Edit tour

Linux Analysis Report
arm5.elf

Overview

General Information

Sample name:arm5.elf
Analysis ID:1646528
MD5:a6259b52248eb007a6cfed8c1598134f
SHA1:7501bcbdac3184d64a37d954dee02947ed759d79
SHA256:c7a2cb428a8ed41bba44536c2b98c0ba9f1e65ff24139b01ee5f39003183ea5c
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Sample reads /proc/mounts (often used for finding a writable filesystem)
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1646528
Start date and time:2025-03-24 05:07:50 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 46s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:arm5.elf
Detection:MAL
Classification:mal52.troj.linELF@0/3@2/0
Command:/tmp/arm5.elf
PID:5430
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world
Standard Error:
  • system is lnxubuntu20
  • arm5.elf (PID: 5430, Parent: 5353, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/arm5.elf
    • arm5.elf New Fork (PID: 5433, Parent: 5430)
  • dash New Fork (PID: 5517, Parent: 3603)
  • rm (PID: 5517, Parent: 3603, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.wnTqWMRFn2 /tmp/tmp.lF6Ae7NxMY /tmp/tmp.ITC1h5aMu2
  • dash New Fork (PID: 5518, Parent: 3603)
  • rm (PID: 5518, Parent: 3603, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.wnTqWMRFn2 /tmp/tmp.lF6Ae7NxMY /tmp/tmp.ITC1h5aMu2
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: arm5.elfVirustotal: Detection: 20%Perma Link
Source: arm5.elfReversingLabs: Detection: 16%
Source: /tmp/arm5.elf (PID: 5433)Socket: 127.0.0.1:22448Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: arm5.elf, 5430.1.00007fc38003c000.00007fc380042000.rw-.sdmp, arm5.elf, 5433.1.00007fc38003c000.00007fc380042000.rw-.sdmpString found in binary or memory: https://motd.ubuntu.com
Source: arm5.elf, 5430.1.00007fc38003c000.00007fc380042000.rw-.sdmp, arm5.elf, 5433.1.00007fc38003c000.00007fc380042000.rw-.sdmpString found in binary or memory: https://motd.ubuntu.comhe
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58878
Source: unknownNetwork traffic detected: HTTP traffic on port 58878 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.troj.linELF@0/3@2/0

