Edit tour

Linux Analysis Report
sh4.elf

Overview

General Information

Sample name:sh4.elf
Analysis ID:1639658
MD5:7718f18d8417b9f213afd87c8fd418cf
SHA1:2d26cfcac54506d1e5f09eda45cffc1ae08a8e07
SHA256:ed66bb93360caf94b42a019007d34b8cdd688799452b82587bff68e44c9c8a0f
Tags:elfuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Uses STUN server to do NAT traversial
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1639658
Start date and time:2025-03-16 02:28:12 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:sh4.elf
Detection:MAL
Classification:mal56.troj.linELF@0/2@1/0
Command:/tmp/sh4.elf
PID:6275
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world
Standard Error:
  • system is lnxubuntu20
  • sh4.elf (PID: 6275, Parent: 6197, MD5: 8943e5f8f8c280467b4472c15ae93ba9) Arguments: /tmp/sh4.elf
    • sh4.elf New Fork (PID: 6277, Parent: 6275)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: sh4.elfVirustotal: Detection: 9%Perma Link

Networking

barindex
Source: global trafficTCP traffic: 156.244.14.93 ports 41763,1,3,4,6,7
Source: unknownDNS query: name: stun.l.google.com
Source: global trafficTCP traffic: 192.168.2.23:45744 -> 156.244.14.93:41763
Source: global trafficUDP traffic: 192.168.2.23:48128 -> 74.125.250.129:19302
Source: /tmp/sh4.elf (PID: 6277)Socket: 127.0.0.1:22448Jump to behavior
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: unknownTCP traffic detected without corresponding DNS query: 156.244.14.93
Source: global trafficDNS traffic detected: DNS query: stun.l.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal56.troj.linELF@0/2@1/0
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/3088/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/2302/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/910/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/6229/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/6107/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/2307/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1594/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1349/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1344/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1465/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1586/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1463/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/5940/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1900/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/491/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1477/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/379/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1476/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1475/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/936/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/2208/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1809/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/1494/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6275)Queries kernel information via 'uname': Jump to behavior
Source: sh4.elf, 6275.1.00007ffcc4d7c000.00007ffcc4d9d000.rw-.sdmpBinary or memory string: /tmp/qemu-open.I7nc5F
Source: sh4.elf, 6275.1.00007f708c421000.00007f708c427000.rw-.sdmpBinary or memory string: vmware
Source: sh4.elf, 6275.1.00007f708c421000.00007f708c427000.rw-.sdmpBinary or memory string: qemu-arm
Source: sh4.elf, 6275.1.00007ffcc4d7c000.00007ffcc4d9d000.rw-.sdmpBinary or memory string: /qemu-open.XXXXX
Source: sh4.elf, 6275.1.00007ffcc4d7c000.00007ffcc4d9d000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
Source: sh4.elf, 6275.1.00007ffcc4d7c000.00007ffcc4d9d000.rw-.sdmpBinary or memory string: bU/tmp/qemu-open.I7nc5F\4
Source: sh4.elf, 6275.1.000055620b20b000.000055620b2b4000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4
Source: sh4.elf, 6275.1.000055620b20b000.000055620b2b4000.rw-.sdmpBinary or memory string: bU5!/etc/qemu-binfmt/sh4
Source: sh4.elf, 6275.1.00007ffcc4d7c000.00007ffcc4d9d000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sh4/tmp/sh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sh4.elf
Source: sh4.elf, 6275.1.00007f708c421000.00007f708c427000.rw-.sdmpBinary or memory string: 1Zm6vnZ5U4mf8vApyWcDwXR44ZAkzslsN1!a1gCWFxqAHsFWFMWRHVDR44!!a1gCWFxqAHsFWFMWT3YAKB!!a1gAWFxuAXsFWUgBRQAA!!a1gAWFxuAXsAWUgKRXgA!!a1gAWFxuAXsAWEgJR3IA!!a10CWFxuAHsGWVcWQHAA!!a10CWFxuAHsGWVcWQHUA!!aFwAWF9uA3sGW0gLRgAA!!aFwAWFlpG2QBW0gJTwAA!!qemu-arm2QBW0gJTwAA!
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1639658 Sample: sh4.elf Startdate: 16/03/2025 Architecture: LINUX Score: 56 11 stun.l.google.com 2->11 13 156.244.14.93, 41763, 45744 POWERLINE-AS-APPOWERLINEDATACENTERHK Seychelles 2->13 15 4 other IPs or domains 2->15 17 Multi AV Scanner detection for submitted file 2->17 19 Connects to many ports of the same IP (likely port scanning) 2->19 7 sh4.elf 2->7         started        signatures3 21 Uses STUN server to do NAT traversial 11->21 process4 process5 9 sh4.elf 7->9         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
sh4.elf9%VirustotalBrowse
sh4.elf11%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
stun.l.google.com
74.125.250.129
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    156.244.14.93
    unknownSeychelles
    132839POWERLINE-AS-APPOWERLINEDATACENTERHKtrue
    109.202.202.202
    unknownSwitzerland
    13030INIT7CHfalse
    74.125.250.129
    stun.l.google.comUnited States
    15169GOOGLEUSfalse
    91.189.91.43
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    91.189.91.42
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    156.244.14.93nimips.elfGet hashmaliciousUnknownBrowse
      arm6.elfGet hashmaliciousUnknownBrowse
        109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
        • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
        91.189.91.43miner.elfGet hashmaliciousUnknownBrowse
          na.elfGet hashmaliciousPrometeiBrowse
            na.elfGet hashmaliciousPrometeiBrowse
              na.elfGet hashmaliciousPrometeiBrowse
                na.elfGet hashmaliciousPrometeiBrowse
                  na.elfGet hashmaliciousPrometeiBrowse
                    .i.elfGet hashmaliciousUnknownBrowse
                      na.elfGet hashmaliciousPrometeiBrowse
                        na.elfGet hashmaliciousPrometeiBrowse
                          kJ38gx2ru9Get hashmaliciousUnknownBrowse
                            91.189.91.42sshd.elfGet hashmaliciousUnknownBrowse
                              na.elfGet hashmaliciousPrometeiBrowse
                                .i.elfGet hashmaliciousUnknownBrowse
                                  miner.elfGet hashmaliciousUnknownBrowse
                                    na.elfGet hashmaliciousPrometeiBrowse
                                      na.elfGet hashmaliciousPrometeiBrowse
