Edit tour

Linux Analysis Report
jkse.x86.elf

Overview

General Information

Sample name:jkse.x86.elf
Analysis ID:1643718
MD5:7de0f304eaa272f19eeb3fa54487f0ba
SHA1:273fa26a6583de96ebaea1dfea6aa004206591b5
SHA256:5fd93f171b93cb295f261e76fe3c67c3b3cf3206d682c53a8df4a189ff02a38b
Tags:elfuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Detected TCP or UDP traffic on non-standard ports
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1643718
Start date and time:2025-03-20 02:37:19 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 52s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:jkse.x86.elf
Detection:MAL
Classification:mal56.linELF@0/0@2/0
Command:/tmp/jkse.x86.elf
PID:5493
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
Dark bot has been sent!!!
Standard Error:
  • system is lnxubuntu20
  • jkse.x86.elf (PID: 5493, Parent: 5417, MD5: 7de0f304eaa272f19eeb3fa54487f0ba) Arguments: /tmp/jkse.x86.elf
  • cleanup
SourceRuleDescriptionAuthorStrings
jkse.x86.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0x2800:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
jkse.x86.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0x2fef:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
jkse.x86.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x1ae2:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x1c1c:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
jkse.x86.elfLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0x2baf:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
jkse.x86.elfLinux_Trojan_Gafgyt_0cd591cdunknownunknown
  • 0x2462:$a: 4E F8 48 8D 4E D8 49 8D 42 E0 48 83 C7 03 EB 6B 4C 8B 46 F8 48 8D
Click to see the 4 entries
SourceRuleDescriptionAuthorStrings
5493.1.0000000000400000.0000000000406000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0x2800:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
5493.1.0000000000400000.0000000000406000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0x2fef:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
5493.1.0000000000400000.0000000000406000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x1ae2:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x1c1c:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
5493.1.0000000000400000.0000000000406000.r-x.sdmpLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0x2baf:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
5493.1.0000000000400000.0000000000406000.r-x.sdmpLinux_Trojan_Gafgyt_0cd591cdunknownunknown
  • 0x2462:$a: 4E F8 48 8D 4E D8 49 8D 42 E0 48 83 C7 03 EB 6B 4C 8B 46 F8 48 8D
Click to see the 4 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: jkse.x86.elfReversingLabs: Detection: 27%
Source: global trafficTCP traffic: 192.168.2.14:40076 -> 196.251.81.246:2223
Source: unknownTCP traffic detected without corresponding DNS query: 196.251.81.246
Source: unknownTCP traffic detected without corresponding DNS query: 196.251.81.246
Source: unknownTCP traffic detected without corresponding DNS query: 196.251.81.246
Source: unknownTCP traffic detected without corresponding DNS query: 196.251.81.246
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

