Edit tour

Linux Analysis Report
arm6.elf

Overview

General Information

Sample name:arm6.elf
Analysis ID:1642471
MD5:629e83c1c5d6c5bd3b9444009fe48ddb
SHA1:06b51996a44d34dc62d636ab0a6beb647627ba30
SHA256:4ee932ad9e97fb8feb7d09baf47058bb0b7e3082b6791ee926b3b83a0ec853fc
Tags:elfMiraiuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Sample reads /proc/mounts (often used for finding a writable filesystem)
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1642471
Start date and time:2025-03-19 03:55:43 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 46s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:arm6.elf
Detection:MAL
Classification:mal52.troj.linELF@0/3@2/0
Command:/tmp/arm6.elf
PID:5477
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world
Standard Error:
  • system is lnxubuntu20
  • arm6.elf (PID: 5477, Parent: 5393, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/arm6.elf
    • arm6.elf New Fork (PID: 5480, Parent: 5477)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: arm6.elfVirustotal: Detection: 14%Perma Link
Source: arm6.elfReversingLabs: Detection: 14%
Source: /tmp/arm6.elf (PID: 5480)Socket: 127.0.0.1:22448Jump to behavior
Source: global trafficTCP traffic: 192.168.2.13:48202 -> 185.125.190.26:443
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: unknownNetwork traffic detected: HTTP traffic on port 48202 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/arm6.elf (PID: 5477)SIGKILL sent: pid: 1 (init), result: successfulJump to behavior
Source: /tmp/arm6.elf (PID: 5477)SIGKILL sent: pid: 1411, result: successfulJump to behavior
Source: /tmp/arm6.elf (PID: 5477)SIGKILL sent: pid: 2936, result: successfulJump to behavior
Source: classification engineClassification label: mal52.troj.linELF@0/3@2/0

