000xbbc00xbbc06.89590x5R E0x10000.init .text .fini .rodata
                                                                    LOAD0xc0000x41c0000x41c0000x3600x25342.69810x6RW 0x10000.ctors .dtors .data .bss
                                                                    GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                    2025-01-11T14:41:52.323766+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360542107.189.4.20158431TCP
                                                                    2025-01-11T14:41:57.971938+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360544107.189.4.20158431TCP
                                                                    2025-01-11T14:42:06.728403+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360546107.189.4.20158431TCP
                                                                    2025-01-11T14:42:17.513516+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360548107.189.4.20158431TCP
                                                                    2025-01-11T14:42:21.180461+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360550107.189.4.20158431TCP
                                                                    2025-01-11T14:42:31.832978+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360552107.189.4.20158431TCP
                                                                    2025-01-11T14:42:35.505483+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360554107.189.4.20158431TCP
                                                                    2025-01-11T14:42:44.180213+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360556107.189.4.20158431TCP
                                                                    2025-01-11T14:42:50.953550+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360558107.189.4.20158431TCP
                                                                    2025-01-11T14:43:00.615675+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360560107.189.4.20158431TCP
                                                                    2025-01-11T14:43:10.289735+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360562107.189.4.20158431TCP
                                                                    2025-01-11T14:43:21.956177+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360564107.189.4.20158431TCP
                                                                    2025-01-11T14:43:32.679836+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360566107.189.4.20158431TCP
                                                                    2025-01-11T14:43:40.349143+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360568107.189.4.20158431TCP
                                                                    2025-01-11T14:43:45.129339+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360570107.189.4.20158431TCP
                                                                    2025-01-11T14:43:50.786779+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.2360572107.189.4.20158431TCP
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 11, 2025 14:41:51.683337927 CET43928443192.168.2.2391.189.91.42
                                                                    Jan 11, 2025 14:41:52.317337036 CET6054258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:41:52.322302103 CET5843160542107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:41:52.322391033 CET6054258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:41:52.323765993 CET6054258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:41:52.328594923 CET5843160542107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:41:53.955682039 CET5843160542107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:41:53.956057072 CET6054258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:41:53.961436987 CET5843160542107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:41:57.966392994 CET6054458431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:41:57.971297979 CET5843160544107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:41:57.971445084 CET6054458431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:41:57.971937895 CET6054458431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:41:57.976772070 CET5843160544107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:41:59.609862089 CET5843160544107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:41:59.610161066 CET6054458431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:41:59.615127087 CET5843160544107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:02.583487988 CET4433925634.249.145.219192.168.2.23
                                                                    Jan 11, 2025 14:42:02.583992004 CET39256443192.168.2.2334.249.145.219
                                                                    Jan 11, 2025 14:42:02.589061975 CET4433925634.249.145.219192.168.2.23
                                                                    Jan 11, 2025 14:42:04.993448019 CET4251680192.168.2.23109.202.202.202
                                                                    Jan 11, 2025 14:42:06.722501040 CET6054658431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:06.727385998 CET5843160546107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:06.727514029 CET6054658431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:06.728403091 CET6054658431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:06.733215094 CET5843160546107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:08.395217896 CET5843160546107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:08.395591974 CET6054658431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:08.400458097 CET5843160546107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:13.184426069 CET43928443192.168.2.2391.189.91.42
                                                                    Jan 11, 2025 14:42:17.507536888 CET6054858431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:17.512468100 CET5843160548107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:17.512583971 CET6054858431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:17.513515949 CET6054858431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:17.518419981 CET5843160548107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:19.163623095 CET5843160548107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:19.164287090 CET6054858431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:19.169162989 CET5843160548107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:21.174370050 CET6055058431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:21.179239035 CET5843160550107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:21.179352999 CET6055058431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:21.180460930 CET6055058431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:21.185281992 CET5843160550107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:22.815491915 CET5843160550107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:22.815918922 CET6055058431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:22.820745945 CET5843160550107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:31.826769114 CET6055258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:31.831621885 CET5843160552107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:31.831721067 CET6055258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:31.832978010 CET6055258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:31.837882042 CET5843160552107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:33.486443043 CET5843160552107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:33.486864090 CET6055258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:33.491743088 CET5843160552107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:35.498672962 CET6055458431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:35.503518105 CET5843160554107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:35.503654957 CET6055458431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:35.505482912 CET6055458431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:35.510330915 CET5843160554107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:37.162472963 CET5843160554107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:37.162816048 CET6055458431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:37.167771101 CET5843160554107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:44.173873901 