Edit tour

Linux Analysis Report
ppc.elf

Overview

General Information

Sample name:ppc.elf
Analysis ID:1646959
MD5:6151a3bd25304a650f3a1f7b8348f848
SHA1:d27b64de58d799f1975fc0c4694a2e177651aa77
SHA256:b769d3e596ae9b2f1e0e78eb1d314d73561d1a71533eca930ebb4ce41a32aef3
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Sample reads /proc/mounts (often used for finding a writable filesystem)
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1646959
Start date and time:2025-03-24 13:23:44 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 40s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ppc.elf
Detection:MAL
Classification:mal52.troj.linELF@0/4@0/0
Command:/tmp/ppc.elf
PID:6211
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world
Standard Error:
  • system is lnxubuntu20
  • ppc.elf (PID: 6211, Parent: 6128, MD5: ae65271c943d3451b7f026d1fadccea6) Arguments: /tmp/ppc.elf
    • ppc.elf New Fork (PID: 6218, Parent: 6211)
  • dash New Fork (PID: 6216, Parent: 4333)
  • rm (PID: 6216, Parent: 4333, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.hIb3qKwwRd /tmp/tmp.kfC1mD0mjp /tmp/tmp.YQnocLFUSh
  • dash New Fork (PID: 6217, Parent: 4333)
  • rm (PID: 6217, Parent: 4333, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.hIb3qKwwRd /tmp/tmp.kfC1mD0mjp /tmp/tmp.YQnocLFUSh
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ppc.elfVirustotal: Detection: 9%Perma Link
Source: ppc.elfReversingLabs: Detection: 16%
Source: ppc.elfString: /proc/%s/exe/proc/%s/cmdline/proc/%d/exe/proc/%d/cmdlinerwgettftpcurlftp/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/lib/snap/usr/lib/
Source: /tmp/ppc.elf (PID: 6218)Socket: 127.0.0.1:22448Jump to behavior
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:33608 -> 54.171.230.55:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: ppc.elf, 6211.1.00007f2b04028000.00007f2b0402e000.rw-.sdmp, ppc.elf, 6218.1.00007f2b04028000.00007f2b0402e000.rw-.sdmpString found in binary or memory: https://motd.ubuntu.com
Source: ppc.elf, 6211.1.00007f2b04028000.00007f2b0402e000.rw-.sdmp, ppc.elf, 6218.1.00007f2b04028000.00007f2b0402e000.rw-.sdmpString found in binary or memory: https://motd.ubuntu.comhe
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 33608 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/ppc.elf (PID: 6211)SIGKILL sent: pid: 4433, result: successfulJump to behavior
Source: classification engineClassification label: mal52.troj.linELF@0/4@0/0

Persistence and Installation Behavior

barindex
Source: /tmp/ppc.elf (PID: 6211)File: /proc/6211/mountsJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/3088/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/2302/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/2302/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/910/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/2307/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/2307/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1594/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1594/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1349/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1349/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1344/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1344/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1465/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1465/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1586/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1586/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1463/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1463/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1900/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/1900/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/491/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/491/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6211)File opened: /proc/252/cmdlineJump to behavior
Source: /usr/bin/dash (PID: 6216)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.hIb3qKwwRd /tmp/tmp.kfC1mD0mjp /tmp/tmp.YQnocLFUShJump to behavior
Source: /usr/bin/dash (PID: 6217)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.hIb3qKwwRd /tmp/tmp.kfC1mD0mjp /tmp/tmp.YQnocLFUShJump to behavior
Source: /tmp/ppc.elf (PID: 6211)Queries kernel information via 'uname': Jump to behavior
Source: ppc.elf, 6211.1.00007f2b04028000.00007f2b0402e000.rw-.sdmp, ppc.elf, 6218.1.00007f2b04028000.00007f2b0402e000.rw-.sdmpBinary or memory string: !!a1gAWFxuAXsFWUgBRQAA!!a1gAWFxuAXsAWUgKRXgA!!a1gAWFxuAXsAWEgJR3IA!!a10CWFxuAHsGWVcWQHAA!!a10CWFxuAHsGWVcWQHUA!!aFwAWF9uA3sGW0gLRgAA!1aFwAWFlpG2QBW0gJTwAA1!qemu-arm2QBW0gJTwAA!
Source: ppc.elf, 6218.1.00007ffc5f8f0000.00007ffc5f911000.rw-.sdmpBinary or memory string: :DMPDIR%s/qemu-opSXPF
Source: ppc.elf, 6218.1.00007f2b04028000.00007f2b0402e000.rw-.sdmpBinary or memory string: vmware
Source: ppc.elf, 6211.1.00005648cf85f000.00005648cf92f000.rw-.sdmp, ppc.elf, 6218.1.00005648cf85f000.00005648cf92f000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc1
Source: ppc.elf, 6211.1.00007ffc5f8f0000.00007ffc5f911000.rw-.sdmp, ppc.elf, 6218.1.00007ffc5f8f0000.00007ffc5f911000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-ppc/tmp/ppc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/ppc.elf
Source: ppc.elf, 6211.1.00007ffc5f8f0000.00007ffc5f911000.rw-.sdmpBinary or memory string: HV/tmp/qemu-open.nYeU2P\
Source: ppc.elf, 6211.1.00005648cf85f000.00005648cf92f000.rw-.sdmp, ppc.elf, 6218.1.00005648cf85f000.00005648cf92f000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
Source: ppc.elf, 6211.1.00007ffc5f8f0000.00007ffc5f911000.rw-.sdmp, ppc.elf, 6218.1.00007ffc5f8f0000.00007ffc5f911000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
Source: ppc.elf, 6211.1.00007ffc5f8f0000.00007ffc5f911000.rw-.sdmp, ppc.elf, 6218.1.00007ffc5f8f0000.00007ffc5f911000.rw-.sdmpBinary or memory string: %s/qemu-op
Source: ppc.elf, 6211.1.00007ffc5f8f0000.00007ffc5f911000.rw-.sdmp, ppc.elf, 6218.1.00007ffc5f8f0000.00007ffc5f911000.rw-.sdmpBinary or memory string: MPDIR%s/qemu-op
Source: ppc.elf, 6218.1.00007ffc5f8f0000.00007ffc5f911000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
Source: ppc.elf, 6211.1.00007f2b04028000.00007f2b0402e000.rw-.sdmp, ppc.elf, 6218.1.00007f2b04028000.00007f2b0402e000.rw-.sdmpBinary or memory string: !qemu-arm
Source: ppc.elf, 6211.1.00007ffc5f8f0000.00007ffc5f911000.rw-.sdmpBinary or memory string: /tmp/qemu-open.nYeU2P
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
File Deletion
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1646959 Sample: ppc.elf Startdate: 24/03/2025 Architecture: LINUX Score: 52 16 109.202.202.202, 80 INIT7CH Switzerland 2->16 18 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->18 20 2 other IPs or domains 2->20 22 Multi AV Scanner detection for submitted file 2->22 7 ppc.elf 2->7         started        10 dash rm 2->10         started        12 dash rm 2->12         started        signatures3 process4 signatures5 24 Sample reads /proc/mounts (often used for finding a writable filesystem) 7->24 14 ppc.elf 7->14         started        process6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ppc.elf9%VirustotalBrowse
ppc.elf17%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://motd.ubuntu.comppc.elf, 6211.1.00007f2b04028000.00007f2b0402e000.rw-.sdmp, ppc.elf, 6218.1.00007f2b04028000.00007f2b0402e000.rw-.sdmpfalse
    high
    https://motd.ubuntu.comheppc.elf, 6211.1.00007f2b04028000.00007f2b0402e000.rw-.sdmp, ppc.elf, 6218.1.00007f2b04028000.00007f2b0402e000.rw-.sdmpfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      54.171.230.55
      unknownUnited States
      16509AMAZON-02USfalse
      109.202.202.202
      unknownSwitzerland
      13030INIT7CHfalse
      91.189.91.43
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      91.189.91.42
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      54.171.230.55mpsl.elfGet hashmaliciousUnknownBrowse
        arm7.elfGet hashmaliciousUnknownBrowse
          mips.elfGet hashmaliciousUnknownBrowse
            na.elfGet hashmaliciousPrometeiBrowse
              mpsl.fkunigr.elfGet hashmaliciousMiraiBrowse
                armv5l.elfGet hashmaliciousMiraiBrowse
                  na.elfGet hashmaliciousPrometeiBrowse
                    arm5.elfGet hashmaliciousUnknownBrowse
                      arc.elfGet hashmaliciousMiraiBrowse
                        109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                        • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                        91.189.91.43mpsl.elfGet hashmaliciousUnknownBrowse
                          arm7.elfGet hashmaliciousUnknownBrowse
                            na.elfGet hashmaliciousPrometeiBrowse
                              mips.elfGet hashmaliciousUnknownBrowse
                                na.elfGet hashmaliciousPrometeiBrowse
                                  na.elfGet hashmaliciousPrometeiBrowse
                                    na.elfGet hashmaliciousPrometeiBrowse
                                      x86.fkunigr.elfGet hashmaliciousMiraiBrowse
                                        arm5.elfGet hashmaliciousUnknownBrowse
                                          sh4.fkunigr.elfGet hashmaliciousMiraiBrowse
                                            91.189.91.42mpsl.elfGet hashmaliciousUnknownBrowse
                                              arm7.elfGet hashmaliciousUnknownBrowse
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                  mips.elfGet hashmaliciousUnknownBrowse
                                                    na.elfGet hashmaliciousPrometeiBrowse
                                                      na.elfGet hashmaliciousPrometeiBrowse
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                          x86.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                            arm5.elfGet hashmaliciousUnknownBrowse
                                                              sh4.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                CANONICAL-ASGBarm6.elfGet hashmaliciousUnknownBrowse
                                                                • 185.125.190.26
                                                                mpsl.elfGet hashmaliciousUnknownBrowse
                                                                • 91.189.91.42
                                                                arm.elfGet hashmaliciousUnknownBrowse
                                                                • 185.125.190.26
                                                                arm7.elfGet hashmaliciousUnknownBrowse
                                                                • 91.189.91.42
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 91.189.91.42
                                                                mips.elfGet hashmaliciousUnknownBrowse
                                                                • 91.189.91.42
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 91.189.91.42
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 91.189.91.42
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 91.189.91.42
                                                                x86.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                                • 91.189.91.42
                                                                CANONICAL-ASGBarm6.elfGet hashmaliciousUnknownBrowse
                                                                • 185.125.190.26
                                                                mpsl.elfGet hashmaliciousUnknownBrowse
                                                                • 91.189.91.42
                                                                arm.elfGet hashmaliciousUnknownBrowse
                                                                • 185.125.190.26
                                                                arm7.elfGet hashmaliciousUnknownBrowse
                                                                • 91.189.91.42
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 91.189.91.42
                                                                mips.elfGet hashmaliciousUnknownBrowse
                                                                • 91.189.91.42
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 91.189.91.42
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 91.189.91.42
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 91.189.91.42
                                                                x86.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                                • 91.189.91.42
                                                                AMAZON-02USarm6.elfGet hashmaliciousUnknownBrowse
                                                                • 54.247.62.1
                                                                mpsl.elfGet hashmaliciousUnknownBrowse
                                                                • 54.171.230.55
                                                                arm.elfGet hashmaliciousUnknownBrowse
                                                                • 34.243.160.129
                                                                arm5.elfGet hashmaliciousUnknownBrowse
                                                                • 34.243.160.129
                                                                arm7.elfGet hashmaliciousUnknownBrowse
                                                                • 54.171.230.55
                                                                tftp.elfGet hashmaliciousUnknownBrowse
                                                                • 54.217.10.153
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 34.243.160.129
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 52.212.150.54
                                                                8RGIkD2qeg.exeGet hashmaliciousLokibotBrowse
                                                                • 13.248.169.48
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 34.249.145.219
                                                                INIT7CHmpsl.elfGet hashmaliciousUnknownBrowse
                                                                • 109.202.202.202
                                                                arm7.elfGet hashmaliciousUnknownBrowse
                                                                • 109.202.202.202
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 109.202.202.202
                                                                mips.elfGet hashmaliciousUnknownBrowse
                                                                • 109.202.202.202
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 109.202.202.202
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 109.202.202.202
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                • 109.202.202.202
                                                                x86.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                                • 109.202.202.202
