Edit tour

Linux Analysis Report
skid.arm7.elf

Overview

General Information

Sample name:skid.arm7.elf
Analysis ID:1676184
MD5:05750ffcabc06060147818395c9def22
SHA1:021bb2c4bda7f08f7a50c29c58f80db6ae2183cd
SHA256:94c8932063761ecd43ed95d0ca486fbf23eed31d11da30db9279a1805b7d7455
Tags:elfuser-abuse_ch
Infos:

Detection

Score:76
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Opens /proc/net/* files useful for finding connected devices and routers
Opens /sys/class/net/* files useful for querying network interface information
Performs DNS TXT record lookups
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to kill multiple processes (SIGKILL)
Uses STUN server to do NAT traversial
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1676184
Start date and time:2025-04-28 12:42:19 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 25s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:skid.arm7.elf
Detection:MAL
Classification:mal76.spre.troj.spyw.evad.linELF@0/0@2/0
  • VT rate limit hit for: ukrainianhorseriding.kamru.su
Command:/tmp/skid.arm7.elf
PID:5487
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
chacha slide
Standard Error:
  • system is lnxubuntu20
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: skid.arm7.elfReversingLabs: Detection: 13%

Spreading

barindex
Source: /tmp/skid.arm7.elf (PID: 5491)Opens: /proc/net/routeJump to behavior

Networking

barindex
Source: global trafficTCP traffic: 67.205.137.180 ports 46201,0,1,2,4,6
Source: /tmp/skid.arm7.elf (PID: 5491)Opens: /sys/class/net/ens160/addressJump to behavior
Source: unknownDNS query: name: stun.l.google.com
Source: global trafficTCP traffic: 192.168.2.14:36514 -> 67.205.137.180:46201
Source: global trafficUDP traffic: 192.168.2.14:56782 -> 74.125.250.129:19302
Source: /tmp/skid.arm7.elf (PID: 5491)Socket: 127.0.0.1:22448Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 67.205.137.180
Source: unknownTCP traffic detected without corresponding DNS query: 67.205.137.180
Source: unknownTCP traffic detected without corresponding DNS query: 67.205.137.180
Source: unknownTCP traffic detected without corresponding DNS query: 67.205.137.180
Source: unknownTCP traffic detected without corresponding DNS query: 67.205.137.180
Source: unknownTCP traffic detected without corresponding DNS query: 67.205.137.180
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: ukrainianhorseriding.kamru.su
Source: global trafficDNS traffic detected: DNS query: stun.l.google.com

System Summary

barindex
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5583, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5584, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5585, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5586, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5587, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5588, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5589, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5590, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5591, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5592, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5593, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5594, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5595, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5596, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5597, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5598, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5648, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5655, result: successfulJump to behavior
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5583, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5584, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5585, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5586, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5587, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5588, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5589, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5590, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5591, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5592, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5593, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5594, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5595, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5596, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5597, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5598, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5648, result: successfulJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5515)SIGKILL sent: pid: 5655, result: successfulJump to behavior
Source: classification engineClassification label: mal76.spre.troj.spyw.evad.linELF@0/0@2/0

Persistence and Installation Behavior

barindex
Source: /tmp/skid.arm7.elf (PID: 5487)File: /proc/5487/mountsJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3684/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3420/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1560/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1383/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3341/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3120/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3142/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3361/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1635/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1712/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1633/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1655/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1577/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1610/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1653/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1630/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3412/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3235/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1650/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1717/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1639/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1638/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1659/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3319/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3134/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3398/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1394/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3392/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3329/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3406/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1/mapsJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1567/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3304/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3425/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1642/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3402/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1564/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1640/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3147/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3246/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1661/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1683/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/3245/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/800/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)File opened: /proc/1647/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3684/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3420/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1560/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1383/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3341/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3120/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3142/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3361/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1635/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1712/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1633/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1655/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1577/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1610/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1653/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1630/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3412/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3235/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1650/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1717/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1639/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1638/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1659/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3319/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3134/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3398/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1394/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3392/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3329/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3406/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1567/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3304/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3425/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1642/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3402/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1564/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1640/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3147/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3246/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1661/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1683/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/3245/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/800/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5513)File opened: /proc/1647/exeJump to behavior
Source: /tmp/skid.arm7.elf (PID: 5487)Queries kernel information via 'uname': Jump to behavior
Source: skid.arm7.elf, 5487.1.0000559bfaa2e000.0000559bfab7d000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: skid.arm7.elf, 5487.1.00007ffd5191e000.00007ffd5193f000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/skid.arm7.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/skid.arm7.elf
Source: skid.arm7.elf, 5487.1.0000559bfaa2e000.0000559bfab7d000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: skid.arm7.elf, 5487.1.00007ffd5191e000.00007ffd5193f000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm

HIPS / PFW / Operating System Protection Evasion

barindex
Source: TrafficDNS traffic detected: queries for: ukrainianhorseriding.kamru.su
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network Medium1
Service Stop
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1676184 Sample: skid.arm7.elf Startdate: 28/04/2025 Architecture: LINUX Score: 76 19 ukrainianhorseriding.kamru.su 2->19 21 stun.l.google.com 2->21 23 2 other IPs or domains 2->23 25 Multi AV Scanner detection for submitted file 2->25 27 Connects to many ports of the same IP (likely port scanning) 2->27 8 skid.arm7.elf 2->8         started        signatures3 29 Performs DNS TXT record lookups 19->29 31 Uses STUN server to do NAT traversial 21->31 process4 signatures5 33 Sample reads /proc/mounts (often used for finding a writable filesystem) 8->33 11 skid.arm7.elf 8->11         started        process6 signatures7 35 Opens /sys/class/net/* files useful for querying network interface information 11->35 37 Opens /proc/net/* files useful for finding connected devices and routers 11->37 14 skid.arm7.elf 11->14         started        17 skid.arm7.elf 11->17         started        process8 signatures9 39 Sample tries to kill multiple processes (SIGKILL) 14->39
SourceDetectionScannerLabelLink
skid.arm7.elf14%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
stun.l.google.com
74.125.250.129
truefalse
    high
    ukrainianhorseriding.kamru.su
    unknown
    unknowntrue
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      67.205.137.180
      unknownUnited States
      14061DIGITALOCEAN-ASNUStrue
      74.125.250.129
      stun.l.google.comUnited States
      15169GOOGLEUSfalse
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      DIGITALOCEAN-ASNUShttp://www.timesofisrael.com/young-sephardic-jews-embrace-an-old-musical-tradition/Get hashmaliciousUnknownBrowse
      • 45.55.125.136
      250428-hq5p5aykz3.bin.exeGet hashmaliciousMyDoomBrowse
      • 104.248.224.170
      250428-fxpw5stsbx.bin.exeGet hashmaliciousMyDoomBrowse
      • 138.197.213.185
      250427-qx3s4s1wct.bin.vbsGet hashmaliciousLCRYXBrowse
      • 174.138.110.4
      hoho.arm.elfGet hashmaliciousUnknownBrowse
      • 134.209.166.133
      jew.mpsl.elfGet hashmaliciousUnknownBrowse
      • 157.245.157.96
      LCrypt0rX.vbsGet hashmaliciousLCRYXBrowse
      • 174.138.110.4
      arm.elfGet hashmaliciousMirai, MoobotBrowse
      • 157.245.194.14
      mips.elfGet hashmaliciousMirai, MoobotBrowse
      • 157.245.169.98
      sh4.elfGet hashmaliciousMirai, MoobotBrowse
      • 157.245.169.81
      No context
      No context
      No created / dropped files found
      File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
      Entropy (8bit):6.069693785759844
      TrID:
      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
      File name:skid.arm7.elf
      File size:103'964 bytes
      MD5:05750ffcabc06060147818395c9def22
      SHA1:021bb2c4bda7f08f7a50c29c58f80db6ae2183cd
      SHA256:94c8932063761ecd43ed95d0ca486fbf23eed31d11da30db9279a1805b7d7455
      SHA512:911d4f2eb707916ab27e939c56f8c37f8161a54d082c5edea38ee4223df17cbd71ddd560692d9fb47710164be74b83910e745eec3c453fc5e158e82a50831d89
      SSDEEP:3072:9R6JtXZzlliV3n4HpPuyv7Jo1pacRTpVqnhd:36JtXZzTCX4HpPuyv7q1paSG
      TLSH:9CA3195ABD819B15D5C516BAFE4E118A33131BBCE3EE7212DD245B2023CBA1B0F7B512
      File Content Preview:.ELF..............(.........4...........4. ...(........p............(...(...........................................................P...............................................Q.td..................................-...L..................@-.,@...0....S