CET6055658431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:44.178687096 CET5843160556107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:44.178848982 CET6055658431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:44.180212975 CET6055658431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:44.184987068 CET5843160556107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:45.834150076 CET5843160556107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:45.834700108 CET6055658431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:45.839536905 CET5843160556107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:50.947637081 CET6055858431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:50.952497959 CET5843160558107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:50.952629089 CET6055858431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:50.953550100 CET6055858431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:50.958328009 CET5843160558107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:52.597429991 CET5843160558107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:52.597929955 CET6055858431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:42:52.602835894 CET5843160558107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:42:54.138705969 CET43928443192.168.2.2391.189.91.42
                                                                    Jan 11, 2025 14:43:00.609205961 CET6056058431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:00.614141941 CET5843160560107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:00.614214897 CET6056058431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:00.615674973 CET6056058431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:00.620428085 CET5843160560107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:02.273125887 CET5843160560107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:02.273504972 CET6056058431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:02.280060053 CET5843160560107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:10.283405066 CET6056258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:10.288223982 CET5843160562107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:10.288332939 CET6056258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:10.289735079 CET6056258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:10.294548035 CET5843160562107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:11.939435959 CET5843160562107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:11.939832926 CET6056258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:11.944632053 CET5843160562107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:21.949736118 CET6056458431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:21.954680920 CET5843160564107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:21.954761028 CET6056458431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:21.956176996 CET6056458431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:21.960906982 CET5843160564107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:23.663505077 CET5843160564107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:23.663878918 CET6056458431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:23.668737888 CET5843160564107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:32.673630953 CET6056658431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:32.678539038 CET5843160566107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:32.678626060 CET6056658431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:32.679836035 CET6056658431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:32.684648991 CET5843160566107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:34.332429886 CET5843160566107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:34.332778931 CET6056658431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:34.338078022 CET5843160566107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:40.342729092 CET6056858431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:40.347688913 CET5843160568107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:40.347781897 CET6056858431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:40.349143028 CET6056858431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:40.353931904 CET5843160568107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:42.018546104 CET5843160568107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:42.018903017 CET6056858431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:42.023741007 CET5843160568107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:45.123090029 CET6057058431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:45.127998114 CET5843160570107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:45.128082991 CET6057058431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:45.129338980 CET6057058431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:45.134104013 CET5843160570107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:46.768300056 CET5843160570107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:46.768697023 CET6057058431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:46.773632050 CET5843160570107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:50.780167103 CET6057258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:50.785165071 CET5843160572107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:50.785255909 CET6057258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:50.786778927 CET6057258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:50.791587114 CET5843160572107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:52.425173044 CET5843160572107.189.4.201192.168.2.23
                                                                    Jan 11, 2025 14:43:52.425451040 CET6057258431192.168.2.23107.189.4.201
                                                                    Jan 11, 2025 14:43:52.430434942 CET5843160572107.189.4.201192.168.2.23
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 11, 2025 14:41:52.205923080 CET5283153192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:41:52.316225052 CET53528318.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:41:57.957745075 CET4401653192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:41:57.965759039 CET53440168.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:42:06.611574888 CET4272153192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:42:06.721519947 CET53427218.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:42:17.396764994 CET5488753192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:42:17.506522894 CET53548878.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:42:21.166743994 CET6059553192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:42:21.173729897 CET53605958.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:42:31.818730116 CET5713053192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:42:31.826015949 CET53571308.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:42:35.490199089 CET5344153192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:42:35.497550964 CET53534418.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:42:44.165740967 CET4413153192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:42:44.173065901 CET53441318.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:42:50.836931944 CET5608153192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:42:50.946791887 CET53560818.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:43:00.600585938 CET5430253192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:43:00.608369112 CET53543028.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:43:10.275513887 CET4737353192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:43:10.282658100 CET53473738.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:43:21.941984892 CET4025953192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:43:21.948952913 CET53402598.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:43:32.665918112 CET5513053192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:43:32.672873974 CET53551308.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:43:40.335427999 CET4989853192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:43:40.342000008 CET53498988.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:43:45.022530079 CET4844953192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:43:45.121769905 CET53484498.8.8.8192.168.2.23
