Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
spc.elf

Overview

General Information

Sample name:spc.elf
Analysis ID:1590737
MD5:3b444aa740a349cce77c4e961e45fad6
SHA1:8ce2d1638105a1b5fa1e0cb90b4be3cf8d463469
SHA256:03ca920007385b5b86b0104cb9b4b0229a49a2863dfdfd79e596dfdaabf717ed
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1590737
Start date and time:2025-01-14 14:42:34 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 34s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:spc.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@1/0
  • VT rate limit hit for: bot.tianyadd.top
Command:/tmp/spc.elf
PID:5510
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • spc.elf (PID: 5510, Parent: 5425, MD5: 7dc1c0e23cd5e102bb12e5c29403410e) Arguments: /tmp/spc.elf
    • spc.elf New Fork (PID: 5512, Parent: 5510)
      • spc.elf New Fork (PID: 5514, Parent: 5512)
      • spc.elf New Fork (PID: 5515, Parent: 5512)
        • spc.elf New Fork (PID: 5518, Parent: 5515)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
spc.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    spc.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      spc.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xcad8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcaec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb00:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb14:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb28:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb3c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb50:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb64:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb78:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcb8c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcba0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcbb4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcbc8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcbdc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcbf0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcc68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      5510.1.00007fb22c011000.00007fb22c020000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5510.1.00007fb22c011000.00007fb22c020000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5510.1.00007fb22c011000.00007fb22c020000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xcad8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcaec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcb00:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcb14:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcb28:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcb3c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcb50:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcb64:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcb78:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcb8c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcba0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcbb4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcbc8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcbdc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcbf0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcc04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcc18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcc2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcc40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcc54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcc68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Process Memory Space: spc.elf PID: 5510JoeSecurity_MoobotYara detected MoobotJoe Security
            Process Memory Space: spc.elf PID: 5510JoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Click to see the 1 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T14:43:29.267923+010020304911Malware Command and Control Activity Detected192.168.2.1438206107.189.3.21430242TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T14:43:29.796560+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1438206TCP
              2025-01-14T14:43:48.356059+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1438206TCP
              2025-01-14T14:44:08.316429+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1438206TCP
              2025-01-14T14:44:28.319655+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1438206TCP
              2025-01-14T14:44:48.321909+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1438206TCP
              2025-01-14T14:45:08.324698+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1438206TCP
              2025-01-14T14:45:28.327368+010020304891Malware Command and Control Activity Detected107.189.3.21430242192.168.2.1438206TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: spc.elfAvira: detected
              Source: spc.elfReversingLabs: Detection: 60%
              Source: spc.elfVirustotal: Detection: 60%Perma Link

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:38206 -> 107.189.3.214:30242
              Source: Network trafficSuricata IDS: 2030489 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response : 107.189.3.214:30242 -> 192.168.2.14:38206
              Source: global trafficTCP traffic: 192.168.2.14:38206 -> 107.189.3.214:30242
              Source: global trafficDNS traffic detected: DNS query: bot.tianyadd.top

              System Summary

              barindex
              Source: spc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5510.1.00007fb22c011000.00007fb22c020000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: spc.elf PID: 5510, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: spc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5510.1.00007fb22c011000.00007fb22c020000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: spc.elf PID: 5510, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@1/0
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/1583/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/2672/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/234/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/1577/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/19/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/1593/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/240/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/3094/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/242/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/3406/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/244/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/1589/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/245/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/246/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/3402/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/5/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/247/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/248/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/7/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/249/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/8/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/129/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/801/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/806/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/807/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/928/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/3420/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/131/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/252/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/253/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/254/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/255/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/135/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/256/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/1599/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/257/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/378/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/3412/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/35/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/1371/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/260/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/261/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/262/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/142/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/263/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/264/cmdlineJump to behavior
              Source: /tmp/spc.elf (PID: 5514)File opened: /proc/265/cmdlineJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: /tmp/spc.elf (PID: 5510)File: /tmp/spc.elfJump to behavior
              Source: /tmp/spc.elf (PID: 5510)Queries kernel information via 'uname': Jump to behavior
              Source: spc.elf, 5510.1.000055d376667000.000055d3766ec000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sparc
              Source: spc.elf, 5510.1.000055d376667000.000055d3766ec000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/sparc
              Source: spc.elf, 5510.1.00007fff2b981000.00007fff2b9a2000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc
              Source: spc.elf, 5510.1.00007fff2b981000.00007fff2b9a2000.rw-.sdmpBinary or memory string: Dx86_64/usr/bin/qemu-sparc/tmp/spc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/spc.elf

