Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
bot.x86.elf

Overview

General Information

Sample name:bot.x86.elf
Analysis ID:1591230
MD5:73e9f8adef7a11c9ef8cb1f04e3515b8
SHA1:924b5222423513793c01beb6b76f0db91d6285f0
SHA256:c07b4d74b4a9d505d7e4f06d7ce14a0e2171491b5767091ae116848371e9a979
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Okiru
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Uses dynamic DNS services
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1591230
Start date and time:2025-01-14 20:36:10 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 48s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:bot.x86.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@20/0
Command:/tmp/bot.x86.elf
PID:5834
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • bot.x86.elf (PID: 5834, Parent: 5758, MD5: 73e9f8adef7a11c9ef8cb1f04e3515b8) Arguments: /tmp/bot.x86.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
bot.x86.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    bot.x86.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
      bot.x86.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        bot.x86.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0xf6b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf6cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf6e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf6f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf708:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf71c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf730:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf744:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf758:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf76c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf780:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf794:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf80c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf820:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf834:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf848:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        bot.x86.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
        • 0x32f0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
        Click to see the 5 entries
        SourceRuleDescriptionAuthorStrings
        5834.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
          5834.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
            5834.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              5834.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
              • 0xf6b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf6cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf6e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf6f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf708:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf71c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf730:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf744:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf758:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf76c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf780:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf794:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf80c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf820:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf834:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf848:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              5834.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
              • 0x32f0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
              Click to see the 9 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T20:37:24.727928+010020304901Malware Command and Control Activity Detected192.168.2.155538845.133.74.8943957TCP
              2025-01-14T20:37:35.370762+010020304901Malware Command and Control Activity Detected192.168.2.155539045.133.74.8943957TCP
              2025-01-14T20:37:45.006309+010020304901Malware Command and Control Activity Detected192.168.2.155539245.133.74.8943957TCP
              2025-01-14T20:37:50.546830+010020304901Malware Command and Control Activity Detected192.168.2.155539445.133.74.8943957TCP
              2025-01-14T20:37:52.099783+010020304901Malware Command and Control Activity Detected192.168.2.155539645.133.74.8943957TCP
              2025-01-14T20:37:57.734862+010020304901Malware Command and Control Activity Detected192.168.2.155539845.133.74.8943957TCP
              2025-01-14T20:38:06.278886+010020304901Malware Command and Control Activity Detected192.168.2.155540045.133.74.8943957TCP
              2025-01-14T20:38:08.824357+010020304901Malware Command and Control Activity Detected192.168.2.155540245.133.74.8943957TCP
              2025-01-14T20:38:14.377175+010020304901Malware Command and Control Activity Detected192.168.2.155540445.133.74.8943957TCP
              2025-01-14T20:38:17.956654+010020304901Malware Command and Control Activity Detected192.168.2.155540645.133.74.8943957TCP
              2025-01-14T20:38:20.512227+010020304901Malware Command and Control Activity Detected192.168.2.155540845.133.74.8943957TCP
              2025-01-14T20:38:30.057293+010020304901Malware Command and Control Activity Detected192.168.2.155541045.133.74.8943957TCP
              2025-01-14T20:38:40.700544+010020304901Malware Command and Control Activity Detected192.168.2.155541245.133.74.8943957TCP
              2025-01-14T20:38:49.239997+010020304901Malware Command and Control Activity Detected192.168.2.155541445.133.74.8943957TCP
              2025-01-14T20:38:59.781262+010020304901Malware Command and Control Activity Detected192.168.2.155541645.133.74.8943957TCP
              2025-01-14T20:39:05.426137+010020304901Malware Command and Control Activity Detected192.168.2.155541845.133.74.8943957TCP
              2025-01-14T20:39:09.071604+010020304901Malware Command and Control Activity Detected192.168.2.155542045.133.74.8943957TCP
              2025-01-14T20:39:14.673529+010020304901Malware Command and Control Activity Detected192.168.2.155542245.133.74.8943957TCP
              2025-01-14T20:39:17.228980+010020304901Malware Command and Control Activity Detected192.168.2.155542445.133.74.8943957TCP
              2025-01-14T20:39:19.788254+010020304901Malware Command and Control Activity Detected192.168.2.155542645.133.74.8943957TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: bot.x86.elfAvira: detected
              Source: bot.x86.elfReversingLabs: Detection: 63%
              Source: bot.x86.elfJoe Sandbox ML: detected
              Source: bot.x86.elfString: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55388 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55404 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55398 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55416 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55392 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55422 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55394 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55424 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55408 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55390 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55402 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55412 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55418 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55400 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55406 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55426 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55396 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55420 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55410 -> 45.133.74.89:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:55414 -> 45.133.74.89:43957
