Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
bot.x86_64.elf

Overview

General Information

Sample name:bot.x86_64.elf
Analysis ID:1591223
MD5:f0b16f2bd1291806dfebe873a52cbbec
SHA1:e037e0d55c8b88ee82c627ffa95b13cfbb9c4d40
SHA256:14c2f2acb973fa38251edda7ed747ce464aed13c23baccd7f039ef193c6f0eed
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Gafgyt, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Gafgyt
Yara detected Mirai
Yara detected Okiru
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Uses dynamic DNS services
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1591223
Start date and time:2025-01-14 20:32:10 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 32s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:bot.x86_64.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@23/0
  • VT rate limit hit for: crystalc2.duckdns.org
Command:/tmp/bot.x86_64.elf
PID:6223
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
Bashlite, GafgytBashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.bashlite
SourceRuleDescriptionAuthorStrings
bot.x86_64.elfJoeSecurity_GafgytYara detected GafgytJoe Security
    bot.x86_64.elfJoeSecurity_OkiruYara detected OkiruJoe Security
      bot.x86_64.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
        bot.x86_64.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          bot.x86_64.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x163c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x163dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x163f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16404:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16418:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1642c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16440:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16454:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16468:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1647c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16490:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16508:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1651c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16530:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16544:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16558:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Click to see the 14 entries
          SourceRuleDescriptionAuthorStrings
          6223.1.0000000000400000.0000000000419000.r-x.sdmpJoeSecurity_GafgytYara detected GafgytJoe Security
            6223.1.0000000000400000.0000000000419000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
              6223.1.0000000000400000.0000000000419000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
                6223.1.0000000000400000.0000000000419000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
                  6223.1.0000000000400000.0000000000419000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
                  • 0x163c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x163dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x163f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16404:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16418:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x1642c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16440:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16454:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16468:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x1647c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16490:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16508:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x1651c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16530:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16544:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16558:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  Click to see the 18 entries
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-14T20:32:57.656668+010020304901Malware Command and Control Activity Detected192.168.2.233390045.133.74.8943957TCP
                  2025-01-14T20:33:04.293706+010020304901Malware Command and Control Activity Detected192.168.2.233390245.133.74.8943957TCP
                  2025-01-14T20:33:06.945192+010020304901Malware Command and Control Activity Detected192.168.2.233390445.133.74.8943957TCP
                  2025-01-14T20:33:13.579823+010020304901Malware Command and Control Activity Detected192.168.2.233390645.133.74.8943957TCP
                  2025-01-14T20:33:15.268475+010020304901Malware Command and Control Activity Detected192.168.2.233390845.133.74.8943957TCP
                  2025-01-14T20:33:16.814323+010020304901Malware Command and Control Activity Detected192.168.2.233391045.133.74.8943957TCP
                  2025-01-14T20:33:23.383487+010020304901Malware Command and Control Activity Detected192.168.2.233391245.133.74.8943957TCP
                  2025-01-14T20:33:28.930368+010020304901Malware Command and Control Activity Detected192.168.2.233391445.133.74.8943957TCP
                  2025-01-14T20:33:36.499800+010020304901Malware Command and Control Activity Detected192.168.2.233391645.133.74.8943957TCP
                  2025-01-14T20:33:47.151889+010020304901Malware Command and Control Activity Detected192.168.2.233391845.133.74.8943957TCP
                  2025-01-14T20:33:52.705578+010020304901Malware Command and Control Activity Detected192.168.2.233392045.133.74.8943957TCP
                  2025-01-14T20:33:57.274836+010020304901Malware Command and Control Activity Detected192.168.2.233392245.133.74.8943957TCP
                  2025-01-14T20:34:06.842095+010020304901Malware Command and Control Activity Detected192.168.2.233392445.133.74.8943957TCP
                  2025-01-14T20:34:09.410721+010020304901Malware Command and Control Activity Detected192.168.2.233392645.133.74.8943957TCP
                  2025-01-14T20:34:20.049212+010020304901Malware Command and Control Activity Detected192.168.2.233392845.133.74.8943957TCP
                  2025-01-14T20:34:21.592868+010020304901Malware Command and Control Activity Detected192.168.2.233393045.133.74.8943957TCP
                  2025-01-14T20:34:30.155006+010020304901Malware Command and Control Activity Detected192.168.2.233393245.133.74.8943957TCP
                  2025-01-14T20:34:35.810615+010020304901Malware Command and Control Activity Detected192.168.2.233393445.133.74.8943957TCP
                  2025-01-14T20:34:41.373879+010020304901Malware Command and Control Activity Detected192.168.2.233393645.133.74.8943957TCP
                  2025-01-14T20:34:42.926757+010020304901Malware Command and Control Activity Detected192.168.2.233393845.133.74.8943957TCP
                  2025-01-14T20:34:47.504291+010020304901Malware Command and Control Activity Detected192.168.2.233394045.133.74.8943957TCP
                  2025-01-14T20:34:54.064424+010020304901Malware Command and Control Activity Detected192.168.2.233394245.133.74.8943957TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: bot.x86_64.elfAvira: detected
