Edit tour

Linux Analysis Report
ppc.elf

Overview

General Information

Sample name:ppc.elf
Analysis ID:1647709
MD5:fcf98963be7340387ba2d19893913a3b
SHA1:d22731469cf152eab0b7b2299fc6d3fbd96ef34b
SHA256:369a65073ad707d852bcb79cb41bbf6b6cf76a411470d099eda3f71acd39df8c
Tags:elfuser-abuse_ch
Infos:
Errors
  • No or unstable Internet during analysis

Detection

Score:48
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1647709
Start date and time:2025-03-25 07:32:32 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 45s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ppc.elf
Detection:MAL
Classification:mal48.linELF@0/2@0/0
  • No or unstable Internet during analysis
  • Excluded IPs from analysis (whitelisted): 208.67.222.222
Command:/tmp/ppc.elf
PID:5504
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world
Standard Error:
  • system is lnxubuntu20
  • ppc.elf (PID: 5504, Parent: 5429, MD5: ae65271c943d3451b7f026d1fadccea6) Arguments: /tmp/ppc.elf
    • ppc.elf New Fork (PID: 5508, Parent: 5504)
  • dash New Fork (PID: 5574, Parent: 3633)
  • rm (PID: 5574, Parent: 3633, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.xuOJ7IhafQ /tmp/tmp.OxiAmPmWa7 /tmp/tmp.yue8Ho4scb
  • dash New Fork (PID: 5575, Parent: 3633)
  • cat (PID: 5575, Parent: 3633, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.xuOJ7IhafQ
  • dash New Fork (PID: 5576, Parent: 3633)
  • head (PID: 5576, Parent: 3633, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5577, Parent: 3633)
  • tr (PID: 5577, Parent: 3633, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5578, Parent: 3633)
  • cut (PID: 5578, Parent: 3633, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5579, Parent: 3633)
  • cat (PID: 5579, Parent: 3633, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.xuOJ7IhafQ
  • dash New Fork (PID: 5580, Parent: 3633)
  • head (PID: 5580, Parent: 3633, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5581, Parent: 3633)
  • tr (PID: 5581, Parent: 3633, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5582, Parent: 3633)
  • cut (PID: 5582, Parent: 3633, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5583, Parent: 3633)
  • rm (PID: 5583, Parent: 3633, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.xuOJ7IhafQ /tmp/tmp.OxiAmPmWa7 /tmp/tmp.yue8Ho4scb
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ppc.elfReversingLabs: Detection: 13%
Source: /tmp/ppc.elf (PID: 5508)Socket: 127.0.0.1:22448Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
Source: unknownUDP traffic detected without corresponding DNS query: 208.67.220.220
Source: unknownUDP traffic detected without corresponding DNS query: 208.67.220.220
Source: unknownUDP traffic detected without corresponding DNS query: 208.67.220.220
Source: unknownUDP traffic detected without corresponding DNS query: 208.67.220.220
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: wget/1.20.3-1ubuntu1 Ubuntu/20.04.2/LTS GNU/Linux/5.4.0-72-generic/x86_64 Intel(R)/Xeon(R)/Silver/4210/CPU/@/2.20GHz cloud_id/noneAccept: */*Accept-Encoding: identityHost: motd.ubuntu.comConnection: Keep-Alive
Source: ppc.elf, 5504.1.00007effec024000.00007effec02a000.rw-.sdmpString found in binary or memory: https://motd.ubuntu.com
Source: ppc.elf, 5504.1.00007effec024000.00007effec02a000.rw-.sdmpString found in binary or memory: https://motd.ubuntu.comhe
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 34606
Source: unknownNetwork traffic detected: HTTP traffic on port 42468 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 34606 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal48.linELF@0/2@0/0
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/1583/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/2672/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/1577/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/3633/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/1593/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/3094/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/3406/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/1589/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/3402/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/806/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/807/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/928/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/135/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/3412/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/1371/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/262/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/142/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/263/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 5504)File opened: /proc/264/cmdlineJump to behavior
Source: /usr/bin/dash (PID: 5574)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.xuOJ7IhafQ /tmp/tmp.OxiAmPmWa7 /tmp/tmp.yue8Ho4scbJump to behavior