                                        na.elfGet hashmaliciousPrometeiBrowse
                                          na.elfGet hashmaliciousPrometeiBrowse
                                            na.elfGet hashmaliciousPrometeiBrowse
                                              na.elfGet hashmaliciousPrometeiBrowse
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                POWERLINE-AS-APPOWERLINEDATACENTERHKppc.elfGet hashmaliciousUnknownBrowse
                                                • 156.244.45.113
                                                arm.elfGet hashmaliciousUnknownBrowse
                                                • 156.244.45.113
                                                KKveTTgaAAsecNNaaaa.x86.elfGet hashmaliciousUnknownBrowse
                                                • 147.78.152.244
                                                boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                • 156.253.227.112
                                                boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                • 156.253.227.112
                                                boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                                • 156.253.227.112
                                                boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                • 156.253.227.112
                                                boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                • 156.253.227.112
                                                boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                                • 156.253.227.112
                                                boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                                • 156.253.227.112
                                                CANONICAL-ASGBsshd.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                .i.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                miner.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 185.125.190.26
                                                CANONICAL-ASGBsshd.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                .i.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                miner.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 185.125.190.26
                                                INIT7CHsshd.elfGet hashmaliciousUnknownBrowse
                                                • 109.202.202.202
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 109.202.202.202
                                                .i.elfGet hashmaliciousUnknownBrowse
                                                • 109.202.202.202
                                                miner.elfGet hashmaliciousUnknownBrowse
                                                • 109.202.202.202
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 109.202.202.202
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 109.202.202.202
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 109.202.202.202
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 109.202.202.202
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 109.202.202.202
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 109.202.202.202
                                                No context
                                                No context
                                                Process:/tmp/sh4.elf
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):13
                                                Entropy (8bit):3.5465935642949384
                                                Encrypted:false
                                                SSDEEP:3:TgKYn:TgKYn
                                                MD5:AEF4020327A62D78F5A8202D453B0A74
                                                SHA1:84FC7A7CBE0B4EF5BDB927B95EA1BD01665BE8B1
                                                SHA-256:1878DDF74B755A998CBFD2140779771966ADF507D2B95CA86906476BFD80575B
                                                SHA-512:0E1BF58363F746F19B92730E15E2091F05A2C87B120B004F3819735F4D60268E66711EBEB06E3B771B2DE327FCBB3DDD368241E7A6E1A1B759384F6D70A2C528
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:/tmp/sh4.elf.
                                                Process:/tmp/sh4.elf
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):13
                                                Entropy (8bit):3.5465935642949384
                                                Encrypted:false
                                                SSDEEP:3:TgKYn:TgKYn
                                                MD5:AEF4020327A62D78F5A8202D453B0A74
                                                SHA1:84FC7A7CBE0B4EF5BDB927B95EA1BD01665BE8B1
                                                SHA-256:1878DDF74B755A998CBFD2140779771966ADF507D2B95CA86906476BFD80575B
                                                SHA-512:0E1BF58363F746F19B92730E15E2091F05A2C87B120B004F3819735F4D60268E66711EBEB06E3B771B2DE327FCBB3DDD368241E7A6E1A1B759384F6D70A2C528
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:/tmp/sh4.elf.
                                                File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
                                                Entropy (8bit):6.942865268788372
                                                TrID:
                                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                File name:sh4.elf
                                                File size:68'416 bytes
                                                MD5:7718f18d8417b9f213afd87c8fd418cf
                                                SHA1:2d26cfcac54506d1e5f09eda45cffc1ae08a8e07
                                                SHA256:ed66bb93360caf94b42a019007d34b8cdd688799452b82587bff68e44c9c8a0f
                                                SHA512:8cc39f621db061ea1e8b091b8519850f43e5a7702e1e3f4980dc9dfb1f588e103d1c74fd1fdbc27375d3a8fce2623948260348d0d3a2e0bc33e778e586ead562
                                                SSDEEP:768:cWfuiDRnmleJNEkIgwseEHjfmQjnWdCXoQH4v9YacquvBrpqKBNyZeVj/IErg:J2lpkIgwseEpjnRXLHxT+UVDrg
                                                TLSH:CC638D32F8642DA4C82559F9F0F0C97D03126DF284D62DB5ADEFE22454A7E8CF58A760
                                                File Content Preview:.ELF..............*.......@.4...........4. ...(...............@...@...........................B...B......F..........Q.td..............................././"O.n......#.*@........#.*@....&O.n.l..................................././.../.a"O.!...n...a.b("...q.

