Edit tour

Linux Analysis Report
arm7.elf

Overview

General Information

Sample name:arm7.elf
Analysis ID:1644836
MD5:e66761ae8b07781349d431863c131f43
SHA1:d6b6ef30b763880393d8b41d44d5d257e8e46fd0
SHA256:54a273154e5dbea1ce300ebabe2e8be87afefbfc9d9a30f474114d7f0b0bcaaa
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:60
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample reads /proc/mounts (often used for finding a writable filesystem)
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1644836
Start date and time:2025-03-21 01:44:19 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 47s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:arm7.elf
Detection:MAL
Classification:mal60.troj.linELF@0/3@4/0
  • VT rate limit hit for: https://motd.ubuntu.comhe
Command:/tmp/arm7.elf
PID:5428
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world
Standard Error:
  • system is lnxubuntu20
  • arm7.elf (PID: 5428, Parent: 5347, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/arm7.elf
    • arm7.elf New Fork (PID: 5433, Parent: 5428)
  • dash New Fork (PID: 5521, Parent: 3578)
  • rm (PID: 5521, Parent: 3578, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.0TPniCuKmw /tmp/tmp.rZz18ohmxs /tmp/tmp.DouXRBWVc0
  • dash New Fork (PID: 5522, Parent: 3578)
  • cat (PID: 5522, Parent: 3578, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.0TPniCuKmw
  • dash New Fork (PID: 5523, Parent: 3578)
  • head (PID: 5523, Parent: 3578, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5524, Parent: 3578)
  • tr (PID: 5524, Parent: 3578, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5525, Parent: 3578)
  • cut (PID: 5525, Parent: 3578, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5526, Parent: 3578)
  • cat (PID: 5526, Parent: 3578, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.0TPniCuKmw
  • dash New Fork (PID: 5527, Parent: 3578)
  • head (PID: 5527, Parent: 3578, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5528, Parent: 3578)
  • tr (PID: 5528, Parent: 3578, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5529, Parent: 3578)
  • cut (PID: 5529, Parent: 3578, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5530, Parent: 3578)
  • rm (PID: 5530, Parent: 3578, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.0TPniCuKmw /tmp/tmp.rZz18ohmxs /tmp/tmp.DouXRBWVc0
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
arm7.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    SourceRuleDescriptionAuthorStrings
    5428.1.00007f970c017000.00007f970c0a1000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5433.1.00007f970c017000.00007f970c0a1000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: arm7.elfReversingLabs: Detection: 16%
        Source: /tmp/arm7.elf (PID: 5433)Socket: 127.0.0.1:22448Jump to behavior
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: wget/1.20.3-1ubuntu1 Ubuntu/20.04.2/LTS GNU/Linux/5.4.0-72-generic/x86_64 Intel(R)/Xeon(R)/Silver/4210/CPU/@/2.20GHz cloud_id/noneAccept: */*Accept-Encoding: identityHost: motd.ubuntu.comConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
        Source: arm7.elf, 5428.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmp, arm7.elf, 5433.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmpString found in binary or memory: http://17365637265742070617373776F7264206D656D6F721/t/wget.sh
        Source: arm7.elf, 5428.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmp, arm7.elf, 5433.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmpString found in binary or memory: https://motd.ubuntu.com
        Source: arm7.elf, 5428.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmp, arm7.elf, 5433.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmpString found in binary or memory: https://motd.ubuntu.comhe
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58876
        Source: unknownNetwork traffic detected: HTTP traffic on port 58876 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 37676 -> 443
        Source: ELF static info symbol of initial sample.symtab present: no
        Source: /tmp/arm7.elf (PID: 5428)SIGKILL sent: pid: 1 (init), result: successfulJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)SIGKILL sent: pid: 1411, result: successfulJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)SIGKILL sent: pid: 2936, result: successfulJump to behavior
        Source: classification engineClassification label: mal60.troj.linELF@0/3@4/0

        Persistence and Installation Behavior

        barindex
        Source: /tmp/arm7.elf (PID: 5428)File: /proc/5428/mountsJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/5264/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/3761/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/230/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/110/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/231/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/111/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/232/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/112/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/233/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/113/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/234/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/114/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/235/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/115/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/236/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/116/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/237/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/117/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/238/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/118/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/239/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/119/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/914/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/10/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/917/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/11/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/12/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/13/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/14/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/15/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/16/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/17/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/18/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/19/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/240/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/3095/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/120/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/241/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/121/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/242/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/1/mapsJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/1/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/122/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/243/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/2/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/123/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/244/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/3/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/124/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/245/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/1588/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/125/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/4/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/246/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/126/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/5/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/247/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/127/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/6/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/248/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/128/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/7/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/249/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/129/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/8/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/800/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/9/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/1906/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/802/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/803/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/3646/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/20/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/21/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/22/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/23/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/24/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/25/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/26/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/27/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/28/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/29/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/3420/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/1482/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/490/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/1480/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/250/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/371/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/130/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/251/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/131/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/252/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/132/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/253/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/254/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/1238/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/134/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/255/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/256/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/257/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/378/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/3413/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/258/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/259/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/1475/cmdlineJump to behavior
        Source: /tmp/arm7.elf (PID: 5428)File opened: /proc/936/cmdlineJump to behavior
        Source: /usr/bin/dash (PID: 5521)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.0TPniCuKmw /tmp/tmp.rZz18ohmxs /tmp/tmp.DouXRBWVc0Jump to behavior
        Source: /usr/bin/dash (PID: 5530)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.0TPniCuKmw /tmp/tmp.rZz18ohmxs /tmp/tmp.DouXRBWVc0Jump to behavior
        Source: /tmp/arm7.elf (PID: 5428)Queries kernel information via 'uname': Jump to behavior
        Source: arm7.elf, 5433.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmpBinary or memory string: vmwarem
        Source: arm7.elf, 5433.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmpBinary or memory string: vmware
        Source: arm7.elf, 5428.1.000055f474212000.000055f474361000.rw-.sdmp, arm7.elf, 5433.1.000055f474212000.000055f474361000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
        Source: arm7.elf, 5428.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmp, arm7.elf, 5433.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmpBinary or memory string: qemu-arm
        Source: arm7.elf, 5428.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmp, arm7.elf, 5433.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmpBinary or memory string: qemu-arm)Zm6vnZ5U4mf8vApyWcDwXR44ZAkzslsN)
        Source: arm7.elf, 5428.1.000055f474212000.000055f474361000.rw-.sdmp, arm7.elf, 5433.1.000055f474212000.000055f474361000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
        Source: arm7.elf, 5428.1.00007ffde19fc000.00007ffde1a1d000.rw-.sdmp, arm7.elf, 5433.1.00007ffde19fc000.00007ffde1a1d000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
        Source: arm7.elf, 5428.1.00007ffde19fc000.00007ffde1a1d000.rw-.sdmpBinary or memory string: /tmp/qemu-open.m0yPtD
        Source: arm7.elf, 5428.1.00007ffde19fc000.00007ffde1a1d000.rw-.sdmp, arm7.elf, 5433.1.00007ffde19fc000.00007ffde1a1d000.rw-.sdmpBinary or memory string: YCKx86_64/usr/bin/qemu-arm/tmp/arm7.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/arm7.elf
        Source: arm7.elf, 5433.1.00007ffde19fc000.00007ffde1a1d000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
        Source: arm7.elf, 5428.1.00007ffde19fc000.00007ffde1a1d000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.m0yPtD:

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: arm7.elf, type: SAMPLE
        Source: Yara matchFile source: 5428.1.00007f970c017000.00007f970c0a1000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5433.1.00007f970c017000.00007f970c0a1000.r-x.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: arm7.elf, type: SAMPLE
        Source: Yara matchFile source: 5428.1.00007f970c017000.00007f970c0a1000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5433.1.00007f970c017000.00007f970c0a1000.r-x.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
        File Deletion
        1
        OS Credential Dumping
        11
        Security Software Discovery
        Remote ServicesData from Local System1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
        File and Directory Discovery
        Remote Desktop ProtocolData from Removable Media2
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
        Ingress Tool Transfer
        Traffic DuplicationData Destruction
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1644836 Sample: arm7.elf Startdate: 21/03/2025 Architecture: LINUX Score: 60 18 54.171.230.55, 443, 58876 AMAZON-02US United States 2->18 20 54.217.10.153, 443 AMAZON-02US United States 2->20 22 daisy.ubuntu.com 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Yara detected Mirai 2->26 7 arm7.elf 2->7         started        10 dash rm 2->10         started        12 dash cut 2->12         started        14 8 other processes 2->14 signatures3 process4 signatures5 28 Sample reads /proc/mounts (often used for finding a writable filesystem) 7->28 16 arm7.elf 7->16         started        process6

