Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
4LbWi40g57.elf

Overview

General Information

Sample name:4LbWi40g57.elf
renamed because original name is a hash value
Original sample name:47c38dfe1d4d3661c6216b5be3b48bea.elf
Analysis ID:1529269
MD5:47c38dfe1d4d3661c6216b5be3b48bea
SHA1:64b780eddfabbf48d8f8c29cfa4ece8f5b93d092
SHA256:ef069f81e2fbf94c1bba6f5de1acf95ad5b0b236dd8a931765b2dd9b0a877c3f
Tags:32armelfmirai
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1529269
Start date and time:2024-10-08 20:10:10 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 8s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:4LbWi40g57.elf
renamed because original name is a hash value
Original Sample Name:47c38dfe1d4d3661c6216b5be3b48bea.elf
Detection:MAL
Classification:mal48.linELF@0/1@3/0
  • VT rate limit hit for: 4LbWi40g57.elf
Command:/tmp/4LbWi40g57.elf
PID:5433
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • sh (PID: 5477, Parent: 1588, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/bin/gnome-shell
  • gnome-shell (PID: 5477, Parent: 1588, MD5: da7a257239677622fe4b3a65972c9e87) Arguments: /usr/bin/gnome-shell
  • sh (PID: 5479, Parent: 1588, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-sharing
  • gsd-sharing (PID: 5479, Parent: 1588, MD5: e29d9025d98590fbb69f89fdbd4438b3) Arguments: /usr/libexec/gsd-sharing
  • gdm3 New Fork (PID: 5483, Parent: 1400)
  • Default (PID: 5483, Parent: 1400, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • gdm3 New Fork (PID: 5499, Parent: 1400)
  • Default (PID: 5499, Parent: 1400, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • systemd New Fork (PID: 5505, Parent: 1)
  • systemd-user-runtime-dir (PID: 5505, Parent: 1, MD5: d55f4b0847f88131dbcfb07435178e54) Arguments: /lib/systemd/systemd-user-runtime-dir stop 127
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 4LbWi40g57.elfReversingLabs: Detection: 31%
Source: global trafficTCP traffic: 192.168.2.13:36318 -> 154.223.21.228:7193
Source: /tmp/4LbWi40g57.elf (PID: 5433)Socket: 127.0.0.1:1234Jump to behavior
Source: global trafficTCP traffic: 192.168.2.13:48202 -> 185.125.190.26:443
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownUDP traffic detected without corresponding DNS query: 185.84.81.194
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: subcarrace.indy
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: unknownNetwork traffic detected: HTTP traffic on port 48202 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/4LbWi40g57.elf (PID: 5435)SIGKILL sent: pid: 884, result: successfulJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)SIGKILL sent: pid: 1691, result: successfulJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)SIGKILL sent: pid: 1847, result: successfulJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)SIGKILL sent: pid: 1866, result: successfulJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)SIGKILL sent: pid: 5477, result: successfulJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)SIGKILL sent: pid: 5479, result: successfulJump to behavior
Source: classification engineClassification label: mal48.linELF@0/1@3/0
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3635/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3635/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/1482/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/1480/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/1238/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/1238/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3413/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3413/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/1475/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/936/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/936/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/816/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/816/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3310/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3310/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3424/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3424/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3300/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3300/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3429/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3429/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3680/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3680/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3681/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3681/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3442/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3442/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3315/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3315/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3434/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3434/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3678/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3678/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3679/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3679/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/5510/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3208/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3208/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/5508/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/5509/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3327/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3327/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3448/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3448/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3203/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3203/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/5502/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/726/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/726/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/727/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/727/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/5505/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/5506/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3209/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3209/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/5507/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/5520/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/2496/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/2496/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3100/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3100/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3342/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3342/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3220/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3220/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/5519/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3336/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3336/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3455/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3455/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3212/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/3212/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/855/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5435)File opened: /proc/855/cmdlineJump to behavior
Source: /tmp/4LbWi40g57.elf (PID: 5433)Queries kernel information via 'uname': Jump to behavior
Source: 4LbWi40g57.elf, 5433.1.000056446f177000.000056446f2c6000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: 4LbWi40g57.elf, 5433.1.00007ffcefc56000.00007ffcefc77000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: 4LbWi40g57.elf, 5433.1.000056446f177000.000056446f2c6000.rw-.sdmpBinary or memory string: oDV!/etc/qemu-binfmt/arm
Source: 4LbWi40g57.elf, 5433.1.00007ffcefc56000.00007ffcefc77000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/4LbWi40g57.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/4LbWi40g57.elf
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1529269 Sample: 4LbWi40g57.elf Startdate: 08/10/2024 Architecture: LINUX Score: 48 19 subcarrace.indy 154.223.21.228, 36318, 7193 ITACE-AS-APItaceInternationalLimitedHK Seychelles 2->19 21 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->21 23 daisy.ubuntu.com 2->23 25 Multi AV Scanner detection for submitted file 2->25 7 4LbWi40g57.elf 2->7         started        9 gnome-session-binary sh gnome-shell 2->9         started        11 gnome-session-binary sh gsd-sharing 2->11         started        13 3 other processes 2->13 signatures3 process4 process5 15 4LbWi40g57.elf 7->15         started        17 4LbWi40g57.elf 7->17         started       
SourceDetectionScannerLabelLink
4LbWi40g57.elf32%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    unknown
    subcarrace.indy
    154.223.21.228
    truefalse
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      185.125.190.26
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      154.223.21.228
      subcarrace.indySeychelles
      134705ITACE-AS-APItaceInternationalLimitedHKfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      185.125.190.26na.elfGet hashmaliciousUnknownBrowse
        na.elfGet hashmaliciousUnknownBrowse
          na.elfGet hashmaliciousUnknownBrowse
            na.elfGet hashmaliciousUnknownBrowse
              na.elfGet hashmaliciousUnknownBrowse
                na.elfGet hashmaliciousUnknownBrowse
                  na.elfGet hashmaliciousMiraiBrowse
                    na.elfGet hashmaliciousMiraiBrowse
                      x86.elfGet hashmaliciousUnknownBrowse
                        boatnet.x86.elfGet hashmaliciousMiraiBrowse
                          154.223.21.228na.elfGet hashmaliciousUnknownBrowse
                            na.elfGet hashmaliciousUnknownBrowse
                              na.elfGet hashmaliciousUnknownBrowse
                                na.elfGet hashmaliciousUnknownBrowse
                                  na.elfGet hashmaliciousUnknownBrowse
                                    na.elfGet hashmaliciousUnknownBrowse
                                      na.elfGet hashmaliciousUnknownBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        subcarrace.indyna.elfGet hashmaliciousUnknownBrowse
                                        • 154.223.21.228
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 154.223.21.228
                                        SecuriteInfo.com.Linux.Mirai.5074.22612.23241.elfGet hashmaliciousUnknownBrowse
                                        • 154.90.63.88
                                        daisy.ubuntu.comirods-runtime-4.1.9-centos7-x86_64.rpmGet hashmaliciousXmrigBrowse
                                        • 162.213.35.24
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 162.213.35.25
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 162.213.35.24
                                        logrotate_malware.elfGet hashmaliciousXmrigBrowse
                                        • 162.213.35.25
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 162.213.35.25
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 162.213.35.24
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 162.213.35.25
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 162.213.35.24
                                        na.elfGet hashmaliciousMiraiBrowse
                                        • 162.213.35.25
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CANONICAL-ASGBBOVYJVrOjt.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        UZPtyH1Maa.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        irods-runtime-4.1.9-centos7-x86_64.rpmGet hashmaliciousXmrigBrowse
                                        • 185.125.188.62
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 185.125.190.26
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        na.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        ITACE-AS-APItaceInternationalLimitedHKnullnet_load.arm.elfGet hashmaliciousMiraiBrowse
                                        • 156.237.86.224
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 154.223.21.228
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 154.223.21.228
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 154.223.21.228
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 154.223.21.228
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 154.223.21.228
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 156.235.45.157
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 154.223.21.228
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 154.223.21.228
                                        gmpsl.elfGet hashmaliciousMiraiBrowse
                                        • 156.230.199.3
                                        No context
                                        No context
                                        Process:/usr/libexec/gsd-sharing
                                        File Type:very short file (no magic)
                                        Category:dropped
                                        Size (bytes):1
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:93B885ADFE0DA089CDF634904FD59F71
                                        SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                        SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                        SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:.
                                        File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                                        Entropy (8bit):5.919290729503602
                                        TrID:
                                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                        File name:4LbWi40g57.elf
                                        File size:46'488 bytes
                                        MD5:47c38dfe1d4d3661c6216b5be3b48bea
                                        SHA1:64b780eddfabbf48d8f8c29cfa4ece8f5b93d092
                                        SHA256:ef069f81e2fbf94c1bba6f5de1acf95ad5b0b236dd8a931765b2dd9b0a877c3f
                                        SHA512:2efa477ae9822fe0df2daf539a04b56b957a382d89a7be41aa4efcbcd8b1cdb382e5bd05cbb3ff3f2327f971dc6a208fd84bc322aacddb1a315ec1e2af82e911
                                        SSDEEP:768:HXd2Q45NNn6lQvagWqqyHSXbtCnm/TdJDuwD6JRgRm0+wsOtcfWdKQXLGpb:3NBC6IEfDYS7+YmWdH
                                        TLSH:EC23E791BD819A0BCAD5037BFA1E42CD37267798F2DE3203DE256F5137CA92B096A141
                                        File Content Preview:.ELF...a..........(.........4...........4. ...(.....................................................4....S..........Q.td..................................-...L."...R*..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                                        ELF header