              Source: global trafficTCP traffic: 45.133.74.89 ports 43957,3,4,5,7,9
              Source: unknownDNS query: name: crystalc2.duckdns.org
              Source: global trafficTCP traffic: 192.168.2.15:55388 -> 45.133.74.89:43957
              Source: global trafficDNS traffic detected: DNS query: crystalc2.duckdns.org

              System Summary

              barindex
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: Process Memory Space: bot.x86.elf PID: 5834, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Initial sampleString containing 'busybox' found: /bin/busybox
              Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: Process Memory Space: bot.x86.elf PID: 5834, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.linELF@0/0@20/0
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/231/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/233/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/5818/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/5819/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/1333/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/1695/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/911/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/914/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/19/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/1591/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/246/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/5/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/1585/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/7/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/129/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/8/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/802/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/804/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/3407/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/1484/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/131/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/133/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/1479/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/378/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/931/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/1595/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/812/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/933/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/5835/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/3419/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/5836/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/35/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/3310/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/260/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/261/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/262/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/142/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/263/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/264/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/265/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/145/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/266/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/267/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/268/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/3303/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/269/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5836)File opened: /proc/1486/cmdlineJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5834, type: MEMORYSTR
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5834, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5834, type: MEMORYSTR
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5834.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5834, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              Valid AccountsWindows Management Instrumentation1
              Scripting
              Path InterceptionDirect Volume Access1
              OS Credential Dumping
              System Service DiscoveryRemote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive11
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              SourceDetectionScannerLabelLink
              bot.x86.elf63%ReversingLabsLinux.Backdoor.Mirai
              bot.x86.elf100%AviraEXP/ELF.Mirai.Z.A
              bot.x86.elf100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              crystalc2.duckdns.org
              45.133.74.89
              truefalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                45.133.74.89
                crystalc2.duckdns.orgGermany
                202322EVERYONE-BANDWIDTH-INCDEfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                45.133.74.89bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                  bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                    bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                      bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        crystalc2.duckdns.orgbot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        • 45.133.74.89
                        bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                        • 45.133.74.89
                        bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        • 45.133.74.89
                        bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        • 45.133.74.89
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        EVERYONE-BANDWIDTH-INCDEbot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        • 45.133.74.89
                        bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                        • 45.133.74.89
                        bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        • 45.133.74.89
                        bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        • 45.133.74.89
                        na.elfGet hashmaliciousMiraiBrowse
                        • 45.86.155.23
                        na.elfGet hashmaliciousUnknownBrowse
                        • 45.86.155.23
                        na.elfGet hashmaliciousMiraiBrowse
                        • 45.86.155.23
                        na.elfGet hashmaliciousUnknownBrowse
                        • 45.86.155.23
                        na.elfGet hashmaliciousUnknownBrowse
                        • 45.86.155.23
                        na.elfGet hashmaliciousUnknownBrowse
                        • 45.86.155.23
                        No context
                        No context
                        No created / dropped files found
                        File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):5.7150584816343315
                        TrID:
                        • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                        • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                        File name:bot.x86.elf
                        File size:89'576 bytes
                        MD5:73e9f8adef7a11c9ef8cb1f04e3515b8
                        SHA1:924b5222423513793c01beb6b76f0db91d6285f0
                        SHA256:c07b4d74b4a9d505d7e4f06d7ce14a0e2171491b5767091ae116848371e9a979
                        SHA512:9b1eac7e08b41de7f3fc24a239a69c04e9cd62ba30150c2c8a0ac476c04b04049def3640cfbec126f610f6ce67e72262874dd0cee5e76bba28cd2fbf413ae485
                        SSDEEP:1536:xpmWc2AcighsZ82fJxfcLHH1mSsM8y6Q+gBQ9TnkISGtAdR0xZ:xpmX2riED2frfsHVmL1Q1Q9kVTR0x
                        TLSH:A2936CC5F683D4F5E89304B1613AEB339B33F0B52019EA43D7799932ECA1511EA16B6C
                        File Content Preview:.ELF....................d...4...X\......4. ...(......................................................G..8...........Q.td............................U..S........$...h........[]...$.............U......= ....t..5...................u........t....h............

