Edit tour

Linux Analysis Report
arm.elf

Overview

General Information

Sample name:arm.elf
Analysis ID:1646954
MD5:b273bb23fa10dceb2eeb4b44c873f412
SHA1:10a979f0219644c9738641d08abd65e6a4be9bda
SHA256:19959273b474356df250456bdb2e7a1e336db74c38e43c1764baf7a250dca466
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Sample reads /proc/mounts (often used for finding a writable filesystem)
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1646954
Start date and time:2025-03-24 13:18:36 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 43s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:arm.elf
Detection:MAL
Classification:mal52.troj.linELF@0/4@2/0
Command:/tmp/arm.elf
PID:5478
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world
Standard Error:
  • system is lnxubuntu20
  • arm.elf (PID: 5478, Parent: 5403, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/arm.elf
    • arm.elf New Fork (PID: 5485, Parent: 5478)
  • dash New Fork (PID: 5482, Parent: 3635)
  • rm (PID: 5482, Parent: 3635, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.54jY11Pvj2 /tmp/tmp.TdHXmcI7yM /tmp/tmp.6tqqoplSu1
  • dash New Fork (PID: 5483, Parent: 3635)
  • rm (PID: 5483, Parent: 3635, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.54jY11Pvj2 /tmp/tmp.TdHXmcI7yM /tmp/tmp.6tqqoplSu1
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: arm.elfVirustotal: Detection: 18%Perma Link
Source: arm.elfReversingLabs: Detection: 19%
Source: arm.elfString: /proc/%s/exe/proc/%s/cmdline/proc/%d/exe/proc/%d/cmdlinewgettftpcurlftp/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/lib/snap/usr/lib/
Source: /tmp/arm.elf (PID: 5485)Socket: 127.0.0.1:22448Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: arm.elf, 5478.1.00007f0d70033000.00007f0d7003d000.rw-.sdmp, arm.elf, 5485.1.00007f0d70033000.00007f0d7003d000.rw-.sdmpString found in binary or memory: http://17365637265742070617373776F7264206D656D6F721/t/wget.sh
Source: arm.elf, 5478.1.00007f0d70033000.00007f0d7003d000.rw-.sdmp, arm.elf, 5485.1.00007f0d70033000.00007f0d7003d000.rw-.sdmpString found in binary or memory: https://motd.ubuntu.com
Source: arm.elf, 5478.1.00007f0d70033000.00007f0d7003d000.rw-.sdmp, arm.elf, 5485.1.00007f0d70033000.00007f0d7003d000.rw-.sdmpString found in binary or memory: https://motd.ubuntu.comhe
Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42466 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 42466
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/arm.elf (PID: 5478)SIGKILL sent: pid: 3730, result: successfulJump to behavior
Source: classification engineClassification label: mal52.troj.linELF@0/4@2/0

Persistence and Installation Behavior

barindex
Source: /tmp/arm.elf (PID: 5478)File: /proc/5478/mountsJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/1583/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/2672/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/1577/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/3635/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/1593/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/3094/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/3406/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/1/mapsJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/1589/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/3402/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/806/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/807/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/928/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/3783/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/135/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/3412/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/1371/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/262/cmdlineJump to behavior
Source: /tmp/arm.elf (PID: 5478)File opened: /proc/142/cmdlineJump to behavior
Source: /usr/bin/dash (PID: 5482)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.54jY11Pvj2 /tmp/tmp.TdHXmcI7yM /tmp/tmp.6tqqoplSu1Jump to behavior
Source: /usr/bin/dash (PID: 5483)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.54jY11Pvj2 /tmp/tmp.TdHXmcI7yM /tmp/tmp.6tqqoplSu1Jump to behavior
Source: /tmp/arm.elf (PID: 5478)Queries kernel information via 'uname': Jump to behavior
Source: arm.elf, 5478.1.00007ffe7d726000.00007ffe7d747000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.szSgkr:
Source: arm.elf, 5478.1.00007ffe7d726000.00007ffe7d747000.rw-.sdmpBinary or memory string: /tmp/qemu-open.szSgkr
Source: arm.elf, 5478.1.00007f0d70033000.00007f0d7003d000.rw-.sdmp, arm.elf, 5485.1.00007f0d70033000.00007f0d7003d000.rw-.sdmpBinary or memory string: qemu-arm)Zm6vnZ5U4mf8vApyWcDwXR44ZAkzslsN)x
Source: arm.elf, 5485.1.00007f0d70033000.00007f0d7003d000.rw-.sdmpBinary or memory string: vmwarem
Source: arm.elf, 5485.1.00007f0d70033000.00007f0d7003d000.rw-.sdmpBinary or memory string: vmware
Source: arm.elf, 5478.1.000055efb81dd000.000055efb834c000.rw-.sdmp, arm.elf, 5485.1.000055efb81dd000.000055efb834c000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: arm.elf, 5478.1.00007f0d70033000.00007f0d7003d000.rw-.sdmp, arm.elf, 5485.1.00007f0d70033000.00007f0d7003d000.rw-.sdmpBinary or memory string: qemu-arm
Source: arm.elf, 5478.1.00007ffe7d726000.00007ffe7d747000.rw-.sdmp, arm.elf, 5485.1.00007ffe7d726000.00007ffe7d747000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/arm.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/arm.elf
Source: arm.elf, 5478.1.000055efb81dd000.000055efb834c000.rw-.sdmp, arm.elf, 5485.1.000055efb81dd000.000055efb834c000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: arm.elf, 5478.1.00007ffe7d726000.00007ffe7d747000.rw-.sdmp, arm.elf, 5485.1.00007ffe7d726000.00007ffe7d747000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: arm.elf, 5485.1.00007ffe7d726000.00007ffe7d747000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
File Deletion
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1646954 Sample: arm.elf Startdate: 24/03/2025 Architecture: LINUX Score: 52 16 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->16 18 34.243.160.129, 42466, 443 AMAZON-02US United States 2->18 20 daisy.ubuntu.com 2->20 22 Multi AV Scanner detection for submitted file 2->22 7 arm.elf 2->7         started        10 dash rm 2->10         started        12 dash rm 2->12         started        signatures3 process4 signatures5 24 Sample reads /proc/mounts (often used for finding a writable filesystem) 7->24 14 arm.elf 7->14         started        process6
SourceDetectionScannerLabelLink
arm.elf18%VirustotalBrowse
arm.elf19%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    https://motd.ubuntu.comarm.elf, 5478.1.00007f0d70033000.00007f0d7003d000.rw-.sdmp, arm.elf, 5485.1.00007f0d70033000.00007f0d7003d000.rw-.sdmpfalse
      high
      https://motd.ubuntu.comhearm.elf, 5478.1.00007f0d70033000.00007f0d7003d000.rw-.sdmp, arm.elf, 5485.1.00007f0d70033000.00007f0d7003d000.rw-.sdmpfalse
        high
        http://17365637265742070617373776F7264206D656D6F721/t/wget.sharm.elf, 5478.1.00007f0d70033000.00007f0d7003d000.rw-.sdmp, arm.elf, 5485.1.00007f0d70033000.00007f0d7003d000.rw-.sdmpfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          185.125.190.26
          unknownUnited Kingdom
          41231CANONICAL-ASGBfalse
          34.243.160.129
          unknownUnited States
          16509AMAZON-02USfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          185.125.190.26arm.elfGet hashmaliciousMiraiBrowse
            na.elfGet hashmaliciousPrometeiBrowse
              morte.x86.elfGet hashmaliciousOkiruBrowse
                owari.arm6.elfGet hashmaliciousUnknownBrowse
                  arc.elfGet hashmaliciousMiraiBrowse
                    na.elfGet hashmaliciousPrometeiBrowse
                      x86.elfGet hashmaliciousMiraiBrowse
                        arm5.elfGet hashmaliciousUnknownBrowse
                          na.elfGet hashmaliciousPrometeiBrowse
                            boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                              34.243.160.129na.elfGet hashmaliciousPrometeiBrowse
                                na.elfGet hashmaliciousPrometeiBrowse
                                  ppc.fkunigr.elfGet hashmaliciousMiraiBrowse
                                    mips.elfGet hashmaliciousMiraiBrowse
                                      na.elfGet hashmaliciousPrometeiBrowse
                                        wget.elfGet hashmaliciousGafgyt, MiraiBrowse
                                          na.elfGet hashmaliciousPrometeiBrowse
                                            miner.elfGet hashmaliciousUnknownBrowse
                                              na.elfGet hashmaliciousPrometeiBrowse
                                                linux_mipsel_softfloat.elfGet hashmaliciousChaosBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  daisy.ubuntu.comtftp.elfGet hashmaliciousUnknownBrowse
                                                  • 162.213.35.25
                                                  aarch64.elfGet hashmaliciousUnknownBrowse
                                                  • 162.213.35.24
                                                  g4za.arm5.elfGet hashmaliciousMiraiBrowse
                                                  • 162.213.35.24
                                                  g4za.arm6.elfGet hashmaliciousMiraiBrowse
                                                  • 162.213.35.25
                                                  .i.elfGet hashmaliciousUnknownBrowse
                                                  • 162.213.35.25
                                                  arm5.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                  • 162.213.35.24
                                                  arm6.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                  • 162.213.35.24
                                                  ppc.elfGet hashmaliciousUnknownBrowse
                                                  • 162.213.35.24
                                                  arm7.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                  • 162.213.35.25
                                                  mips.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                  • 162.213.35.24
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  AMAZON-02USarm7.elfGet hashmaliciousUnknownBrowse
                                                  • 54.171.230.55
                                                  tftp.elfGet hashmaliciousUnknownBrowse
                                                  • 54.217.10.153
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 34.243.160.129
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 52.212.150.54
                                                  8RGIkD2qeg.exeGet hashmaliciousLokibotBrowse
                                                  • 13.248.169.48
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 34.249.145.219
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 54.247.62.1
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 52.212.150.54
                                                  mips.elfGet hashmaliciousUnknownBrowse
                                                  • 54.171.230.55
                                                  Fatura-03-2025.pdfGet hashmaliciousUnknownBrowse
                                                  • 3.17.7.232
                                                  CANONICAL-ASGBarm7.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 91.189.91.42
                                                  mips.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 91.189.91.42
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 91.189.91.42
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                  • 91.189.91.42
                                                  x86.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                  • 91.189.91.42
                                                  arm5.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  sh4.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                  • 91.189.91.42
                                                  arm5.elfGet hashmaliciousMiraiBrowse
                                                  • 91.189.91.42
                                                  No context
                                                  No context
                                                  Process:/tmp/arm.elf
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):13
                                                  Entropy (8bit):3.3927474104487847
                                                  Encrypted:false
                                                  SSDEEP:3:Tg7G:Tgy
                                                  MD5:060C950602AE5DFAF583473721C0D328
                                                  SHA1:91D13B439729088DC17F1E0519970D82C56F2B07
                                                  SHA-256:F8D4586FDF6230A2D5F431EF44BABDF37F6D7CEDBB3560702B0DC8493DD44EE3
                                                  SHA-512:000D50E0A5736B0AB3B1BF61F55911914808FA197365B10F61F24096E2959ADAC2C3FF0D9ED226AD99934093F9FDD1C7035A22EEB5091DF75402A0A26E7A84AC
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:/tmp/arm.elf.
                                                  Process:/tmp/arm.elf
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):13
                                                  Entropy (8bit):3.3927474104487847
                                                  Encrypted:false
                                                  SSDEEP:3:Tg7G:Tgy
                                                  MD5:060C950602AE5DFAF583473721C0D328
                                                  SHA1:91D13B439729088DC17F1E0519970D82C56F2B07
                                                  SHA-256:F8D4586FDF6230A2D5F431EF44BABDF37F6D7CEDBB3560702B0DC8493DD44EE3
                                                  SHA-512:000D50E0A5736B0AB3B1BF61F55911914808FA197365B10F61F24096E2959ADAC2C3FF0D9ED226AD99934093F9FDD1C7035A22EEB5091DF75402A0A26E7A84AC
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:/tmp/arm.elf.
                                                  Process:/tmp/arm.elf
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):13
                                                  Entropy (8bit):3.3927474104487847
                                                  Encrypted:false
                                                  SSDEEP:3:Tg7G:Tgy
                                                  MD5:060C950602AE5DFAF583473721C0D328
                                                  SHA1:91D13B439729088DC17F1E0519970D82C56F2B07
                                                  SHA-256:F8D4586FDF6230A2D5F431EF44BABDF37F6D7CEDBB3560702B0DC8493DD44EE3
                                                  SHA-512:000D50E0A5736B0AB3B1BF61F55911914808FA197365B10F61F24096E2959ADAC2C3FF0D9ED226AD99934093F9FDD1C7035A22EEB5091DF75402A0A26E7A84AC
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:/tmp/arm.elf.
                                                  Process:/tmp/arm.elf
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):13
                                                  Entropy (8bit):3.3927474104487847
                                                  Encrypted:false
                                                  SSDEEP:3:Tg7G:Tgy
                                                  MD5:060C950602AE5DFAF583473721C0D328
                                                  SHA1:91D13B439729088DC17F1E0519970D82C56F2B07
                                                  SHA-256:F8D4586FDF6230A2D5F431EF44BABDF37F6D7CEDBB3560702B0DC8493DD44EE3
                                                  SHA-512:000D50E0A5736B0AB3B1BF61F55911914808FA197365B10F61F24096E2959ADAC2C3FF0D9ED226AD99934093F9FDD1C7035A22EEB5091DF75402A0A26E7A84AC
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:/tmp/arm.elf.
                                                  File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                                                  Entropy (8bit):6.104631250534213
                                                  TrID:
                                                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                  File name:arm.elf
                                                  File size:79'516 bytes
                                                  MD5:b273bb23fa10dceb2eeb4b44c873f412
                                                  SHA1:10a979f0219644c9738641d08abd65e6a4be9bda
                                                  SHA256:19959273b474356df250456bdb2e7a1e336db74c38e43c1764baf7a250dca466
                                                  SHA512:f0e0942a27257f3f69206ca26f4beb3bb2427cb393e218ecf207df2dc9020d62772c6feb1b4177aabe8461e518c27c4d28994649004e2f9b9ff875f144239869
                                                  SSDEEP:1536:jwgeEqGVJdzFCdxPacQuiOtmbeBkTMLzv8GaKZAZHAQF8HKrwaDTCvl:jJeEqGVJdzq2OtmbvMLzv8M2gQF8HYwR
                                                  TLSH:96731946BC919A52C6C146BBFF1F428D3326639CE3EE7213DA259F21378B5660E3B141
                                                  File Content Preview:.ELF...a..........(.........4....5......4. ...(......................1...1...............1...1...1.......h..........Q.td..................................-...L."....E..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                                                  ELF header

