Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
m68k.elf

Overview

General Information

Sample name:m68k.elf
Analysis ID:1589746
MD5:0969277e81a006649aeb8634a8ddfbc0
SHA1:2f7664e3455681ab03d648b4746a4ec30be99473
SHA256:5601edf110c689308c65e625747f13d7997d7c0c347f18639720f6e855207c3f
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:72
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589746
Start date and time:2025-01-13 04:01:07 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 4s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:m68k.elf
Detection:MAL
Classification:mal72.troj.linELF@0/0@2/0
Command:/tmp/m68k.elf
PID:5414
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
wormbot
Standard Error:
  • system is lnxubuntu20
  • m68k.elf (PID: 5414, Parent: 5340, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/m68k.elf
    • m68k.elf New Fork (PID: 5416, Parent: 5414)
    • m68k.elf New Fork (PID: 5418, Parent: 5414)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
m68k.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    m68k.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0x11527:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1153b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1154f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11563:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11577:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1158b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1159f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x115b3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x115c7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x115db:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x115ef:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11603:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11617:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1162b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1163f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11653:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11667:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1167b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1168f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x116a3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x116b7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    SourceRuleDescriptionAuthorStrings
    5414.1.00007efcf4001000.00007efcf4014000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5414.1.00007efcf4001000.00007efcf4014000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x11527:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1153b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1154f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11563:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11577:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1158b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1159f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x115b3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x115c7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x115db:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x115ef:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11603:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11617:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1162b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1163f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11653:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11667:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1167b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1168f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x116a3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x116b7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      Process Memory Space: m68k.elf PID: 5414JoeSecurity_Mirai_8Yara detected MiraiJoe Security
        Process Memory Space: m68k.elf PID: 5414Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0xaf7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xb0b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xb1f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xb33:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xb47:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xb5b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xb6f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xb83:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xb97:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xbab:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xbbf:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xbd3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xbe7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xbfb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc0f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc23:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc37:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc4b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc5f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc73:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc87:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: m68k.elfAvira: detected
        Source: m68k.elfReversingLabs: Detection: 36%
        Source: global trafficTCP traffic: 192.168.2.13:45928 -> 85.239.34.134:999
        Source: /tmp/m68k.elf (PID: 5414)Socket: 127.0.0.1:7567Jump to behavior
        Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
        Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
        Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
        Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
        Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
        Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
        Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
        Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
        Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
        Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
        Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
        Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

        System Summary

        barindex
        Source: m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: 5414.1.00007efcf4001000.00007efcf4014000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: Process Memory Space: m68k.elf PID: 5414, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: ELF static info symbol of initial sample.symtab present: no
        Source: m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: 5414.1.00007efcf4001000.00007efcf4014000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: Process Memory Space: m68k.elf PID: 5414, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: classification engineClassification label: mal72.troj.linELF@0/0@2/0
        Source: /tmp/m68k.elf (PID: 5414)Queries kernel information via 'uname': Jump to behavior
        Source: m68k.elf, 5414.1.00007ffdd650c000.00007ffdd652d000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
        Source: m68k.elf, 5414.1.0000563da7bb1000.0000563da7c36000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
        Source: m68k.elf, 5414.1.0000563da7bb1000.0000563da7c36000.rw-.sdmpBinary or memory string: =V!/etc/qemu-binfmt/m68k
        Source: m68k.elf, 5414.1.00007ffdd650c000.00007ffdd652d000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-m68k/tmp/m68k.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/m68k.elf

