Edit tour

Linux Analysis Report
x86.elf

Overview

General Information

Sample name:x86.elf
Analysis ID:1648757
MD5:49cf80e2a7a87ccc1eb3b6992a3e9c78
SHA1:ae7f27a1636e7609817d40a3266ebe1ae1ceecab
SHA256:6e695364595da2edaf8e941881a1954f964ed7fa38c1e117b573e3a65d00f5b5
Tags:elfuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Sample is packed with UPX
Sends malformed DNS queries
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Sample contains only a LOAD segment without any section mappings
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1648757
Start date and time:2025-03-26 07:18:15 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 25s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:x86.elf
Detection:MAL
Classification:mal56.troj.evad.linELF@0/1@25/0
  • VT rate limit hit for: solarwhale.dyn
  • VT rate limit hit for: solarwhale.dyn. [malformed]
Command:/tmp/x86.elf
PID:5436
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
skidmark botnet
Standard Error:
  • system is lnxubuntu20
  • x86.elf (PID: 5436, Parent: 5357, MD5: 49cf80e2a7a87ccc1eb3b6992a3e9c78) Arguments: /tmp/x86.elf
    • x86.elf New Fork (PID: 5437, Parent: 5436)
      • x86.elf New Fork (PID: 5438, Parent: 5437)
      • x86.elf New Fork (PID: 5439, Parent: 5437)
      • x86.elf New Fork (PID: 5440, Parent: 5437)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: x86.elfReversingLabs: Detection: 13%