                                                  Class:ELF32
                                                  Data:2's complement, little endian
                                                  Version:1 (current)
                                                  Machine:ARM
                                                  Version Number:0x1
                                                  Type:EXEC (Executable file)
                                                  OS/ABI:ARM - ABI
                                                  ABI Version:0
                                                  Entry Point Address:0x8190
                                                  Flags:0x202
                                                  ELF Header Size:52
                                                  Program Header Offset:52
                                                  Program Header Size:32
                                                  Number of Program Headers:3
                                                  Section Header Offset:79116
                                                  Section Header Size:40
                                                  Number of Section Headers:10
                                                  Header String Table Index:9
                                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                  NULL0x00x00x00x00x0000
                                                  .initPROGBITS0x80940x940x180x00x6AX004
                                                  .textPROGBITS0x80b00xb00x117bc0x00x6AX0016
                                                  .finiPROGBITS0x1986c0x1186c0x140x00x6AX004
                                                  .rodataPROGBITS0x198800x118800x19540x00x2A004
                                                  .ctorsPROGBITS0x231d80x131d80x80x00x3WA004
                                                  .dtorsPROGBITS0x231e00x131e00x80x00x3WA004
                                                  .dataPROGBITS0x231ec0x131ec0x2e00x00x3WA004
                                                  .bssNOBITS0x234cc0x134cc0x65d80x00x3WA004
                                                  .shstrtabSTRTAB0x00x134cc0x3e0x00x0001
                                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                  LOAD0x00x80000x80000x131d40x131d46.12350x5R E0x8000.init .text .fini .rodata
                                                  LOAD0x131d80x231d80x231d80x2f40x68cc3.76450x6RW 0x8000.ctors .dtors .data .bss
                                                  GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