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: m68k.elf, type: SAMPLE
        Source: Yara matchFile source: 5414.1.00007efcf4001000.00007efcf4014000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5414, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: m68k.elf, type: SAMPLE
        Source: Yara matchFile source: 5414.1.00007efcf4001000.00007efcf4014000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5414, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
        Security Software Discovery
        Remote ServicesData from Local System1
        Non-Standard Port
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        m68k.elf37%ReversingLabsLinux.Backdoor.Mirai
        m68k.elf100%AviraEXP/ELF.Mirai.Z.A
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        daisy.ubuntu.com
        162.213.35.25
        truefalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          85.239.34.134
          unknownRussian Federation
          134121RAINBOW-HKRainbownetworklimitedHKfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          85.239.34.134x86.elfGet hashmaliciousMiraiBrowse
            sh4.elfGet hashmaliciousUnknownBrowse
              ppc.elfGet hashmaliciousUnknownBrowse
                arm6.elfGet hashmaliciousUnknownBrowse
                  arm5.elfGet hashmaliciousUnknownBrowse
                    m68k.elfGet hashmaliciousUnknownBrowse
                      mpsl.elfGet hashmaliciousUnknownBrowse
                        harm.elfGet hashmaliciousUnknownBrowse
                          mips.elfGet hashmaliciousUnknownBrowse
                            spc.elfGet hashmaliciousUnknownBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              daisy.ubuntu.com2.elfGet hashmaliciousUnknownBrowse
                              • 162.213.35.24
                              i686.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.25
                              t3.elfGet hashmaliciousUnknownBrowse
                              • 162.213.35.24
                              t6.elfGet hashmaliciousUnknownBrowse
                              • 162.213.35.24
                              t5.elfGet hashmaliciousUnknownBrowse
                              • 162.213.35.24
                              m68k.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.24
                              mips.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.24
                              Cinquento.arm5.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.25
                              Cinquento.x86.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.24
                              Cinquento.arm6.elfGet hashmaliciousMiraiBrowse
                              • 162.213.35.25
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              RAINBOW-HKRainbownetworklimitedHKx86.elfGet hashmaliciousMiraiBrowse
                              • 85.239.34.134
                              4kN17cL4Tn.exeGet hashmaliciousLummaCBrowse
                              • 85.239.54.77
                              sh4.elfGet hashmaliciousUnknownBrowse
                              • 85.239.34.134
                              ppc.elfGet hashmaliciousUnknownBrowse
                              • 85.239.34.134
                              arm6.elfGet hashmaliciousUnknownBrowse
                              • 85.239.34.134
                              arm5.elfGet hashmaliciousUnknownBrowse
                              • 85.239.34.134
                              m68k.elfGet hashmaliciousUnknownBrowse
                              • 85.239.34.134
                              mpsl.elfGet hashmaliciousUnknownBrowse
                              • 85.239.34.134
                              harm.elfGet hashmaliciousUnknownBrowse
                              • 85.239.34.134
                              mips.elfGet hashmaliciousUnknownBrowse
                              • 85.239.34.134
                              No context
                              No context
                              No created / dropped files found
                              File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                              Entropy (8bit):6.182425748602363
                              TrID:
                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                              File name:m68k.elf
                              File size:78'780 bytes
                              MD5:0969277e81a006649aeb8634a8ddfbc0
                              SHA1:2f7664e3455681ab03d648b4746a4ec30be99473
                              SHA256:5601edf110c689308c65e625747f13d7997d7c0c347f18639720f6e855207c3f
                              SHA512:8df6c6484304298d3e86ddac49077b9bc5127e52760001e3357f6b3874502d504be264d8b42db6b7c5d749e18cca87fab52fd24fe57de2f542bc916317c13f7a
                              SSDEEP:1536:Zy3cc5d10JEFt7NQvh89qBaJTQeuacWjcW0JcWcB8oIqQBVLHmJRAvJNIs5TuIB:Chd6eFtmkqyTQeuacWjcW0JcWcBxIqQF
                              TLSH:3B733BCAF801D97EF84AD67B4C530D097671F2E10B930B36175BBA67E936198281BDC1
                              File Content Preview:.ELF.......................D...4..1......4. ...(......................-...-...............-...=...=.......(|........dt.Q............................NV..a....da....xN^NuNV..J9..A.f>"y..=. QJ.g.X.#...=.N."y..=. QJ.f.A.....J.g.Hy..=.N.X.......A.N^NuNV..N^NuN