                  Source: bot.x86_64.elfReversingLabs: Detection: 63%
                  Source: bot.x86_64.elfJoe Sandbox ML: detected
                  Source: bot.x86_64.elfString: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33922 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33920 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33926 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33918 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33940 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33910 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33936 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33930 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33906 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33938 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33912 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33932 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33908 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33916 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33902 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33934 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33942 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33924 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33928 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33914 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33900 -> 45.133.74.89:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.23:33904 -> 45.133.74.89:43957
                  Source: global trafficTCP traffic: 45.133.74.89 ports 43957,3,4,5,7,9
                  Source: unknownDNS query: name: crystalc2.duckdns.org
                  Source: global trafficTCP traffic: 192.168.2.23:33900 -> 45.133.74.89:43957
                  Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
                  Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
                  Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                  Source: global trafficDNS traffic detected: DNS query: crystalc2.duckdns.org
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

                  System Summary

                  barindex
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
                  Source: Process Memory Space: bot.x86_64.elf PID: 6223, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                  Source: Initial sampleString containing 'busybox' found: /bin/busybox
                  Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
                  Source: ELF static info symbol of initial sample.symtab present: no
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
                  Source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
                  Source: Process Memory Space: bot.x86_64.elf PID: 6223, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                  Source: classification engineClassification label: mal100.troj.linELF@0/0@23/0
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1582/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/3088/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/230/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/110/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/231/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/111/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/232/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1579/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/112/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/233/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1699/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/113/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/234/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1335/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1698/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/114/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/235/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1334/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1576/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/2302/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/115/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/236/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/116/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/237/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/117/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/118/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/910/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/119/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/912/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/10/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/2307/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/11/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/918/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/12/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/13/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/14/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/15/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/16/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/17/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/18/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1594/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/120/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/121/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1349/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/122/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/243/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/123/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/2/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/124/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/3/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/4/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/125/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/126/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1344/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1465/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1586/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/127/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/6/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/248/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/128/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/249/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1463/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/800/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/9/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/801/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/20/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/21/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1900/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/22/