Networking

barindex
Source: global trafficDNS traffic detected: malformed DNS query: solarwhale.dyn. [malformed]
Source: unknownDNS traffic detected: query: echohorizon.dyn replaycode: Name error (3)
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownUDP traffic detected without corresponding DNS query: 94.16.114.254
Source: unknownUDP traffic detected without corresponding DNS query: 94.16.114.254
Source: unknownUDP traffic detected without corresponding DNS query: 94.16.114.254
Source: unknownUDP traffic detected without corresponding DNS query: 94.16.114.254
Source: unknownUDP traffic detected without corresponding DNS query: 94.16.114.254
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 51.254.162.59
Source: unknownUDP traffic detected without corresponding DNS query: 51.254.162.59
Source: unknownUDP traffic detected without corresponding DNS query: 51.254.162.59
Source: unknownUDP traffic detected without corresponding DNS query: 51.254.162.59
Source: unknownUDP traffic detected without corresponding DNS query: 51.254.162.59
Source: unknownUDP traffic detected without corresponding DNS query: 185.181.61.24
Source: unknownUDP traffic detected without corresponding DNS query: 185.181.61.24
Source: unknownUDP traffic detected without corresponding DNS query: 185.181.61.24
Source: unknownUDP traffic detected without corresponding DNS query: 185.181.61.24
Source: unknownUDP traffic detected without corresponding DNS query: 185.181.61.24
Source: unknownUDP traffic detected without corresponding DNS query: 178.254.22.166
Source: unknownUDP traffic detected without corresponding DNS query: 178.254.22.166
Source: unknownUDP traffic detected without corresponding DNS query: 178.254.22.166
Source: unknownUDP traffic detected without corresponding DNS query: 178.254.22.166
Source: unknownUDP traffic detected without corresponding DNS query: 178.254.22.166
Source: global trafficDNS traffic detected: DNS query: solarwhale.dyn
Source: global trafficDNS traffic detected: DNS query: echohorizon.dyn
Source: global trafficDNS traffic detected: DNS query: solarwhale.dyn. [malformed]
Source: x86.elfString found in binary or memory: http://upx.sf.net
Source: LOAD without section mappingsProgram segment: 0x8048000
Source: classification engineClassification label: mal56.troj.evad.linELF@0/1@25/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 5.00 Copyright (C) 1996-2025 the UPX Team. All Rights Reserved. $
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/5381/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/238/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/239/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/5276/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/241/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/3642/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/1482/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/1480/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/371/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/1238/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/134/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/3413/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/1475/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/3776/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 5439)File opened: /proc/936/cmdlineJump to behavior
Source: x86.elfSubmission file: segment LOAD with 7.8843 entropy (max. 8.0)
Source: x86.elfSubmission file: segment LOAD with 7.9764 entropy (max. 8.0)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Obfuscated Files or Information
1
OS Credential Dumping
System Service DiscoveryRemote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1648757 Sample: x86.elf Startdate: 26/03/2025 Architecture: LINUX Score: 56 18 solarwhale.dyn. [malformed] 2->18 20 solarwhale.dyn 2->20 22 2 other IPs or domains 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Sample is packed with UPX 2->26 8 x86.elf 2->8         started        signatures3 28 Sends malformed DNS queries 18->28 process4 process5 10 x86.elf 8->10         started        process6 12 x86.elf 10->12         started        14 x86.elf 10->14         started        16 x86.elf 10->16         started       
SourceDetectionScannerLabelLink
x86.elf14%ReversingLabsLinux.Packed.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
echohorizon.dyn
unknown
unknownfalse
    high
    solarwhale.dyn
    unknown
    unknowntrue
      unknown
      solarwhale.dyn. [malformed]
      unknown
      unknowntrue
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://upx.sf.netx86.elffalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          175.30.53.20
          unknownChina
          4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          175.30.53.20x86.elfGet hashmaliciousUnknownBrowse
            x86_64.elfGet hashmaliciousUnknownBrowse
              arm.elfGet hashmaliciousUnknownBrowse
                mpsl.elfGet hashmaliciousUnknownBrowse
                  gjsoX84ZOy.elfGet hashmaliciousMiraiBrowse