                                        Class:ELF32
                                        Data:2's complement, little endian
                                        Version:1 (current)
                                        Machine:ARM
                                        Version Number:0x1
                                        Type:EXEC (Executable file)
                                        OS/ABI:ARM - ABI
                                        ABI Version:0
                                        Entry Point Address:0x8190
                                        Flags:0x2
                                        ELF Header Size:52
                                        Program Header Offset:52
                                        Program Header Size:32
                                        Number of Program Headers:3
                                        Section Header Offset:46088
                                        Section Header Size:40
                                        Number of Section Headers:10
                                        Header String Table Index:9
                                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                        NULL0x00x00x00x00x0000
                                        .initPROGBITS0x80940x940x180x00x6AX004
                                        .textPROGBITS0x80b00xb00xa9800x00x6AX0016
                                        .finiPROGBITS0x12a300xaa300x140x00x6AX004
                                        .rodataPROGBITS0x12a440xaa440x74c0x00x2A004
                                        .ctorsPROGBITS0x1b1940xb1940x80x00x3WA004
                                        .dtorsPROGBITS0x1b19c0xb19c0x80x00x3WA004
                                        .dataPROGBITS0x1b1a80xb1a80x2200x00x3WA004
                                        .bssNOBITS0x1b3c80xb3c80x515c0x00x3WA004
                                        .shstrtabSTRTAB0x00xb3c80x3e0x00x0001
                                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                        LOAD0x00x80000x80000xb1900xb1905.94940x5R E0x8000.init .text .fini .rodata
                                        LOAD0xb1940x1b1940x1b1940x2340x53902.91390x6RW 0x8000.ctors .dtors .data .bss
                                        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 8, 2024 20:11:01.738807917 CEST363187193192.168.2.13154.223.21.228
                                        Oct 8, 2024 20:11:01.743711948 CEST719336318154.223.21.228192.168.2.13
                                        Oct 8, 2024 20:11:01.743776083 CEST363187193192.168.2.13154.223.21.228
                                        Oct 8, 2024 20:11:01.760056019 CEST363187193192.168.2.13154.223.21.228
                                        Oct 8, 2024 20:11:01.765001059 CEST719336318154.223.21.228192.168.2.13
                                        Oct 8, 2024 20:11:07.112963915 CEST48202443192.168.2.13185.125.190.26
                                        Oct 8, 2024 20:11:16.761810064 CEST363187193192.168.2.13154.223.21.228
                                        Oct 8, 2024 20:11:16.766702890 CEST719336318154.223.21.228192.168.2.13
                                        Oct 8, 2024 20:11:38.089035988 CEST48202443192.168.2.13185.125.190.26
                                        Oct 8, 2024 20:12:13.575268030 CEST719336318154.223.21.228192.168.2.13
                                        Oct 8, 2024 20:12:13.575524092 CEST363187193192.168.2.13154.223.21.228
                                        Oct 8, 2024 20:12:18.089720011 CEST719336318154.223.21.228192.168.2.13
                                        Oct 8, 2024 20:12:18.090326071 CEST363187193192.168.2.13154.223.21.228
                                        Oct 8, 2024 20:13:03.118726015 CEST363187193192.168.2.13154.223.21.228
                                        Oct 8, 2024 20:13:03.124535084 CEST719336318154.223.21.228192.168.2.13
                                        Oct 8, 2024 20:13:59.959635973 CEST719336318154.223.21.228192.168.2.13
                                        Oct 8, 2024 20:13:59.959992886 CEST363187193192.168.2.13154.223.21.228
                                        Oct 8, 2024 20:13:59.960968971 CEST719336318154.223.21.228192.168.2.13
                                        Oct 8, 2024 20:13:59.961267948 CEST363187193192.168.2.13154.223.21.228
                                        Oct 8, 2024 20:14:05.120428085 CEST719336318154.223.21.228192.168.2.13
                                        Oct 8, 2024 20:14:05.120601892 CEST363187193192.168.2.13154.223.21.228
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 8, 2024 20:11:01.708270073 CEST5225953192.168.2.13185.84.81.194
                                        Oct 8, 2024 20:11:01.718405962 CEST5352259185.84.81.194192.168.2.13
                                        Oct 8, 2024 20:13:42.349128008 CEST4249653192.168.2.131.1.1.1
                                        Oct 8, 2024 20:13:42.349128008 CEST4716853192.168.2.131.1.1.1
                                        Oct 8, 2024 20:13:42.356221914 CEST53471681.1.1.1192.168.2.13
                                        Oct 8, 2024 20:13:42.358377934 CEST53424961.1.1.1192.168.2.13
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 8, 2024 20:11:01.708270073 CEST192.168.2.13185.84.81.1940x9e3dStandard query (0)subcarrace.indyA (IP address)IN (0x0001)false
                                        Oct 8, 2024 20:13:42.349128008 CEST192.168.2.131.1.1.10x599cStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                        Oct 8, 2024 20:13:42.349128008 CEST192.168.2.131.1.1.10xd566Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 8, 2024 20:11:01.718405962 CEST185.84.81.194192.168.2.130x9e3dNo error (0)subcarrace.indy154.223.21.228A (IP address)IN (0x0001)false
                                        Oct 8, 2024 20:13:42.358377934 CEST1.1.1.1192.168.2.130x599cNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                        Oct 8, 2024 20:13:42.358377934 CEST1.1.1.1192.168.2.130x599cNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                                        System Behavior