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        arm7.elf17%ReversingLabsLinux.Backdoor.Mirai
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://motd.ubuntu.comhe0%Avira URL Cloudsafe

        Download Network PCAP: filteredfull

        NameIPActiveMaliciousAntivirus DetectionReputation
        daisy.ubuntu.com
        162.213.35.24
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://motd.ubuntu.com/false
            high
            NameSourceMaliciousAntivirus DetectionReputation
            https://motd.ubuntu.comarm7.elf, 5428.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmp, arm7.elf, 5433.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmpfalse
              high
              https://motd.ubuntu.comhearm7.elf, 5428.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmp, arm7.elf, 5433.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://17365637265742070617373776F7264206D656D6F721/t/wget.sharm7.elf, 5428.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmp, arm7.elf, 5433.1.00007f970c0ad000.00007f970c0ba000.rw-.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                54.171.230.55
                unknownUnited States
                16509AMAZON-02USfalse
                54.217.10.153
                unknownUnited States
                16509AMAZON-02USfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                54.171.230.55eehah4.elfGet hashmaliciousUnknownBrowse
                  na.elfGet hashmaliciousPrometeiBrowse
                    linux_arm5.elfGet hashmaliciousChaosBrowse
                      boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                        na.elfGet hashmaliciousPrometeiBrowse
                          main_x86.elfGet hashmaliciousMiraiBrowse
                            na.elfGet hashmaliciousPrometeiBrowse
                              arm5.elfGet hashmaliciousUnknownBrowse
                                na.elfGet hashmaliciousPrometeiBrowse
                                  hoho.powerpc.elfGet hashmaliciousUnknownBrowse
                                    54.217.10.15346.19.143.26-mips-2025-03-01T06_09_25.elfGet hashmaliciousUnknownBrowse
                                      dlr.sh4.elfGet hashmaliciousUnknownBrowse
                                        i686.elfGet hashmaliciousGafgyt, MiraiBrowse
                                          miner.elfGet hashmaliciousUnknownBrowse
                                            psmips.elfGet hashmaliciousUnknownBrowse
                                              yakuza.m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                main_x86.elfGet hashmaliciousMiraiBrowse
                                                  jkse.arm7.elfGet hashmaliciousMiraiBrowse
                                                    re.bot.mips.elfGet hashmaliciousUnknownBrowse
                                                      45.126.126.33-sora.arm-2025-03-12T01_48_26.elfGet hashmaliciousMiraiBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        daisy.ubuntu.comeehah4.elfGet hashmaliciousUnknownBrowse
                                                        • 162.213.35.25
                                                        efjepc.elfGet hashmaliciousUnknownBrowse
                                                        • 162.213.35.25
                                                        boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                        • 162.213.35.25
                                                        boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                                        • 162.213.35.24
                                                        rjfe686.elfGet hashmaliciousUnknownBrowse
                                                        • 162.213.35.24
                                                        efea6.elfGet hashmaliciousUnknownBrowse
                                                        • 162.213.35.24
                                                        weje64.elfGet hashmaliciousUnknownBrowse
                                                        • 162.213.35.24
                                                        sshd.elfGet hashmaliciousUnknownBrowse
                                                        • 162.213.35.24
                                                        dlr.sh4.elfGet hashmaliciousUnknownBrowse
                                                        • 162.213.35.25
                                                        arc.elfGet hashmaliciousMiraiBrowse
                                                        • 162.213.35.24
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        AMAZON-02USReceipt.docmGet hashmaliciousUnknownBrowse
                                                        • 13.35.93.119
                                                        9v2podJOKj.exeGet hashmaliciousUnknownBrowse
                                                        • 13.249.82.68
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 54.255.164.76
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 54.255.164.76
                                                        9v2podJOKj.exeGet hashmaliciousUnknownBrowse
                                                        • 108.139.38.28
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 34.249.145.219
                                                        arm.elfGet hashmaliciousMiraiBrowse
                                                        • 34.249.145.219
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 54.255.164.76
                                                        Garmin GameOn - Installer.exeGet hashmaliciousUnknownBrowse
                                                        • 13.226.34.91
                                                        Garmin GameOn - Installer.exeGet hashmaliciousUnknownBrowse
                                                        • 13.226.34.64
