Edit tour

Linux Analysis Report
arm7.elf

Overview

General Information

Sample name:arm7.elf
Analysis ID:1639694
MD5:e061c2dde46bbe5b627793a3ee3a49bd
SHA1:b0921d19dc5badadb2eb0a80f737499960605100
SHA256:33ae7c06d2ccdbbf309516bfe334acf1780314acc57719a88f41f82da24decba
Tags:elfMiraiuser-abuse_ch
Infos:

Detection

Mirai
Score:60
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample reads /proc/mounts (often used for finding a writable filesystem)
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1639694
Start date and time:2025-03-16 02:52:49 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 37s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:arm7.elf
Detection:MAL
Classification:mal60.troj.linELF@0/3@2/0
Command:/tmp/arm7.elf
PID:5471
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world
Standard Error:
  • system is lnxubuntu20
  • arm7.elf (PID: 5471, Parent: 5392, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/arm7.elf
    • arm7.elf New Fork (PID: 5474, Parent: 5471)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
arm7.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    SourceRuleDescriptionAuthorStrings
    5474.1.00007f723c017000.00007f723c033000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5471.1.00007f723c017000.00007f723c033000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: arm7.elfReversingLabs: Detection: 19%
        Source: arm7.elfVirustotal: Detection: 31%Perma Link
        Source: /tmp/arm7.elf (PID: 5474)Socket: 127.0.0.1:22448Jump to behavior
        Source: global trafficTCP traffic: 192.168.2.13:48202 -> 185.125.190.26:443
        Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
        Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
        Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
        Source: arm7.elf, 5471.1.00007f723c03b000.00007f723c046000.rw-.sdmp, arm7.elf, 5474.1.00007f723c03b000.00007f723c046000.rw-.sdmpString found in binary or memory: http://17365637265742070617373776F7264206D656D6F721/t/wget.sh
        Source: unknownNetwork traffic detected: HTTP traffic on port 48202 -> 443
        Source: ELF static info symbol of initial sample.symtab present: no
        Source: classification engineClassification label: mal60.troj.linELF@0/3@2/0

        Persistence and Installation Behavior

        barindex
        Source: /tmp/arm7.elf (PID: 5471)File: /proc/5471/mountsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/230/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/110/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/231/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/111/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/232/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/112/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/233/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/113/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/234/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/114/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/235/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/115/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/236/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/116/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/237/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/117/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/238/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/118/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/239/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/119/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/3631/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/3631/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/914/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/914/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/10/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/917/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/917/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/11/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/12/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/13/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/14/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/15/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/16/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/17/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/18/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/19/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/240/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/3095/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/3095/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/120/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/241/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/121/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/242/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/1/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/1/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/1/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/122/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/243/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/2/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/123/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/244/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/3/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/124/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/245/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/1588/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/1588/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/125/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/4/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/246/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/126/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/5/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/247/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/127/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/6/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/248/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/128/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/7/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/249/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/129/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/8/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/800/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/800/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/9/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/1906/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/1906/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/802/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/802/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/803/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/803/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/20/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/21/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/22/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/23/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/24/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/25/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/26/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/27/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/28/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/29/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/3420/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/3420/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/1482/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/1482/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/490/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/490/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/1480/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/1480/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/250/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/371/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/130/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/251/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/131/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/252/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/132/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)File opened: /proc/253/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5471)Queries kernel information via 'uname': Jump to behavior
        Source: arm7.elf, 5474.1.00007f723c03b000.00007f723c046000.rw-.sdmpBinary or memory string: vmwarem
        Source: arm7.elf, 5474.1.00007f723c03b000.00007f723c046000.rw-.sdmpBinary or memory string: vmware
        Source: arm7.elf, 5471.1.000055d0e01c8000.000055d0e0317000.rw-.sdmp, arm7.elf, 5474.1.000055d0e01c8000.000055d0e0317000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
        Source: arm7.elf, 5471.1.00007f723c03b000.00007f723c046000.rw-.sdmp, arm7.elf, 5474.1.00007f723c03b000.00007f723c046000.rw-.sdmpBinary or memory string: qemu-arm
        Source: arm7.elf, 5474.1.00007fff547e9000.00007fff5480a000.rw-.sdmpBinary or memory string: Uqemu: uncaught target signal 11 (Segmentation fault) - core dumped
        Source: arm7.elf, 5471.1.00007fff547e9000.00007fff5480a000.rw-.sdmpBinary or memory string: /tmp/qemu-open.cDuadT
        Source: arm7.elf, 5471.1.00007f723c03b000.00007f723c046000.rw-.sdmp, arm7.elf, 5474.1.00007f723c03b000.00007f723c046000.rw-.sdmpBinary or memory string: qemu-arm)Zm6vnZ5U4mf8vApyWcDwXR44ZAkzslsN)
        Source: arm7.elf, 5471.1.000055d0e01c8000.000055d0e0317000.rw-.sdmp, arm7.elf, 5474.1.000055d0e01c8000.000055d0e0317000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
        Source: arm7.elf, 5471.1.00007fff547e9000.00007fff5480a000.rw-.sdmp, arm7.elf, 5474.1.00007fff547e9000.00007fff5480a000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
        Source: arm7.elf, 5471.1.00007fff547e9000.00007fff5480a000.rw-.sdmp, arm7.elf, 5474.1.00007fff547e9000.00007fff5480a000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/arm7.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/arm7.elf
        Source: arm7.elf, 5474.1.00007fff547e9000.00007fff5480a000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
        Source: arm7.elf, 5471.1.00007fff547e9000.00007fff5480a000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.cDuadT:

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: arm7.elf, type: SAMPLE
        Source: Yara matchFile source: 5474.1.00007f723c017000.00007f723c033000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5471.1.00007f723c017000.00007f723c033000.r-x.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: arm7.elf, type: SAMPLE
        Source: Yara matchFile source: 5474.1.00007f723c017000.00007f723c033000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5471.1.00007f723c017000.00007f723c033000.r-x.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
        OS Credential Dumping
        11
        Security Software Discovery
        Remote ServicesData from Local System1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
        File and Directory Discovery
        Remote Desktop ProtocolData from Removable Media1
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1639694 Sample: arm7.elf Startdate: 16/03/2025 Architecture: LINUX Score: 60 12 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->12 14 daisy.ubuntu.com 2->14 16 Multi AV Scanner detection for submitted file 2->16 18 Yara detected Mirai 2->18 7 arm7.elf 2->7         started        signatures3 process4 signatures5 20 Sample reads /proc/mounts (often used for finding a writable filesystem) 7->20 10 arm7.elf 7->10         started        process6

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        arm7.elf19%ReversingLabsLinux.Trojan.Mirai
        arm7.elf31%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches

        Download Network PCAP: filteredfull

        NameIPActiveMaliciousAntivirus DetectionReputation
        daisy.ubuntu.com
        162.213.35.24
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://17365637265742070617373776F7264206D656D6F721/t/wget.sharm7.elf, 5471.1.00007f723c03b000.00007f723c046000.rw-.sdmp, arm7.elf, 5474.1.00007f723c03b000.00007f723c046000.rw-.sdmpfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            185.125.190.26
            unknownUnited Kingdom
            41231CANONICAL-ASGBfalse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            185.125.190.26na.elfGet hashmaliciousPrometeiBrowse
              na.elfGet hashmaliciousPrometeiBrowse
                na.elfGet hashmaliciousPrometeiBrowse
                  .i.elfGet hashmaliciousUnknownBrowse
                    na.elfGet hashmaliciousPrometeiBrowse
                      45.126.126.33-sora.mips-2025-03-12T01_33_19.elfGet hashmaliciousMiraiBrowse
                        boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                          main_arm7.elfGet hashmaliciousMiraiBrowse
                            na.elfGet hashmaliciousPrometeiBrowse
                              .i.elfGet hashmaliciousUnknownBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                daisy.ubuntu.commpsl.elfGet hashmaliciousUnknownBrowse
                                • 162.213.35.24
                                ppc.elfGet hashmaliciousUnknownBrowse
                                • 162.213.35.24
                                mips.elfGet hashmaliciousMiraiBrowse
                                • 162.213.35.24
                                arm.elfGet hashmaliciousMiraiBrowse
                                • 162.213.35.25
                                arm6.elfGet hashmaliciousUnknownBrowse
                                • 162.213.35.25
                                .i.elfGet hashmaliciousUnknownBrowse
                                • 162.213.35.24
                                .i.elfGet hashmaliciousUnknownBrowse
                                • 162.213.35.25
                                .i.elfGet hashmaliciousUnknownBrowse
                                • 162.213.35.25
                                sshd.elfGet hashmaliciousUnknownBrowse
                                • 162.213.35.25
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                CANONICAL-ASGBsh4.elfGet hashmaliciousUnknownBrowse
                                • 91.189.91.42
                                aarch64.elfGet hashmaliciousMiraiBrowse
                                • 91.189.91.42
                                arc.elfGet hashmaliciousMiraiBrowse
                                • 91.189.91.42
                                arm6.elfGet hashmaliciousUnknownBrowse
                                • 91.189.91.42
                                arm5.elfGet hashmaliciousUnknownBrowse
                                • 91.189.91.42
                                sh4.elfGet hashmaliciousUnknownBrowse
                                • 91.189.91.42
                                sshd.elfGet hashmaliciousUnknownBrowse
