Edit tour

Linux Analysis Report
mips.nn.elf

Overview

General Information

Sample name:mips.nn.elf
Analysis ID:1654578
MD5:c73a365be78dfe06bc37973eae34652d
SHA1:c8e5597e6b3cc57acbd171dbb75d218256bca388
SHA256:76a178a2f246f1445e07d110aed40f59353cb2a6ce493b4612c64de19c48f01e
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:64
Range:0 - 100

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1654578
Start date and time:2025-04-02 12:48:34 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 34s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:mips.nn.elf
Detection:MAL
Classification:mal64.troj.linELF@0/2@0/0
Command:/tmp/mips.nn.elf
PID:6209
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
The Gorilla Botnet Cats Came After You!
Standard Error:
  • system is lnxubuntu20
  • mips.nn.elf (PID: 6209, Parent: 6124, MD5: 0083f1f0e77be34ad27f849842bbb00c) Arguments: /tmp/mips.nn.elf
  • udisksd New Fork (PID: 6219, Parent: 799)
  • dumpe2fs (PID: 6219, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6254, Parent: 799)
  • dumpe2fs (PID: 6254, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6274, Parent: 799)
  • dumpe2fs (PID: 6274, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • dash New Fork (PID: 6358, Parent: 4337)
  • rm (PID: 6358, Parent: 4337, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.v3QLYp7cRs /tmp/tmp.3eHzlqOkwL /tmp/tmp.XGQcq6bZ5h
  • dash New Fork (PID: 6359, Parent: 4337)
  • rm (PID: 6359, Parent: 4337, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.v3QLYp7cRs /tmp/tmp.3eHzlqOkwL /tmp/tmp.XGQcq6bZ5h
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
mips.nn.elfJoeSecurity_Mirai_9Yara detected MiraiJoe Security
    SourceRuleDescriptionAuthorStrings
    6209.1.00007fbf80400000.00007fbf80420000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: mips.nn.elfAvira: detected
      Source: mips.nn.elfVirustotal: Detection: 34%Perma Link
      Source: mips.nn.elfReversingLabs: Detection: 55%
      Source: global trafficTCP traffic: 192.168.2.23:58492 -> 176.65.134.15:38242
      Source: /tmp/mips.nn.elf (PID: 6209)Socket: 127.0.0.1:38242Jump to behavior
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
      Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 34.249.145.219
      Source: unknownTCP traffic detected without corresponding DNS query: 34.249.145.219
      Source: unknownTCP traffic detected without corresponding DNS query: 34.249.145.219
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
      Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 34.249.145.219
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownTCP traffic detected without corresponding DNS query: 176.65.134.15
      Source: unknownNetwork traffic detected: HTTP traffic on port 39244 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39244
      Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: /tmp/mips.nn.elf (PID: 6233)SIGKILL sent: pid: 6358, result: no such processJump to behavior
      Source: classification engineClassification label: mal64.troj.linELF@0/2@0/0
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6274/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6254/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6311/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6310/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6035/cmdlineJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6313/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6312/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/799/cmdlineJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6325/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6308/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6307/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6309/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6320/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6322/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6321/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6324/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6323/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/2/cmdlineJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6315/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6314/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6317/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6316/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6319/statusJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6233)File opened: /proc/6318/statusJump to behavior
      Source: /usr/bin/dash (PID: 6358)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.v3QLYp7cRs /tmp/tmp.3eHzlqOkwL /tmp/tmp.XGQcq6bZ5hJump to behavior
      Source: /usr/bin/dash (PID: 6359)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.v3QLYp7cRs /tmp/tmp.3eHzlqOkwL /tmp/tmp.XGQcq6bZ5hJump to behavior
      Source: /tmp/mips.nn.elf (PID: 6209)Queries kernel information via 'uname': Jump to behavior
      Source: mips.nn.elf, 6209.1.00007ffcb211a000.00007ffcb213b000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mips/tmp/mips.nn.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/mips.nn.elf
      Source: mips.nn.elf, 6209.1.000055dbf84ed000.000055dbf8594000.rw-.sdmpBinary or memory string: !/usr/bin/vmtoolsd!/proc/4489/exe1/usr/lib/policykit-1/polkitd
      Source: mips.nn.elf, 6209.1.000055dbf84ed000.000055dbf8594000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mips
      Source: mips.nn.elf, 6209.1.000055dbf84ed000.000055dbf8594000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips
      Source: mips.nn.elf, 6209.1.00007ffcb211a000.00007ffcb213b000.rw-.sdmpBinary or memory string: /tmp/qemu-open.fSfkyJ
      Source: mips.nn.elf, 6209.1.000055dbf84ed000.000055dbf8594000.rw-.sdmpBinary or memory string: /usr/bin/vmtoolsd
      Source: mips.nn.elf, 6209.1.00007ffcb211a000.00007ffcb213b000.rw-.sdmpBinary or memory string: %s/qemu-op
      Source: mips.nn.elf, 6209.1.00007ffcb211a000.00007ffcb213b000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips
      Source: mips.nn.elf, 6209.1.00007ffcb211a000.00007ffcb213b000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.fSfkyJ\
      Source: mips.nn.elf, 6209.1.00007ffcb211a000.00007ffcb213b000.rw-.sdmpBinary or memory string: MPDIR%s/qemu-op

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: mips.nn.elf, type: SAMPLE
      Source: Yara matchFile source: 6209.1.00007fbf80400000.00007fbf80420000.r-x.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: mips.nn.elf, type: SAMPLE
      Source: Yara matchFile source: 6209.1.00007fbf80400000.00007fbf80420000.r-x.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
      File Deletion
      1
      OS Credential Dumping
      11
      Security Software Discovery
      Remote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1654578 Sample: mips.nn.elf Startdate: 02/04/2025 Architecture: LINUX Score: 64 20 109.202.202.202, 80 INIT7CH Switzerland 2->20 22 176.65.134.15, 38242, 58492 DIOGELO-ASGB Germany 2->22 24 3 other IPs or domains 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 Yara detected Mirai 2->30 8 mips.nn.elf 2->8         started        10 udisksd dumpe2fs 2->10         started        12 udisksd dumpe2fs 2->12         started        14 3 other processes 2->14 signatures3 process4 process5 16 mips.nn.elf 8->16         started        process6 18 mips.nn.elf 16->18         started       
      SourceDetectionScannerLabelLink
      mips.nn.elf35%VirustotalBrowse
      mips.nn.elf56%ReversingLabsLinux.Backdoor.Mirai
      mips.nn.elf100%AviraLINUX/GM.Mirai.ZM
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches

      Download Network PCAP: filteredfull

      No contacted domains info
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      34.249.145.219
      unknownUnited States
      16509AMAZON-02USfalse
      109.202.202.202
      unknownSwitzerland
      13030INIT7CHfalse
      176.65.134.15
      unknownGermany
      56325DIOGELO-ASGBfalse
      91.189.91.43
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      91.189.91.42
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      34.249.145.219na.elfGet hashmaliciousPrometeiBrowse
        arm6.nn.elfGet hashmaliciousMiraiBrowse
          na.elfGet hashmaliciousPrometeiBrowse
            na.elfGet hashmaliciousPrometeiBrowse
              na.elfGet hashmaliciousPrometeiBrowse
                ppc.elfGet hashmaliciousUnknownBrowse
                  drea4.elfGet hashmaliciousUnknownBrowse
                    825.elfGet hashmaliciousUnknownBrowse
                      IdpLihor52.elfGet hashmaliciousUnknownBrowse
                        Space.mips.elfGet hashmaliciousUnknownBrowse
                          109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                          • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                          176.65.134.15arm5.nn.elfGet hashmaliciousMiraiBrowse
                            sparc.nn.elfGet hashmaliciousMiraiBrowse
                              mips.nn.elfGet hashmaliciousMiraiBrowse
                                arm5.nn.elfGet hashmaliciousMiraiBrowse
                                  arm.nn.elfGet hashmaliciousMiraiBrowse
                                    arm7.nn.elfGet hashmaliciousMiraiBrowse
                                      sh4.nn.elfGet hashmaliciousMiraiBrowse
                                        powerpc.nn.elfGet hashmaliciousMiraiBrowse
                                          mipsel.nn.elfGet hashmaliciousMiraiBrowse
                                            x86_32.nn.elfGet hashmaliciousMiraiBrowse
                                              91.189.91.43na.elfGet hashmaliciousPrometeiBrowse
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                  arm6.nn.elfGet hashmaliciousMiraiBrowse
                                                    na.elfGet hashmaliciousPrometeiBrowse
                                                      na.elfGet hashmaliciousPrometeiBrowse
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                          na.elfGet hashmaliciousPrometeiBrowse
                                                            arc.elfGet hashmaliciousMiraiBrowse
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                                ppc.elfGet hashmaliciousUnknownBrowse
                                                                  No context
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  CANONICAL-ASGBna.elfGet hashmaliciousPrometeiBrowse
                                                                  • 91.189.91.42
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 91.189.91.42
                                                                  arm6.nn.elfGet hashmaliciousMiraiBrowse
                                                                  • 91.189.91.42
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 91.189.91.42
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 91.189.91.42
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 91.189.91.42
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 91.189.91.42
                                                                  arc.elfGet hashmaliciousMiraiBrowse
                                                                  • 91.189.91.42
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 91.189.91.42
                                                                  ppc.elfGet hashmaliciousUnknownBrowse
                                                                  • 91.189.91.42
                                                                  DIOGELO-ASGB1743589926c659c1a4578e4d44e9da59d9af359b09204378dcd90a6c0d8fa9188a951bb0e2722.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • 176.65.134.41
                                                                  paste.ee_d_ktyPclYy.jsGet hashmaliciousRemcosBrowse
                                                                  • 176.65.134.41
                                                                  PR3001789.jsGet hashmaliciousRemcosBrowse
                                                                  • 176.65.134.41
                                                                  killua.x86_64.elfGet hashmaliciousUnknownBrowse
                                                                  • 176.65.134.43
                                                                  arm5.nn.elfGet hashmaliciousMiraiBrowse
                                                                  • 176.65.134.15
                                                                  1743362826ccceca1466d46143044cb8d624b4839206fb65ac2eea5a81b59a8e2977ae7bc5620.dat-decoded.exeGet hashmaliciousXWormBrowse
                                                                  • 176.65.134.56
                                                                  1743362767b39ce9ae90af463b2090fcece5c4349a42c3942cf272d75d62dd81aabd676faf123.dat-decoded.exeGet hashmaliciousXWormBrowse
                                                                  • 176.65.134.56
                                                                  SZf8I0IvEg.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                  • 176.65.134.105
                                                                  Z9dgTYzz4x.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                  • 176.65.134.153
                                                                  killua.x86.elfGet hashmaliciousUnknownBrowse
                                                                  • 176.65.134.43
                                                                  INIT7CHna.elfGet hashmaliciousPrometeiBrowse
                                                                  • 109.202.202.202
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 109.202.202.202
                                                                  arm6.nn.elfGet hashmaliciousMiraiBrowse
                                                                  • 109.202.202.202
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 109.202.202.202
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 109.202.202.202
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 109.202.202.202
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 109.202.202.202
                                                                  arc.elfGet hashmaliciousMiraiBrowse
                                                                  • 109.202.202.202
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 109.202.202.202
                                                                  ppc.elfGet hashmaliciousUnknownBrowse
                                                                  • 109.202.202.202
                                                                  AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                                                                  • 54.171.230.55
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 34.249.145.219
                                                                  http://www.grafix.buzzGet hashmaliciousUnknownBrowse
                                                                  • 3.11.92.157
                                                                  arm6.nn.elfGet hashmaliciousMiraiBrowse
                                                                  • 34.249.145.219
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 34.249.145.219
                                                                  https://click.pstmrk.it/3s/click.pstmrk.it%2F3s%2Fclick.pstmrk.it%252F3s%252Fclick.pstmrk.it%25252F3s%25252Fclick.pstmrk.it%2525252F3%2525252Fohdlrdw8.softindusolutions.in%2525252FUsrr%2525252FDGO8AQ%2525252FAQ%2525252F8df5f3e5-890c-4781-9572-8b2c336424af%2525252F2%2525252FfqFre5K5lI%25252FUsrr%25252FDmO8AQ%25252FAQ%25252F251db6df-d3df-44bb-a660-21d30bcf5a42%25252F2%25252FEn_kh56HAv%252FUsrr%252FEGO8AQ%252FAQ%252F81acf56d-0365-47cb-aa65-bb61a6799bd7%252F2%252Fjggqn4VRzQ%2FUsrr%2FEWO8AQ%2FAQ%2F55ed24d0-bd3d-4666-96ff-3d8e7e5fba7c%2F2%2Fv-PfME3c3P/Usrr/EmO8AQ/AQ/21ff5261-8959-46ca-a062-d9bdef8858ef/2/GCkEEKTUYC#Z2VyYWxkaW5lLmNvYWtsZXlAaXR2LmNvbQ==Get hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                                                  • 3.146.16.147
                                                                  https://url8500-gls-mcdxyrhvwqogmuz7axpxpdfi-2.webflow.io/Get hashmaliciousUnknownBrowse
                                                                  • 13.33.251.183
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 34.249.145.219
                                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                                  • 34.249.145.219
                                                                  ppc.elfGet hashmaliciousUnknownBrowse
                                                                  • 34.249.145.219
                                                                  No context
                                                                  No context
                                                                  Process:/tmp/mips.nn.elf
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):53
                                                                  Entropy (8bit):3.871459242626451
                                                                  Encrypted:false
                                                                  SSDEEP:3:yGKtARxFQFrgBJ4BJ+3e:dQ0EcHG2e
                                                                  MD5:2BD9B4BE30579E633FC0191AA93DF486
                                                                  SHA1:7D63A9BD9662E86666B27C1B50DB8E7370C624FF
                                                                  SHA-256:64DC39F3004DC93C9FC4F1467B4807F2D8E3EB0BFA96B15C19CD8E7D6FA77A1D
                                                                  SHA-512:AE6DD7B39191354CF43CF65E517460D7D4C61B8F5C08E33E6CA3C451DC7CAB4DE89F33934C89396B80F1AADE0A4E2571BD5AE8B76EF80B737D4588703D2814D5
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview:gorilla botnet is on the device ur not a cat go away.
                                                                  Process:/tmp/mips.nn.elf
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):17
                                                                  Entropy (8bit):3.4992275471326932
                                                                  Encrypted:false
                                                                  SSDEEP:3:TgaLOln:TgAKn
                                                                  MD5:3B2A108EB9BDAC564681D1D50B5B8E8F
                                                                  SHA1:E744F918D99769B49D0C6E8CBEDD4A1590CBBD1E
                                                                  SHA-256:B89FE9B42F66509FF52B529092B42F8D759FB8E03059E8CC4039940A45287D87
                                                                  SHA-512:52A5D2AB05D38B4EEE703B8344837CA7B890D6C8CC32C7AAEE8F128EBBE5F45A92A72A54E8A14B4DB61E9E7E002CED615B52E7503F50FB46AD8738921B1C98A5
                                                                  Malicious:false
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview:/tmp/mips.nn.elf.
                                                                  File type:ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
                                                                  Entropy (8bit):5.609053145958687
                                                                  TrID:
                                                                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                  File name:mips.nn.elf
                                                                  File size:133'344 bytes
                                                                  MD5:c73a365be78dfe06bc37973eae34652d
                                                                  SHA1:c8e5597e6b3cc57acbd171dbb75d218256bca388
                                                                  SHA256:76a178a2f246f1445e07d110aed40f59353cb2a6ce493b4612c64de19c48f01e
                                                                  SHA512:273b81c351d6ef0f48d80e50f5b733808c897ed106a9187be1946f1d71d2bc03f752328c21039c0e399a87cedb09e192b0ae33d4bd60063cc9b8f1f271abe4d7
                                                                  SSDEEP:3072:CcvEeZdZh4BY1r9MTePI2XKG+UjvkyHMPSG2K:CcvEeZfh4BY1r98ePJjDzLLTK
                                                                  TLSH:8ED3C61E6E218F6DF369833847B78E21A39833D626D1D685D2BCD5115F6038E241FFA8
                                                                  File Content Preview:.ELF.....................@.`...4.........4. ...(.............@...@...........................E...E.....h..s.........dt.Q............................<...'.~,...!'.......................<...'.~....!... ....'9... ......................<...'.}....!........'9.

                                                                  ELF header

                                                                  Class:ELF32
                                                                  Data:2's complement, big endian
                                                                  Version:1 (current)
                                                                  Machine:MIPS R3000
                                                                  Version Number:0x1
                                                                  Type:EXEC (Executable file)
                                                                  OS/ABI:UNIX - System V
                                                                  ABI Version:0
                                                                  Entry Point Address:0x400260
                                                                  Flags:0x1007
                                                                  ELF Header Size:52
                                                                  Program Header Offset:52
                                                                  Program Header Size:32
                                                                  Number of Program Headers:3
                                                                  Section Header Offset:132784
                                                                  Section Header Size:40
                                                                  Number of Section Headers:14
                                                                  Header String Table Index:13
                                                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                  NULL0x00x00x00x00x0000
                                                                  .initPROGBITS0x4000940x940x8c0x00x6AX004
                                                                  .textPROGBITS0x4001200x1200x1da000x00x6AX0016
                                                                  .finiPROGBITS0x41db200x1db200x5c0x00x6AX004
                                                                  .rodataPROGBITS0x41db800x1db800x1d600x00x2A0016
                                                                  .ctorsPROGBITS0x45f8e40x1f8e40x80x00x3WA004
                                                                  .dtorsPROGBITS0x45f8ec0x1f8ec0x80x00x3WA004
                                                                  .data.rel.roPROGBITS0x45f8f80x1f8f80x5c0x00x3WA004
                                                                  .dataPROGBITS0x45f9600x1f9600x5680x00x3WA0016
                                                                  .gotPROGBITS0x45fed00x1fed00x77c0x40x10000003WAp0016
                                                                  .sbssNOBITS0x46064c0x2064c0x280x00x10000003WAp004
                                                                  .bssNOBITS0x4606800x2064c0x65780x00x3WA0016
                                                                  .mdebug.abi32PROGBITS0xe6a0x2064c0x00x00x0001
                                                                  .shstrtabSTRTAB0x00x2064c0x640x00x0001
                                                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                  LOAD0x00x4000000x4000000x1f8e00x1f8e05.62120x5R E0x10000.init .text .fini .rodata
                                                                  LOAD0x1f8e40x45f8e40x45f8e40xd680x73144.34050x6RW 0x10000.ctors .dtors .data.rel.ro .data .got .sbss .bss
                                                                  GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

                                                                  Download Network PCAP: filteredfull

                                                                  • Total Packets: 37
                                                                  • 38242 undefined
                                                                  • 443 (HTTPS)
                                                                  • 80 (HTTP)
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Apr 2, 2025 12:49:15.092370987 CEST43928443192.168.2.2391.189.91.42
                                                                  Apr 2, 2025 12:49:16.342505932 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:16.575383902 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:49:16.576282978 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:16.576282978 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:16.809379101 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:49:16.809581995 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:49:16.809627056 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:16.902884007 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:17.137465954 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:49:17.137814045 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:17.137814045 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:17.415425062 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:49:17.415618896 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:17.647828102 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:49:20.467564106 CEST42836443192.168.2.2391.189.91.43
                                                                  Apr 2, 2025 12:49:22.003329992 CEST4251680192.168.2.23109.202.202.202
                                                                  Apr 2, 2025 12:49:26.379924059 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:49:26.380012989 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:31.960396051 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:49:31.960484982 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:35.313502073 CEST43928443192.168.2.2391.189.91.42
                                                                  Apr 2, 2025 12:49:41.968652010 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:42.202923059 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:49:42.202939987 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:49:42.203048944 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:42.623691082 CEST39244443192.168.2.2334.249.145.219
                                                                  Apr 2, 2025 12:49:42.623729944 CEST4433924434.249.145.219192.168.2.23
                                                                  Apr 2, 2025 12:49:42.623804092 CEST39244443192.168.2.2334.249.145.219
                                                                  Apr 2, 2025 12:49:42.624083042 CEST39244443192.168.2.2334.249.145.219
                                                                  Apr 2, 2025 12:49:42.624098063 CEST4433924434.249.145.219192.168.2.23
                                                                  Apr 2, 2025 12:49:42.774665117 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:49:42.774738073 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:43.337240934 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:49:43.337327003 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:47.339325905 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:49:47.339432001 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:49:47.599787951 CEST42836443192.168.2.2391.189.91.43
                                                                  Apr 2, 2025 12:49:51.695202112 CEST4251680192.168.2.23109.202.202.202
                                                                  Apr 2, 2025 12:50:02.816494942 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:50:02.816597939 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:50:16.267990112 CEST43928443192.168.2.2391.189.91.42
                                                                  Apr 2, 2025 12:50:18.056265116 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:50:18.056382895 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:50:28.667531967 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:50:28.667696953 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:50:35.773736954 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:50:35.773946047 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:50:37.102200031 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:50:37.102333069 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:50:37.148482084 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:50:37.148610115 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:50:37.231652975 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:50:37.231771946 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:50:42.616103888 CEST39244443192.168.2.2334.249.145.219
                                                                  Apr 2, 2025 12:50:42.660279036 CEST4433924434.249.145.219192.168.2.23
                                                                  Apr 2, 2025 12:50:57.238246918 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:50:57.503139019 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:50:57.503351927 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:51:06.356627941 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:51:06.356767893 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:51:15.593750000 CEST3824258492176.65.134.15192.168.2.23
                                                                  Apr 2, 2025 12:51:15.593993902 CEST5849238242192.168.2.23176.65.134.15
                                                                  Apr 2, 2025 12:51:19.411746025 CEST4433924434.249.145.219192.168.2.23