Source: /usr/bin/dash (PID: 5583)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.xuOJ7IhafQ /tmp/tmp.OxiAmPmWa7 /tmp/tmp.yue8Ho4scbJump to behavior
Source: /tmp/ppc.elf (PID: 5504)Queries kernel information via 'uname': Jump to behavior
Source: ppc.elf, 5504.1.0000559c3d724000.0000559c3d7d4000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc1
Source: ppc.elf, 5504.1.00007effec024000.00007effec02a000.rw-.sdmpBinary or memory string: vmware
Source: ppc.elf, 5504.1.00007ffcad3a1000.00007ffcad3c2000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-ppc/tmp/ppc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/ppc.elf
Source: ppc.elf, 5504.1.0000559c3d724000.0000559c3d7d4000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
Source: ppc.elf, 5504.1.00007ffcad3a1000.00007ffcad3c2000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
Source: ppc.elf, 5504.1.00007ffcad3a1000.00007ffcad3c2000.rw-.sdmpBinary or memory string: %s/qemu-op
Source: ppc.elf, 5504.1.00007ffcad3a1000.00007ffcad3c2000.rw-.sdmpBinary or memory string: /tmp/qemu-open.jDfAYp
Source: ppc.elf, 5504.1.00007ffcad3a1000.00007ffcad3c2000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.jDfAYp\d
Source: ppc.elf, 5504.1.00007ffcad3a1000.00007ffcad3c2000.rw-.sdmpBinary or memory string: MPDIR%s/qemu-op
Source: ppc.elf, 5504.1.00007effec024000.00007effec02a000.rw-.sdmpBinary or memory string: !qemu-arm
Source: ppc.elf, 5504.1.00007effec024000.00007effec02a000.rw-.sdmpBinary or memory string: !!a1gAWFxuAXsFWUgBRQAA!!a1gAWFxuAXsAWUgKRXgA!!a1gAWFxuAXsAWEgJR3IA!!a10CWFxuAHsGWVcWQHAA!!a10CWFxuAHsGWVcWQHUA!!aFwAWF9uA3sGW0gLRgAA!!aFwAWFlpG2QBW0gJTwAA!!qemu-arm2QBW0gJTwAA!
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
File Deletion
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1647709 Sample: ppc.elf Startdate: 25/03/2025 Architecture: LINUX Score: 48 17 34.243.160.129, 443 AMAZON-02US United States 2->17 19 54.217.10.153, 34606, 443 AMAZON-02US United States 2->19 21 Multi AV Scanner detection for submitted file 2->21 7 ppc.elf 2->7         started        9 dash rm 2->9         started        11 dash cat 2->11         started        13 8 other processes 2->13 signatures3 process4 process5 15 ppc.elf 7->15         started       
SourceDetectionScannerLabelLink
ppc.elf14%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
NameMaliciousAntivirus DetectionReputation
https://motd.ubuntu.com/false
    high
    NameSourceMaliciousAntivirus DetectionReputation
    https://motd.ubuntu.comppc.elf, 5504.1.00007effec024000.00007effec02a000.rw-.sdmpfalse
      high
      https://motd.ubuntu.comheppc.elf, 5504.1.00007effec024000.00007effec02a000.rw-.sdmpfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        54.217.10.153
        unknownUnited States
        16509AMAZON-02USfalse
        34.243.160.129
        unknownUnited States
        16509AMAZON-02USfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        54.217.10.153tftp.elfGet hashmaliciousUnknownBrowse
          na.elfGet hashmaliciousPrometeiBrowse
            pspc.elfGet hashmaliciousMiraiBrowse
              sh4.elfGet hashmaliciousMiraiBrowse
                wget.elfGet hashmaliciousGafgyt, MiraiBrowse
                  wget.elfGet hashmaliciousGafgytBrowse
                    main_x86_64.elfGet hashmaliciousUnknownBrowse
                      arm7.elfGet hashmaliciousMiraiBrowse
                        46.19.143.26-mips-2025-03-01T06_09_25.elfGet hashmaliciousUnknownBrowse
                          dlr.sh4.elfGet hashmaliciousUnknownBrowse
                            34.243.160.129na.elfGet hashmaliciousPrometeiBrowse
                              na.elfGet hashmaliciousPrometeiBrowse
                                na.elfGet hashmaliciousPrometeiBrowse
                                  bot.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                    arm.elfGet hashmaliciousUnknownBrowse
                                      arm5.elfGet hashmaliciousUnknownBrowse
                                        na.elfGet hashmaliciousPrometeiBrowse
                                          na.elfGet hashmaliciousPrometeiBrowse
                                            ppc.fkunigr.elfGet hashmaliciousMiraiBrowse
                                              mips.elfGet hashmaliciousMiraiBrowse
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                https://wetransfer.com/downloads/c8bc27df5dfd7191ef8f37cb3c6ac00d20250224065100/d32c95a77eed5b4a4b71cf1d195e388b20250224065134/2b0e6a?t_exp=1740984660&t_lsid=1b177f95-6705-4fde-b25f-deb1d43f0838&t_network=email&t_rid=ZW1haWx8Njc1NDBjYWZiNjM1NTFjNmY2NTBhM2Rl&t_s=download_link&t_ts=1740379894&utm_campaign=TRN_TDL_01&utm_source=sendgrid&utm_medium=email&trk=TRN_TDL_01Get hashmaliciousUnknownBrowse
                                                • 13.226.94.53