                    skwXrj6q72.elfGet hashmaliciousUnknownBrowse
                      VqY324s7TO.elfGet hashmaliciousUnknownBrowse
                        1v1A4KluJp.elfGet hashmaliciousUnknownBrowse
                          fI2JqkDmZj.elfGet hashmaliciousUnknownBrowse
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            CHINANET-BACKBONENo31Jin-rongStreetCNhttps://energy-innovation-4916.my.salesforce-sites.com/enrGet hashmaliciousHTMLPhisherBrowse
                            • 63.140.39.248
                            https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://tucansport.com/sample-page/&ved=2ahUKEwjQ8uXI8KWMAxXnRzABHZNPGggQFnoECBcQAQ&usg=AOvVaw0aeev5ilte-Y3jh1kJeCpRGet hashmaliciousUnknownBrowse
                            • 63.140.38.112
                            http://hak5.comGet hashmaliciousUnknownBrowse
                            • 63.140.39.22
                            arm.elfGet hashmaliciousGafgyt, OkiruBrowse
                            • 183.144.215.77
                            ppc.elfGet hashmaliciousOkiruBrowse
                            • 114.220.169.100
                            mips.elfGet hashmaliciousGafgyt, OkiruBrowse
                            • 171.93.227.232
                            m68k.elfGet hashmaliciousGafgyt, OkiruBrowse
                            • 222.209.183.103
                            mpsl.elfGet hashmaliciousGafgyt, OkiruBrowse
                            • 110.180.33.75
                            sh4.elfGet hashmaliciousGafgyt, OkiruBrowse
                            • 42.94.250.55
                            arm7.elfGet hashmaliciousOkiruBrowse
                            • 125.87.223.24
                            No context
                            No context
                            Process:/tmp/x86.elf
                            File Type:data
                            Category:dropped
                            Size (bytes):6501
                            Entropy (8bit):6.497544961336459
                            Encrypted:false
                            SSDEEP:96:HSNwtpYHpb5yQzlJqdAK0gJrwpm/Ko2BD4/U9VDX19B2dAtRy5Fag9RWssNJcyuC:yNwMHKclJq5Im/Ko2BaKFDMUoLag9ic+
                            MD5:55F9FB7A5A632E6BD2C4CA5178795955
                            SHA1:3B22C1708E5789ADE9B79516878BF8E00EF27C91
                            SHA-256:6A7E9243A338B8188B1865B3668D43664092976FFA3DF32B9741E3BC16B86368
                            SHA-512:2AA33D073132BA427D325E4BC2B10D3167C8955686BC12353875AAE158A6D65BDB14C77563C7F5DDE814AE4D045CE8EA4381ED57EEB70BC92CDD94F3BCD1749F
                            Malicious:false
                            Reputation:low
                            Preview:....L...".......[S.%.....X............Y........t.............u.........j.Y.U....u.W...u......u.W.....u....t._Yj..D$.....@.........H..)}.WV...../proc/self/exe.[).j.X..D$(.......jUX...y........t...._O.... =......E..8...^..)..1....).Z.......I...O.1.).........X]X...^]......TWUVP.@.....Mh..f.}..u..-.z....[.s..........1...XY_[VQPRW[..x#S).j.^j.Z....1.).)...;...[...3..._).<..u.[YPPPPPPPP.[.'WVS..|$....@.9...s.j.[j.X.....t.....F..B...C.....)..C...[^_.U..WV..S.....:.........}..:.E..E.P.C..v....P..........uy.U.;U.uq.E.)..C....V.)....tEj.....a....E.Y..t:.M..tB9.w>;.w:9.r......V.Q.8....U.X...V.)....u..e.[^_..}.UPX!u.....t.j.[j.X...U..WVS.t$.t<..u8............9.t....t(..t......9.u.C..p.u..u...t..U..u.[^_]......j.[j.X...U..WVS.............u..].VSW.....j.j.j2j..u.S.u.....$VWS.........e.[^_..U..WVS..x.E.U.}.]..E......E..U..M..E......U.M..E..............P4..E.+Z(f.x.........].J.....E.j[X..k....M..E.....f.Q,f..........E....E..... ;E...f....M....~.......
                            File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
                            Entropy (8bit):7.973588605879543
                            TrID:
                            • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                            • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                            File name:x86.elf
                            File size:28'572 bytes
                            MD5:49cf80e2a7a87ccc1eb3b6992a3e9c78
                            SHA1:ae7f27a1636e7609817d40a3266ebe1ae1ceecab
                            SHA256:6e695364595da2edaf8e941881a1954f964ed7fa38c1e117b573e3a65d00f5b5
                            SHA512:a51b3bbc0f25fec04d2b271c78378fe002f2eb6e04f5ddc39d009ab2aeeb676724b4c9d8f3405ef6af69741dfe6e05638b8181e69f3acfc254bd4f9e3728ed10
                            SSDEEP:384:MhUpKPw2EALHSI6J4TksMaW3Ua20ZwFsPjkpdlhbpl+hrXQ7DJ8NfjN2VAB5UeNR:UUpcZ68PAKf3lhb7+dcGN2VAHFyI9l
                            TLSH:3ED2E07B73927706C0375DBDAC144F4DF4929B1A2916B3A0433B96B8F8A161E235ED22
                            File Content Preview:.ELF....................X...4...........4. ..........................................................n...n..........Q.td................................UPX!\.......0...........V..........?..k.I/.j....\.d*nlz.e..A./:..5.KT7S..RmC...[X.t..l.bx.+......[B...:

                            ELF header

                            Class:ELF32
                            Data:2's complement, little endian
                            Version:1 (current)
                            Machine:Intel 80386
                            Version Number:0x1
                            Type:EXEC (Executable file)
                            OS/ABI:UNIX - Linux
                            ABI Version:0
                            Entry Point Address:0x805db58
                            Flags:0x0
                            ELF Header Size:52
                            Program Header Offset:52
                            Program Header Size:32
                            Number of Program Headers:3
                            Section Header Offset:0
                            Section Header Size:0
                            Number of Section Headers:0
                            Header String Table Index:0
                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                            LOAD0x00x80480000x80480000x10000xf9807.88430x6RW 0x1000
                            LOAD0x00x80580000x80580000x6ea60x6ea67.97640x5R E0x1000
                            GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

                            Download Network PCAP: filteredfull

                            • Total Packets: 45
                            • 53 (DNS)
                            • 23 (Telnet)
                            TimestampSource PortDest PortSource IPDest IP
                            Mar 26, 2025 07:19:29.174534082 CET4445423192.168.2.13175.30.53.20
                            Mar 26, 2025 07:19:30.205390930 CET4445423192.168.2.13175.30.53.20
                            Mar 26, 2025 07:19:32.221389055 CET4445423192.168.2.13175.30.53.20
                            Mar 26, 2025 07:19:36.413379908 CET4445423192.168.2.13175.30.53.20
                            Mar 26, 2025 07:19:40.365415096 CET4445623192.168.2.13175.30.53.20
                            Mar 26, 2025 07:19:41.373394966 CET4445623192.168.2.13175.30.53.20
                            Mar 26, 2025 07:19:43.389385939 CET4445623192.168.2.13175.30.53.20
                            Mar 26, 2025 07:19:47.421480894 CET4445623192.168.2.13175.30.53.20
                            Mar 26, 2025 07:20:15.393448114 CET4445823192.168.2.13175.30.53.20
                            Mar 26, 2025 07:20:16.413425922 CET4445823192.168.2.13175.30.53.20
                            Mar 26, 2025 07:20:18.429405928 CET4445823192.168.2.13175.30.53.20
                            Mar 26, 2025 07:20:22.493428946 CET4445823192.168.2.13175.30.53.20
                            Mar 26, 2025 07:20:26.375827074 CET4446023192.168.2.13175.30.53.20
                            Mar 26, 2025 07:20:27.389436007 CET4446023192.168.2.13175.30.53.20
                            Mar 26, 2025 07:20:29.405416965 CET4446023192.168.2.13175.30.53.20
                            Mar 26, 2025 07:20:33.501441956 CET4446023192.168.2.13175.30.53.20
                            Mar 26, 2025 07:21:01.404448986 CET4446223192.168.2.13175.30.53.20
                            Mar 26, 2025 07:21:02.429508924 CET4446223192.168.2.13175.30.53.20
                            Mar 26, 2025 07:21:04.445528030 CET4446223192.168.2.13175.30.53.20
                            Mar 26, 2025 07:21:08.573621035 CET4446223192.168.2.13175.30.53.20
                            TimestampSource PortDest PortSource IPDest IP
                            Mar 26, 2025 07:19:04.150537014 CET5125353192.168.2.1394.16.114.254
                            Mar 26, 2025 07:19:09.155622005 CET4330153192.168.2.1394.16.114.254
                            Mar 26, 2025 07:19:14.160690069 CET4630753192.168.2.1394.16.114.254
                            Mar 26, 2025 07:19:19.165411949 CET5299953192.168.2.1394.16.114.254
                            Mar 26, 2025 07:19:24.169399023 CET4882153192.168.2.1394.16.114.254
                            Mar 26, 2025 07:19:39.181619883 CET5872553192.168.2.13194.36.144.87
                            Mar 26, 2025 07:19:39.487231970 CET5358725194.36.144.87192.168.2.13
                            Mar 26, 2025 07:19:39.487354994 CET4967853192.168.2.13194.36.144.87
                            Mar 26, 2025 07:19:39.664499998 CET5349678194.36.144.87192.168.2.13
                            Mar 26, 2025 07:19:39.664673090 CET5152153192.168.2.13194.36.144.87
                            Mar 26, 2025 07:19:39.859381914 CET5351521194.36.144.87192.168.2.13
                            Mar 26, 2025 07:19:39.859503031 CET5612653192.168.2.13194.36.144.87
                            Mar 26, 2025 07:19:40.186502934 CET5356126194.36.144.87192.168.2.13
                            Mar 26, 2025 07:19:40.186650038 CET3728153192.168.2.13194.36.144.87
                            Mar 26, 2025 07:19:40.365309954 CET5337281194.36.144.87192.168.2.13
                            Mar 26, 2025 07:19:50.373802900 CET4705253192.168.2.1351.254.162.59
                            Mar 26, 2025 07:19:55.378884077 CET4652953192.168.2.1351.254.162.59
                            Mar 26, 2025 07:20:00.381429911 CET5171053192.168.2.1351.254.162.59
                            Mar 26, 2025 07:20:05.386502028 CET5901753192.168.2.1351.254.162.59
                            Mar 26, 2025 07:20:10.390877962 CET5934353192.168.2.1351.254.162.59
                            Mar 26, 2025 07:20:25.401607037 CET5526953192.168.2.13185.181.61.24
                            Mar 26, 2025 07:20:25.599513054 CET5355269185.181.61.24192.168.2.13
                            Mar 26, 2025 07:20:25.599725008 CET3349953192.168.2.13185.181.61.24