Persistence and Installation Behavior

barindex
Source: /tmp/arm5.elf (PID: 5430)File: /proc/5430/mountsJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/3640/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/3638/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/3639/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/238/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/239/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/3637/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/3771/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/5270/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/241/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/1/mapsJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/1482/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/1480/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/371/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/1238/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/134/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/3413/cmdlineJump to behavior
Source: /tmp/arm5.elf (PID: 5430)File opened: /proc/258/cmdlineJump to behavior
Source: /usr/bin/dash (PID: 5517)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.wnTqWMRFn2 /tmp/tmp.lF6Ae7NxMY /tmp/tmp.ITC1h5aMu2Jump to behavior
Source: /usr/bin/dash (PID: 5518)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.wnTqWMRFn2 /tmp/tmp.lF6Ae7NxMY /tmp/tmp.ITC1h5aMu2Jump to behavior
Source: /tmp/arm5.elf (PID: 5430)Queries kernel information via 'uname': Jump to behavior
Source: arm5.elf, 5430.1.00007fc38003c000.00007fc380042000.rw-.sdmp, arm5.elf, 5433.1.00007fc38003c000.00007fc380042000.rw-.sdmpBinary or memory string: !!a1gAWFxuAXsFWUgBRQAA!!a1gAWFxuAXsAWUgKRXgA!!a1gAWFxuAXsAWEgJR3IA!!a10CWFxuAHsGWVcWQHAA!!a10CWFxuAHsGWVcWQHUA!!aFwAWF9uA3sGW0gLRgAA!1aFwAWFlpG2QBW0gJTwAA1!qemu-arm2QBW0gJTwAA!
Source: arm5.elf, 5433.1.00007fc38003c000.00007fc380042000.rw-.sdmpBinary or memory string: vmware
Source: arm5.elf, 5430.1.00007fc38003c000.00007fc380042000.rw-.sdmp, arm5.elf, 5433.1.00007fc38003c000.00007fc380042000.rw-.sdmpBinary or memory string: qemu-arm
Source: arm5.elf, 5430.1.00007ffef2fce000.00007ffef2fef000.rw-.sdmpBinary or memory string: BV/tmp/qemu-open.4asH4K:U
Source: arm5.elf, 5430.1.0000564287722000.0000564287870000.rw-.sdmp, arm5.elf, 5433.1.0000564287722000.0000564287870000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: arm5.elf, 5430.1.00007ffef2fce000.00007ffef2fef000.rw-.sdmp, arm5.elf, 5433.1.00007ffef2fce000.00007ffef2fef000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: arm5.elf, 5430.1.00007ffef2fce000.00007ffef2fef000.rw-.sdmpBinary or memory string: /tmp/qemu-open.4asH4K
Source: arm5.elf, 5430.1.0000564287722000.0000564287870000.rw-.sdmp, arm5.elf, 5433.1.0000564287722000.0000564287870000.rw-.sdmpBinary or memory string: BV!/etc/qemu-binfmt/arm
Source: arm5.elf, 5433.1.00007ffef2fce000.00007ffef2fef000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
Source: arm5.elf, 5430.1.00007ffef2fce000.00007ffef2fef000.rw-.sdmp, arm5.elf, 5433.1.00007ffef2fce000.00007ffef2fef000.rw-.sdmpBinary or memory string: Sx86_64/usr/bin/qemu-arm/tmp/arm5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/arm5.elf
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
File Deletion
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1646528 Sample: arm5.elf Startdate: 24/03/2025 Architecture: LINUX Score: 52 16 54.171.230.55, 443, 58878 AMAZON-02US United States 2->16 18 daisy.ubuntu.com 2->18 20 Multi AV Scanner detection for submitted file 2->20 7 arm5.elf 2->7         started        10 dash rm 2->10         started        12 dash rm 2->12         started        signatures3 process4 signatures5 22 Sample reads /proc/mounts (often used for finding a writable filesystem) 7->22 14 arm5.elf 7->14         started        process6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
arm5.elf21%VirustotalBrowse
arm5.elf17%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    https://motd.ubuntu.comarm5.elf, 5430.1.00007fc38003c000.00007fc380042000.rw-.sdmp, arm5.elf, 5433.1.00007fc38003c000.00007fc380042000.rw-.sdmpfalse
      high
      https://motd.ubuntu.comhearm5.elf, 5430.1.00007fc38003c000.00007fc380042000.rw-.sdmp, arm5.elf, 5433.1.00007fc38003c000.00007fc380042000.rw-.sdmpfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        54.171.230.55
        unknownUnited States
        16509AMAZON-02USfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        54.171.230.55morte.mips.elfGet hashmaliciousGafgyt, OkiruBrowse
          aarch64.elfGet hashmaliciousMiraiBrowse
            na.elfGet hashmaliciousPrometeiBrowse
              arm6.elfGet hashmaliciousMiraiBrowse
                na.elfGet hashmaliciousPrometeiBrowse
                  gigab.arm5.elfGet hashmaliciousUnknownBrowse
                    na.elfGet hashmaliciousPrometeiBrowse
                      updated.elfGet hashmaliciousUnknownBrowse
                        spc.elfGet hashmaliciousMiraiBrowse
                          na.elfGet hashmaliciousPrometeiBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            daisy.ubuntu.commorte.m68k.elfGet hashmaliciousGafgyt, OkiruBrowse
                            • 162.213.35.24
                            morte.arm.elfGet hashmaliciousGafgyt, OkiruBrowse
                            • 162.213.35.25
                            morte.mips.elfGet hashmaliciousGafgyt, OkiruBrowse
                            • 162.213.35.24
                            resgod.arm.elfGet hashmaliciousMiraiBrowse
                            • 162.213.35.24