                                                                    Jan 11, 2025 14:43:50.772005081 CET4765453192.168.2.238.8.8.8
                                                                    Jan 11, 2025 14:43:50.779241085 CET53476548.8.8.8192.168.2.23
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Jan 11, 2025 14:41:52.205923080 CET192.168.2.238.8.8.80x5647Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:41:57.957745075 CET192.168.2.238.8.8.80x6850Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:06.611574888 CET192.168.2.238.8.8.80x1921Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:17.396764994 CET192.168.2.238.8.8.80x2060Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:21.166743994 CET192.168.2.238.8.8.80xf6efStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:31.818730116 CET192.168.2.238.8.8.80x3c7cStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:35.490199089 CET192.168.2.238.8.8.80x56d8Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:44.165740967 CET192.168.2.238.8.8.80xdddcStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:50.836931944 CET192.168.2.238.8.8.80xb642Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:00.600585938 CET192.168.2.238.8.8.80x479dStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:10.275513887 CET192.168.2.238.8.8.80xebc4Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:21.941984892 CET192.168.2.238.8.8.80x6edfStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:32.665918112 CET192.168.2.238.8.8.80xbb7eStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:40.335427999 CET192.168.2.238.8.8.80x72e7Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:45.022530079 CET192.168.2.238.8.8.80xf0deStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:50.772005081 CET192.168.2.238.8.8.80xfdf2Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Jan 11, 2025 14:41:52.316225052 CET8.8.8.8192.168.2.230x5647No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:41:57.965759039 CET8.8.8.8192.168.2.230x6850No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:06.721519947 CET8.8.8.8192.168.2.230x1921No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:17.506522894 CET8.8.8.8192.168.2.230x2060No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:21.173729897 CET8.8.8.8192.168.2.230xf6efNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:31.826015949 CET8.8.8.8192.168.2.230x3c7cNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:35.497550964 CET8.8.8.8192.168.2.230x56d8No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:44.173065901 CET8.8.8.8192.168.2.230xdddcNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:42:50.946791887 CET8.8.8.8192.168.2.230xb642No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:00.608369112 CET8.8.8.8192.168.2.230x479dNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:10.282658100 CET8.8.8.8192.168.2.230xebc4No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:21.948952913 CET8.8.8.8192.168.2.230x6edfNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:32.672873974 CET8.8.8.8192.168.2.230xbb7eNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:40.342000008 CET8.8.8.8192.168.2.230x72e7No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:45.121769905 CET8.8.8.8192.168.2.230xf0deNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                                                                    Jan 11, 2025 14:43:50.779241085 CET8.8.8.8192.168.2.230xfdf2No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false

                                                                    System Behavior

                                                                    Start time (UTC):13:41:51
                                                                    Start date (UTC):11/01/2025
                                                                    Path:/tmp/sh4.elf
                                                                    Arguments:/tmp/sh4.elf
                                                                    File size:4139976 bytes
                                                                    MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                                                    Start time (UTC):13:41:51
                                                                    Start date (UTC):11/01/2025
                                                                    Path:/tmp/sh4.elf
                                                                    Arguments:-
                                                                    File size:4139976 bytes
                                                                    MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                                                    Start time (UTC):13:41:51
                                                                    Start date (UTC):11/01/2025
                                                                    Path:/tmp/sh4.elf
                                                                    Arguments:-
                                                                    File size:4139976 bytes
                                                                    MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                                                    Start time (UTC):13:41:51
                                                                    Start date (UTC):11/01/2025
                                                                    Path:/tmp/sh4.elf
                                                                    Arguments:-
                                                                    File size:4139976 bytes
                                                                    MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                                                    Start time (UTC):13:41:51
                                                                    Start date (UTC):11/01/2025
                                                                    Path:/tmp/sh4.elf
                                                                    Arguments:-
                                                                    File size:4139976 bytes
                                                                    MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                                                                    Start time (UTC):13:42:02
                                                                    Start date (UTC):11/01/2025
                                                                    Path:/usr/bin/dash
                                                                    Arguments:-
                                                                    File size:129816 bytes
                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                    Start time (UTC):13:42:02
                                                                    Start date (UTC):11/01/2025
                                                                    Path:/usr/bin/rm
                                                                    Arguments:rm -f /tmp/tmp.ndebHxSOx4 /tmp/tmp.sAvHCOOAJJ /tmp/tmp.FJXjf6sxbM
                                                                    File size:72056 bytes
                                                                    MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                    Start time (UTC):13:42:02
                                                                    Start date (UTC):11/01/2025
                                                                    Path:/usr/bin/dash
                                                                    Arguments:-
                                                                    File size:129816 bytes
                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                    Start time (UTC):13:42:02
                                                                    Start date (UTC):11/01/2025
                                                                    Path:/usr/bin/rm
                                                                    Arguments:rm -f /tmp/tmp.ndebHxSOx4 /tmp/tmp.sAvHCOOAJJ /tmp/tmp.FJXjf6sxbM
                                                                    File size:72056 bytes
                                                                    MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b