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/23/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/24/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/25/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/26/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/27/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/28/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/29/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/491/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/250/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/130/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/251/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/252/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/132/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/253/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/254/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/255/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/256/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1599/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/257/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1477/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/379/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/258/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1476/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/259/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1475/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/936/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/4503/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/30/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/2208/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/35/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1809/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/1494/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/260/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/261/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 6225)File opened: /proc/141/cmdlineJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 6223, type: MEMORYSTR
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 6223, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 6223, type: MEMORYSTR
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 6223.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 6223, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  Valid AccountsWindows Management Instrumentation1
                  Scripting
                  Path InterceptionDirect Volume Access1
                  OS Credential Dumping
                  System Service DiscoveryRemote ServicesData from Local System1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture12
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  No configs have been found
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Number of created Files
                  • Is malicious
                  • Internet
                  SourceDetectionScannerLabelLink
                  bot.x86_64.elf63%ReversingLabsLinux.Backdoor.Mirai
                  bot.x86_64.elf100%AviraEXP/ELF.Mirai.Z.A
                  bot.x86_64.elf100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  crystalc2.duckdns.org
                  45.133.74.89
                  truetrue
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    45.133.74.89
                    crystalc2.duckdns.orgGermany
                    202322EVERYONE-BANDWIDTH-INCDEtrue
                    109.202.202.202
                    unknownSwitzerland
                    13030INIT7CHfalse
                    91.189.91.43
                    unknownUnited Kingdom
                    41231CANONICAL-ASGBfalse
                    91.189.91.42
                    unknownUnited Kingdom
                    41231CANONICAL-ASGBfalse
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                    • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                    91.189.91.43na.elfGet hashmaliciousPrometeiBrowse
                      na.elfGet hashmaliciousPrometeiBrowse
                        bin.elfGet hashmaliciousUnknownBrowse
                          na.elfGet hashmaliciousPrometeiBrowse
                            na.elfGet hashmaliciousPrometeiBrowse
                              na.elfGet hashmaliciousPrometeiBrowse
                                Kloki.arm7.elfGet hashmaliciousUnknownBrowse
                                  debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                                    m-p.s-l.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      x-3.2-.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        91.189.91.42na.elfGet hashmaliciousPrometeiBrowse
                                          na.elfGet hashmaliciousPrometeiBrowse
                                            bin.elfGet hashmaliciousUnknownBrowse
                                              na.elfGet hashmaliciousPrometeiBrowse
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                    Kloki.arm7.elfGet hashmaliciousUnknownBrowse
                                                      debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                                                        m-p.s-l.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          x-3.2-.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                            No context
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            CANONICAL-ASGBna.elfGet hashmaliciousPrometeiBrowse
                                                            • 91.189.91.42
                                                            na.elfGet hashmaliciousPrometeiBrowse
                                                            • 91.189.91.42
                                                            bin.elfGet hashmaliciousUnknownBrowse
                                                            • 91.189.91.42
                                                            na.elfGet hashmaliciousPrometeiBrowse
                                                            • 91.189.91.42
                                                            Kloki.x86.elfGet hashmaliciousUnknownBrowse
                                                            • 185.125.190.26
                                                            na.elfGet hashmaliciousPrometeiBrowse
                                                            • 91.189.91.42
                                                            na.elfGet hashmaliciousPrometeiBrowse
                                                            • 91.189.91.42
                                                            Kloki.arm7.elfGet hashmaliciousUnknownBrowse
                                                            • 91.189.91.42
                                                            debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 91.189.91.42
                                                            m-p.s-l.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                            • 91.189.91.42