                                                                arm5.elfGet hashmaliciousUnknownBrowse
                                                                • 109.202.202.202
                                                                sh4.fkunigr.elfGet hashmaliciousMiraiBrowse
                                                                • 109.202.202.202
                                                                No context
                                                                No context
                                                                Process:/tmp/ppc.elf
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):13
                                                                Entropy (8bit):3.1808329872054406
                                                                Encrypted:false
                                                                SSDEEP:3:Tg/cA3:TgkG
                                                                MD5:B4B673815F84B3C325AF4B636EF3F7E8
                                                                SHA1:0D795B3294AE13B67B5977896D2C28B777A2216A
                                                                SHA-256:BA14832061879D30329B0378D53F56199440D741567578D0482343247629A00C
                                                                SHA-512:DC4969EF1C3132480F4001EB78586B888D6E75CE84121CDF2B9679DA13062DC56604B4E7F1B1BBD205F9CC707B4BF311AAA9C19F0C67224026F270C18FDCD7EF
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:/tmp/ppc.elf.
                                                                Process:/tmp/ppc.elf
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):13
                                                                Entropy (8bit):3.1808329872054406
                                                                Encrypted:false
                                                                SSDEEP:3:Tg/cA3:TgkG
                                                                MD5:B4B673815F84B3C325AF4B636EF3F7E8
                                                                SHA1:0D795B3294AE13B67B5977896D2C28B777A2216A
                                                                SHA-256:BA14832061879D30329B0378D53F56199440D741567578D0482343247629A00C
                                                                SHA-512:DC4969EF1C3132480F4001EB78586B888D6E75CE84121CDF2B9679DA13062DC56604B4E7F1B1BBD205F9CC707B4BF311AAA9C19F0C67224026F270C18FDCD7EF
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:/tmp/ppc.elf.
                                                                Process:/tmp/ppc.elf
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):13
                                                                Entropy (8bit):3.1808329872054406
                                                                Encrypted:false
                                                                SSDEEP:3:Tg/cA3:TgkG
                                                                MD5:B4B673815F84B3C325AF4B636EF3F7E8
                                                                SHA1:0D795B3294AE13B67B5977896D2C28B777A2216A
                                                                SHA-256:BA14832061879D30329B0378D53F56199440D741567578D0482343247629A00C
                                                                SHA-512:DC4969EF1C3132480F4001EB78586B888D6E75CE84121CDF2B9679DA13062DC56604B4E7F1B1BBD205F9CC707B4BF311AAA9C19F0C67224026F270C18FDCD7EF
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:/tmp/ppc.elf.
                                                                Process:/tmp/ppc.elf
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):13
                                                                Entropy (8bit):3.1808329872054406
                                                                Encrypted:false
                                                                SSDEEP:3:Tg/cA3:TgkG
                                                                MD5:B4B673815F84B3C325AF4B636EF3F7E8
                                                                SHA1:0D795B3294AE13B67B5977896D2C28B777A2216A
                                                                SHA-256:BA14832061879D30329B0378D53F56199440D741567578D0482343247629A00C
                                                                SHA-512:DC4969EF1C3132480F4001EB78586B888D6E75CE84121CDF2B9679DA13062DC56604B4E7F1B1BBD205F9CC707B4BF311AAA9C19F0C67224026F270C18FDCD7EF
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:/tmp/ppc.elf.
                                                                File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
                                                                Entropy (8bit):6.321569065679738
                                                                TrID:
                                                                • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                                                • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                                                File name:ppc.elf
                                                                File size:91'832 bytes
                                                                MD5:6151a3bd25304a650f3a1f7b8348f848
                                                                SHA1:d27b64de58d799f1975fc0c4694a2e177651aa77
                                                                SHA256:b769d3e596ae9b2f1e0e78eb1d314d73561d1a71533eca930ebb4ce41a32aef3
                                                                SHA512:a588e1922ad7a644357edcdb125b82574f0143d0f52517de63b5b010ea5914ce571606793a2fa14a585ad500483216ba93091e742edf1f3aa6ffe5b2d143bc53
                                                                SSDEEP:1536:1Oqg3xzndXfCiFCQwsZ3jK42k/WRd1ZQf2IztVzq0iwPbcaQFHVr8e:AqubCKzqaAaQ38e
                                                                TLSH:20934C41B7190587E2A35DF03B3F27E1C3EE8E9221B46648791FBB4A92B1D321446EDD
                                                                File Content Preview:.ELF...........................4..d......4. ...(......................cx..cx..............c...c...c.......I.........dt.Q.............................!..|......$H...H.I....$8!. |...N.. .!..|.......?.........d...../...@..`= ..;.c......+../...A..$8...}).....