System Summary

barindex
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
Source: jkse.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
Source: 5493.1.0000000000400000.0000000000406000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: classification engineClassification label: mal56.linELF@0/0@2/0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1643718 Sample: jkse.x86.elf Startdate: 20/03/2025 Architecture: LINUX Score: 56 11 196.251.81.246, 2223, 40076 SONIC-WirelessZA Seychelles 2->11 13 daisy.ubuntu.com 2->13 15 Malicious sample detected (through community Yara rule) 2->15 17 Multi AV Scanner detection for submitted file 2->17 7 jkse.x86.elf 2->7         started        signatures3 process4 process5 9 jkse.x86.elf 7->9         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
jkse.x86.elf28%ReversingLabsLinux.PUA.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    196.251.81.246
    unknownSeychelles
    37417SONIC-WirelessZAfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    196.251.81.246hgfs.mips.elfGet hashmaliciousUnknownBrowse
      hgfs.arm5.elfGet hashmaliciousUnknownBrowse
        hgfs.mpsl.elfGet hashmaliciousUnknownBrowse
          hgfs.x86.elfGet hashmaliciousUnknownBrowse
            hgfs.arm.elfGet hashmaliciousUnknownBrowse
              demon.arm.elfGet hashmaliciousUnknownBrowse
                demon.mpsl.elfGet hashmaliciousUnknownBrowse
                  demon.x86.elfGet hashmaliciousUnknownBrowse
                    demon.x86.elfGet hashmaliciousUnknownBrowse
                      demon.mips.elfGet hashmaliciousUnknownBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        daisy.ubuntu.combin.sh.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        jkse.arm7.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.24
                        jkse.arm.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        jkse.ppc.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        jkse.mips.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        jkse.mpsl.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        jkse.x86.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        .i.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        i.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        i.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        SONIC-WirelessZAhttp://xbyvrqtn.top/usGet hashmaliciousUnknownBrowse
                        • 196.251.84.181
                        http://xbyvrqtn.top/usGet hashmaliciousUnknownBrowse
                        • 196.251.84.181
                        http://xbyvrqtn.top/usGet hashmaliciousUnknownBrowse
                        • 196.251.84.181
                        https://www.google.com/url?hl=en&q=https://cdn.ampproject.org/c/s/jegv1ldtjh.a%25c2%25ade%25c2%25Adk%25C2%25Adl%25C2%25Adr%25c2%25adi%25C2%25ADn%25C2%25ADz%25C2%25adq%25c2%25adj%25C2%25Adq%25C2%25aDi%25C2%25aDb%25c2%25ADq%25C2%25Ado%25c2%25aDka.t%25e2%2580%258bop%25E2%2580%258b%25E2%2580%258B%25e2%2580%258b%25e2%2580%258B%25e2%2580%258b%25E2%2580%258B/amMgVuH15&source=gmail&ust=1742410052450000&usg=AOvVaw0GK2SUuLEby7u5w5ZWxyMh&YTdPAksnR=xagYpqPznMYk&YyfzgJrJvRpTM=RTPnZXNAiOh&PLnshNZqnl=baausDsxgpv&qJduqCVMbFdQx=BbatOoTYZZuQ&RPUUNGyEOz=qTJWgcVCEJaNbm&ufWjhADKw=eBZhUsnl&KLBhhhQa=mrGnAJdvrbof&wcUBdTuxBkmso=EkffKbil&KsqXNiBqxanKX=MtCvZcliGnM&tTjHekJYXkvvP=jTYAKbfGOAO&IWIyeMJGRCyRL=koUYltfPVrTyWqD&lbZtBn=HkHQOrPNB&cHoeySn=UAAUckZtc&ApNBSf=https://HyJrMaYnoQ&BLwCqS=uyynTqnODJSU&ecDECnehYNZRJ=LGmwkowGuNaBZ&uFYXyk=pjWCPZkOEWah&dzrPNTsALF=aShddbXpJvuB&ZCSedalrUK=amMxQTfdevAy&YOklOPCHPuxh=ArBOEbAAGCL&jgyuaVdbuP=GZTylTEAvWpIU&gaJMaMAxBAvd=EQkoxvGGFp&bbsHeAsTzlJ=WbDBQqwWuGet hashmaliciousUnknownBrowse
                        • 196.251.87.145
                        https://www.google.com/url?hl=en&q=https://cdn.ampproject.org/c/s/jeo2bu4xli.n%25c2%25Adz%25c2%25Adg%25c2%25adc%25c2%25Adr%25c2%25adf%25c2%25ADh%25C2%25Adl%25C2%25Adt%25c2%25aDa%25c2%25aDd%25c2%25aDi%25C2%25ADo%25c2%25Adw%25C2%25Adw%25C2%25addn.t%25e2%2580%258Bop%25e2%2580%258B%25E2%2580%258B%25E2%2580%258B%25E2%2580%258B%25e2%2580%258B%25E2%2580%258B%25e2%2580%258B/bwPHDPEJd&source=gmail&ust=1742413495673000&usg=AOvVaw39FbuU5xpVacJWgJQtP58b&FtlJrYdzNAhN=uknHniJ&PmCXQdns=MzApfXsDDjKokpX&WJEATipbJJkHU=wBUHmYvZBSY&MvuBQRjKnyOdG=NmBhucjwiXGhHJ&HsgJXV=vUQVLxQuP&OoHkHEYkrde=BYDXDOUHGOJFuLX&BXmGKopH=kGhpVZI&dWIzLIFvfOYsb=SRJFeyfVS&jv=PYRYelozPw&ltqhxtYX=pZOJEBKVd&SozPniSkWA=oVsZYnlxgai&ZNgdDeJB=aQDOTycq&aJQRplgTpnZSq=bTqFbYiklKcoMOv&MDXkizPwGl=https://HGDYSHGYmzPafU&zIgpqQRkTfM=MOrpRmhzLs&HJIaiQDe=jmQYqbe&cSoMIS=IekAbLKFqgNOxBi&JiDUNutRC=AHOKRzrWU&ZeaHXQPofWpSm=teYFaSKd&TToGkcLeeK=JkUmUxP&jwBftbrKOo=NdxcUwSLkn&uDUWxpwv=gakyAdL&xLcrMT=yBIWjELAduPSwGet hashmaliciousUnknownBrowse
                        • 196.251.87.145
                        original.emlGet hashmaliciousunknownBrowse
                        • 196.251.87.145
                        http://xbyvrqtn.top/usGet hashmaliciousUnknownBrowse
                        • 196.251.84.181
                        http://lihi.cc/6nCRBGet hashmaliciousUnknownBrowse
                        • 196.251.81.216
                        SecuriteInfo.com.Win32.PWSX-gen.11592.10317.exeGet hashmaliciousAgentTeslaBrowse
                        • 196.251.83.222
                        SecuriteInfo.com.Win32.PWSX-gen.22728.13847.exeGet hashmaliciousAgentTeslaBrowse
                        • 196.251.83.222
                        No context
                        No context
                        No created / dropped files found
                        File type:
                        Entropy (8bit):5.420457073288427
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:jkse.x86.elf
                        File size:25'760 bytes
                        MD5:7de0f304eaa272f19eeb3fa54487f0ba
                        SHA1:273fa26a6583de96ebaea1dfea6aa004206591b5
                        SHA256:5fd93f171b93cb295f261e76fe3c67c3b3cf3206d682c53a8df4a189ff02a38b
                        SHA512:d9a3ba0997f4c39ba6d03c59c2d10c6c3b74f78da285a99b14ed4f418925eab7f21ed776d90a419a4a9792929fc5146e7b83378e8753a16d6807d7ea3d71f546
                        SSDEEP:384:RXyQDFGe3Nzj0qRYjSTjYjB+xu6L1Cu7FjWXmLLppuXz3O2DPaQH:RLIe3Nzj0ypDLJZV9puD36
                        TLSH:A0C22B23A58384BCCAAAC2B556EBB534D13B743C1363759D23F4F632A9DEC910ED9140
                        File Content Preview:.ELF..............>.......@.....@....... b..........@.8...@.......................@.......@......R.......R.......................`.......`P......`P.............................Q.td....................................................H...._....ZG..H........