                            resgod.arc.elfGet hashmaliciousMiraiBrowse
                            • 162.213.35.25
                            gigab.arm4.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.24
                            resgod.mips.elfGet hashmaliciousMiraiBrowse
                            • 162.213.35.24
                            resgod.arm7.elfGet hashmaliciousMiraiBrowse
                            • 162.213.35.25
                            gigab.i686.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.25
                            resgod.spc.elfGet hashmaliciousMiraiBrowse
                            • 162.213.35.24
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            AMAZON-02US#U0440#U043e#U0431#U043b#U043e#U043a#U0441.exeGet hashmaliciousNjratBrowse
                            • 18.197.239.5
                            na.elfGet hashmaliciousPrometeiBrowse
                            • 52.43.119.120
                            gigab.x86.elfGet hashmaliciousUnknownBrowse
                            • 34.249.145.219
                            morte.mips.elfGet hashmaliciousGafgyt, OkiruBrowse
                            • 54.171.230.55
                            arm7.elfGet hashmaliciousUnknownBrowse
                            • 34.249.145.219
                            SecuriteInfo.com.Win64.CrypterX-gen.5834.27621.exeGet hashmaliciousVidarBrowse
                            • 108.138.128.112
                            aarch64.elfGet hashmaliciousMiraiBrowse
                            • 34.249.145.219
                            resgod.arm5.elfGet hashmaliciousMiraiBrowse
                            • 54.77.209.255
                            na.elfGet hashmaliciousPrometeiBrowse
                            • 52.43.119.120
                            na.elfGet hashmaliciousPrometeiBrowse
                            • 54.247.62.1
                            No context
                            No context
                            Process:/tmp/arm5.elf
                            File Type:data
                            Category:dropped
                            Size (bytes):14
                            Entropy (8bit):3.521640636343319
                            Encrypted:false
                            SSDEEP:3:TggLAJ5:Tgg03
                            MD5:A737667E3E61E716C83359F35BC141DA
                            SHA1:E7C3DBC96B90E28F18CFB1CADE0C7AF673FFAA57
                            SHA-256:2D8A0F430A3339E16B223D653251534539D95B1DF7142834F68D9172B1656E37
                            SHA-512:0ACAFC3F3F40EDEF3D9F2F1CCE09BAF5004FD8488434F4903F18B9B7E77B4A6CDF7F84A47856CB2FDAA4B1B0F70FC2A3EDDE82BD29831FF54CB75F4E4C74FE74
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:/tmp/arm5.elf.
                            Process:/tmp/arm5.elf
                            File Type:data
                            Category:dropped
                            Size (bytes):14
                            Entropy (8bit):3.521640636343319
                            Encrypted:false
                            SSDEEP:3:TggLAJ5:Tgg03
                            MD5:A737667E3E61E716C83359F35BC141DA
                            SHA1:E7C3DBC96B90E28F18CFB1CADE0C7AF673FFAA57
                            SHA-256:2D8A0F430A3339E16B223D653251534539D95B1DF7142834F68D9172B1656E37
                            SHA-512:0ACAFC3F3F40EDEF3D9F2F1CCE09BAF5004FD8488434F4903F18B9B7E77B4A6CDF7F84A47856CB2FDAA4B1B0F70FC2A3EDDE82BD29831FF54CB75F4E4C74FE74
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:/tmp/arm5.elf.
                            Process:/tmp/arm5.elf
                            File Type:data
                            Category:dropped
                            Size (bytes):14
                            Entropy (8bit):3.521640636343319
                            Encrypted:false
                            SSDEEP:3:TggLAJ5:Tgg03
                            MD5:A737667E3E61E716C83359F35BC141DA
                            SHA1:E7C3DBC96B90E28F18CFB1CADE0C7AF673FFAA57
                            SHA-256:2D8A0F430A3339E16B223D653251534539D95B1DF7142834F68D9172B1656E37
                            SHA-512:0ACAFC3F3F40EDEF3D9F2F1CCE09BAF5004FD8488434F4903F18B9B7E77B4A6CDF7F84A47856CB2FDAA4B1B0F70FC2A3EDDE82BD29831FF54CB75F4E4C74FE74
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:/tmp/arm5.elf.
                            File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                            Entropy (8bit):6.096397153006739
                            TrID:
                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                            File name:arm5.elf
                            File size:115'468 bytes
                            MD5:a6259b52248eb007a6cfed8c1598134f
                            SHA1:7501bcbdac3184d64a37d954dee02947ed759d79
                            SHA256:c7a2cb428a8ed41bba44536c2b98c0ba9f1e65ff24139b01ee5f39003183ea5c
                            SHA512:cbbdc2566a62dd963e1140fbc2f279101e81665ac9058837daea94717bff48d1b0a2e948e6544c06515643f94fdcfb46b907bba61605a0f6a1f159fcf37576c0
                            SSDEEP:3072:rbxqks/HRRzqt24aNsI66jy71on6tIqT1Dbnd:rbxXsrzqt24Atr61o6tF19
                            TLSH:6DB3F79AB8509F66C1D116BEFE1E428D33232FB8E3DA3107DD156B2077CA95A0E7B441
                            File Content Preview:.ELF..............(.....l...4...,.......4. ...(........p(...(<..(<.......................................................................I..........Q.td.............................@-..@............/..@-.,@...0....S..... 0....S.........../..0...0...@..../