                                                                  System Behavior

                                                                  Start time (UTC):10:49:15
                                                                  Start date (UTC):02/04/2025
                                                                  Path:/tmp/mips.nn.elf
                                                                  Arguments:-
                                                                  File size:5777432 bytes
                                                                  MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                                                                  Start time (UTC):10:49:15
                                                                  Start date (UTC):02/04/2025
                                                                  Path:/tmp/mips.nn.elf
                                                                  Arguments:-
                                                                  File size:5777432 bytes
                                                                  MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                                                                  Start time (UTC):10:49:15
                                                                  Start date (UTC):02/04/2025
                                                                  Path:/usr/lib/udisks2/udisksd
                                                                  Arguments:-
                                                                  File size:483056 bytes
                                                                  MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                  Start time (UTC):10:49:15
                                                                  Start date (UTC):02/04/2025
                                                                  Path:/usr/sbin/dumpe2fs
                                                                  Arguments:dumpe2fs -h /dev/dm-0
                                                                  File size:31112 bytes
                                                                  MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                  Start time (UTC):10:49:15
                                                                  Start date (UTC):02/04/2025
                                                                  Path:/usr/lib/udisks2/udisksd
                                                                  Arguments:-
                                                                  File size:483056 bytes
                                                                  MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                  Start time (UTC):10:49:15
                                                                  Start date (UTC):02/04/2025
                                                                  Path:/usr/sbin/dumpe2fs
                                                                  Arguments:dumpe2fs -h /dev/dm-0
                                                                  File size:31112 bytes
                                                                  MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                  Start time (UTC):10:49:15
                                                                  Start date (UTC):02/04/2025
                                                                  Path:/usr/lib/udisks2/udisksd
                                                                  Arguments:-
                                                                  File size:483056 bytes
                                                                  MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                  Start time (UTC):10:49:15
                                                                  Start date (UTC):02/04/2025
                                                                  Path:/usr/sbin/dumpe2fs
                                                                  Arguments:dumpe2fs -h /dev/dm-0
                                                                  File size:31112 bytes
                                                                  MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                  Start time (UTC):10:50:41
                                                                  Start date (UTC):02/04/2025
                                                                  Path:/usr/bin/dash
                                                                  Arguments:-
                                                                  File size:129816 bytes
                                                                  MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                  Start time (UTC):10:50:41
                                                                  Start date (UTC):02/04/2025
                                                                  Path:/usr/bin/rm
                                                                  Arguments:rm -f /tmp/tmp.v3QLYp7cRs /tmp/tmp.3eHzlqOkwL /tmp/tmp.XGQcq6bZ5h
                                                                  File size:72056 bytes
                                                                  MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                  Start time (UTC):10:50:41
                                                                  Start date (UTC):02/04/2025
                                                                  Path:/usr/bin/dash
                                                                  Arguments:-
                                                                  File size:129816 bytes
                                                                  MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                  Start time (UTC):10:50:41
                                                                  Start date (UTC):02/04/2025
                                                                  Path:/usr/bin/rm
                                                                  Arguments:rm -f /tmp/tmp.v3QLYp7cRs /tmp/tmp.3eHzlqOkwL /tmp/tmp.XGQcq6bZ5h
                                                                  File size:72056 bytes
                                                                  MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b