                                                main_mpsl.elfGet hashmaliciousMiraiBrowse
                                                • 54.171.230.55
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.212.150.54
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.212.150.54
                                                arc.elfGet hashmaliciousMiraiBrowse
                                                • 34.249.145.219
                                                AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                https://wetransfer.com/downloads/c8bc27df5dfd7191ef8f37cb3c6ac00d20250224065100/d32c95a77eed5b4a4b71cf1d195e388b20250224065134/2b0e6a?t_exp=1740984660&t_lsid=1b177f95-6705-4fde-b25f-deb1d43f0838&t_network=email&t_rid=ZW1haWx8Njc1NDBjYWZiNjM1NTFjNmY2NTBhM2Rl&t_s=download_link&t_ts=1740379894&utm_campaign=TRN_TDL_01&utm_source=sendgrid&utm_medium=email&trk=TRN_TDL_01Get hashmaliciousUnknownBrowse
                                                • 13.226.94.53
                                                main_mpsl.elfGet hashmaliciousMiraiBrowse
                                                • 54.171.230.55
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.212.150.54
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 52.212.150.54
                                                arc.elfGet hashmaliciousMiraiBrowse
                                                • 34.249.145.219
                                                No context
                                                No context
                                                Process:/tmp/ppc.elf
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):13
                                                Entropy (8bit):3.1808329872054406
                                                Encrypted:false
                                                SSDEEP:3:Tg/cA3:TgkG
                                                MD5:B4B673815F84B3C325AF4B636EF3F7E8
                                                SHA1:0D795B3294AE13B67B5977896D2C28B777A2216A
                                                SHA-256:BA14832061879D30329B0378D53F56199440D741567578D0482343247629A00C
                                                SHA-512:DC4969EF1C3132480F4001EB78586B888D6E75CE84121CDF2B9679DA13062DC56604B4E7F1B1BBD205F9CC707B4BF311AAA9C19F0C67224026F270C18FDCD7EF
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:/tmp/ppc.elf.
                                                Process:/tmp/ppc.elf
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):13
                                                Entropy (8bit):3.1808329872054406
                                                Encrypted:false
                                                SSDEEP:3:Tg/cA3:TgkG
                                                MD5:B4B673815F84B3C325AF4B636EF3F7E8
                                                SHA1:0D795B3294AE13B67B5977896D2C28B777A2216A
                                                SHA-256:BA14832061879D30329B0378D53F56199440D741567578D0482343247629A00C
                                                SHA-512:DC4969EF1C3132480F4001EB78586B888D6E75CE84121CDF2B9679DA13062DC56604B4E7F1B1BBD205F9CC707B4BF311AAA9C19F0C67224026F270C18FDCD7EF
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:/tmp/ppc.elf.
                                                File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
                                                Entropy (8bit):6.306136376264158
                                                TrID:
                                                • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                                • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                                File name:ppc.elf
                                                File size:75'212 bytes
                                                MD5:fcf98963be7340387ba2d19893913a3b
                                                SHA1:d22731469cf152eab0b7b2299fc6d3fbd96ef34b
                                                SHA256:369a65073ad707d852bcb79cb41bbf6b6cf76a411470d099eda3f71acd39df8c
                                                SHA512:56c0dbd67601101b218b6878afb978a037206a7fafd84f45c65f9b5c16ee6678aa9d8d23fca79296dfe599eb3626a7d49f718ea0a3c3ada718feec84cd9b6ef1
                                                SSDEEP:1536:+Lyb0MYvXOHMBQteinIjy4/QfunCVSt0UlHVrP:AuQbbtJfP
                                                TLSH:7F734B41B7190587D6B36DF03B3F2BE1D3EA8E8221A46244780FFB4596B1E321946EDD
                                                File Content Preview:.ELF...........................4..#......4. ...(......................"..."...............#...#...#.......F.........dt.Q.............................!..|......$H...H..q...$8!. |...N.. .!..|.......?.........#...../...@..`= ..;.#......+../...A..$8...}).....