                                                  Download Network PCAP: filteredfull

                                                  • Total Packets: 6
                                                  • 443 (HTTPS)
                                                  • 53 (DNS)
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Mar 24, 2025 13:19:15.053944111 CET42466443192.168.2.1434.243.160.129
                                                  Mar 24, 2025 13:19:18.505043030 CET42466443192.168.2.1434.243.160.129
                                                  Mar 24, 2025 13:19:18.683365107 CET4434246634.243.160.129192.168.2.14
                                                  Mar 24, 2025 13:19:26.835839987 CET46540443192.168.2.14185.125.190.26
                                                  Mar 24, 2025 13:19:57.058931112 CET46540443192.168.2.14185.125.190.26
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Mar 24, 2025 13:19:20.292851925 CET3480353192.168.2.141.1.1.1
                                                  Mar 24, 2025 13:19:20.292851925 CET4118853192.168.2.141.1.1.1
                                                  Mar 24, 2025 13:19:20.394742012 CET53348031.1.1.1192.168.2.14
                                                  Mar 24, 2025 13:19:20.398423910 CET53411881.1.1.1192.168.2.14
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Mar 24, 2025 13:19:20.292851925 CET192.168.2.141.1.1.10xdec4Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                                  Mar 24, 2025 13:19:20.292851925 CET192.168.2.141.1.1.10x8f9aStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Mar 24, 2025 13:19:20.394742012 CET1.1.1.1192.168.2.140xdec4No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                                                  Mar 24, 2025 13:19:20.394742012 CET1.1.1.1192.168.2.140xdec4No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                                                  System Behavior

                                                  Start time (UTC):12:19:18
                                                  Start date (UTC):24/03/2025
                                                  Path:/tmp/arm.elf
                                                  Arguments:-
                                                  File size:4956856 bytes
                                                  MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                  Start time (UTC):12:19:17
                                                  Start date (UTC):24/03/2025
                                                  Path:/usr/bin/dash
                                                  Arguments:-
                                                  File size:129816 bytes
                                                  MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                  Start time (UTC):12:19:17
                                                  Start date (UTC):24/03/2025
                                                  Path:/usr/bin/rm
                                                  Arguments:rm -f /tmp/tmp.54jY11Pvj2 /tmp/tmp.TdHXmcI7yM /tmp/tmp.6tqqoplSu1
                                                  File size:72056 bytes
                                                  MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                  Start time (UTC):12:19:17
                                                  Start date (UTC):24/03/2025
                                                  Path:/usr/bin/dash
                                                  Arguments:-
                                                  File size:129816 bytes
                                                  MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                  Start time (UTC):12:19:17
                                                  Start date (UTC):24/03/2025
                                                  Path:/usr/bin/rm
                                                  Arguments:rm -f /tmp/tmp.54jY11Pvj2 /tmp/tmp.TdHXmcI7yM /tmp/tmp.6tqqoplSu1
                                                  File size:72056 bytes
                                                  MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b