                                • 91.189.91.42
                                na.elfGet hashmaliciousPrometeiBrowse
                                • 91.189.91.42
                                .i.elfGet hashmaliciousUnknownBrowse
                                • 91.189.91.42
                                miner.elfGet hashmaliciousUnknownBrowse
                                • 91.189.91.42
                                No context
                                No context
                                Process:/tmp/arm7.elf
                                File Type:data
                                Category:dropped
                                Size (bytes):14
                                Entropy (8bit):3.521640636343319
                                Encrypted:false
                                SSDEEP:3:TgiLG:TgiC
                                MD5:451AC90F7FA61D0393D6A5A02158D369
                                SHA1:5A7D458802462B80F94A9CDA24E2C877437A8E34
                                SHA-256:E2D543300D643CEF7698E750F74E8499993E346EF765FA2061EB5DFAF8D77E48
                                SHA-512:EF1D000F5B8BB5AFD4F6CB347FBE0FA0E97608B8C3839B6B44CB9828E5522396B334AE37148FCD2064A423B3DDD0C8874EF7019023A84B36E3893E50353F06FE
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:/tmp/arm7.elf.
                                Process:/tmp/arm7.elf
                                File Type:data
                                Category:dropped
                                Size (bytes):14
                                Entropy (8bit):3.521640636343319
                                Encrypted:false
                                SSDEEP:3:TgiLG:TgiC
                                MD5:451AC90F7FA61D0393D6A5A02158D369
                                SHA1:5A7D458802462B80F94A9CDA24E2C877437A8E34
                                SHA-256:E2D543300D643CEF7698E750F74E8499993E346EF765FA2061EB5DFAF8D77E48
                                SHA-512:EF1D000F5B8BB5AFD4F6CB347FBE0FA0E97608B8C3839B6B44CB9828E5522396B334AE37148FCD2064A423B3DDD0C8874EF7019023A84B36E3893E50353F06FE
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:/tmp/arm7.elf.
                                Process:/tmp/arm7.elf
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):355
                                Entropy (8bit):3.821623452428097
                                Encrypted:false
                                SSDEEP:6:GDFx8MGz/VUH/vYDFxePj/V/3VVyAb/rVmsVot/VOArB/VH:CFGCnQaVIAbyl
                                MD5:647456E12A05E883AA63F9E5C3ABD5BA
                                SHA1:1EE128A3735C2C9B83F861A7BC7EC18723574CC4
                                SHA-256:86F08E18ADE3D817E8497FB7136EABFA04F1D697A1A264CB8CE5FAF51AEBAB36
                                SHA-512:D58E25B29341927515E689FCA3FCECDA9265486A6DA17BC2FFB2BC3998B5C6772C26D00A70262E8425C15EE24BDAAD56E0B352C34F019F8C82183030F643F9A6
                                Malicious:false
                                Reputation:low
                                Preview:8000-24000 r-xp 00000000 fd:00 531606 /tmp/arm7.elf.2b000-2c000 rw-p 0001b000 fd:00 531606 /tmp/arm7.elf.2c000-37000 rw-p 00000000 00:00 0 .ff7ee000-ff7ef000 r--p 00000000 fd:00 793309 /usr/lib/x86_64-linux-gnu/libm-2.31.so.ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack].
                                File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), dynamically linked, stripped
                                Entropy (8bit):6.116470163446497
                                TrID:
                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                File name:arm7.elf
                                File size:112'964 bytes
                                MD5:e061c2dde46bbe5b627793a3ee3a49bd
                                SHA1:b0921d19dc5badadb2eb0a80f737499960605100
                                SHA256:33ae7c06d2ccdbbf309516bfe334acf1780314acc57719a88f41f82da24decba
                                SHA512:cbb6df26ec206cf4dd4bc9e31eab8e273be12098f3230060bf4ec5df1d895e870ecae7ac1643493cf9fd359f12d99b2c076c0ba01c0e2885dbfbd98ee8a43ec4
                                SSDEEP:3072:KCL1AF0cHTPPtvz8FEE9ZzUFhfVaBj09iXDQJ4anIsCnHp:KCL1AFdHTt7kjGh9aBj09iXY4n
                                TLSH:09B3F75AF9819F62D4D616BEFE4E518D33232BA8E3EE7202DD145B2037CA55B0E7B401
                                File Content Preview:.ELF..............(.........4...........4. ...(.........(...(2..(2..................................@...@...............@...@...@...8....t..............D...D...D.........................................................-...L..................@-.,@...0....S