                                        Start time (UTC):18:10:59
                                        Start date (UTC):08/10/2024
                                        Path:/tmp/4LbWi40g57.elf
                                        Arguments:/tmp/4LbWi40g57.elf
                                        File size:4956856 bytes
                                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                        Start time (UTC):18:11:01
                                        Start date (UTC):08/10/2024
                                        Path:/tmp/4LbWi40g57.elf
                                        Arguments:-
                                        File size:4956856 bytes
                                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                        Start time (UTC):18:11:01
                                        Start date (UTC):08/10/2024
                                        Path:/tmp/4LbWi40g57.elf
                                        Arguments:-
                                        File size:4956856 bytes
                                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                        Start time (UTC):18:11:31
                                        Start date (UTC):08/10/2024
                                        Path:/usr/libexec/gnome-session-binary
                                        Arguments:-
                                        File size:334664 bytes
                                        MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                        Start time (UTC):18:11:31
                                        Start date (UTC):08/10/2024
                                        Path:/bin/sh
                                        Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/bin/gnome-shell
                                        File size:129816 bytes
                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                        Start time (UTC):18:11:31
                                        Start date (UTC):08/10/2024
                                        Path:/usr/bin/gnome-shell
                                        Arguments:/usr/bin/gnome-shell
                                        File size:23168 bytes
                                        MD5 hash:da7a257239677622fe4b3a65972c9e87

                                        Start time (UTC):18:11:31
                                        Start date (UTC):08/10/2024
                                        Path:/usr/libexec/gnome-session-binary
                                        Arguments:-
                                        File size:334664 bytes
                                        MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                        Start time (UTC):18:11:31
                                        Start date (UTC):08/10/2024
                                        Path:/bin/sh
                                        Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-sharing
                                        File size:129816 bytes
                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                        Start time (UTC):18:11:31
                                        Start date (UTC):08/10/2024
                                        Path:/usr/libexec/gsd-sharing
                                        Arguments:/usr/libexec/gsd-sharing
                                        File size:35424 bytes
                                        MD5 hash:e29d9025d98590fbb69f89fdbd4438b3

                                        Start time (UTC):18:11:32
                                        Start date (UTC):08/10/2024
                                        Path:/usr/sbin/gdm3
                                        Arguments:-
                                        File size:453296 bytes
                                        MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                        Start time (UTC):18:11:32
                                        Start date (UTC):08/10/2024
                                        Path:/etc/gdm3/PrimeOff/Default
                                        Arguments:/etc/gdm3/PrimeOff/Default
                                        File size:129816 bytes
                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                        Start time (UTC):18:11:32
                                        Start date (UTC):08/10/2024
                                        Path:/usr/sbin/gdm3
                                        Arguments:-
                                        File size:453296 bytes
                                        MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                        Start time (UTC):18:11:32
                                        Start date (UTC):08/10/2024
                                        Path:/etc/gdm3/PrimeOff/Default
                                        Arguments:/etc/gdm3/PrimeOff/Default
                                        File size:129816 bytes
                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                        Start time (UTC):18:11:42
                                        Start date (UTC):08/10/2024
                                        Path:/usr/lib/systemd/systemd
                                        Arguments:-
                                        File size:1620224 bytes
                                        MD5 hash:9b2bec7092a40488108543f9334aab75

                                        Start time (UTC):18:11:42
                                        Start date (UTC):08/10/2024
                                        Path:/lib/systemd/systemd-user-runtime-dir
                                        Arguments:/lib/systemd/systemd-user-runtime-dir stop 127
                                        File size:22672 bytes
                                        MD5 hash:d55f4b0847f88131dbcfb07435178e54