                                                ELF header

                                                Class:ELF32
                                                Data:2's complement, big endian
                                                Version:1 (current)
                                                Machine:PowerPC
                                                Version Number:0x1
                                                Type:EXEC (Executable file)
                                                OS/ABI:UNIX - System V
                                                ABI Version:0
                                                Entry Point Address:0x100001f8
                                                Flags:0x0
                                                ELF Header Size:52
                                                Program Header Offset:52
                                                Program Header Size:32
                                                Number of Program Headers:3
                                                Section Header Offset:74732
                                                Section Header Size:40
                                                Number of Section Headers:12
                                                Header String Table Index:11
                                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                NULL0x00x00x00x00x0000
                                                .initPROGBITS0x100000940x940x240x00x6AX004
                                                .textPROGBITS0x100000b80xb80x10dc80x00x6AX004
                                                .finiPROGBITS0x10010e800x10e800x200x00x6AX004
                                                .rodataPROGBITS0x10010ea00x10ea00x13f00x00x2A008
                                                .ctorsPROGBITS0x100223000x123000x80x00x3WA004
                                                .dtorsPROGBITS0x100223080x123080x80x00x3WA004
                                                .dataPROGBITS0x100223140x123140x840x00x3WA004
                                                .sdataPROGBITS0x100223980x123980x90x00x3WA004
                                                .sbssNOBITS0x100223a40x123a10x280x00x3WA004
                                                .bssNOBITS0x100223d00x123a10x462c0x00x3WA008
                                                .shstrtabSTRTAB0x00x123a10x4b0x00x0001
                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                LOAD0x00x100000000x100000000x122900x122906.32910x5R E0x10000.init .text .fini .rodata
                                                LOAD0x123000x100223000x100223000xa10x46fc4.24350x6RW 0x10000.ctors .dtors .data .sdata .sbss .bss
                                                GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