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: spc.elf, type: SAMPLE
              Source: Yara matchFile source: 5510.1.00007fb22c011000.00007fb22c020000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: spc.elf PID: 5510, type: MEMORYSTR
              Source: Yara matchFile source: spc.elf, type: SAMPLE
              Source: Yara matchFile source: 5510.1.00007fb22c011000.00007fb22c020000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: spc.elf PID: 5510, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response
              Source: Yara matchFile source: spc.elf, type: SAMPLE
              Source: Yara matchFile source: 5510.1.00007fb22c011000.00007fb22c020000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: spc.elf PID: 5510, type: MEMORYSTR
              Source: Yara matchFile source: spc.elf, type: SAMPLE
              Source: Yara matchFile source: 5510.1.00007fb22c011000.00007fb22c020000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: spc.elf PID: 5510, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
              File Deletion
              1
              OS Credential Dumping
              11
              Security Software Discovery
              Remote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590737 Sample: spc.elf Startdate: 14/01/2025 Architecture: LINUX Score: 100 20 bot.tianyadd.top 107.189.3.214, 30242, 38206 PONYNETUS United States 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 4 other signatures 2->28 9 spc.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 spc.elf 9->12         started        process6 process7 14 spc.elf 12->14         started        16 spc.elf 12->16         started        process8 18 spc.elf 14->18         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              spc.elf61%ReversingLabsLinux.Trojan.Mirai
              spc.elf100%AviraEXP/ELF.Mirai.Z.A
              spc.elf60%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              bot.tianyadd.top
              107.189.3.214
              truetrue
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                107.189.3.214
                bot.tianyadd.topUnited States
                53667PONYNETUStrue
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                107.189.3.214mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  bot.tianyadd.topmpsl.elfGet hashmaliciousMirai, MoobotBrowse
                  • 107.189.3.214
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  PONYNETUSmpsl.elfGet hashmaliciousMirai, MoobotBrowse
                  • 107.189.3.214
                  https://clients.dedicatedservicesusa.comGet hashmaliciousUnknownBrowse
                  • 198.98.59.241
                  m68k.elfGet hashmaliciousMirai, MoobotBrowse
                  • 107.189.4.201
                  ppc.elfGet hashmaliciousMirai, MoobotBrowse
                  • 107.189.4.201
                  spc.elfGet hashmaliciousMirai, MoobotBrowse
                  • 107.189.4.201
                  sh4.elfGet hashmaliciousMirai, MoobotBrowse
                  • 107.189.4.201
                  uShK30bvrV.exeGet hashmaliciousRemcosBrowse
                  • 172.86.115.221
                  miori.spc.elfGet hashmaliciousUnknownBrowse
                  • 107.189.6.73
                  cZO.exeGet hashmaliciousUnknownBrowse
                  • 107.189.28.6
                  file.exeGet hashmaliciousUnknownBrowse
                  • 205.185.126.56
                  No context
                  No context
                  No created / dropped files found
                  File type:ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, stripped
                  Entropy (8bit):6.154318706551363
                  TrID:
                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                  File name:spc.elf
                  File size:59'872 bytes
                  MD5:3b444aa740a349cce77c4e961e45fad6
                  SHA1:8ce2d1638105a1b5fa1e0cb90b4be3cf8d463469
                  SHA256:03ca920007385b5b86b0104cb9b4b0229a49a2863dfdfd79e596dfdaabf717ed
                  SHA512:cbcb3afebf6837c76dbedc11d6ae1035253f0125faa053011a92afb368f208eed92eab7c342d164596cf565cc543ba47c3222a1139d98cf8f529fbb560905bc9
                  SSDEEP:1536:/fPucFQm4/g1We/ubYYqIQpu75nta1Ngw:fucSnauVaNgw
                  TLSH:15433B31BA760E27C0D1A8B621EB4B24B6F547DE26E8CA0B3D710D9EBF715402553AF4
                  File Content Preview:.ELF...........................4...P.....4. ...(.......................................................l..%L........dt.Q................................@..(....@.2:................#.....`...`.....!..... ...@.....".........`......$ ... ...@...........`....