                                                                ELF header

                                                                Class:ELF32
                                                                Data:2's complement, big endian
                                                                Version:1 (current)
                                                                Machine:PowerPC
                                                                Version Number:0x1
                                                                Type:EXEC (Executable file)
                                                                OS/ABI:UNIX - System V
                                                                ABI Version:0
                                                                Entry Point Address:0x100001f8
                                                                Flags:0x0
                                                                ELF Header Size:52
                                                                Program Header Offset:52
                                                                Program Header Size:32
                                                                Number of Program Headers:3
                                                                Section Header Offset:91352
                                                                Section Header Size:40
                                                                Number of Section Headers:12
                                                                Header String Table Index:11
                                                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                NULL0x00x00x00x00x0000
                                                                .initPROGBITS0x100000940x940x240x00x6AX004
                                                                .textPROGBITS0x100000b80xb80x14a0c0x00x6AX004
                                                                .finiPROGBITS0x10014ac40x14ac40x200x00x6AX004
                                                                .rodataPROGBITS0x10014ae80x14ae80x18900x00x2A008
                                                                .ctorsPROGBITS0x100263e80x163e80x80x00x3WA004
                                                                .dtorsPROGBITS0x100263f00x163f00x80x00x3WA004
                                                                .dataPROGBITS0x100263fc0x163fc0x880x00x3WA004
                                                                .sdataPROGBITS0x100264840x164840x90x00x3WA004
                                                                .sbssNOBITS0x100264900x1648d0x280x00x3WA004
                                                                .bssNOBITS0x100264b80x1648d0x48480x00x3WA008
                                                                .shstrtabSTRTAB0x00x1648d0x4b0x00x0001
                                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                LOAD0x00x100000000x100000000x163780x163786.34020x5R E0x10000.init .text .fini .rodata
                                                                LOAD0x163e80x100263e80x100263e80xa50x49184.16000x6RW 0x10000.ctors .dtors .data .sdata .sbss .bss
                                                                GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

                                                                Download Network PCAP: filteredfull

                                                                • Total Packets: 8
                                                                • 443 (HTTPS)
                                                                • 80 (HTTP)
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Mar 24, 2025 13:24:23.737149000 CET43928443192.168.2.2391.189.91.42
                                                                Mar 24, 2025 13:24:23.737159967 CET33608443192.168.2.2354.171.230.55
                                                                Mar 24, 2025 13:24:29.368568897 CET42836443192.168.2.2391.189.91.43
                                                                Mar 24, 2025 13:24:30.904195070 CET4251680192.168.2.23109.202.202.202
                                                                Mar 24, 2025 13:24:43.958544970 CET43928443192.168.2.2391.189.91.42
                                                                Mar 24, 2025 13:24:56.244646072 CET42836443192.168.2.2391.189.91.43
                                                                Mar 24, 2025 13:25:00.340065956 CET4251680192.168.2.23109.202.202.202
                                                                Mar 24, 2025 13:25:24.912589073 CET43928443192.168.2.2391.189.91.42

                                                                System Behavior

                                                                Start time (UTC):12:24:25
                                                                Start date (UTC):24/03/2025
                                                                Path:/tmp/ppc.elf
                                                                Arguments:-
                                                                File size:5388968 bytes
                                                                MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                                Start time (UTC):12:24:25
                                                                Start date (UTC):24/03/2025
                                                                Path:/usr/bin/dash
                                                                Arguments:-
                                                                File size:129816 bytes
                                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                Start time (UTC):12:24:25
                                                                Start date (UTC):24/03/2025
                                                                Path:/usr/bin/rm
                                                                Arguments:rm -f /tmp/tmp.hIb3qKwwRd /tmp/tmp.kfC1mD0mjp /tmp/tmp.YQnocLFUSh
                                                                File size:72056 bytes
                                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                Start time (UTC):12:24:25
                                                                Start date (UTC):24/03/2025
                                                                Path:/usr/bin/dash
                                                                Arguments:-
                                                                File size:129816 bytes
                                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                Start time (UTC):12:24:25
                                                                Start date (UTC):24/03/2025
                                                                Path:/usr/bin/rm
                                                                Arguments:rm -f /tmp/tmp.hIb3qKwwRd /tmp/tmp.kfC1mD0mjp /tmp/tmp.YQnocLFUSh
                                                                File size:72056 bytes
                                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b