Persistence and Installation Behavior

barindex
Source: /tmp/arm6.elf (PID: 5477)File: /proc/5477/mountsJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/238/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/239/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/3631/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/241/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/1/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/1482/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/1480/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/371/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/1238/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/134/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/3413/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/1475/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/936/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)File opened: /proc/816/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5477)Queries kernel information via 'uname': Jump to behavior
Source: arm6.elf, 5477.1.00007fb7c403b000.00007fb7c4041000.rw-.sdmp, arm6.elf, 5480.1.00007fb7c403b000.00007fb7c4041000.rw-.sdmpBinary or memory string: !!a1gAWFxuAXsFWUgBRQAA!!a1gAWFxuAXsAWUgKRXgA!!a1gAWFxuAXsAWEgJR3IA!!a10CWFxuAHsGWVcWQHAA!!a10CWFxuAHsGWVcWQHUA!!aFwAWF9uA3sGW0gLRgAA!1aFwAWFlpG2QBW0gJTwAA1!qemu-arm2QBW0gJTwAA!
Source: arm6.elf, 5480.1.00007fb7c403b000.00007fb7c4041000.rw-.sdmpBinary or memory string: vmware
Source: arm6.elf, 5477.1.000055a2d9b14000.000055a2d9c62000.rw-.sdmp, arm6.elf, 5480.1.000055a2d9b14000.000055a2d9c62000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: arm6.elf, 5477.1.00007fb7c403b000.00007fb7c4041000.rw-.sdmp, arm6.elf, 5480.1.00007fb7c403b000.00007fb7c4041000.rw-.sdmpBinary or memory string: qemu-arm
Source: arm6.elf, 5477.1.000055a2d9b14000.000055a2d9c62000.rw-.sdmp, arm6.elf, 5480.1.000055a2d9b14000.000055a2d9c62000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: arm6.elf, 5477.1.00007ffcda007000.00007ffcda028000.rw-.sdmp, arm6.elf, 5480.1.00007ffcda007000.00007ffcda028000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: arm6.elf, 5477.1.00007ffcda007000.00007ffcda028000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.OYMyYj:
Source: arm6.elf, 5477.1.00007ffcda007000.00007ffcda028000.rw-.sdmpBinary or memory string: /tmp/qemu-open.OYMyYj
Source: arm6.elf, 5477.1.00007ffcda007000.00007ffcda028000.rw-.sdmp, arm6.elf, 5480.1.00007ffcda007000.00007ffcda028000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/arm6.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/arm6.elf
Source: arm6.elf, 5480.1.00007ffcda007000.00007ffcda028000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1642471 Sample: arm6.elf Startdate: 19/03/2025 Architecture: LINUX Score: 52 12 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->12 14 daisy.ubuntu.com 2->14 16 Multi AV Scanner detection for submitted file 2->16 7 arm6.elf 2->7         started        signatures3 process4 signatures5 18 Sample reads /proc/mounts (often used for finding a writable filesystem) 7->18 10 arm6.elf 7->10         started        process6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
arm6.elf14%VirustotalBrowse
arm6.elf15%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    185.125.190.26
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    185.125.190.26na.elfGet hashmaliciousPrometeiBrowse
      Federalx86Agent.elfGet hashmaliciousMiraiBrowse
        mpsl.elfGet hashmaliciousUnknownBrowse
          FederalppcAgent.elfGet hashmaliciousMiraiBrowse
            na.elfGet hashmaliciousPrometeiBrowse
              Mozi.m.elfGet hashmaliciousMiraiBrowse
                na.elfGet hashmaliciousPrometeiBrowse
                  2gkeFl1jcj.elfGet hashmaliciousUnknownBrowse
                    x-8.6-.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
                      na.elfGet hashmaliciousPrometeiBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        daisy.ubuntu.comsh4.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        Federalx86Agent.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        FederalmpslAgent.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        mpsl.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        Federali686Agent.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        FederalmipsAgent.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        FederalppcAgent.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        resgod.x86.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        FederalarcAgent.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CANONICAL-ASGBmips.elfGet hashmaliciousUnknownBrowse
                        • 91.189.91.42
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 185.125.190.26
                        Federalx86Agent.elfGet hashmaliciousMiraiBrowse
                        • 185.125.190.26
                        Federalarm7Agent.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        mpsl.elfGet hashmaliciousUnknownBrowse
                        • 185.125.190.26
                        Federalm68kAgent.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 91.189.91.42
                        Federalsh4Agent.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        FederalarmAgent.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        Federalarm7Agent.elfGet hashmaliciousMiraiBrowse
                        • 91.189.91.42
                        No context
                        No context
                        Process:/tmp/arm6.elf
                        File Type:data
                        Category:dropped
                        Size (bytes):14
                        Entropy (8bit):3.521640636343319
                        Encrypted:false
                        SSDEEP:3:Tgj03:Tgw3
                        MD5:3F57B2990E079DDED19A289B2C2D9845
                        SHA1:EC529CD92FCD1419E74F69269A1FBDFB901F3360
                        SHA-256:42BAD665C8A094C4820D587524D2B0F1E1AA45E1BA9BCE12E59A92CBA93B90BC
                        SHA-512:B2E54540954546CA0BDC2B73923B545659131AB088282E7070B2A7C9FBA1D1C1D58CFE4094D1DAE38D578E2B4FD7CB2E3A7D25A06EE84546207EE6A3B19553A8
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:/tmp/arm6.elf.
                        Process:/tmp/arm6.elf
                        File Type:data
                        Category:dropped
                        Size (bytes):14
                        Entropy (8bit):3.521640636343319
                        Encrypted:false
                        SSDEEP:3:Tgj03:Tgw3
                        MD5:3F57B2990E079DDED19A289B2C2D9845
                        SHA1:EC529CD92FCD1419E74F69269A1FBDFB901F3360
                        SHA-256:42BAD665C8A094C4820D587524D2B0F1E1AA45E1BA9BCE12E59A92CBA93B90BC
                        SHA-512:B2E54540954546CA0BDC2B73923B545659131AB088282E7070B2A7C9FBA1D1C1D58CFE4094D1DAE38D578E2B4FD7CB2E3A7D25A06EE84546207EE6A3B19553A8
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:/tmp/arm6.elf.
                        Process:/tmp/arm6.elf
                        File Type:data
                        Category:dropped
                        Size (bytes):14
                        Entropy (8bit):3.521640636343319
                        Encrypted:false
                        SSDEEP:3:Tgj03:Tgw3
                        MD5:3F57B2990E079DDED19A289B2C2D9845
                        SHA1:EC529CD92FCD1419E74F69269A1FBDFB901F3360
                        SHA-256:42BAD665C8A094C4820D587524D2B0F1E1AA45E1BA9BCE12E59A92CBA93B90BC
                        SHA-512:B2E54540954546CA0BDC2B73923B545659131AB088282E7070B2A7C9FBA1D1C1D58CFE4094D1DAE38D578E2B4FD7CB2E3A7D25A06EE84546207EE6A3B19553A8
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:/tmp/arm6.elf.
                        File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):6.035292876805966
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:arm6.elf
                        File size:111'424 bytes
                        MD5:629e83c1c5d6c5bd3b9444009fe48ddb
                        SHA1:06b51996a44d34dc62d636ab0a6beb647627ba30
                        SHA256:4ee932ad9e97fb8feb7d09baf47058bb0b7e3082b6791ee926b3b83a0ec853fc
                        SHA512:7f13e8a47ced59445506d1419322a4ce1d03e35cb8ab8014193d4efb00c305654b6204f56f4de3b0c2dc66a39c55bf5158a8947b55bb69ff3ea57fc4d4d70c48
                        SSDEEP:1536:Z3nU0Oi3tVWSfQViM0Ml1gyYiSujRQn1YXmkZ8VHDpqoH/msIO0pJVmr/dmGYFV8:2ri3toSrMlD1S4q/kZ8VFeOWJQdmUBJ
                        TLSH:ADB31896BC419F26C2D116BEFE1E428E33131FB8E3DE3102ED155B2477CAA5A0E7A451
                        File Content Preview:.ELF..............(.....l...4...8.......4. ...(........p.....&...&..................................T...T...............................LI..........Q.td.............................@-..@............/..@-.,@...0....S..... 0....S.........../..0...0...@..../