                                                        AMAZON-02USReceipt.docmGet hashmaliciousUnknownBrowse
                                                        • 13.35.93.119
                                                        9v2podJOKj.exeGet hashmaliciousUnknownBrowse
                                                        • 13.249.82.68
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 54.255.164.76
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 54.255.164.76
                                                        9v2podJOKj.exeGet hashmaliciousUnknownBrowse
                                                        • 108.139.38.28
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 34.249.145.219
                                                        arm.elfGet hashmaliciousMiraiBrowse
                                                        • 34.249.145.219
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                        • 54.255.164.76
                                                        Garmin GameOn - Installer.exeGet hashmaliciousUnknownBrowse
                                                        • 13.226.34.91
                                                        Garmin GameOn - Installer.exeGet hashmaliciousUnknownBrowse
                                                        • 13.226.34.64
                                                        No context
                                                        No context
                                                        Process:/tmp/arm7.elf
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):14
                                                        Entropy (8bit):3.521640636343319
                                                        Encrypted:false
                                                        SSDEEP:3:TgiLG:TgiC
                                                        MD5:451AC90F7FA61D0393D6A5A02158D369
                                                        SHA1:5A7D458802462B80F94A9CDA24E2C877437A8E34
                                                        SHA-256:E2D543300D643CEF7698E750F74E8499993E346EF765FA2061EB5DFAF8D77E48
                                                        SHA-512:EF1D000F5B8BB5AFD4F6CB347FBE0FA0E97608B8C3839B6B44CB9828E5522396B334AE37148FCD2064A423B3DDD0C8874EF7019023A84B36E3893E50353F06FE
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:/tmp/arm7.elf.
                                                        Process:/tmp/arm7.elf
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):14
                                                        Entropy (8bit):3.521640636343319
                                                        Encrypted:false
                                                        SSDEEP:3:TgiLG:TgiC
                                                        MD5:451AC90F7FA61D0393D6A5A02158D369
                                                        SHA1:5A7D458802462B80F94A9CDA24E2C877437A8E34
                                                        SHA-256:E2D543300D643CEF7698E750F74E8499993E346EF765FA2061EB5DFAF8D77E48
                                                        SHA-512:EF1D000F5B8BB5AFD4F6CB347FBE0FA0E97608B8C3839B6B44CB9828E5522396B334AE37148FCD2064A423B3DDD0C8874EF7019023A84B36E3893E50353F06FE
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:/tmp/arm7.elf.
                                                        Process:/tmp/arm7.elf
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):14
                                                        Entropy (8bit):3.521640636343319
                                                        Encrypted:false
                                                        SSDEEP:3:TgiLG:TgiC
                                                        MD5:451AC90F7FA61D0393D6A5A02158D369
                                                        SHA1:5A7D458802462B80F94A9CDA24E2C877437A8E34
                                                        SHA-256:E2D543300D643CEF7698E750F74E8499993E346EF765FA2061EB5DFAF8D77E48
                                                        SHA-512:EF1D000F5B8BB5AFD4F6CB347FBE0FA0E97608B8C3839B6B44CB9828E5522396B334AE37148FCD2064A423B3DDD0C8874EF7019023A84B36E3893E50353F06FE
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:/tmp/arm7.elf.
                                                        File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), dynamically linked, stripped
                                                        Entropy (8bit):6.32612861927664
                                                        TrID:
                                                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                        File name:arm7.elf
                                                        File size:580'988 bytes
                                                        MD5:e66761ae8b07781349d431863c131f43
                                                        SHA1:d6b6ef30b763880393d8b41d44d5d257e8e46fd0
                                                        SHA256:54a273154e5dbea1ce300ebabe2e8be87afefbfc9d9a30f474114d7f0b0bcaaa
                                                        SHA512:263c061c3726e091d6c1ff8486318f6e1487a6363ee7d20c1b22f8d68b25c118d57c4838a6d74ef3f41cbe0a404615ae428f124d8adfdb8ae6531ebb3151c84a
                                                        SSDEEP:12288:px+CStFmRj6M7EQYHCV4ruEEGKqRKWkZFgMgU13pyZQSafidN6cgJ4FHR1n:px+c6M3YHC1NWkZn13C5W
                                                        TLSH:76C44A59A8419B95D1C02BBBFF1D934873131B38E2EFB1069D196B286BDBC1B0F7A501
                                                        File Content Preview:.ELF..............(.........4...........4. ...(.....................(...(...........................$...$...........................|:..8.................................................................................-...L..................@-.,@...0....S