                        ELF header

                        Class:ELF32
                        Data:2's complement, little endian
                        Version:1 (current)
                        Machine:Intel 80386
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x8048164
                        Flags:0x0
                        ELF Header Size:52
                        Program Header Offset:52
                        Program Header Size:32
                        Number of Program Headers:3
                        Section Header Offset:89176
                        Section Header Size:40
                        Number of Section Headers:10
                        Header String Table Index:9
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x80480940x940x1c0x00x6AX001
                        .textPROGBITS0x80480b00xb00xf1360x00x6AX0016
                        .finiPROGBITS0x80571e60xf1e60x170x00x6AX001
                        .rodataPROGBITS0x80572000xf2000x22900x00x2A0032
                        .ctorsPROGBITS0x805a4940x114940xc0x00x3WA004
                        .dtorsPROGBITS0x805a4a00x114a00x80x00x3WA004
                        .dataPROGBITS0x805a4c00x114c00x47580x00x3WA0032
                        .bssNOBITS0x805ec200x15c180x49ac0x00x3WA0032
                        .shstrtabSTRTAB0x00x15c180x3e0x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x80480000x80480000x114900x114906.58870x5R E0x1000.init .text .fini .rodata
                        LOAD0x114940x805a4940x805a4940x47840x91380.36430x6RW 0x1000.ctors .dtors .data .bss
                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2025-01-14T20:37:24.727928+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155538845.133.74.8943957TCP
                        2025-01-14T20:37:35.370762+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155539045.133.74.8943957TCP
                        2025-01-14T20:37:45.006309+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155539245.133.74.8943957TCP
                        2025-01-14T20:37:50.546830+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155539445.133.74.8943957TCP
                        2025-01-14T20:37:52.099783+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155539645.133.74.8943957TCP
                        2025-01-14T20:37:57.734862+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155539845.133.74.8943957TCP
                        2025-01-14T20:38:06.278886+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155540045.133.74.8943957TCP
                        2025-01-14T20:38:08.824357+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155540245.133.74.8943957TCP
                        2025-01-14T20:38:14.377175+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155540445.133.74.8943957TCP
                        2025-01-14T20:38:17.956654+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155540645.133.74.8943957TCP
                        2025-01-14T20:38:20.512227+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155540845.133.74.8943957TCP
                        2025-01-14T20:38:30.057293+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155541045.133.74.8943957TCP
                        2025-01-14T20:38:40.700544+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155541245.133.74.8943957TCP
                        2025-01-14T20:38:49.239997+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155541445.133.74.8943957TCP
                        2025-01-14T20:38:59.781262+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155541645.133.74.8943957TCP
                        2025-01-14T20:39:05.426137+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155541845.133.74.8943957TCP
                        2025-01-14T20:39:09.071604+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155542045.133.74.8943957TCP
                        2025-01-14T20:39:14.673529+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155542245.133.74.8943957TCP
                        2025-01-14T20:39:17.228980+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155542445.133.74.8943957TCP
                        2025-01-14T20:39:19.788254+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.155542645.133.74.8943957TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 14, 2025 20:37:24.723105907 CET5538843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:24.727842093 CET439575538845.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:24.727890015 CET5538843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:24.727927923 CET5538843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:24.732701063 CET439575538845.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:25.266922951 CET439575538845.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:25.267002106 CET5538843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:25.271912098 CET439575538845.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:35.365684986 CET5539043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:35.370668888 CET439575539045.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:35.370727062 CET5539043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:35.370762110 CET5539043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:35.375649929 CET439575539045.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:35.901154041 CET439575539045.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:35.901410103 CET5539043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:35.906377077 CET439575539045.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:45.000612974 CET5539243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:45.006124973 CET439575539245.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:45.006309032 CET5539243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:45.006309032 CET5539243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:45.011365891 CET439575539245.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:45.529922962 CET439575539245.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:45.530307055 CET5539243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:45.535353899 CET439575539245.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:50.541733027 CET5539443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:50.546700001 CET439575539445.