                                                ELF header

                                                Class:ELF32
                                                Data:2's complement, little endian
                                                Version:1 (current)
                                                Machine:<unknown>
                                                Version Number:0x1
                                                Type:EXEC (Executable file)
                                                OS/ABI:UNIX - System V
                                                ABI Version:0
                                                Entry Point Address:0x4001a0
                                                Flags:0xc
                                                ELF Header Size:52
                                                Program Header Offset:52
                                                Program Header Size:32
                                                Number of Program Headers:3
                                                Section Header Offset:68016
                                                Section Header Size:40
                                                Number of Section Headers:10
                                                Header String Table Index:9
                                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                NULL0x00x00x00x00x0000
                                                .initPROGBITS0x4000940x940x2e0x00x6AX004
                                                .textPROGBITS0x4000e00xe00xf2c00x00x6AX0032
                                                .finiPROGBITS0x40f3a00xf3a00x220x00x6AX004
                                                .rodataPROGBITS0x40f3c40xf3c40x142c0x00x2A004
                                                .ctorsPROGBITS0x4208cc0x108cc0x80x00x3WA004
                                                .dtorsPROGBITS0x4208d40x108d40x80x00x3WA004
                                                .dataPROGBITS0x4208e00x108e00x900x00x3WA004
                                                .bssNOBITS0x4209700x109700x46540x00x3WA004
                                                .shstrtabSTRTAB0x00x109700x3e0x00x0001
                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                LOAD0x00x4000000x4000000x107f00x107f06.97420x5R E0x10000.init .text .fini .rodata
                                                LOAD0x108cc0x4208cc0x4208cc0xa40x46f84.17990x6RW 0x10000.ctors .dtors .data .bss
                                                GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