                                                        ELF header

                                                        Class:ELF32
                                                        Data:2's complement, little endian
                                                        Version:1 (current)
                                                        Machine:ARM
                                                        Version Number:0x1
                                                        Type:EXEC (Executable file)
                                                        OS/ABI:UNIX - System V
                                                        ABI Version:0
                                                        Entry Point Address:0x8194
                                                        Flags:0x4000002
                                                        ELF Header Size:52
                                                        Program Header Offset:52
                                                        Program Header Size:32
                                                        Number of Program Headers:5
                                                        Section Header Offset:580348
                                                        Section Header Size:40
                                                        Number of Section Headers:16
                                                        Header String Table Index:15
                                                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                        NULL0x00x00x00x00x0000
                                                        .initPROGBITS0x80d40xd40x100x00x6AX004
                                                        .textPROGBITS0x80f00xf00x7a4740x00x6AX0016
                                                        .finiPROGBITS0x825640x7a5640x100x00x6AX004
                                                        .rodataPROGBITS0x825780x7a5780xf56c0x00x2A008
                                                        .ARM.extabPROGBITS0x91ae40x89ae40x180x00x2A004
                                                        .ARM.exidxARM_EXIDX0x91afc0x89afc0x1280x00x82AL204
                                                        .eh_framePROGBITS0x9a0000x8a0000x40x00x3WA004
                                                        .tbssNOBITS0x9a0040x8a0040x80x00x403WAT004
                                                        .init_arrayINIT_ARRAY0x9a0040x8a0040x40x00x3WA004
                                                        .fini_arrayFINI_ARRAY0x9a0080x8a0080x40x00x3WA004
                                                        .data.rel.roPROGBITS0x9a0100x8a0100x36000x00x3WA004
                                                        .gotPROGBITS0x9d6100x8d6100x12c0x40x3WA004
                                                        .dataPROGBITS0x9d73c0x8d73c0x3400x00x3WA004
                                                        .bssNOBITS0x9da800x8da7c0x79b80x00x3WA008
                                                        .shstrtabSTRTAB0x00x8da7c0x800x00x0001
                                                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                        DYNAMIC0x89afc0x91afc0x91afc0x1280x1284.69480x4R 0x4.ARM.exidx
                                                        LOAD0x00x80000x80000x89c240x89c246.35660x5R E0x8000.init .text .fini .rodata .ARM.extab .ARM.exidx
                                                        LOAD0x8a0000x9a0000x9a0000x3a7c0xb4384.18040x6RW 0x8000.eh_frame .tbss .init_array .fini_array .data.rel.ro .got .data .bss
                                                        DYNAMIC0x8a0040x9a0040x9a0040x00x80.00000x4R 0x4
                                                        DYNAMIC0x00x00x00x00x00.00000x7RWE0x4