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:50.546780109 CET5539443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:50.546829939 CET5539443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:50.552706957 CET439575539445.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:51.085534096 CET439575539445.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:51.085834026 CET5539443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:51.090780973 CET439575539445.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:52.094758034 CET5539643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:52.099687099 CET439575539645.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:52.099782944 CET5539643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:52.099782944 CET5539643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:52.104736090 CET439575539645.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:52.629226923 CET439575539645.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:52.629518032 CET5539643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:52.634535074 CET439575539645.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:57.729760885 CET5539843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:57.734603882 CET439575539845.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:57.734862089 CET5539843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:57.734862089 CET5539843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:57.739713907 CET439575539845.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:58.263026953 CET439575539845.133.74.89192.168.2.15
                        Jan 14, 2025 20:37:58.263355017 CET5539843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:37:58.268589020 CET439575539845.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:06.273679018 CET5540043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:06.278691053 CET439575540045.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:06.278886080 CET5540043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:06.278886080 CET5540043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:06.283802986 CET439575540045.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:06.809222937 CET439575540045.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:06.809469938 CET5540043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:06.814412117 CET439575540045.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:08.819221020 CET5540243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:08.824244976 CET439575540245.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:08.824316025 CET5540243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:08.824357033 CET5540243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:08.829242945 CET439575540245.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:09.361947060 CET439575540245.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:09.362232924 CET5540243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:09.367185116 CET439575540245.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:14.371071100 CET5540443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:14.377057076 CET439575540445.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:14.377130032 CET5540443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:14.377175093 CET5540443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:14.382709980 CET439575540445.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:14.941592932 CET439575540445.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:14.941982031 CET5540443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:14.946939945 CET439575540445.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:17.951541901 CET5540643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:17.956501961 CET439575540645.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:17.956610918 CET5540643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:17.956654072 CET5540643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:17.961599112 CET439575540645.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:18.496646881 CET439575540645.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:18.497020960 CET5540643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:18.501981020 CET439575540645.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:20.507208109 CET5540843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:20.512088060 CET439575540845.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:20.512190104 CET5540843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:20.512227058 CET5540843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:20.517091990 CET439575540845.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:21.042881966 CET439575540845.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:21.043028116 CET5540843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:21.047916889 CET439575540845.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:30.052103996 CET5541043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:30.057176113 CET439575541045.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:30.057254076 CET5541043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:30.057292938 CET5541043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:30.062464952 CET439575541045.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:30.596189976 CET439575541045.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:30.596383095 CET5541043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:30.601205111 CET439575541045.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:40.695197105 CET5541243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:40.700460911 CET439575541245.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:40.700544119 CET5541243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:40.700544119 CET5541243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:40.705789089 CET439575541245.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:41.226474047 CET439575541245.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:41.226643085 CET5541243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:41.231535912 CET439575541245.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:49.234994888 CET5541443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:49.239898920 CET439575541445.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:49.239955902 CET5541443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:49.239996910 CET5541443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:49.244807005 CET439575541445.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:49.766938925 CET439575541445.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:49.767087936 CET5541443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:49.772017956 CET439575541445.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:59.776184082 CET5541643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:59.781096935 CET439575541645.133.74.89192.168.2.15