                              ELF header

                              Class:ELF32
                              Data:2's complement, big endian
                              Version:1 (current)
                              Machine:MC68000
                              Version Number:0x1
                              Type:EXEC (Executable file)
                              OS/ABI:UNIX - System V
                              ABI Version:0
                              Entry Point Address:0x80000144
                              Flags:0x0
                              ELF Header Size:52
                              Program Header Offset:52
                              Program Header Size:32
                              Number of Program Headers:3
                              Section Header Offset:78300
                              Section Header Size:40
                              Number of Section Headers:12
                              Header String Table Index:11
                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                              NULL0x00x00x00x00x0000
                              .initPROGBITS0x800000940x940x140x00x6AX002
                              .textPROGBITS0x800000a80xa80x113a20x00x6AX004
                              .finiPROGBITS0x8001144a0x1144a0xe0x00x6AX002
                              .rodataPROGBITS0x800114580x114580x195a0x00x2A002
                              .eh_framePROGBITS0x80013db40x12db40x40x00x3WA004
                              .ctorsPROGBITS0x80013db80x12db80x80x00x3WA004
                              .dtorsPROGBITS0x80013dc00x12dc00x80x00x3WA004
                              .jcrPROGBITS0x80013dc80x12dc80x40x00x3WA004
                              .dataPROGBITS0x80013dcc0x12dcc0x3c00x00x3WA004
                              .bssNOBITS0x8001418c0x1318c0x24a40x00x3WA004
                              .shstrtabSTRTAB0x00x1318c0x4d0x00x0001
                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                              LOAD0x00x800000000x800000000x12db20x12db26.18930x5R E0x1000.init .text .fini .rodata
                              LOAD0x12db40x80013db40x80013db40x3d80x287c4.97620x6RW 0x1000.eh_frame .ctors .dtors .jcr .data .bss
                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 13, 2025 04:01:57.704638958 CET45928999192.168.2.1385.239.34.134
                              Jan 13, 2025 04:01:57.709753990 CET9994592885.239.34.134192.168.2.13
                              Jan 13, 2025 04:01:57.710086107 CET45928999192.168.2.1385.239.34.134
                              Jan 13, 2025 04:01:57.710216999 CET45928999192.168.2.1385.239.34.134
                              Jan 13, 2025 04:01:57.715003967 CET9994592885.239.34.134192.168.2.13
                              Jan 13, 2025 04:01:57.715058088 CET45928999192.168.2.1385.239.34.134
                              Jan 13, 2025 04:01:57.719999075 CET9994592885.239.34.134192.168.2.13
                              Jan 13, 2025 04:02:07.719168901 CET45928999192.168.2.1385.239.34.134
                              Jan 13, 2025 04:02:07.725843906 CET9994592885.239.34.134192.168.2.13
                              Jan 13, 2025 04:02:07.939533949 CET9994592885.239.34.134192.168.2.13
                              Jan 13, 2025 04:02:07.939699888 CET45928999192.168.2.1385.239.34.134
                              Jan 13, 2025 04:03:07.987202883 CET45928999192.168.2.1385.239.34.134
                              Jan 13, 2025 04:03:07.992228031 CET9994592885.239.34.134192.168.2.13
                              Jan 13, 2025 04:03:08.204973936 CET9994592885.239.34.134192.168.2.13
                              Jan 13, 2025 04:03:08.205182076 CET45928999192.168.2.1385.239.34.134
                              Jan 13, 2025 04:04:08.255187988 CET45928999192.168.2.1385.239.34.134
                              Jan 13, 2025 04:04:08.260142088 CET9994592885.239.34.134192.168.2.13
                              Jan 13, 2025 04:04:08.473009109 CET9994592885.239.34.134192.168.2.13
                              Jan 13, 2025 04:04:08.473233938 CET45928999192.168.2.1385.239.34.134
                              Jan 13, 2025 04:05:08.515377045 CET45928999192.168.2.1385.239.34.134
                              Jan 13, 2025 04:05:08.522644997 CET9994592885.239.34.134192.168.2.13
                              Jan 13, 2025 04:05:08.735430956 CET9994592885.239.34.134192.168.2.13
                              Jan 13, 2025 04:05:08.735850096 CET45928999192.168.2.1385.239.34.134
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 13, 2025 04:04:41.984200954 CET3678753192.168.2.131.1.1.1
                              Jan 13, 2025 04:04:41.984308958 CET4400553192.168.2.131.1.1.1
                              Jan 13, 2025 04:04:41.991134882 CET53440051.1.1.1192.168.2.13
                              Jan 13, 2025 04:04:41.991743088 CET53367871.1.1.1192.168.2.13
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 13, 2025 04:04:41.984200954 CET192.168.2.131.1.1.10xec3bStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                              Jan 13, 2025 04:04:41.984308958 CET192.168.2.131.1.1.10xdbe2Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 13, 2025 04:04:41.991743088 CET1.1.1.1192.168.2.130xec3bNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                              Jan 13, 2025 04:04:41.991743088 CET1.1.1.1192.168.2.130xec3bNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                              System Behavior

                              Start time (UTC):03:01:56
                              Start date (UTC):13/01/2025
                              Path:/tmp/m68k.elf
                              Arguments:/tmp/m68k.elf
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):03:01:56
                              Start date (UTC):13/01/2025
                              Path:/tmp/m68k.elf
                              Arguments:-
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):03:01:56
                              Start date (UTC):13/01/2025
                              Path:/tmp/m68k.elf
                              Arguments:-
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc