Edit tour

Linux Analysis Report
sh4.elf

Overview

General Information

Sample name:sh4.elf
Analysis ID:1648328
MD5:2ecff3329901dee7b2d47c6f253ccce2
SHA1:acce3324512525c2a48d007923a09f2fe6eb29de
SHA256:95f7a4b919eeb09f33536c3d726c73de38ef097f9ae05e518043baeb50ae3911
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100

Signatures

Connects to many ports of the same IP (likely port scanning)
Performs DNS TXT record lookups
Uses STUN server to do NAT traversial
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1648328
Start date and time:2025-03-25 18:32:22 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 40s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:sh4.elf
Detection:MAL
Classification:mal52.troj.evad.linELF@0/2@2/0
  • VT rate limit hit for: kamru.ru
Command:/tmp/sh4.elf
PID:6240
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world
Standard Error:
  • system is lnxubuntu20
  • sh4.elf (PID: 6240, Parent: 6161, MD5: 8943e5f8f8c280467b4472c15ae93ba9) Arguments: /tmp/sh4.elf
    • sh4.elf New Fork (PID: 6244, Parent: 6240)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Networking

barindex
Source: global trafficTCP traffic: 154.205.155.97 ports 56190,0,1,5,6,9
Source: unknownDNS query: name: stun.l.google.com
Source: global trafficTCP traffic: 192.168.2.23:38292 -> 154.205.155.97:56190
Source: global trafficUDP traffic: 192.168.2.23:57799 -> 74.125.250.129:19302
Source: /tmp/sh4.elf (PID: 6244)Socket: 127.0.0.1:22448Jump to behavior
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.155.97
Source: global trafficDNS traffic detected: DNS query: kamru.ru
Source: global trafficDNS traffic detected: DNS query: stun.l.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.troj.evad.linELF@0/2@2/0
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/3088/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/2302/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/910/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/2307/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1594/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1349/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1344/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1465/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1586/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1463/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1900/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/491/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/4509/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1477/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/379/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1476/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1475/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/936/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/2208/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1809/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/1494/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)File opened: /proc/141/cmdlineJump to behavior
Source: /tmp/sh4.elf (PID: 6240)Queries kernel information via 'uname': Jump to behavior
Source: sh4.elf, 6240.1.00007ffd0089a000.00007ffd008bb000.rw-.sdmpBinary or memory string: /tmp/qemu-open.SFuri1
Source: sh4.elf, 6240.1.00007fa274411000.00007fa274417000.rw-.sdmpBinary or memory string: vmware
Source: sh4.elf, 6240.1.00007ffd0089a000.00007ffd008bb000.rw-.sdmpBinary or memory string: FV/tmp/qemu-open.SFuri1\
Source: sh4.elf, 6240.1.00007fa274411000.00007fa274417000.rw-.sdmpBinary or memory string: qemu-arm
Source: sh4.elf, 6240.1.00007ffd0089a000.00007ffd008bb000.rw-.sdmpBinary or memory string: /qemu-open.XXXXX
Source: sh4.elf, 6240.1.00007ffd0089a000.00007ffd008bb000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
Source: sh4.elf, 6240.1.00007fa274411000.00007fa274417000.rw-.sdmpBinary or memory string: 1Zm6vnZ5U4mf8vApyWcDwXR44ZAkzslsN1!a1gCWFxqAHsFWFMWRHVDR44!!a1gCWFxqAHsFWFMWT3YABA!!a1gAWFxuAXsFWUgBRQAA!!a1gAWFxuAXsAWUgKRXgA!!a1gAWFxuAXsAWEgJR3IA!!a10CWFxuAHsGWVcWQHAA!!a10CWFxuAHsGWVcWQHUA!!aFwAWF9uA3sGW0gLRgAA!!aFwAWFlpG2QBW0gJTwAA!!qemu-arm2QBW0gJTwAA!
Source: sh4.elf, 6240.1.00005646cd920000.00005646cd9c9000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4
Source: sh4.elf, 6240.1.00005646cd920000.00005646cd9c9000.rw-.sdmpBinary or memory string: FV5!/etc/qemu-binfmt/sh4
Source: sh4.elf, 6240.1.00007ffd0089a000.00007ffd008bb000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sh4/tmp/sh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sh4.elf

HIPS / PFW / Operating System Protection Evasion

barindex
Source: TrafficDNS traffic detected: queries for: kamru.ru
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1648328 Sample: sh4.elf Startdate: 25/03/2025 Architecture: LINUX Score: 52 11 kamru.ru 2->11 13 stun.l.google.com 2->13 15 5 other IPs or domains 2->15 17 Connects to many ports of the same IP (likely port scanning) 2->17 7 sh4.elf 2->7         started        signatures3 19 Performs DNS TXT record lookups 11->19 21 Uses STUN server to do NAT traversial 13->21 process4 process5 9 sh4.elf 7->9         started       
SourceDetectionScannerLabelLink
sh4.elf11%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
stun.l.google.com
74.125.250.129
truefalse
    high
    kamru.ru
    unknown
    unknowntrue
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      109.202.202.202
      unknownSwitzerland
      13030INIT7CHfalse
      154.205.155.97
      unknownSeychelles
      26484IKGUL-26484UStrue
      74.125.250.129
      stun.l.google.comUnited States
      15169GOOGLEUSfalse
      91.189.91.43
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      91.189.91.42
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
      • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
      154.205.155.97kmips.elfGet hashmaliciousUnknownBrowse
        mips.elfGet hashmaliciousUnknownBrowse
          arm7.elfGet hashmaliciousUnknownBrowse
            arm6.elfGet hashmaliciousUnknownBrowse
              nimips.elfGet hashmaliciousUnknownBrowse
                mips.elfGet hashmaliciousUnknownBrowse
                  arm.elfGet hashmaliciousUnknownBrowse
                    mpsl.elfGet hashmaliciousUnknownBrowse
                      91.189.91.43.i.elfGet hashmaliciousUnknownBrowse
                        na.elfGet hashmaliciousPrometeiBrowse
                          na.elfGet hashmaliciousPrometeiBrowse
                            na.elfGet hashmaliciousPrometeiBrowse
                              na.elfGet hashmaliciousPrometeiBrowse
                                na.elfGet hashmaliciousPrometeiBrowse
                                  na.elfGet hashmaliciousPrometeiBrowse
                                    na.elfGet hashmaliciousPrometeiBrowse
                                      arm6.elfGet hashmaliciousUnknownBrowse
                                        x86.elfGet hashmaliciousUnknownBrowse
                                          91.189.91.42.i.elfGet hashmaliciousUnknownBrowse
                                            na.elfGet hashmaliciousPrometeiBrowse
                                              na.elfGet hashmaliciousPrometeiBrowse
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                    na.elfGet hashmaliciousPrometeiBrowse
                                                      na.elfGet hashmaliciousPrometeiBrowse
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                          arm6.elfGet hashmaliciousUnknownBrowse
                                                            x86.elfGet hashmaliciousUnknownBrowse
                                                              No context
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              CANONICAL-ASGB.i.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              arm6.elfGet hashmaliciousGafgyt, OkiruBrowse
                                                              • 185.125.190.26
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              arm6.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              CANONICAL-ASGB.i.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              arm6.elfGet hashmaliciousGafgyt, OkiruBrowse
                                                              • 185.125.190.26
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              arm6.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              IKGUL-26484USmips.elfGet hashmaliciousGafgyt, OkiruBrowse
                                                              • 156.233.94.73
                                                              kmips.elfGet hashmaliciousUnknownBrowse
                                                              • 154.205.155.97
                                                              mips.elfGet hashmaliciousUnknownBrowse
                                                              • 154.205.155.97
                                                              resgod.arm5.elfGet hashmaliciousMiraiBrowse
                                                              • 156.251.85.223
                                                              resgod.arm7.elfGet hashmaliciousMiraiBrowse
                                                              • 156.231.181.96
                                                              resgod.mpsl.elfGet hashmaliciousMiraiBrowse
                                                              • 156.249.231.176
                                                              m68k.elfGet hashmaliciousMiraiBrowse
                                                              • 156.252.201.202
                                                              mpsl.elfGet hashmaliciousMiraiBrowse
                                                              • 156.249.231.187
                                                              x86_64.elfGet hashmaliciousMiraiBrowse
                                                              • 156.238.135.154
                                                              arm7.elfGet hashmaliciousMiraiBrowse
                                                              • 156.231.181.97
                                                              INIT7CH.i.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 109.202.202.202
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 109.202.202.202
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 109.202.202.202
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 109.202.202.202
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 109.202.202.202
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 109.202.202.202
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 109.202.202.202
                                                              arm6.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              x86.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              No context
                                                              No context
                                                              Process:/tmp/sh4.elf
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):13
                                                              Entropy (8bit):3.5465935642949384
                                                              Encrypted:false
                                                              SSDEEP:3:TgKYn:TgKYn
                                                              MD5:AEF4020327A62D78F5A8202D453B0A74
                                                              SHA1:84FC7A7CBE0B4EF5BDB927B95EA1BD01665BE8B1
                                                              SHA-256:1878DDF74B755A998CBFD2140779771966ADF507D2B95CA86906476BFD80575B
                                                              SHA-512:0E1BF58363F746F19B92730E15E2091F05A2C87B120B004F3819735F4D60268E66711EBEB06E3B771B2DE327FCBB3DDD368241E7A6E1A1B759384F6D70A2C528
                                                              Malicious:false
                                                              Reputation:moderate, very likely benign file
                                                              Preview:/tmp/sh4.elf.
                                                              Process:/tmp/sh4.elf
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):13
                                                              Entropy (8bit):3.5465935642949384
                                                              Encrypted:false
                                                              SSDEEP:3:TgKYn:TgKYn
                                                              MD5:AEF4020327A62D78F5A8202D453B0A74
                                                              SHA1:84FC7A7CBE0B4EF5BDB927B95EA1BD01665BE8B1
                                                              SHA-256:1878DDF74B755A998CBFD2140779771966ADF507D2B95CA86906476BFD80575B
                                                              SHA-512:0E1BF58363F746F19B92730E15E2091F05A2C87B120B004F3819735F4D60268E66711EBEB06E3B771B2DE327FCBB3DDD368241E7A6E1A1B759384F6D70A2C528
                                                              Malicious:false
                                                              Reputation:moderate, very likely benign file
                                                              Preview:/tmp/sh4.elf.
                                                              File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
                                                              Entropy (8bit):6.873700906998795
                                                              TrID:
                                                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                              File name:sh4.elf
                                                              File size:66'384 bytes
                                                              MD5:2ecff3329901dee7b2d47c6f253ccce2
                                                              SHA1:acce3324512525c2a48d007923a09f2fe6eb29de
                                                              SHA256:95f7a4b919eeb09f33536c3d726c73de38ef097f9ae05e518043baeb50ae3911
                                                              SHA512:36eb84f7660b8c5a8befd2d9c695addaf7e9518d4ee04dfa987904455122abb326cbc16098ab52a1fa5b1f182e2b772790cdc95aa3973b94cf6603e79680f35e
                                                              SSDEEP:768:Fp8L/ccs9/SSH0ldEatvYAWg3afi3p64WEiBZQHI37FRlWrpOGeBpCscKKgmOIEr:Fk/llOatvYAWghpdYDQHE7l54BWfr
                                                              TLSH:BB538D72F8302D68D81119F5F030D979035659F2C4CB0CB6A9EEE26454A7E8DFA4EBB4
                                                              File Content Preview:.ELF..............*.......@.4...........4. ...(...............@...@.H...H.....................A...A......F..........Q.td..............................././"O.n......#.*@........#.*@L...&O.n.l..................................././.../.a"O.!...n...a.b("...q.

                                                              ELF header

                                                              Class:ELF32
                                                              Data:2's complement, little endian
                                                              Version:1 (current)
                                                              Machine:<unknown>
                                                              Version Number:0x1
                                                              Type:EXEC (Executable file)
                                                              OS/ABI:UNIX - System V
                                                              ABI Version:0
                                                              Entry Point Address:0x4001a0
                                                              Flags:0xc
                                                              ELF Header Size:52
                                                              Program Header Offset:52
                                                              Program Header Size:32
                                                              Number of Program Headers:3
                                                              Section Header Offset:65984
                                                              Section Header Size:40
                                                              Number of Section Headers:10
                                                              Header String Table Index:9
                                                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                              NULL0x00x00x00x00x0000
                                                              .initPROGBITS0x4000940x940x2e0x00x6AX004
                                                              .textPROGBITS0x4000e00xe00xe9600x00x6AX0032
                                                              .finiPROGBITS0x40ea400xea400x220x00x6AX004
                                                              .rodataPROGBITS0x40ea640xea640x12e40x00x2A004
                                                              .ctorsPROGBITS0x4100dc0x100dc0x80x00x3WA004
                                                              .dtorsPROGBITS0x4100e40x100e40x80x00x3WA004
                                                              .dataPROGBITS0x4100f00x100f00x900x00x3WA004
                                                              .bssNOBITS0x4101800x101800x46540x00x3WA004
                                                              .shstrtabSTRTAB0x00x101800x3e0x00x0001
                                                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                              LOAD0x00x4000000x4000000xfd480xfd486.94640x5R E0x10000.init .text .fini .rodata
                                                              LOAD0x100dc0x4100dc0x4100dc0xa40x46f84.09290x6RW 0x10000.ctors .dtors .data .bss
                                                              GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

                                                              Download Network PCAP: filteredfull

                                                              • Total Packets: 28
                                                              • 56190 undefined
                                                              • 19302 undefined
                                                              • 443 (HTTPS)
                                                              • 80 (HTTP)
                                                              • 53 (DNS)
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Mar 25, 2025 18:33:12.663017988 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:33:12.825887918 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:33:12.826030016 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:33:12.995654106 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:33:12.995795965 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:33:13.160075903 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:33:13.160218954 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:33:13.774849892 CET42836443192.168.2.2391.189.91.43
                                                              Mar 25, 2025 18:33:14.104276896 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:33:14.271157026 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:33:15.054732084 CET4251680192.168.2.23109.202.202.202
                                                              Mar 25, 2025 18:33:28.108652115 CET43928443192.168.2.2391.189.91.42
                                                              Mar 25, 2025 18:33:29.117472887 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:33:29.612509966 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:33:29.778184891 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:33:40.394860983 CET42836443192.168.2.2391.189.91.43
                                                              Mar 25, 2025 18:33:42.344223976 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:33:42.344393015 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:33:44.490343094 CET4251680192.168.2.23109.202.202.202
                                                              Mar 25, 2025 18:33:57.358464003 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:33:57.526010036 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:33:57.526295900 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:33:57.700367928 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:34:09.062766075 CET43928443192.168.2.2391.189.91.42
                                                              Mar 25, 2025 18:34:15.101965904 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:34:15.266309977 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:34:15.266488075 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:34:15.430618048 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:34:32.479425907 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:34:32.645994902 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:34:32.646158934 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:34:32.809933901 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:34:52.418937922 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:34:52.605158091 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:34:52.605504036 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:34:52.770551920 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:34:52.770684958 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:35:10.285021067 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:35:10.490632057 CET5619038292154.205.155.97192.168.2.23
                                                              Mar 25, 2025 18:35:10.490863085 CET3829256190192.168.2.23154.205.155.97
                                                              Mar 25, 2025 18:35:10.655369043 CET5619038292154.205.155.97192.168.2.23
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Mar 25, 2025 18:33:12.539380074 CET5975953192.168.2.238.8.8.8
                                                              Mar 25, 2025 18:33:12.650465012 CET53597598.8.8.8192.168.2.23
                                                              Mar 25, 2025 18:33:13.829005957 CET5813553192.168.2.238.8.8.8
                                                              Mar 25, 2025 18:33:13.968904018 CET53581358.8.8.8192.168.2.23
                                                              Mar 25, 2025 18:33:13.969670057 CET5779919302192.168.2.2374.125.250.129
                                                              Mar 25, 2025 18:33:14.102675915 CET193025779974.125.250.129192.168.2.23
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Mar 25, 2025 18:33:12.539380074 CET192.168.2.238.8.8.80x6dadStandard query (0)kamru.ru16IN (0x0001)false
                                                              Mar 25, 2025 18:33:13.829005957 CET192.168.2.238.8.8.80x3be0Standard query (0)stun.l.google.comA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Mar 25, 2025 18:33:12.650465012 CET8.8.8.8192.168.2.230x6dadNo error (0)kamru.ruTXT (Text strings)IN (0x0001)false
                                                              Mar 25, 2025 18:33:13.968904018 CET8.8.8.8192.168.2.230x3be0No error (0)stun.l.google.com74.125.250.129A (IP address)IN (0x0001)false

                                                              System Behavior

                                                              Start time (UTC):17:33:11
                                                              Start date (UTC):25/03/2025
                                                              Path:/tmp/sh4.elf
                                                              Arguments:-
                                                              File size:4139976 bytes
                                                              MD5 hash:8943e5f8f8c280467b4472c15ae93ba9