                        ELF header

                        Class:ELF32
                        Data:2's complement, little endian
                        Version:1 (current)
                        Machine:ARM
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x816c
                        Flags:0x4000002
                        ELF Header Size:52
                        Program Header Offset:52
                        Program Header Size:32
                        Number of Program Headers:4
                        Section Header Offset:110904
                        Section Header Size:40
                        Number of Section Headers:13
                        Header String Table Index:12
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x80b40xb40x140x00x6AX001
                        .textPROGBITS0x80c80xc80x18e3c0x00x6AX004
                        .finiPROGBITS0x20f040x18f040x140x00x6AX001
                        .rodataPROGBITS0x20f180x18f180x17740x00x2A008
                        .ARM.exidxARM_EXIDX0x2268c0x1a68c0xc80x00x82AL204
                        .eh_framePROGBITS0x2b0000x1b0000x40x00x3WA004
                        .init_arrayINIT_ARRAY0x2b0040x1b0040x40x00x3WA004
                        .fini_arrayFINI_ARRAY0x2b0080x1b0080x40x00x3WA004
                        .gotPROGBITS0x2b0100x1b0100x280x40x3WA004
                        .dataPROGBITS0x2b0380x1b0380x9c0x00x3WA004
                        .bssNOBITS0x2b0d80x1b0d40x48740x00x3WA008
                        .shstrtabSTRTAB0x00x1b0d40x620x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        EXIDX0x1a68c0x2268c0x2268c0xc80xc84.28190x4R 0x4.ARM.exidx
                        LOAD0x00x80000x80000x1a7540x1a7546.11440x5R E0x8000.init .text .fini .rodata .ARM.exidx
                        LOAD0x1b0000x2b0000x2b0000xd40x494c3.52870x6RW 0x8000.eh_frame .init_array .fini_array .got .data .bss
                        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

                        Download Network PCAP: filteredfull

                        • Total Packets: 4
                        • 443 (HTTPS)
                        • 53 (DNS)
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 19, 2025 03:56:49.036303043 CET48202443192.168.2.13185.125.190.26
                        Mar 19, 2025 03:57:19.500149965 CET48202443192.168.2.13185.125.190.26
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 19, 2025 03:56:42.879998922 CET4864853192.168.2.138.8.8.8
                        Mar 19, 2025 03:56:42.880049944 CET5542353192.168.2.138.8.8.8
                        Mar 19, 2025 03:56:42.887792110 CET53486488.8.8.8192.168.2.13
                        Mar 19, 2025 03:56:42.887814999 CET53554238.8.8.8192.168.2.13
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Mar 19, 2025 03:56:42.879998922 CET192.168.2.138.8.8.80xeb16Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                        Mar 19, 2025 03:56:42.880049944 CET192.168.2.138.8.8.80xcfc7Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Mar 19, 2025 03:56:42.887792110 CET8.8.8.8192.168.2.130xeb16No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                        Mar 19, 2025 03:56:42.887792110 CET8.8.8.8192.168.2.130xeb16No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):02:56:40
                        Start date (UTC):19/03/2025
                        Path:/tmp/arm6.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1