                                                Download Network PCAP: filteredfull

                                                • Total Packets: 25
                                                • 443 (HTTPS)
                                                • 53 (DNS)
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 25, 2025 07:33:22.915920973 CET42468443192.168.2.1434.243.160.129
                                                Mar 25, 2025 07:33:51.501353979 CET34606443192.168.2.1454.217.10.153
                                                Mar 25, 2025 07:33:51.501403093 CET4433460654.217.10.153192.168.2.14
                                                Mar 25, 2025 07:33:51.501619101 CET34606443192.168.2.1454.217.10.153
                                                Mar 25, 2025 07:33:51.503252983 CET34606443192.168.2.1454.217.10.153
                                                Mar 25, 2025 07:33:51.503312111 CET4433460654.217.10.153192.168.2.14
                                                Mar 25, 2025 07:34:09.399319887 CET4433460654.217.10.153192.168.2.14
                                                Mar 25, 2025 07:34:09.399517059 CET34606443192.168.2.1454.217.10.153
                                                Mar 25, 2025 07:34:09.400015116 CET34606443192.168.2.1454.217.10.153
                                                Mar 25, 2025 07:34:09.400029898 CET4433460654.217.10.153192.168.2.14
                                                Mar 25, 2025 07:34:09.402287960 CET4433460654.217.10.153192.168.2.14
                                                Mar 25, 2025 07:34:09.402471066 CET34606443192.168.2.1454.217.10.153
                                                Mar 25, 2025 07:34:09.403556108 CET34606443192.168.2.1454.217.10.153
                                                Mar 25, 2025 07:34:09.403711081 CET4433460654.217.10.153192.168.2.14
                                                Mar 25, 2025 07:34:09.403779030 CET34606443192.168.2.1454.217.10.153
                                                Mar 25, 2025 07:34:09.403789997 CET4433460654.217.10.153192.168.2.14
                                                Mar 25, 2025 07:34:09.403904915 CET34606443192.168.2.1454.217.10.153
                                                Mar 25, 2025 07:34:11.646049023 CET4433460654.217.10.153192.168.2.14
                                                Mar 25, 2025 07:34:11.646179914 CET4433460654.217.10.153192.168.2.14
                                                Mar 25, 2025 07:34:11.646281004 CET34606443192.168.2.1454.217.10.153
                                                Mar 25, 2025 07:34:11.646610022 CET34606443192.168.2.1454.217.10.153
                                                Mar 25, 2025 07:34:11.646610022 CET34606443192.168.2.1454.217.10.153
                                                Mar 25, 2025 07:34:11.646636963 CET4433460654.217.10.153192.168.2.14
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 25, 2025 07:33:25.947515965 CET3600253192.168.2.148.8.4.4
                                                Mar 25, 2025 07:33:27.949589968 CET3713553192.168.2.14208.67.220.220
                                                Mar 25, 2025 07:33:47.967075109 CET3775853192.168.2.14208.67.220.220
                                                Mar 25, 2025 07:33:49.969106913 CET5811353192.168.2.148.8.8.8
                                                Mar 25, 2025 07:34:30.010140896 CET5396553192.168.2.148.8.8.8
                                                Mar 25, 2025 07:34:32.012192011 CET4544153192.168.2.148.8.4.4
                                                Mar 25, 2025 07:34:34.014328957 CET5843853192.168.2.148.8.4.4
                                                Mar 25, 2025 07:34:52.031657934 CET3402553192.168.2.14208.67.220.220
                                                Mar 25, 2025 07:34:54.033869028 CET4779453192.168.2.148.8.8.8
                                                Mar 25, 2025 07:34:56.035954952 CET5379953192.168.2.14208.67.220.220
                                                Mar 25, 2025 07:35:14.054586887 CET3493953192.168.2.148.8.8.8
                                                Mar 25, 2025 07:35:16.056737900 CET4762253192.168.2.148.8.8.8
                                                • motd.ubuntu.com
                                                Session IDSource IPSource PortDestination IPDestination Port
                                                0192.168.2.143460654.217.10.153443
                                                TimestampBytes transferredDirectionData
                                                2025-03-25 06:34:09 UTC249OUTGET / HTTP/1.1
                                                User-Agent: wget/1.20.3-1ubuntu1 Ubuntu/20.04.2/LTS GNU/Linux/5.4.0-72-generic/x86_64 Intel(R)/Xeon(R)/Silver/4210/CPU/@/2.20GHz cloud_id/none
                                                Accept: */*
                                                Accept-Encoding: identity
                                                Host: motd.ubuntu.com
                                                Connection: Keep-Alive
                                                2025-03-25 06:34:11 UTC271INHTTP/1.1 200 OK
                                                Date: Tue, 25 Mar 2025 06:34:11 GMT
                                                Server: Apache/2.4.18 (Ubuntu)
                                                Last-Modified: Tue, 25 Mar 2025 06:31:37 GMT
                                                ETag: "d8-63124df691e02"
                                                Accept-Ranges: bytes
                                                Content-Length: 216
                                                Vary: Accept-Encoding
                                                Connection: close
                                                Content-Type: text/plain
                                                2025-03-25 06:34:11 UTC216INData Raw: 20 2a 20 53 74 72 69 63 74 6c 79 20 63 6f 6e 66 69 6e 65 64 20 4b 75 62 65 72 6e 65 74 65 73 20 6d 61 6b 65 73 20 65 64 67 65 20 61 6e 64 20 49 6f 54 20 73 65 63 75 72 65 2e 20 4c 65 61 72 6e 20 68 6f 77 20 4d 69 63 72 6f 4b 38 73 0a 20 20 20 6a 75 73 74 20 72 61 69 73 65 64 20 74 68 65 20 62 61 72 20 66 6f 72 20 65 61 73 79 2c 20 72 65 73 69 6c 69 65 6e 74 20 61 6e 64 20 73 65 63 75 72 65 20 4b 38 73 20 63 6c 75 73 74 65 72 20 64 65 70 6c 6f 79 6d 65 6e 74 2e 0a 0a 20 20 20 68 74 74 70 73 3a 2f 2f 75 62 75 6e 74 75 2e 63 6f 6d 2f 65 6e 67 61 67 65 2f 73 65 63 75 72 65 2d 6b 75 62 65 72 6e 65 74 65 73 2d 61 74 2d 74 68 65 2d 65 64 67 65 0a
                                                Data Ascii: * Strictly confined Kubernetes makes edge and IoT secure. Learn how MicroK8s just raised the bar for easy, resilient and secure K8s cluster deployment. https://ubuntu.com/engage/secure-kubernetes-at-the-edge