                                                Download Network PCAP: filteredfull

                                                • Total Packets: 26
                                                • 41763 undefined
                                                • 19302 undefined
                                                • 443 (HTTPS)
                                                • 80 (HTTP)
                                                • 53 (DNS)
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 16, 2025 02:29:21.229377031 CET43928443192.168.2.2391.189.91.42
                                                Mar 16, 2025 02:29:22.486701965 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:29:22.491487980 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:29:22.491540909 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:29:23.073647976 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:29:23.073890924 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:29:23.166076899 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:29:23.166203976 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:29:26.604682922 CET42836443192.168.2.2391.189.91.43
                                                Mar 16, 2025 02:29:27.330312014 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:29:27.335441113 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:29:41.962666988 CET43928443192.168.2.2391.189.91.42
                                                Mar 16, 2025 02:29:42.343678951 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:29:42.348426104 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:29:42.348510027 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:29:42.353221893 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:29:44.010377884 CET4251680192.168.2.23109.202.202.202
                                                Mar 16, 2025 02:29:52.201364040 CET42836443192.168.2.2391.189.91.43
                                                Mar 16, 2025 02:29:58.432559967 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:29:58.432926893 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:30:13.446422100 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:30:13.451159000 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:30:13.451215029 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:30:13.455903053 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:30:22.917052031 CET43928443192.168.2.2391.189.91.42
                                                Mar 16, 2025 02:30:33.461149931 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:30:33.465958118 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:30:33.466038942 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:30:33.470993996 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:30:43.394370079 CET42836443192.168.2.2391.189.91.43
                                                Mar 16, 2025 02:30:51.347536087 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:30:51.352400064 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:30:51.352488041 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:30:51.357212067 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:31:10.030941963 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:31:10.036006927 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:31:10.036087990 CET4574441763192.168.2.23156.244.14.93
                                                Mar 16, 2025 02:31:10.040719986 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:31:27.285171986 CET4176345744156.244.14.93192.168.2.23
                                                Mar 16, 2025 02:31:27.285310030 CET4574441763192.168.2.23156.244.14.93
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 16, 2025 02:29:23.496898890 CET5173753192.168.2.238.8.8.8
                                                Mar 16, 2025 02:29:23.504101038 CET53517378.8.8.8192.168.2.23
                                                Mar 16, 2025 02:29:23.504934072 CET4812819302192.168.2.2374.125.250.129
                                                Mar 16, 2025 02:29:23.968151093 CET193024812874.125.250.129192.168.2.23
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Mar 16, 2025 02:29:23.496898890 CET192.168.2.238.8.8.80xdc59Standard query (0)stun.l.google.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Mar 16, 2025 02:29:23.504101038 CET8.8.8.8192.168.2.230xdc59No error (0)stun.l.google.com74.125.250.129A (IP address)IN (0x0001)false

                                                System Behavior

                                                Start time (UTC):01:29:21
                                                Start date (UTC):16/03/2025
                                                Path:/tmp/sh4.elf
                                                Arguments:-
                                                File size:4139976 bytes
                                                MD5 hash:8943e5f8f8c280467b4472c15ae93ba9