                        Jan 14, 2025 20:38:59.781203985 CET5541643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:59.781261921 CET5541643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:38:59.786075115 CET439575541645.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:00.319036007 CET439575541645.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:00.319363117 CET5541643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:00.324322939 CET439575541645.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:05.420247078 CET5541843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:05.425728083 CET439575541845.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:05.426096916 CET5541843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:05.426136971 CET5541843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:05.431484938 CET439575541845.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:05.966200113 CET439575541845.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:05.966830015 CET5541843957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:05.972177029 CET439575541845.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:09.066523075 CET5542043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:09.071512938 CET439575542045.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:09.071573019 CET5542043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:09.071604013 CET5542043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:09.076446056 CET439575542045.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:09.657113075 CET439575542045.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:09.657300949 CET5542043957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:09.662231922 CET439575542045.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:14.667622089 CET5542243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:14.673396111 CET439575542245.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:14.673465967 CET5542243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:14.673528910 CET5542243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:14.678379059 CET439575542245.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:15.212419033 CET439575542245.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:15.212543011 CET5542243957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:15.217535973 CET439575542245.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:17.223660946 CET5542443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:17.228785992 CET439575542445.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:17.228905916 CET5542443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:17.228980064 CET5542443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:17.233814001 CET439575542445.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:17.774198055 CET439575542445.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:17.774399042 CET5542443957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:17.779370070 CET439575542445.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:19.783164024 CET5542643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:19.788144112 CET439575542645.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:19.788216114 CET5542643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:19.788254023 CET5542643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:19.793112040 CET439575542645.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:20.340271950 CET439575542645.133.74.89192.168.2.15
                        Jan 14, 2025 20:39:20.340482950 CET5542643957192.168.2.1545.133.74.89
                        Jan 14, 2025 20:39:20.345446110 CET439575542645.133.74.89192.168.2.15
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 14, 2025 20:37:24.716737032 CET4079553192.168.2.158.8.8.8
                        Jan 14, 2025 20:37:24.723006010 CET53407958.8.8.8192.168.2.15
                        Jan 14, 2025 20:37:35.268481970 CET5511253192.168.2.158.8.8.8
                        Jan 14, 2025 20:37:35.365562916 CET53551128.8.8.8192.168.2.15
                        Jan 14, 2025 20:37:44.903337955 CET5895253192.168.2.158.8.8.8
                        Jan 14, 2025 20:37:45.000279903 CET53589528.8.8.8192.168.2.15
                        Jan 14, 2025 20:37:50.534187078 CET5304053192.168.2.158.8.8.8
                        Jan 14, 2025 20:37:50.541496038 CET53530408.8.8.8192.168.2.15
                        Jan 14, 2025 20:37:52.087220907 CET5971953192.168.2.158.8.8.8
                        Jan 14, 2025 20:37:52.094659090 CET53597198.8.8.8192.168.2.15
                        Jan 14, 2025 20:37:57.632221937 CET5128053192.168.2.158.8.8.8
                        Jan 14, 2025 20:37:57.729408026 CET53512808.8.8.8192.168.2.15
                        Jan 14, 2025 20:38:06.265815973 CET5856453192.168.2.158.8.8.8
                        Jan 14, 2025 20:38:06.273427010 CET53585648.8.8.8192.168.2.15
                        Jan 14, 2025 20:38:08.811674118 CET5148053192.168.2.158.8.8.8
                        Jan 14, 2025 20:38:08.819011927 CET53514808.8.8.8192.168.2.15
                        Jan 14, 2025 20:38:14.363720894 CET3646553192.168.2.158.8.8.8
                        Jan 14, 2025 20:38:14.370867014 CET53364658.8.8.8192.168.2.15
                        Jan 14, 2025 20:38:17.944104910 CET5923253192.168.2.158.8.8.8
                        Jan 14, 2025 20:38:17.951421022 CET53592328.8.8.8192.168.2.15
                        Jan 14, 2025 20:38:20.499516010 CET5391853192.168.2.158.8.8.8
                        Jan 14, 2025 20:38:20.507096052 CET53539188.8.8.8192.168.2.15
                        Jan 14, 2025 20:38:30.044518948 CET4168853192.168.2.158.8.8.8
                        Jan 14, 2025 20:38:30.051981926 CET53416888.8.8.8192.168.2.15