                        Download Network PCAP: filteredfull

                        • Total Packets: 6
                        • 2223 undefined
                        • 53 (DNS)
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 20, 2025 02:38:04.451719999 CET400762223192.168.2.14196.251.81.246
                        Mar 20, 2025 02:38:04.634814978 CET222340076196.251.81.246192.168.2.14
                        Mar 20, 2025 02:38:04.634888887 CET400762223192.168.2.14196.251.81.246
                        Mar 20, 2025 02:38:04.637855053 CET400762223192.168.2.14196.251.81.246
                        Mar 20, 2025 02:38:04.825607061 CET222340076196.251.81.246192.168.2.14
                        Mar 20, 2025 02:38:04.825670958 CET400762223192.168.2.14196.251.81.246
                        Mar 20, 2025 02:38:05.026925087 CET222340076196.251.81.246192.168.2.14
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 20, 2025 02:40:49.423450947 CET5513753192.168.2.148.8.8.8
                        Mar 20, 2025 02:40:49.423563004 CET4086953192.168.2.148.8.8.8
                        Mar 20, 2025 02:40:49.514158010 CET53551378.8.8.8192.168.2.14
                        Mar 20, 2025 02:40:49.515072107 CET53408698.8.8.8192.168.2.14
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Mar 20, 2025 02:40:49.423450947 CET192.168.2.148.8.8.80xa204Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                        Mar 20, 2025 02:40:49.423563004 CET192.168.2.148.8.8.80x5838Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Mar 20, 2025 02:40:49.514158010 CET8.8.8.8192.168.2.140xa204No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                        Mar 20, 2025 02:40:49.514158010 CET8.8.8.8192.168.2.140xa204No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):01:38:03
                        Start date (UTC):20/03/2025
                        Path:/tmp/jkse.x86.elf
                        Arguments:/tmp/jkse.x86.elf
                        File size:25760 bytes
                        MD5 hash:7de0f304eaa272f19eeb3fa54487f0ba

                        Start time (UTC):01:38:03
                        Start date (UTC):20/03/2025
                        Path:/tmp/jkse.x86.elf
                        Arguments:-
                        File size:25760 bytes
                        MD5 hash:7de0f304eaa272f19eeb3fa54487f0ba