                                                        Download Network PCAP: filteredfull

                                                        • Total Packets: 16
                                                        • 443 (HTTPS)
                                                        • 53 (DNS)
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Mar 21, 2025 01:45:04.285785913 CET37676443192.168.2.1354.217.10.153
                                                        Mar 21, 2025 01:45:32.876365900 CET58876443192.168.2.1354.171.230.55
                                                        Mar 21, 2025 01:45:32.876425982 CET4435887654.171.230.55192.168.2.13
                                                        Mar 21, 2025 01:45:32.876549959 CET58876443192.168.2.1354.171.230.55
                                                        Mar 21, 2025 01:45:32.881846905 CET58876443192.168.2.1354.171.230.55
                                                        Mar 21, 2025 01:45:32.881877899 CET4435887654.171.230.55192.168.2.13
                                                        Mar 21, 2025 01:46:12.241365910 CET4435887654.171.230.55192.168.2.13
                                                        Mar 21, 2025 01:46:12.241662025 CET58876443192.168.2.1354.171.230.55
                                                        Mar 21, 2025 01:46:12.241802931 CET58876443192.168.2.1354.171.230.55
                                                        Mar 21, 2025 01:46:12.241835117 CET4435887654.171.230.55192.168.2.13
                                                        Mar 21, 2025 01:46:12.244024992 CET4435887654.171.230.55192.168.2.13
                                                        Mar 21, 2025 01:46:12.244169950 CET58876443192.168.2.1354.171.230.55
                                                        Mar 21, 2025 01:46:12.244771004 CET58876443192.168.2.1354.171.230.55
                                                        Mar 21, 2025 01:46:12.244896889 CET4435887654.171.230.55192.168.2.13
                                                        Mar 21, 2025 01:46:12.244961023 CET58876443192.168.2.1354.171.230.55
                                                        Mar 21, 2025 01:46:12.244978905 CET4435887654.171.230.55192.168.2.13
                                                        Mar 21, 2025 01:46:12.245065928 CET58876443192.168.2.1354.171.230.55
                                                        Mar 21, 2025 01:46:13.278037071 CET4435887654.171.230.55192.168.2.13
                                                        Mar 21, 2025 01:46:13.278182983 CET4435887654.171.230.55192.168.2.13
                                                        Mar 21, 2025 01:46:13.278280020 CET58876443192.168.2.1354.171.230.55
                                                        Mar 21, 2025 01:46:13.278892040 CET58876443192.168.2.1354.171.230.55
                                                        Mar 21, 2025 01:46:13.278925896 CET4435887654.171.230.55192.168.2.13
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Mar 21, 2025 01:45:07.997798920 CET3337553192.168.2.131.1.1.1
                                                        Mar 21, 2025 01:45:07.997855902 CET4330153192.168.2.131.1.1.1
                                                        Mar 21, 2025 01:45:08.105753899 CET53433011.1.1.1192.168.2.13
                                                        Mar 21, 2025 01:45:13.002616882 CET5836453192.168.2.138.8.8.8
                                                        Mar 21, 2025 01:45:13.093288898 CET53583648.8.8.8192.168.2.13
                                                        Mar 21, 2025 01:45:13.093842030 CET4594153192.168.2.138.8.8.8
                                                        Mar 21, 2025 01:45:13.186155081 CET53459418.8.8.8192.168.2.13
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Mar 21, 2025 01:45:07.997798920 CET192.168.2.131.1.1.10x1e05Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                                        Mar 21, 2025 01:45:07.997855902 CET192.168.2.131.1.1.10xcb6Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                                        Mar 21, 2025 01:45:13.002616882 CET192.168.2.138.8.8.80x1e05Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                                        Mar 21, 2025 01:45:13.093842030 CET192.168.2.138.8.8.80x9ab4Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Mar 21, 2025 01:45:13.093288898 CET8.8.8.8192.168.2.130x1e05No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                                        Mar 21, 2025 01:45:13.093288898 CET8.8.8.8192.168.2.130x1e05No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                                                        • motd.ubuntu.com
                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                        0192.168.2.135887654.171.230.55443
                                                        TimestampBytes transferredDirectionData
                                                        2025-03-21 00:46:12 UTC249OUTGET / HTTP/1.1
                                                        User-Agent: wget/1.20.3-1ubuntu1 Ubuntu/20.04.2/LTS GNU/Linux/5.4.0-72-generic/x86_64 Intel(R)/Xeon(R)/Silver/4210/CPU/@/2.20GHz cloud_id/none
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        Host: motd.ubuntu.com
                                                        Connection: Keep-Alive
                                                        2025-03-21 00:46:13 UTC271INHTTP/1.1 200 OK
                                                        Date: Fri, 21 Mar 2025 00:46:13 GMT
                                                        Server: Apache/2.4.18 (Ubuntu)
                                                        Last-Modified: Fri, 21 Mar 2025 00:45:39 GMT
                                                        ETag: "d8-630cf92d2bf4b"
                                                        Accept-Ranges: bytes
                                                        Content-Length: 216
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Content-Type: text/plain
                                                        2025-03-21 00:46:13 UTC216INData Raw: 20 2a 20 53 74 72 69 63 74 6c 79 20 63 6f 6e 66 69 6e 65 64 20 4b 75 62 65 72 6e 65 74 65 73 20 6d 61 6b 65 73 20 65 64 67 65 20 61 6e 64 20 49 6f 54 20 73 65 63 75 72 65 2e 20 4c 65 61 72 6e 20 68 6f 77 20 4d 69 63 72 6f 4b 38 73 0a 20 20 20 6a 75 73 74 20 72 61 69 73 65 64 20 74 68 65 20 62 61 72 20 66 6f 72 20 65 61 73 79 2c 20 72 65 73 69 6c 69 65 6e 74 20 61 6e 64 20 73 65 63 75 72 65 20 4b 38 73 20 63 6c 75 73 74 65 72 20 64 65 70 6c 6f 79 6d 65 6e 74 2e 0a 0a 20 20 20 68 74 74 70 73 3a 2f 2f 75 62 75 6e 74 75 2e 63 6f 6d 2f 65 6e 67 61 67 65 2f 73 65 63 75 72 65 2d 6b 75 62 65 72 6e 65 74 65 73 2d 61 74 2d 74 68 65 2d 65 64 67 65 0a
                                                        Data Ascii: * Strictly confined Kubernetes makes edge and IoT secure. Learn how MicroK8s just raised the bar for easy, resilient and secure K8s cluster deployment. https://ubuntu.com/engage/secure-kubernetes-at-the-edge