                        Jan 14, 2025 20:38:40.597631931 CET3963853192.168.2.158.8.8.8
                        Jan 14, 2025 20:38:40.694819927 CET53396388.8.8.8192.168.2.15
                        Jan 14, 2025 20:38:49.227827072 CET5153353192.168.2.158.8.8.8
                        Jan 14, 2025 20:38:49.234888077 CET53515338.8.8.8192.168.2.15
                        Jan 14, 2025 20:38:59.768842936 CET5222253192.168.2.158.8.8.8
                        Jan 14, 2025 20:38:59.776002884 CET53522228.8.8.8192.168.2.15
                        Jan 14, 2025 20:39:05.322098970 CET3573653192.168.2.158.8.8.8
                        Jan 14, 2025 20:39:05.419760942 CET53357368.8.8.8192.168.2.15
                        Jan 14, 2025 20:39:08.969317913 CET4377153192.168.2.158.8.8.8
                        Jan 14, 2025 20:39:09.066337109 CET53437718.8.8.8192.168.2.15
                        Jan 14, 2025 20:39:14.658611059 CET5016053192.168.2.158.8.8.8
                        Jan 14, 2025 20:39:14.667474031 CET53501608.8.8.8192.168.2.15
                        Jan 14, 2025 20:39:17.214061975 CET4835953192.168.2.158.8.8.8
                        Jan 14, 2025 20:39:17.223217010 CET53483598.8.8.8192.168.2.15
                        Jan 14, 2025 20:39:19.775985956 CET5224953192.168.2.158.8.8.8
                        Jan 14, 2025 20:39:19.783061981 CET53522498.8.8.8192.168.2.15
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 14, 2025 20:37:24.716737032 CET192.168.2.158.8.8.80x9697Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:37:35.268481970 CET192.168.2.158.8.8.80x58a1Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:37:44.903337955 CET192.168.2.158.8.8.80x430fStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:37:50.534187078 CET192.168.2.158.8.8.80x9caeStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:37:52.087220907 CET192.168.2.158.8.8.80x5c31Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:37:57.632221937 CET192.168.2.158.8.8.80x4208Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:06.265815973 CET192.168.2.158.8.8.80xcc15Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:08.811674118 CET192.168.2.158.8.8.80x24c3Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:14.363720894 CET192.168.2.158.8.8.80xdd3Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:17.944104910 CET192.168.2.158.8.8.80x9cd0Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:20.499516010 CET192.168.2.158.8.8.80xab32Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:30.044518948 CET192.168.2.158.8.8.80xe5dfStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:40.597631931 CET192.168.2.158.8.8.80xd712Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:49.227827072 CET192.168.2.158.8.8.80x5a52Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:59.768842936 CET192.168.2.158.8.8.80xe0c2Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:39:05.322098970 CET192.168.2.158.8.8.80xcc1dStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:39:08.969317913 CET192.168.2.158.8.8.80x2a2dStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:39:14.658611059 CET192.168.2.158.8.8.80xeebbStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:39:17.214061975 CET192.168.2.158.8.8.80x92e8Standard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        Jan 14, 2025 20:39:19.775985956 CET192.168.2.158.8.8.80x486fStandard query (0)crystalc2.duckdns.orgA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 14, 2025 20:37:24.723006010 CET8.8.8.8192.168.2.150x9697No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:37:35.365562916 CET8.8.8.8192.168.2.150x58a1No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:37:45.000279903 CET8.8.8.8192.168.2.150x430fNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:37:50.541496038 CET8.8.8.8192.168.2.150x9caeNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:37:52.094659090 CET8.8.8.8192.168.2.150x5c31No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:37:57.729408026 CET8.8.8.8192.168.2.150x4208No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:06.273427010 CET8.8.8.8192.168.2.150xcc15No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:08.819011927 CET8.8.8.8192.168.2.150x24c3No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:14.370867014 CET8.8.8.8192.168.2.150xdd3No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:17.951421022 CET8.8.8.8192.168.2.150x9cd0No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:20.507096052 CET8.8.8.8192.168.2.150xab32No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:30.051981926 CET8.8.8.8192.168.2.150xe5dfNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:40.694819927 CET8.8.8.8192.168.2.150xd712No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:49.234888077 CET8.8.8.8192.168.2.150x5a52No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:38:59.776002884 CET8.8.8.8192.168.2.150xe0c2No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:39:05.419760942 CET8.8.8.8192.168.2.150xcc1dNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:39:09.066337109 CET8.8.8.8192.168.2.150x2a2dNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:39:14.667474031 CET8.8.8.8192.168.2.150xeebbNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:39:17.223217010 CET8.8.8.8192.168.2.150x92e8No error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false
                        Jan 14, 2025 20:39:19.783061981 CET8.8.8.8192.168.2.150x486fNo error (0)crystalc2.duckdns.org45.133.74.89A (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):19:37:23
                        Start date (UTC):14/01/2025
                        Path:/tmp/bot.x86.elf
                        Arguments:/tmp/bot.x86.elf
                        File size:89576 bytes
                        MD5 hash:73e9f8adef7a11c9ef8cb1f04e3515b8

                        Start time (UTC):19:37:23
                        Start date (UTC):14/01/2025
                        Path:/tmp/bot.x86.elf
                        Arguments:-
                        File size:89576 bytes
                        MD5 hash:73e9f8adef7a11c9ef8cb1f04e3515b8

                        Start time (UTC):19:37:23
                        Start date (UTC):14/01/2025
                        Path:/tmp/bot.x86.elf
                        Arguments:-
                        File size:89576 bytes
                        MD5 hash:73e9f8adef7a11c9ef8cb1f04e3515b8