                            Mar 26, 2025 07:20:25.801337004 CET5333499185.181.61.24192.168.2.13
                            Mar 26, 2025 07:20:25.801503897 CET4759253192.168.2.13185.181.61.24
                            Mar 26, 2025 07:20:25.999366045 CET5347592185.181.61.24192.168.2.13
                            Mar 26, 2025 07:20:25.999574900 CET3564153192.168.2.13185.181.61.24
                            Mar 26, 2025 07:20:26.197168112 CET5335641185.181.61.24192.168.2.13
                            Mar 26, 2025 07:20:26.197303057 CET3935253192.168.2.13185.181.61.24
                            Mar 26, 2025 07:20:26.375672102 CET5339352185.181.61.24192.168.2.13
                            Mar 26, 2025 07:20:36.385691881 CET3541353192.168.2.13178.254.22.166
                            Mar 26, 2025 07:20:41.388880014 CET4631053192.168.2.13178.254.22.166
                            Mar 26, 2025 07:20:46.391176939 CET4246253192.168.2.13178.254.22.166
                            Mar 26, 2025 07:20:51.394314051 CET3760353192.168.2.13178.254.22.166
                            Mar 26, 2025 07:20:56.399198055 CET3629353192.168.2.13178.254.22.166
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Mar 26, 2025 07:19:04.150537014 CET192.168.2.1394.16.114.2540x1ca0Standard query (0)solarwhale.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:09.155622005 CET192.168.2.1394.16.114.2540x1ca0Standard query (0)solarwhale.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:14.160690069 CET192.168.2.1394.16.114.2540x1ca0Standard query (0)solarwhale.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:19.165411949 CET192.168.2.1394.16.114.2540x1ca0Standard query (0)solarwhale.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:24.169399023 CET192.168.2.1394.16.114.2540x1ca0Standard query (0)solarwhale.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:39.181619883 CET192.168.2.13194.36.144.870x701fStandard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:39.487354994 CET192.168.2.13194.36.144.870x701fStandard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:39.664673090 CET192.168.2.13194.36.144.870x701fStandard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:39.859503031 CET192.168.2.13194.36.144.870x701fStandard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:40.186650038 CET192.168.2.13194.36.144.870x701fStandard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:50.373802900 CET192.168.2.1351.254.162.590xc420Standard query (0)solarwhale.dyn. [malformed]256395false
                            Mar 26, 2025 07:19:55.378884077 CET192.168.2.1351.254.162.590xc420Standard query (0)solarwhale.dyn. [malformed]256400false
                            Mar 26, 2025 07:20:00.381429911 CET192.168.2.1351.254.162.590xc420Standard query (0)solarwhale.dyn. [malformed]256405false
                            Mar 26, 2025 07:20:05.386502028 CET192.168.2.1351.254.162.590xc420Standard query (0)solarwhale.dyn. [malformed]256410false
                            Mar 26, 2025 07:20:10.390877962 CET192.168.2.1351.254.162.590xc420Standard query (0)solarwhale.dyn. [malformed]256415false
                            Mar 26, 2025 07:20:25.401607037 CET192.168.2.13185.181.61.240xf122Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:20:25.599725008 CET192.168.2.13185.181.61.240xf122Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:20:25.801503897 CET192.168.2.13185.181.61.240xf122Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:20:25.999574900 CET192.168.2.13185.181.61.240xf122Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:20:26.197303057 CET192.168.2.13185.181.61.240xf122Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:20:36.385691881 CET192.168.2.13178.254.22.1660x200cStandard query (0)solarwhale.dyn. [malformed]256441false
                            Mar 26, 2025 07:20:41.388880014 CET192.168.2.13178.254.22.1660x200cStandard query (0)solarwhale.dyn. [malformed]256446false
                            Mar 26, 2025 07:20:46.391176939 CET192.168.2.13178.254.22.1660x200cStandard query (0)solarwhale.dyn. [malformed]256451false
                            Mar 26, 2025 07:20:51.394314051 CET192.168.2.13178.254.22.1660x200cStandard query (0)solarwhale.dyn. [malformed]256456false
                            Mar 26, 2025 07:20:56.399198055 CET192.168.2.13178.254.22.1660x200cStandard query (0)solarwhale.dyn. [malformed]256461false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Mar 26, 2025 07:19:39.487231970 CET194.36.144.87192.168.2.130x701fName error (3)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:39.664499998 CET194.36.144.87192.168.2.130x701fName error (3)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:39.859381914 CET194.36.144.87192.168.2.130x701fName error (3)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:40.186502934 CET194.36.144.87192.168.2.130x701fName error (3)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:19:40.365309954 CET194.36.144.87192.168.2.130x701fName error (3)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:20:25.599513054 CET185.181.61.24192.168.2.130xf122Name error (3)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:20:25.801337004 CET185.181.61.24192.168.2.130xf122Name error (3)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:20:25.999366045 CET185.181.61.24192.168.2.130xf122Name error (3)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:20:26.197168112 CET185.181.61.24192.168.2.130xf122Name error (3)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                            Mar 26, 2025 07:20:26.375672102 CET185.181.61.24192.168.2.130xf122Name error (3)echohorizon.dynnonenoneA (IP address)IN (0x0001)false

