Edit tour

Linux Analysis Report
arm6.elf

Overview

General Information

Sample name:arm6.elf
Analysis ID:1646958
MD5:4056553e7eab29be85ddb0edc5af5d62
SHA1:f3fb2dab8933849916e93d4d4014f7bb163e42ac
SHA256:ab3cfd71402c57342fd07d20b5972fb43568f3be8b558f9eb8f86508ca1518e2
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Sample reads /proc/mounts (often used for finding a writable filesystem)
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1646958
Start date and time:2025-03-24 13:23:11 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 37s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:arm6.elf
Detection:MAL
Classification:mal52.troj.linELF@0/4@2/0
Command:/tmp/arm6.elf
PID:5424
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world
Standard Error:
  • system is lnxubuntu20
  • arm6.elf (PID: 5424, Parent: 5346, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/arm6.elf
    • arm6.elf New Fork (PID: 5431, Parent: 5424)
  • dash New Fork (PID: 5429, Parent: 3590)
  • rm (PID: 5429, Parent: 3590, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.JOdHON771a /tmp/tmp.Vo2uvnqfFI /tmp/tmp.4MAIQkxvZc
  • dash New Fork (PID: 5430, Parent: 3590)
  • rm (PID: 5430, Parent: 3590, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.JOdHON771a /tmp/tmp.Vo2uvnqfFI /tmp/tmp.4MAIQkxvZc
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: arm6.elfVirustotal: Detection: 10%Perma Link
Source: arm6.elfReversingLabs: Detection: 16%
Source: arm6.elfString: /proc/%s/exe/proc/%s/cmdline/proc/%d/exe/proc/%d/cmdlinerwgettftpcurlftp/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/lib/snap/usr/lib/
Source: /tmp/arm6.elf (PID: 5431)Socket: 127.0.0.1:22448Jump to behavior
Source: global trafficTCP traffic: 192.168.2.13:57212 -> 54.247.62.1:443
Source: global trafficTCP traffic: 192.168.2.13:48202 -> 185.125.190.26:443
Source: unknownTCP traffic detected without corresponding DNS query: 54.247.62.1
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: arm6.elf, 5424.1.00007fbbc4038000.00007fbbc403e000.rw-.sdmp, arm6.elf, 5431.1.00007fbbc4038000.00007fbbc403e000.rw-.sdmpString found in binary or memory: https://motd.ubuntu.com
Source: arm6.elf, 5424.1.00007fbbc4038000.00007fbbc403e000.rw-.sdmp, arm6.elf, 5431.1.00007fbbc4038000.00007fbbc403e000.rw-.sdmpString found in binary or memory: https://motd.ubuntu.comhe
Source: unknownNetwork traffic detected: HTTP traffic on port 48202 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57212 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/arm6.elf (PID: 5424)SIGKILL sent: pid: 3695, result: successfulJump to behavior
Source: classification engineClassification label: mal52.troj.linELF@0/4@2/0