                                ELF header

                                Class:ELF32
                                Data:2's complement, little endian
                                Version:1 (current)
                                Machine:ARM
                                Version Number:0x1
                                Type:EXEC (Executable file)
                                OS/ABI:UNIX - System V
                                ABI Version:0
                                Entry Point Address:0x8194
                                Flags:0x4000002
                                ELF Header Size:52
                                Program Header Offset:52
                                Program Header Size:32
                                Number of Program Headers:5
                                Section Header Offset:112364
                                Section Header Size:40
                                Number of Section Headers:15
                                Header String Table Index:14
                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                NULL0x00x00x00x00x0000
                                .initPROGBITS0x80d40xd40x100x00x6AX004
                                .textPROGBITS0x80f00xf00x1916c0x00x6AX0016
                                .finiPROGBITS0x2125c0x1925c0x100x00x6AX004
                                .rodataPROGBITS0x212700x192700x1fa00x00x2A008
                                .ARM.extabPROGBITS0x232100x1b2100x180x00x2A004
                                .ARM.exidxARM_EXIDX0x232280x1b2280x1180x00x82AL204
                                .eh_framePROGBITS0x2b3400x1b3400x40x00x3WA004
                                .tbssNOBITS0x2b3440x1b3440x80x00x403WAT004
                                .init_arrayINIT_ARRAY0x2b3440x1b3440x40x00x3WA004
                                .fini_arrayFINI_ARRAY0x2b3480x1b3480x40x00x3WA004
                                .gotPROGBITS0x2b3500x1b3500xa80x40x3WA004
                                .dataPROGBITS0x2b3f80x1b3f80x2800x00x3WA004
                                .bssNOBITS0x2b6780x1b6780x70d40x00x3WA004
                                .shstrtabSTRTAB0x00x1b6780x730x00x0001
                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                DYNAMIC0x1b2280x232280x232280x1180x1184.48540x4R 0x4.ARM.exidx
                                LOAD0x00x80000x80000x1b3400x1b3406.12990x5R E0x8000.init .text .fini .rodata .ARM.extab .ARM.exidx
                                LOAD0x1b3400x2b3400x2b3400x3380x740c4.20550x6RW 0x8000.eh_frame .tbss .init_array .fini_array .got .data .bss
                                DYNAMIC0x1b3440x2b3440x2b3440x00x80.00000x4R 0x4
                                DYNAMIC0x00x00x00x00x00.00000x7RWE0x4

                                Download Network PCAP: filteredfull

                                • Total Packets: 4
                                • 443 (HTTPS)
                                • 53 (DNS)
                                TimestampSource PortDest PortSource IPDest IP
                                Mar 16, 2025 02:53:53.840204954 CET48202443192.168.2.13185.125.190.26
                                Mar 16, 2025 02:54:25.584328890 CET48202443192.168.2.13185.125.190.26
                                TimestampSource PortDest PortSource IPDest IP
                                Mar 16, 2025 02:53:45.100155115 CET5486653192.168.2.138.8.8.8
                                Mar 16, 2025 02:53:45.100210905 CET5035953192.168.2.138.8.8.8
                                Mar 16, 2025 02:53:45.106323957 CET53548668.8.8.8192.168.2.13
                                Mar 16, 2025 02:53:45.106338024 CET53503598.8.8.8192.168.2.13
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Mar 16, 2025 02:53:45.100155115 CET192.168.2.138.8.8.80x5c81Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                Mar 16, 2025 02:53:45.100210905 CET192.168.2.138.8.8.80xd753Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Mar 16, 2025 02:53:45.106323957 CET8.8.8.8192.168.2.130x5c81No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                Mar 16, 2025 02:53:45.106323957 CET8.8.8.8192.168.2.130x5c81No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                                System Behavior

                                Start time (UTC):01:53:42
                                Start date (UTC):16/03/2025
                                Path:/tmp/arm7.elf
                                Arguments:-
                                File size:4956856 bytes
                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1