                                                            CANONICAL-ASGBna.elfGet hashmaliciousPrometeiBrowse
                                                            • 91.189.91.42
                                                            na.elfGet hashmaliciousPrometeiBrowse
                                                            • 91.189.91.42
                                                            bin.elfGet hashmaliciousUnknownBrowse
                                                            • 91.189.91.42
                                                            na.elfGet hashmaliciousPrometeiBrowse
                                                            • 91.189.91.42
                                                            Kloki.x86.elfGet hashmaliciousUnknownBrowse
                                                            • 185.125.190.26
                                                            na.elfGet hashmaliciousPrometeiBrowse
                                                            • 91.189.91.42
                                                            na.elfGet hashmaliciousPrometeiBrowse
                                                            • 91.189.91.42
                                                            Kloki.arm7.elfGet hashmaliciousUnknownBrowse
                                                            • 91.189.91.42
                                                            debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 91.189.91.42
                                                            m-p.s-l.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                            • 91.189.91.42
                                                            EVERYONE-BANDWIDTH-INCDEna.elfGet hashmaliciousMiraiBrowse
                                                            • 45.86.155.23
                                                            na.elfGet hashmaliciousUnknownBrowse
                                                            • 45.86.155.23
                                                            na.elfGet hashmaliciousMiraiBrowse
                                                            • 45.86.155.23
                                                            na.elfGet hashmaliciousUnknownBrowse
                                                            • 45.86.155.23
                                                            na.elfGet hashmaliciousUnknownBrowse
                                                            • 45.86.155.23
                                                            na.elfGet hashmaliciousUnknownBrowse
                                                            • 45.86.155.23
                                                            na.elfGet hashmaliciousUnknownBrowse
                                                            • 45.86.155.23
                                                            na.elfGet hashmaliciousUnknownBrowse
                                                            • 45.86.155.23
                                                            na.elfGet hashmaliciousMiraiBrowse
                                                            • 45.86.155.23
                                                            na.elfGet hashmaliciousUnknownBrowse
                                                            • 45.86.155.23
                                                            INIT7CHna.elfGet hashmaliciousPrometeiBrowse
                                                            • 109.202.202.202
                                                            na.elfGet hashmaliciousPrometeiBrowse
                                                            • 109.202.202.202
                                                            bin.elfGet hashmaliciousUnknownBrowse
                                                            • 109.202.202.202
                                                            na.elfGet hashmaliciousPrometeiBrowse
                                                            • 109.202.202.202
                                                            na.elfGet hashmaliciousPrometeiBrowse
                                                            • 109.202.202.202
                                                            na.elfGet hashmaliciousPrometeiBrowse
                                                            • 109.202.202.202
                                                            Kloki.arm7.elfGet hashmaliciousUnknownBrowse
                                                            • 109.202.202.202
                                                            debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 109.202.202.202
                                                            m-p.s-l.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                            • 109.202.202.202
                                                            x-3.2-.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                            • 109.202.202.202
                                                            No context
                                                            No context
                                                            No created / dropped files found
                                                            File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                                                            Entropy (8bit):5.2236099305060035
                                                            TrID:
                                                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                            File name:bot.x86_64.elf
                                                            File size:139'576 bytes
                                                            MD5:f0b16f2bd1291806dfebe873a52cbbec
                                                            SHA1:e037e0d55c8b88ee82c627ffa95b13cfbb9c4d40
                                                            SHA256:14c2f2acb973fa38251edda7ed747ce464aed13c23baccd7f039ef193c6f0eed
                                                            SHA512:4f950617872212669cf5aa41054b31e54c48f9db771c05d9875eaf214df1d4ee435103957009b2f0cd544d76bfa9db3ba40323d872d3c2b3ac6d493782296662
                                                            SSDEEP:3072:tGtwnNiaOnUTMFKPT9OSQ7AOaogjV2iZlBWCgriA1QPdL:tGtwnNiaOnUTOuLyB1QPd
                                                            TLSH:CFD33A17B5C180FDC4DAC5B44F9EF53ADD32B1AC1238B16B2BD4AA221E4AE315F1DA50
                                                            File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@...............................................Q.......Q.....x....... ...............Q.td....................................................H...._.....]..H........