Persistence and Installation Behavior

barindex
Source: /tmp/arm6.elf (PID: 5424)File: /proc/5424/mountsJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/5263/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/5263/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/238/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/239/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/241/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/1/mapsJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/1482/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/1482/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/1480/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/1480/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/371/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/arm6.elf (PID: 5424)File opened: /proc/253/cmdlineJump to behavior
Source: /usr/bin/dash (PID: 5429)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.JOdHON771a /tmp/tmp.Vo2uvnqfFI /tmp/tmp.4MAIQkxvZcJump to behavior
Source: /usr/bin/dash (PID: 5430)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.JOdHON771a /tmp/tmp.Vo2uvnqfFI /tmp/tmp.4MAIQkxvZcJump to behavior
Source: /tmp/arm6.elf (PID: 5424)Queries kernel information via 'uname': Jump to behavior
Source: arm6.elf, 5424.1.00007fbbc4038000.00007fbbc403e000.rw-.sdmp, arm6.elf, 5431.1.00007fbbc4038000.00007fbbc403e000.rw-.sdmpBinary or memory string: !!a1gAWFxuAXsFWUgBRQAA!!a1gAWFxuAXsAWUgKRXgA!!a1gAWFxuAXsAWEgJR3IA!!a10CWFxuAHsGWVcWQHAA!!a10CWFxuAHsGWVcWQHUA!!aFwAWF9uA3sGW0gLRgAA!1aFwAWFlpG2QBW0gJTwAA1!qemu-arm2QBW0gJTwAA!
Source: arm6.elf, 5431.1.00007fbbc4038000.00007fbbc403e000.rw-.sdmpBinary or memory string: vmware
Source: arm6.elf, 5424.1.0000559a01dde000.0000559a01f2c000.rw-.sdmp, arm6.elf, 5431.1.0000559a01dde000.0000559a01f2c000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: arm6.elf, 5424.1.00007fbbc4038000.00007fbbc403e000.rw-.sdmp, arm6.elf, 5431.1.00007fbbc4038000.00007fbbc403e000.rw-.sdmpBinary or memory string: qemu-arm
Source: arm6.elf, 5424.1.00007ffd9465e000.00007ffd9467f000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.NyZael:
Source: arm6.elf, 5424.1.0000559a01dde000.0000559a01f2c000.rw-.sdmp, arm6.elf, 5431.1.0000559a01dde000.0000559a01f2c000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: arm6.elf, 5424.1.00007ffd9465e000.00007ffd9467f000.rw-.sdmp, arm6.elf, 5431.1.00007ffd9465e000.00007ffd9467f000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: arm6.elf, 5424.1.00007ffd9465e000.00007ffd9467f000.rw-.sdmpBinary or memory string: /tmp/qemu-open.NyZael
Source: arm6.elf, 5424.1.00007ffd9465e000.00007ffd9467f000.rw-.sdmp, arm6.elf, 5431.1.00007ffd9465e000.00007ffd9467f000.rw-.sdmpBinary or memory string: d|x86_64/usr/bin/qemu-arm/tmp/arm6.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/arm6.elf
Source: arm6.elf, 5431.1.00007ffd9465e000.00007ffd9467f000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
File Deletion
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1646958 Sample: arm6.elf Startdate: 24/03/2025 Architecture: LINUX Score: 52 16 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->16 18 54.247.62.1, 443 AMAZON-02US United States 2->18 20 daisy.ubuntu.com 2->20 22 Multi AV Scanner detection for submitted file 2->22 7 arm6.elf 2->7         started        10 dash rm 2->10         started        12 dash rm 2->12         started        signatures3 process4 signatures5 24 Sample reads /proc/mounts (often used for finding a writable filesystem) 7->24 14 arm6.elf 7->14         started        process6
SourceDetectionScannerLabelLink
arm6.elf11%VirustotalBrowse
arm6.elf17%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    https://motd.ubuntu.comarm6.elf, 5424.1.00007fbbc4038000.00007fbbc403e000.rw-.sdmp, arm6.elf, 5431.1.00007fbbc4038000.00007fbbc403e000.rw-.sdmpfalse
      high
      https://motd.ubuntu.comhearm6.elf, 5424.1.00007fbbc4038000.00007fbbc403e000.rw-.sdmp, arm6.elf, 5431.1.00007fbbc4038000.00007fbbc403e000.rw-.sdmpfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        185.125.190.26
        unknownUnited Kingdom
        41231CANONICAL-ASGBfalse
        54.247.62.1
        unknownUnited States
        16509AMAZON-02USfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        185.125.190.26arm.elfGet hashmaliciousUnknownBrowse
          arm.elfGet hashmaliciousMiraiBrowse
            na.elfGet hashmaliciousPrometeiBrowse
              morte.x86.elfGet hashmaliciousOkiruBrowse
                owari.arm6.elfGet hashmaliciousUnknownBrowse
                  arc.elfGet hashmaliciousMiraiBrowse
                    na.elfGet hashmaliciousPrometeiBrowse
                      x86.elfGet hashmaliciousMiraiBrowse
                        arm5.elfGet hashmaliciousUnknownBrowse
                          na.elfGet hashmaliciousPrometeiBrowse
                            54.247.62.1na.elfGet hashmaliciousPrometeiBrowse
                              na.elfGet hashmaliciousPrometeiBrowse
                                sh4.elfGet hashmaliciousMiraiBrowse
                                  arm6.elfGet hashmaliciousMiraiBrowse
                                    openssh.elfGet hashmaliciousGafgytBrowse
                                      na.elfGet hashmaliciousPrometeiBrowse
                                        na.elfGet hashmaliciousPrometeiBrowse
                                          miner.elfGet hashmaliciousUnknownBrowse
                                            boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                              bot.arm6.elfGet hashmaliciousUnknownBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                daisy.ubuntu.comarm.elfGet hashmaliciousUnknownBrowse
                                                • 162.213.35.25
                                                arm5.elfGet hashmaliciousUnknownBrowse
                                                • 162.213.35.25
                                                tftp.elfGet hashmaliciousUnknownBrowse
                                                • 162.213.35.25
                                                aarch64.elfGet hashmaliciousUnknownBrowse
                                                • 162.213.35.24
                                                g4za.arm5.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.24
                                                g4za.arm6.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.25
                                                .i.elfGet hashmaliciousUnknownBrowse
                                                • 162.213.35.25
                                                arm5.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.24
                                                arm6.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.24
                                                ppc.elfGet hashmaliciousUnknownBrowse
                                                • 162.213.35.24
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                AMAZON-02USmpsl.elfGet hashmaliciousUnknownBrowse
                                                • 54.171.230.55
                                                arm.elfGet hashmaliciousUnknownBrowse
                                                • 34.243.160.129
                                                arm5.elfGet hashmaliciousUnknownBrowse
                                                • 34.243.160.129
                                                arm7.elfGet hashmaliciousUnknownBrowse
                                                • 54.171.230.55
                                                tftp.elfGet hashmaliciousUnknownBrowse
                                                • 54.217.10.153
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 34.243.160.129
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.212.150.54
                                                8RGIkD2qeg.exeGet hashmaliciousLokibotBrowse
                                                • 13.248.169.48
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 54.247.62.1
                                                CANONICAL-ASGBmpsl.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                arm.elfGet hashmaliciousUnknownBrowse
                                                • 185.125.190.26
                                                arm7.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                mips.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 91.189.91.42
                                                x86.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                • 91.189.91.42
                                                arm5.elfGet hashmaliciousUnknownBrowse
                                                • 91.189.91.42
                                                No context
                                                No context
                                                Process:/tmp/arm6.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):14
                                                Entropy (8bit):3.521640636343319
                                                Encrypted:false
                                                SSDEEP:3:Tgj03:Tgw3
                                                MD5:3F57B2990E079DDED19A289B2C2D9845
                                                SHA1:EC529CD92FCD1419E74F69269A1FBDFB901F3360
                                                SHA-256:42BAD665C8A094C4820D587524D2B0F1E1AA45E1BA9BCE12E59A92CBA93B90BC
                                                SHA-512:B2E54540954546CA0BDC2B73923B545659131AB088282E7070B2A7C9FBA1D1C1D58CFE4094D1DAE38D578E2B4FD7CB2E3A7D25A06EE84546207EE6A3B19553A8
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:/tmp/arm6.elf.
                                                Process:/tmp/arm6.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):14
                                                Entropy (8bit):3.521640636343319
                                                Encrypted:false
                                                SSDEEP:3:Tgj03:Tgw3
                                                MD5:3F57B2990E079DDED19A289B2C2D9845
                                                SHA1:EC529CD92FCD1419E74F69269A1FBDFB901F3360
                                                SHA-256:42BAD665C8A094C4820D587524D2B0F1E1AA45E1BA9BCE12E59A92CBA93B90BC
                                                SHA-512:B2E54540954546CA0BDC2B73923B545659131AB088282E7070B2A7C9FBA1D1C1D58CFE4094D1DAE38D578E2B4FD7CB2E3A7D25A06EE84546207EE6A3B19553A8
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:/tmp/arm6.elf.
                                                Process:/tmp/arm6.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):14
                                                Entropy (8bit):3.521640636343319
                                                Encrypted:false
                                                SSDEEP:3:Tgj03:Tgw3
                                                MD5:3F57B2990E079DDED19A289B2C2D9845
                                                SHA1:EC529CD92FCD1419E74F69269A1FBDFB901F3360
                                                SHA-256:42BAD665C8A094C4820D587524D2B0F1E1AA45E1BA9BCE12E59A92CBA93B90BC
                                                SHA-512:B2E54540954546CA0BDC2B73923B545659131AB088282E7070B2A7C9FBA1D1C1D58CFE4094D1DAE38D578E2B4FD7CB2E3A7D25A06EE84546207EE6A3B19553A8
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:/tmp/arm6.elf.
                                                Process:/tmp/arm6.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):14
                                                Entropy (8bit):3.521640636343319
                                                Encrypted:false
                                                SSDEEP:3:Tgj03:Tgw3
                                                MD5:3F57B2990E079DDED19A289B2C2D9845
                                                SHA1:EC529CD92FCD1419E74F69269A1FBDFB901F3360
                                                SHA-256:42BAD665C8A094C4820D587524D2B0F1E1AA45E1BA9BCE12E59A92CBA93B90BC
                                                SHA-512:B2E54540954546CA0BDC2B73923B545659131AB088282E7070B2A7C9FBA1D1C1D58CFE4094D1DAE38D578E2B4FD7CB2E3A7D25A06EE84546207EE6A3B19553A8
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:/tmp/arm6.elf.
                                                File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                                                Entropy (8bit):6.099090715144277
                                                TrID:
                                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                File name:arm6.elf
                                                File size:100'068 bytes
                                                MD5:4056553e7eab29be85ddb0edc5af5d62
                                                SHA1:f3fb2dab8933849916e93d4d4014f7bb163e42ac
                                                SHA256:ab3cfd71402c57342fd07d20b5972fb43568f3be8b558f9eb8f86508ca1518e2
                                                SHA512:88b22bfcca5e2676c285a9f314b0460913662936f86ef50a3190286e0e2b611c84cf65a65a574610c0ea7d976cc57e9045fad61888f63bb22a2bcee8fe69275e
                                                SSDEEP:1536:DonvMYOWRZneVtpfLrkyoNit849INrYe/HiY5wuBxQykrZuX1/nOhh5uOxbYIGYA:AMXWbneVt9a+INrX0uBxQ1bhhxb1yQ
                                                TLSH:ABA30795BC419B16C2D016BBFE1E428D33232FB8E2EA3203DD156F2077DA95A0E7B451
                                                File Content Preview:.ELF..............(.....l...4...........4. ...(........p................................................................................DI..........Q.td.............................@-..@............/..@-.,@...0....S..... 0....S.........../..0...0...@..../

                                                ELF header

                                                Class:ELF32
                                                Data:2's complement, little endian
                                                Version:1 (current)
                                                Machine:ARM
                                                Version Number:0x1
                                                Type:EXEC (Executable file)
                                                OS/ABI:UNIX - System V
                                                ABI Version:0
                                                Entry Point Address:0x816c
                                                Flags:0x4000002
                                                ELF Header Size:52
                                                Program Header Offset:52
                                                Program Header Size:32
                                                Number of Program Headers:4
                                                Section Header Offset:99548
                                                Section Header Size:40
                                                Number of Section Headers:13
                                                Header String Table Index:12
                                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                NULL0x00x00x00x00x0000
                                                .initPROGBITS0x80b40xb40x140x00x6AX001
                                                .textPROGBITS0x80c80xc80x16bc00x00x6AX004
                                                .finiPROGBITS0x1ec880x16c880x140x00x6AX001
                                                .rodataPROGBITS0x1ec9c0x16c9c0x16440x00x2A004
                                                .ARM.exidxARM_EXIDX0x202e00x182e00xc80x00x82AL204
                                                .eh_framePROGBITS0x283a80x183a80x40x00x3WA004
                                                .init_arrayINIT_ARRAY0x283ac0x183ac0x40x00x3WA004
                                                .fini_arrayFINI_ARRAY0x283b00x183b00x40x00x3WA004
                                                .gotPROGBITS0x283b80x183b80x280x40x3WA004
                                                .dataPROGBITS0x283e00x183e00x980x00x3WA004
                                                .bssNOBITS0x284780x184780x48740x00x3WA008
                                                .shstrtabSTRTAB0x00x184780x620x00x0001
                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                EXIDX0x182e00x202e00x202e00xc80xc84.30560x4R 0x4.ARM.exidx
                                                LOAD0x00x80000x80000x183a80x183a86.11000x5R E0x8000.init .text .fini .rodata .ARM.exidx
                                                LOAD0x183a80x283a80x283a80xd00x49443.51190x6RW 0x8000.eh_frame .init_array .fini_array .got .data .bss
                                                GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

                                                Download Network PCAP: filteredfull

                                                • Total Packets: 5
                                                • 443 (HTTPS)
                                                • 53 (DNS)
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 24, 2025 13:23:49.481225967 CET57212443192.168.2.1354.247.62.1
                                                Mar 24, 2025 13:24:01.263089895 CET48202443192.168.2.13185.125.190.26
                                                Mar 24, 2025 13:24:33.022900105 CET48202443192.168.2.13185.125.190.26
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 24, 2025 13:23:55.761933088 CET4848753192.168.2.131.1.1.1
                                                Mar 24, 2025 13:23:55.762013912 CET4731653192.168.2.131.1.1.1
                                                Mar 24, 2025 13:23:55.860743046 CET53473161.1.1.1192.168.2.13
                                                Mar 24, 2025 13:23:55.902281046 CET53484871.1.1.1192.168.2.13
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Mar 24, 2025 13:23:55.761933088 CET192.168.2.131.1.1.10xeb66Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                                Mar 24, 2025 13:23:55.762013912 CET192.168.2.131.1.1.10xd10dStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Mar 24, 2025 13:23:55.902281046 CET1.1.1.1192.168.2.130xeb66No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                                                Mar 24, 2025 13:23:55.902281046 CET1.1.1.1192.168.2.130xeb66No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                                                System Behavior

                                                Start time (UTC):12:23:52
                                                Start date (UTC):24/03/2025
                                                Path:/tmp/arm6.elf
                                                Arguments:-
                                                File size:4956856 bytes
                                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                Start time (UTC):12:23:52
                                                Start date (UTC):24/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):12:23:52
                                                Start date (UTC):24/03/2025
                                                Path:/usr/bin/rm
                                                Arguments:rm -f /tmp/tmp.JOdHON771a /tmp/tmp.Vo2uvnqfFI /tmp/tmp.4MAIQkxvZc
                                                File size:72056 bytes
                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                Start time (UTC):12:23:52
                                                Start date (UTC):24/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):12:23:52
                                                Start date (UTC):24/03/2025
                                                Path:/usr/bin/rm
                                                Arguments:rm -f /tmp/tmp.JOdHON771a /tmp/tmp.Vo2uvnqfFI /tmp/tmp.4MAIQkxvZc
                                                File size:72056 bytes
                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b