                                                System Behavior

                                                Start time (UTC):06:33:22
                                                Start date (UTC):25/03/2025
                                                Path:/tmp/ppc.elf
                                                Arguments:-
                                                File size:5388968 bytes
                                                MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/rm
                                                Arguments:rm -f /tmp/tmp.xuOJ7IhafQ /tmp/tmp.OxiAmPmWa7 /tmp/tmp.yue8Ho4scb
                                                File size:72056 bytes
                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/cat
                                                Arguments:cat /tmp/tmp.xuOJ7IhafQ
                                                File size:43416 bytes
                                                MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/head
                                                Arguments:head -n 10
                                                File size:47480 bytes
                                                MD5 hash:fd96a67145172477dd57131396fc9608

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/tr
                                                Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                                                File size:51544 bytes
                                                MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/cut
                                                Arguments:cut -c -80
                                                File size:47480 bytes
                                                MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/cat
                                                Arguments:cat /tmp/tmp.xuOJ7IhafQ
                                                File size:43416 bytes
                                                MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/head
                                                Arguments:head -n 10
                                                File size:47480 bytes
                                                MD5 hash:fd96a67145172477dd57131396fc9608

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/tr
                                                Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                                                File size:51544 bytes
                                                MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/cut
                                                Arguments:cut -c -80
                                                File size:47480 bytes
                                                MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):06:34:10
                                                Start date (UTC):25/03/2025
                                                Path:/usr/bin/rm
                                                Arguments:rm -f /tmp/tmp.xuOJ7IhafQ /tmp/tmp.OxiAmPmWa7 /tmp/tmp.yue8Ho4scb
                                                File size:72056 bytes
                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b