                                                            ELF header

                                                            Class:ELF64
                                                            Data:2's complement, little endian
                                                            Version:1 (current)
                                                            Machine:Advanced Micro Devices X86-64
                                                            Version Number:0x1
                                                            Type:EXEC (Executable file)
                                                            OS/ABI:UNIX - System V
                                                            ABI Version:0
                                                            Entry Point Address:0x400194
                                                            Flags:0x0
                                                            ELF Header Size:64
                                                            Program Header Offset:64
                                                            Program Header Size:56
                                                            Number of Program Headers:3
                                                            Section Header Offset:138936
                                                            Section Header Size:64
                                                            Number of Section Headers:10
                                                            Header String Table Index:9
                                                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                            NULL0x00x00x00x00x0000
                                                            .initPROGBITS0x4000e80xe80x130x00x6AX001
                                                            .textPROGBITS0x4001000x1000x15dd60x00x6AX0016
                                                            .finiPROGBITS0x415ed60x15ed60xe0x00x6AX001
                                                            .rodataPROGBITS0x415f000x15f000x30c00x00x2A0032
                                                            .ctorsPROGBITS0x5190000x190000x180x00x3WA008
                                                            .dtorsPROGBITS0x5190180x190180x100x00x3WA008
                                                            .dataPROGBITS0x5190400x190400x8e380x00x3WA0032
                                                            .bssNOBITS0x521e800x21e780x72a00x00x3WA0032
                                                            .shstrtabSTRTAB0x00x21e780x3e0x00x0001
                                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                            LOAD0x00x4000000x4000000x18fc00x18fc06.39730x5R E0x100000.init .text .fini .rodata
                                                            LOAD0x190000x5190000x5190000x8e780x101200.22720x6RW 0x100000.ctors .dtors .data .bss
                                                            GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2025-01-14T20:32:57.656668+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233390045.133.74.8943957TCP
                                                            2025-01-14T20:33:04.293706+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233390245.133.74.8943957TCP
                                                            2025-01-14T20:33:06.945192+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233390445.133.74.8943957TCP
                                                            2025-01-14T20:33:13.579823+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233390645.133.74.8943957TCP
                                                            2025-01-14T20:33:15.268475+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233390845.133.74.8943957TCP
                                                            2025-01-14T20:33:16.814323+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233391045.133.74.8943957TCP
                                                            2025-01-14T20:33:23.383487+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233391245.133.74.8943957TCP
                                                            2025-01-14T20:33:28.930368+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233391445.133.74.8943957TCP
                                                            2025-01-14T20:33:36.499800+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233391645.133.74.8943957TCP
                                                            2025-01-14T20:33:47.151889+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233391845.133.74.8943957TCP
                                                            2025-01-14T20:33:52.705578+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233392045.133.74.8943957TCP
                                                            2025-01-14T20:33:57.274836+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233392245.133.74.8943957TCP
                                                            2025-01-14T20:34:06.842095+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233392445.133.74.8943957TCP
                                                            2025-01-14T20:34:09.410721+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233392645.133.74.8943957TCP
                                                            2025-01-14T20:34:20.049212+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233392845.133.74.8943957TCP
                                                            2025-01-14T20:34:21.592868+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233393045.133.74.8943957TCP
                                                            2025-01-14T20:34:30.155006+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233393245.133.74.8943957TCP
                                                            2025-01-14T20:34:35.810615+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233393445.133.74.8943957TCP
                                                            2025-01-14T20:34:41.373879+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233393645.133.74.8943957TCP
                                                            2025-01-14T20:34:42.926757+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233393845.133.74.8943957TCP
                                                            2025-01-14T20:34:47.504291+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233394045.133.74.8943957TCP
                                                            2025-01-14T20:34:54.064424+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.233394245.133.74.8943957TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 14, 2025 20:32:57.650707960 CET3390043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:32:57.655498981 CET439573390045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:32:57.655553102 CET3390043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:32:57.656667948 CET3390043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:32:57.661541939 CET439573390045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:32:58.185925007 CET439573390045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:32:58.186036110 CET3390043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:32:58.190886021 CET439573390045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:32:59.683669090 CET42836443192.168.2.2391.189.91.43
                                                            Jan 14, 2025 20:33:01.219480991 CET4251680192.168.2.23109.202.202.202