                            System Behavior

                            Start time (UTC):06:19:02
                            Start date (UTC):26/03/2025
                            Path:/tmp/x86.elf
                            Arguments:/tmp/x86.elf
                            File size:28572 bytes
                            MD5 hash:49cf80e2a7a87ccc1eb3b6992a3e9c78

                            Start time (UTC):06:19:03
                            Start date (UTC):26/03/2025
                            Path:/tmp/x86.elf
                            Arguments:-
                            File size:28572 bytes
                            MD5 hash:49cf80e2a7a87ccc1eb3b6992a3e9c78

                            Start time (UTC):06:19:03
                            Start date (UTC):26/03/2025
                            Path:/tmp/x86.elf
                            Arguments:-
                            File size:28572 bytes
                            MD5 hash:49cf80e2a7a87ccc1eb3b6992a3e9c78

                            Start time (UTC):06:19:03
                            Start date (UTC):26/03/2025
                            Path:/tmp/x86.elf
                            Arguments:-
                            File size:28572 bytes
                            MD5 hash:49cf80e2a7a87ccc1eb3b6992a3e9c78

                            Start time (UTC):06:19:03
                            Start date (UTC):26/03/2025
                            Path:/tmp/x86.elf
                            Arguments:-
                            File size:28572 bytes
                            MD5 hash:49cf80e2a7a87ccc1eb3b6992a3e9c78