                            ELF header

                            Class:ELF32
                            Data:2's complement, little endian
                            Version:1 (current)
                            Machine:ARM
                            Version Number:0x1
                            Type:EXEC (Executable file)
                            OS/ABI:UNIX - System V
                            ABI Version:0
                            Entry Point Address:0x816c
                            Flags:0x4000002
                            ELF Header Size:52
                            Program Header Offset:52
                            Program Header Size:32
                            Number of Program Headers:4
                            Section Header Offset:114988
                            Section Header Size:40
                            Number of Section Headers:12
                            Header String Table Index:11
                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                            NULL0x00x00x00x00x0000
                            .initPROGBITS0x80b40xb40x140x00x6AX001
                            .textPROGBITS0x80c80xc80x19f140x00x6AX004
                            .finiPROGBITS0x21fdc0x19fdc0x140x00x6AX001
                            .rodataPROGBITS0x21ff00x19ff00x1c380x00x2A004
                            .ARM.exidxARM_EXIDX0x23c280x1bc280xc80x00x82AL204
                            .init_arrayINIT_ARRAY0x2c0040x1c0040x40x00x3WA004
                            .fini_arrayFINI_ARRAY0x2c0080x1c0080x40x00x3WA004
                            .gotPROGBITS0x2c0100x1c0100x280x40x3WA004
                            .dataPROGBITS0x2c0380x1c0380x9c0x00x3WA004
                            .bssNOBITS0x2c0d80x1c0d40x48ac0x00x3WA008
                            .shstrtabSTRTAB0x00x1c0d40x580x00x0001
                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                            EXIDX0x1bc280x23c280x23c280xc80xc84.33790x4R 0x4.ARM.exidx
                            LOAD0x00x80000x80000x1bcf00x1bcf06.12920x5R E0x8000.init .text .fini .rodata .ARM.exidx
                            LOAD0x1c0040x2c0040x2c0040xd00x49803.66570x6RW 0x8000.init_array .fini_array .got .data .bss
                            GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

                            Download Network PCAP: filteredfull

                            • Total Packets: 13
                            • 443 (HTTPS)
                            • 53 (DNS)
                            TimestampSource PortDest PortSource IPDest IP
                            Mar 24, 2025 05:08:41.113913059 CET58878443192.168.2.1354.171.230.55
                            Mar 24, 2025 05:08:41.374393940 CET4435887854.171.230.55192.168.2.13
                            Mar 24, 2025 05:08:41.374557972 CET58878443192.168.2.1354.171.230.55
                            Mar 24, 2025 05:08:41.375590086 CET58878443192.168.2.1354.171.230.55
                            Mar 24, 2025 05:08:42.105849028 CET58878443192.168.2.1354.171.230.55
                            Mar 24, 2025 05:08:42.905895948 CET58878443192.168.2.1354.171.230.55
                            Mar 24, 2025 05:08:44.506031036 CET58878443192.168.2.1354.171.230.55
                            Mar 24, 2025 05:08:47.769898891 CET58878443192.168.2.1354.171.230.55
                            Mar 24, 2025 05:08:54.169910908 CET58878443192.168.2.1354.171.230.55
                            Mar 24, 2025 05:09:06.969890118 CET58878443192.168.2.1354.171.230.55
                            Mar 24, 2025 05:09:32.569938898 CET58878443192.168.2.1354.171.230.55
                            Mar 24, 2025 05:09:41.374773026 CET58878443192.168.2.1354.171.230.55
                            Mar 24, 2025 05:09:41.584232092 CET4435887854.171.230.55192.168.2.13
                            TimestampSource PortDest PortSource IPDest IP
                            Mar 24, 2025 05:08:43.580136061 CET5821153192.168.2.131.1.1.1
                            Mar 24, 2025 05:08:43.580136061 CET3499753192.168.2.131.1.1.1
                            Mar 24, 2025 05:08:43.680757046 CET53349971.1.1.1192.168.2.13
                            Mar 24, 2025 05:08:43.683665037 CET53582111.1.1.1192.168.2.13
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Mar 24, 2025 05:08:43.580136061 CET192.168.2.131.1.1.10x1094Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                            Mar 24, 2025 05:08:43.580136061 CET192.168.2.131.1.1.10x20b1Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Mar 24, 2025 05:08:43.683665037 CET1.1.1.1192.168.2.130x1094No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                            Mar 24, 2025 05:08:43.683665037 CET1.1.1.1192.168.2.130x1094No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                            System Behavior

                            Start time (UTC):04:08:41
                            Start date (UTC):24/03/2025
                            Path:/tmp/arm5.elf
                            Arguments:-
                            File size:4956856 bytes
                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                            Start time (UTC):04:09:40
                            Start date (UTC):24/03/2025
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):04:09:40
                            Start date (UTC):24/03/2025
                            Path:/usr/bin/rm
                            Arguments:rm -f /tmp/tmp.wnTqWMRFn2 /tmp/tmp.lF6Ae7NxMY /tmp/tmp.ITC1h5aMu2
                            File size:72056 bytes
                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                            Start time (UTC):04:09:40
                            Start date (UTC):24/03/2025
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):04:09:40
                            Start date (UTC):24/03/2025
                            Path:/usr/bin/rm
                            Arguments:rm -f /tmp/tmp.wnTqWMRFn2 /tmp/tmp.lF6Ae7NxMY /tmp/tmp.ITC1h5aMu2
                            File size:72056 bytes
                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b