                                                            Jan 14, 2025 20:33:04.287763119 CET3390243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:04.292642117 CET439573390245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:04.292731047 CET3390243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:04.293705940 CET3390243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:04.300782919 CET439573390245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:04.832298994 CET439573390245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:04.832401991 CET3390243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:04.837201118 CET439573390245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:06.939650059 CET3390443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:06.944516897 CET439573390445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:06.944575071 CET3390443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:06.945192099 CET3390443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:06.949923992 CET439573390445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:07.472114086 CET439573390445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:07.472239017 CET3390443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:07.477221966 CET439573390445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:13.574249029 CET3390643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:13.579058886 CET439573390645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:13.579111099 CET3390643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:13.579823017 CET3390643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:13.585745096 CET439573390645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:14.162446976 CET439573390645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:14.162708998 CET3390643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:14.167538881 CET439573390645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:15.262429953 CET3390843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:15.267731905 CET439573390845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:15.267791033 CET3390843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:15.268475056 CET3390843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:15.273721933 CET439573390845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:15.799076080 CET439573390845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:15.799299002 CET3390843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:15.804120064 CET439573390845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:16.065442085 CET43928443192.168.2.2391.189.91.42
                                                            Jan 14, 2025 20:33:16.808686972 CET3391043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:16.813493013 CET439573391045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:16.813550949 CET3391043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:16.814322948 CET3391043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:16.819093943 CET439573391045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:17.367458105 CET439573391045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:17.367573023 CET3391043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:17.372425079 CET439573391045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:23.377557993 CET3391243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:23.382376909 CET439573391245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:23.382441998 CET3391243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:23.383486986 CET3391243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:23.388290882 CET439573391245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:23.914028883 CET439573391245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:23.914802074 CET3391243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:23.919677019 CET439573391245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:26.304177999 CET42836443192.168.2.2391.189.91.43
                                                            Jan 14, 2025 20:33:28.924398899 CET3391443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:28.929217100 CET439573391445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:28.929554939 CET3391443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:28.930367947 CET3391443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:28.935127020 CET439573391445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:29.483052969 CET439573391445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:29.483339071 CET3391443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:29.488240957 CET439573391445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:32.447395086 CET4251680192.168.2.23109.202.202.202
                                                            Jan 14, 2025 20:33:36.493654013 CET3391643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:36.498588085 CET439573391645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:36.498658895 CET3391643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:36.499799967 CET3391643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:36.505106926 CET439573391645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:37.044369936 CET439573391645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:37.044615030 CET3391643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:37.049479961 CET439573391645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:47.144969940 CET3391843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:47.150702000 CET439573391845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:47.150768995 CET3391843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:47.151889086 CET3391843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:47.156699896 CET439573391845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:47.689194918 CET439573391845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:47.689579964 CET3391843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:47.694489956 CET439573391845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:52.699692965 CET3392043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:52.704595089 CET439573392045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:52.704685926 CET3392043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:52.705578089 CET3392043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:52.710464954 CET439573392045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:53.258564949 CET439573392045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:53.258685112 CET3392043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:53.263503075 CET439573392045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:57.019867897 CET43928443192.168.2.2391.189.91.42
                                                            Jan 14, 2025 20:33:57.268773079 CET3392243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:57.273737907 CET439573392245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:57.273804903 CET3392243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:57.274836063 CET3392243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:57.279666901 CET439573392245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:57.826528072 CET439573392245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:33:57.826677084 CET3392243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:33:57.831584930 CET439573392245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:06.836121082 CET3392443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:06.840940952 CET439573392445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:06.841018915 CET3392443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:06.842094898 CET3392443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:06.846843958 CET439573392445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:07.393553019 CET439573392445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:07.393712044 CET3392443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:07.398556948 