      ELF header

      Class:ELF32
      Data:2's complement, little endian
      Version:1 (current)
      Machine:ARM
      Version Number:0x1
      Type:EXEC (Executable file)
      OS/ABI:UNIX - System V
      ABI Version:0
      Entry Point Address:0x8194
      Flags:0x4000002
      ELF Header Size:52
      Program Header Offset:52
      Program Header Size:32
      Number of Program Headers:5
      Section Header Offset:103364
      Section Header Size:40
      Number of Section Headers:15
      Header String Table Index:14
      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
      NULL0x00x00x00x00x0000
      .initPROGBITS0x80d40xd40x100x00x6AX004
      .textPROGBITS0x80f00xf00x1746c0x00x6AX0016
      .finiPROGBITS0x1f55c0x1755c0x100x00x6AX004
      .rodataPROGBITS0x1f5700x175700x17180x00x2A008
      .ARM.extabPROGBITS0x20c880x18c880x180x00x2A004
      .ARM.exidxARM_EXIDX0x20ca00x18ca00x1280x00x82AL204
      .eh_framePROGBITS0x290000x190000x40x00x3WA004
      .tbssNOBITS0x290040x190040x80x00x403WAT004
      .init_arrayINIT_ARRAY0x290040x190040x40x00x3WA004
      .fini_arrayFINI_ARRAY0x290080x190080x40x00x3WA004
      .gotPROGBITS0x290100x190100xac0x40x3WA004
      .dataPROGBITS0x290bc0x190bc0x2940x00x3WA004
      .bssNOBITS0x293500x193500x81780x00x3WA004
      .shstrtabSTRTAB0x00x193500x730x00x0001
      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
      EXIDX0x18ca00x20ca00x20ca00x1280x1284.48030x4R 0x4.ARM.exidx
      LOAD0x00x80000x80000x18dc80x18dc86.10560x5R E0x8000.init .text .fini .rodata .ARM.extab .ARM.exidx
      LOAD0x190000x290000x290000x3500x84c84.04230x6RW 0x8000.eh_frame .tbss .init_array .fini_array .got .data .bss
      TLS0x190040x290040x290040x00x80.00000x4R 0x4.tbss
      GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

      Download Network PCAP: filteredfull

      • Total Packets: 9
      • 46201 undefined
      • 19302 undefined
      • 53 (DNS)
      TimestampSource PortDest PortSource IPDest IP
      Apr 28, 2025 12:43:07.195239067 CEST3651446201192.168.2.1467.205.137.180
      Apr 28, 2025 12:43:07.434998989 CEST462013651467.205.137.180192.168.2.14
      Apr 28, 2025 12:43:07.435110092 CEST3651446201192.168.2.1467.205.137.180
      Apr 28, 2025 12:43:07.674804926 CEST462013651467.205.137.180192.168.2.14
      Apr 28, 2025 12:43:07.674864054 CEST3651446201192.168.2.1467.205.137.180
      Apr 28, 2025 12:43:07.914195061 CEST462013651467.205.137.180192.168.2.14
      Apr 28, 2025 12:43:07.914297104 CEST3651446201192.168.2.1467.205.137.180
      Apr 28, 2025 12:43:08.747224092 CEST3651446201192.168.2.1467.205.137.180
      Apr 28, 2025 12:43:08.987889051 CEST462013651467.205.137.180192.168.2.14
      Apr 28, 2025 12:44:14.515428066 CEST462013651467.205.137.180192.168.2.14
      Apr 28, 2025 12:44:14.515552044 CEST3651446201192.168.2.1467.205.137.180
      TimestampSource PortDest PortSource IPDest IP
      Apr 28, 2025 12:43:06.852010965 CEST4021453192.168.2.141.1.1.1
      Apr 28, 2025 12:43:07.193562031 CEST53402141.1.1.1192.168.2.14
      Apr 28, 2025 12:43:08.437133074 CEST5571753192.168.2.141.1.1.1
      Apr 28, 2025 12:43:08.578536034 CEST53557171.1.1.1192.168.2.14
      Apr 28, 2025 12:43:08.579153061 CEST5678219302192.168.2.1474.125.250.129
      Apr 28, 2025 12:43:08.727258921 CEST193025678274.125.250.129192.168.2.14
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Apr 28, 2025 12:43:06.852010965 CEST192.168.2.141.1.1.10x4567Standard query (0)ukrainianhorseriding.kamru.su16IN (0x0001)false
      Apr 28, 2025 12:43:08.437133074 CEST192.168.2.141.1.1.10x23c6Standard query (0)stun.l.google.comA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Apr 28, 2025 12:43:07.193562031 CEST1.1.1.1192.168.2.140x4567No error (0)ukrainianhorseriding.kamru.suTXT (Text strings)IN (0x0001)false
      Apr 28, 2025 12:43:08.578536034 CEST1.1.1.1192.168.2.140x23c6No error (0)stun.l.google.com74.125.250.129A (IP address)IN (0x0001)false

      System Behavior

      Start time (UTC):10:43:03
      Start date (UTC):28/04/2025
      Path:/tmp/skid.arm7.elf
      Arguments:/tmp/skid.arm7.elf
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      Start time (UTC):10:43:06
      Start date (UTC):28/04/2025
      Path:/tmp/skid.arm7.elf
      Arguments:-
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      Start time (UTC):10:43:06
      Start date (UTC):28/04/2025
      Path:/tmp/skid.arm7.elf
      Arguments:-
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

      Start time (UTC):10:43:06
      Start date (UTC):28/04/2025
      Path:/tmp/skid.arm7.elf
      Arguments:-
      File size:4956856 bytes
      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1