                                                        System Behavior

                                                        Start time (UTC):00:45:05
                                                        Start date (UTC):21/03/2025
                                                        Path:/tmp/arm7.elf
                                                        Arguments:-
                                                        File size:4956856 bytes
                                                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/rm
                                                        Arguments:rm -f /tmp/tmp.0TPniCuKmw /tmp/tmp.rZz18ohmxs /tmp/tmp.DouXRBWVc0
                                                        File size:72056 bytes
                                                        MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/cat
                                                        Arguments:cat /tmp/tmp.0TPniCuKmw
                                                        File size:43416 bytes
                                                        MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/head
                                                        Arguments:head -n 10
                                                        File size:47480 bytes
                                                        MD5 hash:fd96a67145172477dd57131396fc9608

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/tr
                                                        Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                                                        File size:51544 bytes
                                                        MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/cut
                                                        Arguments:cut -c -80
                                                        File size:47480 bytes
                                                        MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/cat
                                                        Arguments:cat /tmp/tmp.0TPniCuKmw
                                                        File size:43416 bytes
                                                        MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/head
                                                        Arguments:head -n 10
                                                        File size:47480 bytes
                                                        MD5 hash:fd96a67145172477dd57131396fc9608

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/tr
                                                        Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                                                        File size:51544 bytes
                                                        MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/cut
                                                        Arguments:cut -c -80
                                                        File size:47480 bytes
                                                        MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/dash
                                                        Arguments:-
                                                        File size:129816 bytes
                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                        Start time (UTC):00:46:12
                                                        Start date (UTC):21/03/2025
                                                        Path:/usr/bin/rm
                                                        Arguments:rm -f /tmp/tmp.0TPniCuKmw /tmp/tmp.rZz18ohmxs /tmp/tmp.DouXRBWVc0
                                                        File size:72056 bytes
                                                        MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b