CET439573392445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:09.404053926 CET3392643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:09.408940077 CET439573392645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:09.409034967 CET3392643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:09.410721064 CET3392643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:09.415513992 CET439573392645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:09.938062906 CET439573392645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:09.938201904 CET3392643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:09.943538904 CET439573392645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:20.042735100 CET3392843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:20.048031092 CET439573392845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:20.048084974 CET3392843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:20.049211979 CET3392843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:20.054007053 CET439573392845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:20.575937986 CET439573392845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:20.576067924 CET3392843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:20.580955029 CET439573392845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:21.586884022 CET3393043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:21.591716051 CET439573393045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:21.591767073 CET3393043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:21.592868090 CET3393043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:21.597697973 CET439573393045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:22.138298035 CET439573393045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:22.138473034 CET3393043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:22.143399000 CET439573393045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:30.148696899 CET3393243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:30.153546095 CET439573393245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:30.153614044 CET3393243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:30.155005932 CET3393243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:30.159753084 CET439573393245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:30.702200890 CET439573393245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:30.702436924 CET3393243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:30.707237005 CET439573393245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:35.803906918 CET3393443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:35.809618950 CET439573393445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:35.809690952 CET3393443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:35.810615063 CET3393443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:35.816070080 CET439573393445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:36.356338024 CET439573393445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:36.356602907 CET3393443957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:36.361479998 CET439573393445.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:41.366935015 CET3393643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:41.371961117 CET439573393645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:41.372134924 CET3393643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:41.373878956 CET3393643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:41.378748894 CET439573393645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:41.910082102 CET439573393645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:41.910450935 CET3393643957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:41.915421963 CET439573393645.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:42.920876026 CET3393843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:42.925789118 CET439573393845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:42.925848007 CET3393843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:42.926757097 CET3393843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:42.931665897 CET439573393845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:43.486202002 CET439573393845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:43.486346960 CET3393843957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:43.491199970 CET439573393845.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:47.497955084 CET3394043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:47.503155947 CET439573394045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:47.503242016 CET3394043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:47.504291058 CET3394043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:47.509126902 CET439573394045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:48.048891068 CET439573394045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:48.049134970 CET3394043957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:48.054038048 CET439573394045.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:54.058733940 CET3394243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:54.063641071 CET439573394245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:54.063713074 CET3394243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:54.064424038 CET3394243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:54.069757938 CET439573394245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:54.652460098 CET439573394245.133.74.89192.168.2.23
                                                            Jan 14, 2025 20:34:54.652757883 CET3394243957192.168.2.2345.133.74.89
                                                            Jan 14, 2025 20:34:54.657689095 CET439573394245.133.74.89192.168.2.23
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 14, 2025 20:32:57.552086115 CET5773053192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:32:57.650183916 CET53577308.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:33:04.187455893 CET4381453192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:33:04.287273884 CET53438148.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:33:06.842763901 CET4668053192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:33:06.939148903 CET53466808.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:33:13.473442078 CET3664153192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:33:13.573520899 CET53366418.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:33:15.164414883 CET4814353192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:33:15.261940002 CET53481438.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:33:16.801248074 CET4524553192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:33:16.808207989 CET53452458.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:33:23.369574070 CET3451453192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:33:23.377022982 CET53345148.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:33:28.916681051 CET5274853192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:33:28.923578024 CET53527488.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:33:36.485308886 CET5996653192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:33:36.492994070 CET53599668.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:33:46.046497107 CET4372853192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:33:47.143910885 CET53437288.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:33:52.691833019 CET3371053192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:33:52.699104071 CET53337108.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:33:57.260929108 CET3939053192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:33:57.268218040 CET53393908.