                  ELF header

                  Class:ELF32
                  Data:2's complement, big endian
                  Version:1 (current)
                  Machine:Sparc
                  Version Number:0x1
                  Type:EXEC (Executable file)
                  OS/ABI:UNIX - System V
                  ABI Version:0
                  Entry Point Address:0x101a4
                  Flags:0x0
                  ELF Header Size:52
                  Program Header Offset:52
                  Program Header Size:32
                  Number of Program Headers:3
                  Section Header Offset:59472
                  Section Header Size:40
                  Number of Section Headers:10
                  Header String Table Index:9
                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                  NULL0x00x00x00x00x0000
                  .initPROGBITS0x100940x940x1c0x00x6AX004
                  .textPROGBITS0x100b00xb00xc9200x00x6AX004
                  .finiPROGBITS0x1c9d00xc9d00x140x00x6AX004
                  .rodataPROGBITS0x1c9e80xc9e80x1ab80x00x2A008
                  .ctorsPROGBITS0x2e4a40xe4a40x80x00x3WA004
                  .dtorsPROGBITS0x2e4ac0xe4ac0x80x00x3WA004
                  .dataPROGBITS0x2e4b80xe4b80x3580x00x3WA008
                  .bssNOBITS0x2e8100xe8100x21e00x00x3WA008
                  .shstrtabSTRTAB0x00xe8100x3e0x00x0001
                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                  LOAD0x00x100000x100000xe4a00xe4a06.19550x5R E0x10000.init .text .fini .rodata
                  LOAD0xe4a40x2e4a40x2e4a40x36c0x254c2.65320x6RW 0x10000.ctors .dtors .data .bss
                  GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2025-01-14T14:43:29.267923+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1438206107.189.3.21430242TCP
                  2025-01-14T14:43:29.796560+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1438206TCP
                  2025-01-14T14:43:48.356059+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1438206TCP
                  2025-01-14T14:44:08.316429+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1438206TCP
                  2025-01-14T14:44:28.319655+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1438206TCP
                  2025-01-14T14:44:48.321909+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1438206TCP
                  2025-01-14T14:45:08.324698+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1438206TCP
                  2025-01-14T14:45:28.327368+01002030489ET MALWARE ELF/MooBot Mirai DDoS Variant Server Response1107.189.3.21430242192.168.2.1438206TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 14, 2025 14:43:29.258341074 CET3820630242192.168.2.14107.189.3.214
                  Jan 14, 2025 14:43:29.263228893 CET3024238206107.189.3.214192.168.2.14
                  Jan 14, 2025 14:43:29.263339043 CET3820630242192.168.2.14107.189.3.214
                  Jan 14, 2025 14:43:29.267923117 CET3820630242192.168.2.14107.189.3.214
                  Jan 14, 2025 14:43:29.272737026 CET3024238206107.189.3.214192.168.2.14
                  Jan 14, 2025 14:43:29.796560049 CET3024238206107.189.3.214192.168.2.14
                  Jan 14, 2025 14:43:29.796892881 CET3820630242192.168.2.14107.189.3.214
                  Jan 14, 2025 14:43:39.806062937 CET3820630242192.168.2.14107.189.3.214
                  Jan 14, 2025 14:43:39.810921907 CET3024238206107.189.3.214192.168.2.14
                  Jan 14, 2025 14:43:48.356059074 CET3024238206107.189.3.214192.168.2.14
                  Jan 14, 2025 14:43:48.356148005 CET3820630242192.168.2.14107.189.3.214
                  Jan 14, 2025 14:44:08.316428900 CET3024238206107.189.3.214192.168.2.14
                  Jan 14, 2025 14:44:08.316540956 CET3820630242192.168.2.14107.189.3.214
                  Jan 14, 2025 14:44:28.319654942 CET3024238206107.189.3.214192.168.2.14
                  Jan 14, 2025 14:44:28.319824934 CET3820630242192.168.2.14107.189.3.214
                  Jan 14, 2025 14:44:48.321908951 CET3024238206107.189.3.214192.168.2.14
                  Jan 14, 2025 14:44:48.322014093 CET3820630242192.168.2.14107.189.3.214
                  Jan 14, 2025 14:45:08.324697971 CET3024238206107.189.3.214192.168.2.14
                  Jan 14, 2025 14:45:08.324821949 CET3820630242192.168.2.14107.189.3.214
                  Jan 14, 2025 14:45:28.327368021 CET3024238206107.189.3.214192.168.2.14
                  Jan 14, 2025 14:45:28.327469110 CET3820630242192.168.2.14107.189.3.214
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 14, 2025 14:43:28.983654976 CET5641553192.168.2.148.8.8.8
                  Jan 14, 2025 14:43:29.254904985 CET53564158.8.8.8192.168.2.14
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Jan 14, 2025 14:43:28.983654976 CET192.168.2.148.8.8.80x4780Standard query (0)bot.tianyadd.topA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jan 14, 2025 14:43:29.254904985 CET8.8.8.8192.168.2.140x4780No error (0)bot.tianyadd.top107.189.3.214A (IP address)IN (0x0001)false

                  System Behavior

                  Start time (UTC):13:43:28
                  Start date (UTC):14/01/2025
                  Path:/tmp/spc.elf
                  Arguments:/tmp/spc.elf
                  File size:4379400 bytes
                  MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                  Start time (UTC):13:43:28
                  Start date (UTC):14/01/2025
                  Path:/tmp/spc.elf
                  Arguments:-
                  File size:4379400 bytes
                  MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                  Start time (UTC):13:43:28
                  Start date (UTC):14/01/2025
                  Path:/tmp/spc.elf
                  Arguments:-
                  File size:4379400 bytes
                  MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                  Start time (UTC):13:43:28
                  Start date (UTC):14/01/2025
                  Path:/tmp/spc.elf
                  Arguments:-
                  File size:4379400 bytes
                  MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                  Start time (UTC):13:43:28
                  Start date (UTC):14/01/2025
                  Path:/tmp/spc.elf
                  Arguments:-
                  File size:4379400 bytes
                  MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e