Create Interactive Tour

Linux Analysis Report
ftp.elf

Overview

General Information

Sample name:ftp.elf
Analysis ID:1675125
MD5:a7d91bad781950fa2203916de8c28c08
SHA1:f9ec1175a7732dcff551dfc8875a44f525bc2a46
SHA256:650bd6cc5e57414cd8c87fe9a356b94fb01ad161023a16bafbde82c0ad1a6f47
Tags:elfGafgytuser-abuse_ch
Infos:

Detection

Score:64
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Opens /proc/net/* files useful for finding connected devices and routers
Sample is packed with UPX
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Sample contains only a LOAD segment without any section mappings
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1675125
Start date and time:2025-04-26 22:19:47 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 45s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ftp.elf
Detection:MAL
Classification:mal64.spre.evad.linELF@0/0@2/0
  • VT rate limit hit for: http://176.65.148.222/deltahaxsyeaok.sh;
  • VT rate limit hit for: http://majestic12.co.uk/bot.php?
  • VT rate limit hit for: http://wortschatz.uni-leipzig.de/findlinks/)
  • VT rate limit hit for: http://www.majestic12.co.uk/bot.php?
Command:/tmp/ftp.elf
PID:5435
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
[CONNECTED] [HITTA] [0.0.0.0]
[CONNECTED] [HITTA] [0.0.0.0]
Standard Error:
  • system is lnxubuntu20
  • ftp.elf (PID: 5435, Parent: 5361, MD5: a7d91bad781950fa2203916de8c28c08) Arguments: /tmp/ftp.elf
    • ftp.elf New Fork (PID: 5436, Parent: 5435)
      • ftp.elf New Fork (PID: 5437, Parent: 5436)
  • cleanup
SourceRuleDescriptionAuthorStrings
5435.1.0000000008048000.000000000805e000.r-x.sdmpLinux_Trojan_Gafgyt_c573932bunknownunknown
  • 0x54a:$a: 83 7D 18 00 74 22 8B 45 1C 83 E0 02 85 C0 74 18 83 EC 08 6A 2D FF
5435.1.0000000008048000.000000000805e000.r-x.sdmpLinux_Trojan_Gafgyt_5bf62ce4unknownunknown
  • 0xdafd:$a: 89 E5 56 53 31 F6 8D 45 10 83 EC 10 89 45 F4 8B 55 F4 46 8D
5435.1.0000000008048000.000000000805e000.r-x.sdmpLinux_Trojan_Gafgyt_750fe002unknownunknown
  • 0x1946:$a: 10 8B 45 0C 40 8A 00 3C FC 75 06 C6 45 FF FE EB 50 8B 45 0C 40
5435.1.0000000008048000.000000000805e000.r-x.sdmpLinux_Trojan_Gafgyt_6122acdfunknownunknown
  • 0x2cf:$a: E8 B0 00 FC 8B 7D E8 F2 AE 89 C8 F7 D0 48 48 89 45 F8 EB 03 FF
5435.1.0000000008048000.000000000805e000.r-x.sdmpLinux_Trojan_Gafgyt_7167d08funknownunknown
  • 0x7c6:$a: 0C 8A 00 3C 2D 75 13 FF 45 0C C7 45 E4 01 00 00 00 EB 07 FF
Click to see the 7 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ftp.elfVirustotal: Detection: 38%Perma Link
Source: ftp.elfReversingLabs: Detection: 41%

Spreading

barindex
Source: /tmp/ftp.elf (PID: 5435)Opens: /proc/net/routeJump to behavior
Source: global trafficTCP traffic: 192.168.2.13:34720 -> 176.65.148.222:6667
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.148.222
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpString found in binary or memory: http://176.65.148.222/deltahaxsyeaok.sh;
Source: ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpString found in binary or memory: http://code.google.com/appengine;
Source: ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpString found in binary or memory: http://majestic12.co.uk/bot.php?
Source: ftp.elfString found in binary or memory: http://upx.sf.net
Source: ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpString found in binary or memory: http://wortschatz.uni-leipzig.de/findlinks/)
Source: ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpString found in binary or memory: http://wortschatz.uni-leipzig.de/findlinks/)Mozilla/5.0
Source: ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpString found in binary or memory: http://wortschatz.uni-leipzig.de/findlinks/)findlinks/1.1.5-beta7
Source: ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpString found in binary or memory: http://wortschatz.uni-leipzig.de/findlinks/)findlinks/1.1.6-beta1
Source: ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpString found in binary or memory: http://wortschatz.uni-leipzig.de/findlinks/)findlinks/1.1.6-beta4
Source: ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpString found in binary or memory: http://wortschatz.uni-leipzig.de/findlinks/)findlinks/1.1.6-beta6
Source: ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpString found in binary or memory: http://www.brandwatch.net)
Source: ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpString found in binary or memory: http://www.brandwatch.net)Mozilla/5.0
Source: ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpString found in binary or memory: http://www.majestic12.co.uk/bot.php?
Source: ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpString found in binary or memory: http://www.mojeek.com/bot.html)

System Summary

barindex
Source: 5435.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_c573932b Author: unknown
Source: 5435.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_5bf62ce4 Author: unknown
Source: 5435.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_750fe002 Author: unknown
Source: 5435.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_6122acdf Author: unknown
Source: 5435.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_7167d08f Author: unknown
Source: 5435.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5436.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_c573932b Author: unknown
Source: 5436.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_5bf62ce4 Author: unknown
Source: 5436.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_750fe002 Author: unknown
Source: 5436.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_6122acdf Author: unknown
Source: 5436.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_7167d08f Author: unknown
Source: 5436.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: LOAD without section mappingsProgram segment: 0x8048000
Source: 5435.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_c573932b reference_sample = 4c6aeaa6f6a0c40a3f4116a2e19e669188a8b1678a8930350889da1bab531c68, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 18a3025ebb8af46605970ee8d7d18214854b86200001d576553e102cb71df266, id = c573932b-9b3f-4ab7-a6b6-32dcc7473790, last_modified = 2021-09-16
Source: 5435.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_5bf62ce4 reference_sample = 4c6aeaa6f6a0c40a3f4116a2e19e669188a8b1678a8930350889da1bab531c68, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ffc398303f7208e77c4fbdfb50ac896e531b7cee3be2fa820bc8d70cfb20af3, id = 5bf62ce4-619b-4d46-b221-c5bf552474bb, last_modified = 2021-09-16
Source: 5435.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_750fe002 reference_sample = 4c6aeaa6f6a0c40a3f4116a2e19e669188a8b1678a8930350889da1bab531c68, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f51347158a6477b0da4ed4df3374fbad92b6ac137aa4775f83035d1e30cba7dc, id = 750fe002-cac1-4832-94d2-212aa5ec17e3, last_modified = 2021-09-16
Source: 5435.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_6122acdf os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 283275705c729be23d7dc75056388ecae00390bd25ee7b66b0cfc9b85feee212, id = 6122acdf-1eef-45ea-83ea-699d21c2dc20, last_modified = 2021-09-16
Source: 5435.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_7167d08f reference_sample = 4c6aeaa6f6a0c40a3f4116a2e19e669188a8b1678a8930350889da1bab531c68, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = b9df4ab322a2a329168f684b07b7b05ee3d03165c5b9050a4710eae7aeca6cd9, id = 7167d08f-bfeb-4d78-9783-3a1df2ef0ed3, last_modified = 2021-09-16
Source: 5435.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5436.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_c573932b reference_sample = 4c6aeaa6f6a0c40a3f4116a2e19e669188a8b1678a8930350889da1bab531c68, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 18a3025ebb8af46605970ee8d7d18214854b86200001d576553e102cb71df266, id = c573932b-9b3f-4ab7-a6b6-32dcc7473790, last_modified = 2021-09-16
Source: 5436.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_5bf62ce4 reference_sample = 4c6aeaa6f6a0c40a3f4116a2e19e669188a8b1678a8930350889da1bab531c68, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ffc398303f7208e77c4fbdfb50ac896e531b7cee3be2fa820bc8d70cfb20af3, id = 5bf62ce4-619b-4d46-b221-c5bf552474bb, last_modified = 2021-09-16
Source: 5436.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_750fe002 reference_sample = 4c6aeaa6f6a0c40a3f4116a2e19e669188a8b1678a8930350889da1bab531c68, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f51347158a6477b0da4ed4df3374fbad92b6ac137aa4775f83035d1e30cba7dc, id = 750fe002-cac1-4832-94d2-212aa5ec17e3, last_modified = 2021-09-16
Source: 5436.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_6122acdf os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 283275705c729be23d7dc75056388ecae00390bd25ee7b66b0cfc9b85feee212, id = 6122acdf-1eef-45ea-83ea-699d21c2dc20, last_modified = 2021-09-16
Source: 5436.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_7167d08f reference_sample = 4c6aeaa6f6a0c40a3f4116a2e19e669188a8b1678a8930350889da1bab531c68, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = b9df4ab322a2a329168f684b07b7b05ee3d03165c5b9050a4710eae7aeca6cd9, id = 7167d08f-bfeb-4d78-9783-3a1df2ef0ed3, last_modified = 2021-09-16
Source: 5436.1.0000000008048000.000000000805e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: classification engineClassification label: mal64.spre.evad.linELF@0/0@2/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.96 Copyright (C) 1996-2020 the UPX Team. All Rights Reserved. $
Source: ftp.elfSubmission file: segment LOAD with 7.8615 entropy (max. 8.0)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Obfuscated Files or Information
OS Credential Dumping1
Remote System Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1675125 Sample: ftp.elf Startdate: 26/04/2025 Architecture: LINUX Score: 64 15 176.65.148.222, 34720, 34722, 34724 PALTEL-ASPALTELAutonomousSystemPS Germany 2->15 17 daisy.ubuntu.com 2->17 19 Malicious sample detected (through community Yara rule) 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 Sample is packed with UPX 2->23 8 ftp.elf 2->8         started        signatures3 process4 signatures5 25 Opens /proc/net/* files useful for finding connected devices and routers 8->25 11 ftp.elf 8->11         started        process6 process7 13 ftp.elf 11->13         started       
SourceDetectionScannerLabelLink
ftp.elf38%VirustotalBrowse
ftp.elf42%ReversingLabsLinux.Backdoor.Gafgyt
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://wortschatz.uni-leipzig.de/findlinks/)findlinks/1.1.6-beta1ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpfalse
      high
      http://wortschatz.uni-leipzig.de/findlinks/)ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpfalse
        unknown
        http://176.65.148.222/deltahaxsyeaok.sh;ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpfalse
          unknown
          http://code.google.com/appengine;ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpfalse
            high
            http://www.brandwatch.net)ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpfalse
              high
              http://wortschatz.uni-leipzig.de/findlinks/)Mozilla/5.0ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpfalse
                high
                http://wortschatz.uni-leipzig.de/findlinks/)findlinks/1.1.5-beta7ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpfalse
                  high
                  http://www.majestic12.co.uk/bot.php?ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpfalse
                    unknown
                    http://upx.sf.netftp.elffalse
                      high
                      http://majestic12.co.uk/bot.php?ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpfalse
                        unknown
                        http://wortschatz.uni-leipzig.de/findlinks/)findlinks/1.1.6-beta4ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpfalse
                          high
                          http://www.brandwatch.net)Mozilla/5.0ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpfalse
                            high
                            http://www.mojeek.com/bot.html)ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpfalse
                              high
                              http://wortschatz.uni-leipzig.de/findlinks/)findlinks/1.1.6-beta6ftp.elf, 5435.1.0000000008048000.000000000805e000.r-x.sdmp, ftp.elf, 5436.1.0000000008048000.000000000805e000.r-x.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                176.65.148.222
                                unknownGermany
                                12975PALTEL-ASPALTELAutonomousSystemPSfalse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                176.65.148.222wget.elfGet hashmaliciousUnknownBrowse
                                  sshd.elfGet hashmaliciousGafgytBrowse
                                    nut.elfGet hashmaliciousGafgytBrowse
                                      ntpd.elfGet hashmaliciousGafgytBrowse
                                        apache2.elfGet hashmaliciousGafgytBrowse
                                          openssh.elfGet hashmaliciousGafgytBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            daisy.ubuntu.comtftp.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            wget.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            hoho.arm.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            hoho.arm6.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.25
                                            hoho.arm5.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.24
                                            boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.25
                                            boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.24
                                            boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.24
                                            boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.25
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            PALTEL-ASPALTELAutonomousSystemPSwget.elfGet hashmaliciousUnknownBrowse
                                            • 176.65.148.222
                                            sshd.elfGet hashmaliciousGafgytBrowse
                                            • 176.65.148.222
                                            nut.elfGet hashmaliciousGafgytBrowse
                                            • 176.65.148.222
                                            ntpd.elfGet hashmaliciousGafgytBrowse
                                            • 176.65.148.222
                                            apache2.elfGet hashmaliciousGafgytBrowse
                                            • 176.65.148.222
                                            openssh.elfGet hashmaliciousGafgytBrowse
                                            • 176.65.148.222
                                            boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                            • 176.65.144.22
                                            boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                            • 176.65.144.22
                                            boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                            • 176.65.144.22
                                            boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                            • 176.65.144.22
                                            No context
                                            No context
                                            No created / dropped files found
                                            File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
                                            Entropy (8bit):7.863518625333
                                            TrID:
                                            • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                            • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                            File name:ftp.elf
                                            File size:47'656 bytes
                                            MD5:a7d91bad781950fa2203916de8c28c08
                                            SHA1:f9ec1175a7732dcff551dfc8875a44f525bc2a46
                                            SHA256:650bd6cc5e57414cd8c87fe9a356b94fb01ad161023a16bafbde82c0ad1a6f47
                                            SHA512:36ebd281ff615917f4539e71fd56d5b3f47433cf06d87abb0334d6fb9110fcea4b050162d4e6e82240758cb8647e88b45c0fb3a43c102e9b85f3113b04d78ab0
                                            SSDEEP:768:6vwvVuJVUUdptUXF7TiUL7YX1rXDLfbcYo/it4s6k3ICoywPF0JuL:tvViltUV7m27gXXfgwrHKbP+U
                                            TLSH:3A2302CF9548BF72E4038D349428DB8B77105D4F8A4C19625CAD7DB941F221AF3999F2
                                            File Content Preview:.ELF........................4...........4. ...(.............................................. ... .......*..........Q.td...............................1UPX!....................a........?d..ELF.......d...m...4. p.. .(.....~m..-.#..\..ww.... .`......`...8..

                                            ELF header

                                            Class:ELF32
                                            Data:2's complement, little endian
                                            Version:1 (current)
                                            Machine:Intel 80386
                                            Version Number:0x1
                                            Type:EXEC (Executable file)
                                            OS/ABI:UNIX - Linux
                                            ABI Version:0
                                            Entry Point Address:0x8050da8
                                            Flags:0x0
                                            ELF Header Size:52
                                            Program Header Offset:52
                                            Program Header Size:32
                                            Number of Program Headers:3
                                            Section Header Offset:0
                                            Section Header Size:40
                                            Number of Section Headers:0
                                            Header String Table Index:0
                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                            LOAD0x00x80480000x80480000x96940x96947.86150x5R E0x1000
                                            LOAD0x00x80520000x80520000x00x12ac40.00000x6RW 0x1000
                                            GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

                                            Download Network PCAP: filteredfull

                                            • Total Packets: 43
                                            • 6667 undefined
                                            • 53 (DNS)
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 26, 2025 22:20:29.165393114 CEST347206667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:20:29.436996937 CEST666734720176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:20:34.438591957 CEST347226667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:20:34.710474968 CEST666734722176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:20:39.711417913 CEST347246667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:20:39.983608961 CEST666734724176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:20:44.986037970 CEST347266667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:20:45.257355928 CEST666734726176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:20:50.259167910 CEST347286667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:20:50.530590057 CEST666734728176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:20:55.532727003 CEST347306667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:20:55.804054022 CEST666734730176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:21:00.806119919 CEST347326667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:21:01.077389956 CEST666734732176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:21:06.080122948 CEST347346667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:21:06.351388931 CEST666734734176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:21:11.354048014 CEST347366667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:21:11.625246048 CEST666734736176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:21:16.627343893 CEST347386667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:21:16.898529053 CEST666734738176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:21:21.900965929 CEST347406667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:21:22.172609091 CEST666734740176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:21:27.174949884 CEST347426667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:21:27.449428082 CEST666734742176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:21:32.454498053 CEST347446667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:21:32.725754023 CEST666734744176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:21:37.727514982 CEST347466667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:21:37.998924017 CEST666734746176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:21:43.001040936 CEST347486667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:21:43.272452116 CEST666734748176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:21:48.274131060 CEST347506667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:21:48.545528889 CEST666734750176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:21:53.547652006 CEST347526667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:21:53.818938017 CEST666734752176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:21:58.821083069 CEST347546667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:21:59.092482090 CEST666734754176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:22:04.094719887 CEST347566667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:22:04.366406918 CEST666734756176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:22:09.368871927 CEST347586667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:22:09.640465975 CEST666734758176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:22:14.642667055 CEST347606667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:22:14.913912058 CEST666734760176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:22:19.915806055 CEST347626667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:22:20.187124014 CEST666734762176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:22:25.188949108 CEST347646667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:22:25.460525036 CEST666734764176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:22:30.463000059 CEST347666667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:22:30.734474897 CEST666734766176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:22:35.735821962 CEST347686667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:22:36.007323027 CEST666734768176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:22:41.009366035 CEST347706667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:22:41.280982018 CEST666734770176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:22:46.282830954 CEST347726667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:22:46.554168940 CEST666734772176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:22:51.556272984 CEST347746667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:22:51.827327967 CEST666734774176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:22:56.829632044 CEST347766667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:22:57.102248907 CEST666734776176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:23:02.104043007 CEST347786667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:23:02.375401020 CEST666734778176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:23:07.377716064 CEST347806667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:23:07.649233103 CEST666734780176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:23:12.651372910 CEST347826667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:23:12.922591925 CEST666734782176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:23:17.924313068 CEST347846667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:23:18.198430061 CEST666734784176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:23:23.200068951 CEST347866667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:23:23.471555948 CEST666734786176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:23:28.473063946 CEST347886667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:23:28.744231939 CEST666734788176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:23:33.746112108 CEST347906667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:23:34.017257929 CEST666734790176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:23:39.019373894 CEST347926667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:23:39.290803909 CEST666734792176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:23:44.292949915 CEST347946667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:23:44.564273119 CEST666734794176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:23:49.566351891 CEST347966667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:23:49.837419033 CEST666734796176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:23:54.839617014 CEST347986667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:23:55.110724926 CEST666734798176.65.148.222192.168.2.13
                                            Apr 26, 2025 22:24:00.113007069 CEST348006667192.168.2.13176.65.148.222
                                            Apr 26, 2025 22:24:00.384166002 CEST666734800176.65.148.222192.168.2.13
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 26, 2025 22:23:16.104720116 CEST3957653192.168.2.138.8.8.8
                                            Apr 26, 2025 22:23:16.104773998 CEST4605853192.168.2.138.8.8.8
                                            Apr 26, 2025 22:23:16.253180981 CEST53460588.8.8.8192.168.2.13
                                            Apr 26, 2025 22:23:16.262393951 CEST53395768.8.8.8192.168.2.13
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Apr 26, 2025 22:23:16.104720116 CEST192.168.2.138.8.8.80xb0a3Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                            Apr 26, 2025 22:23:16.104773998 CEST192.168.2.138.8.8.80x592Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Apr 26, 2025 22:23:16.262393951 CEST8.8.8.8192.168.2.130xb0a3No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                            Apr 26, 2025 22:23:16.262393951 CEST8.8.8.8192.168.2.130xb0a3No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                                            System Behavior

                                            Start time (UTC):20:20:28
                                            Start date (UTC):26/04/2025
                                            Path:/tmp/ftp.elf
                                            Arguments:/tmp/ftp.elf
                                            File size:47656 bytes
                                            MD5 hash:a7d91bad781950fa2203916de8c28c08

                                            Start time (UTC):20:20:28
                                            Start date (UTC):26/04/2025
                                            Path:/tmp/ftp.elf
                                            Arguments:-
                                            File size:47656 bytes
                                            MD5 hash:a7d91bad781950fa2203916de8c28c08

                                            Start time (UTC):20:20:28
                                            Start date (UTC):26/04/2025
                                            Path:/tmp/ftp.elf
                                            Arguments:-
                                            File size:47656 bytes
                                            MD5 hash:a7d91bad781950fa2203916de8c28c08