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:34:06.828860998 CET5426153192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:34:06.835469007 CET53542618.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:34:09.396348000 CET4944353192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:34:09.403527975 CET53494438.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:34:19.939968109 CET4606953192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:34:20.041841984 CET53460698.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:34:21.578975916 CET5034153192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:34:21.586277962 CET53503418.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:34:30.140861988 CET5609253192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:34:30.148087025 CET53560928.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:34:35.705708981 CET3818353192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:34:35.803239107 CET53381838.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:34:41.358580112 CET4257553192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:34:41.366383076 CET53425758.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:34:42.913049936 CET3507953192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:34:42.920325994 CET53350798.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:34:47.488488913 CET4599353192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:34:47.497306108 CET53459938.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:34:54.050956964 CET4257753192.168.2.238.8.8.8
                                                            Jan 14, 2025 20:34:54.058141947 CET53425778.8.8.8192.168.2.23
                                                            Jan 14, 2025 20:35:02.654442072 CET5881253192.168.2.238.8.8.8
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Jan 14, 2025 20:32:57.552086115 CET192.168.2.238.8.8.80xacffStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:04.187455893 CET192.168.2.238.8.8.80xebf9Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:06.842763901 CET192.168.2.238.8.8.80xb6b7Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:13.473442078 CET192.168.2.238.8.8.80x6111Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:15.164414883 CET192.168.2.238.8.8.80xaefbStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:16.801248074 CET192.168.2.238.8.8.80xeba7Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:23.369574070 CET192.168.2.238.8.8.80xa038Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:28.916681051 CET192.168.2.238.8.8.80x523cStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:36.485308886 CET192.168.2.238.8.8.80x7af3Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:46.046497107 CET192.168.2.238.8.8.80xefabStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:52.691833019 CET192.168.2.238.8.8.80xe1a6Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:57.260929108 CET192.168.2.238.8.8.80x639aStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:06.828860998 CET192.168.2.238.8.8.80x7f05Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:09.396348000 CET192.168.2.238.8.8.80xeb4cStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:19.939968109 CET192.168.2.238.8.8.80xb6fStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:21.578975916 CET192.168.2.238.8.8.80x216eStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:30.140861988 CET192.168.2.238.8.8.80x9536Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:35.705708981 CET192.168.2.238.8.8.80xa8a0Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:41.358580112 CET192.168.2.238.8.8.80x5d9aStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:42.913049936 CET192.168.2.238.8.8.80x4068Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:47.488488913 CET192.168.2.238.8.8.80x77b3Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:54.050956964 CET192.168.2.238.8.8.80x1612Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:35:02.654442072 CET192.168.2.238.8.8.80x63adStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Jan 14, 2025 20:32:57.650183916 CET8.8.8.8192.168.2.230xacffNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:04.287273884 CET8.8.8.8192.168.2.230xebf9No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:06.939148903 CET8.8.8.8192.168.2.230xb6b7No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:13.573520899 CET8.8.8.8192.168.2.230x6111No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:15.261940002 CET8.8.8.8192.168.2.230xaefbNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:16.808207989 CET8.8.8.8192.168.2.230xeba7No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:23.377022982 CET8.8.8.8192.168.2.230xa038No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:28.923578024 CET8.8.8.8192.168.2.230x523cNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:36.492994070 CET8.8.8.8192.168.2.230x7af3No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:47.143910885 CET8.8.8.8192.168.2.230xefabNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:52.699104071 CET8.8.8.8192.168.2.230xe1a6No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:33:57.268218040 CET8.8.8.8192.168.2.230x639aNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:06.835469007 CET8.8.8.8192.168.2.230x7f05No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:09.403527975 CET8.8.8.8192.168.2.230xeb4cNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:20.041841984 CET8.8.8.8192.168.2.230xb6fNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:21.586277962 CET8.8.8.8192.168.2.230x216eNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:30.148087025 CET8.8.8.8192.168.2.230x9536No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:35.803239107 CET8.8.8.8192.168.2.230xa8a0No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:41.366383076 CET8.8.8.8192.168.2.230x5d9aNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:42.920325994 CET8.8.8.8192.168.2.230x4068No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:47.497306108 CET8.8.8.8192.168.2.230x77b3No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                                                            Jan 14, 2025 20:34:54.058141947 CET8.8.8.8192.168.2.230x1612No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false

                                                            System Behavior

                                                            Start time (UTC):19:32:56
                                                            Start date (UTC):14/01/2025
                                                            Path:/tmp/bot.x86_64.elf
                                                            Arguments:/tmp/bot.x86_64.elf
                                                            File size:139576 bytes
                                                            MD5 hash:f0b16f2bd1291806dfebe873a52cbbec

                                                            Start time (UTC):19:32:56
                                                            Start date (UTC):14/01/2025
                                                            Path:/tmp/bot.x86_64.elf
                                                            Arguments:-
                                                            File size:139576 bytes
                                                            MD5 hash:f0b16f2bd1291806dfebe873a52cbbec

                                                            Start time (UTC):19:32:56
                                                            Start date (UTC):14/01/2025
                                                            Path:/tmp/bot.x86_64.elf
                                                            Arguments:-
                                                            File size:139576 bytes
                                                            MD5 hash:f0b16f2bd1291806dfebe873a52cbbec