Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
NLHiAJgSnj.elf

Overview

General Information

Sample name:NLHiAJgSnj.elf
renamed because original name is a hash value
Original sample name:d79c81f5e8f405f76b0d77f543379653.elf
Analysis ID:1529270
MD5:d79c81f5e8f405f76b0d77f543379653
SHA1:b67d6128d3d27de64ff29a24082bc736514b51dd
SHA256:ca8548f71a92e380a154ef983cb4d5af98f5af77537fc6522f0c41592ca0dedb
Tags:32armelfmirai
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1529270
Start date and time:2024-10-08 20:10:10 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 6s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:NLHiAJgSnj.elf
renamed because original name is a hash value
Original Sample Name:d79c81f5e8f405f76b0d77f543379653.elf
Detection:MAL
Classification:mal52.troj.linELF@0/0@3/0
  • VT rate limit hit for: NLHiAJgSnj.elf
Command:/tmp/NLHiAJgSnj.elf
PID:5487
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • sh (PID: 5529, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/bin/gnome-shell
  • gnome-shell (PID: 5529, Parent: 1383, MD5: da7a257239677622fe4b3a65972c9e87) Arguments: /usr/bin/gnome-shell
  • sh (PID: 5531, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-sharing
  • gsd-sharing (PID: 5531, Parent: 1383, MD5: e29d9025d98590fbb69f89fdbd4438b3) Arguments: /usr/libexec/gsd-sharing
  • gdm3 New Fork (PID: 5533, Parent: 1289)
  • Default (PID: 5533, Parent: 1289, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • gdm3 New Fork (PID: 5552, Parent: 1289)
  • Default (PID: 5552, Parent: 1289, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • systemd New Fork (PID: 5559, Parent: 1)
  • systemd-user-runtime-dir (PID: 5559, Parent: 1, MD5: d55f4b0847f88131dbcfb07435178e54) Arguments: /lib/systemd/systemd-user-runtime-dir stop 127
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: NLHiAJgSnj.elfReversingLabs: Detection: 23%

Networking

barindex
Source: global trafficTCP traffic: 154.90.62.142 ports 2,3,4,8,9,38429
Source: global trafficTCP traffic: 192.168.2.14:38794 -> 154.90.62.142:38429
Source: /tmp/NLHiAJgSnj.elf (PID: 5487)Socket: 127.0.0.1:1234Jump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 130.61.69.123
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: krddnsnet.dyn
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)SIGKILL sent: pid: 888, result: successfulJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)SIGKILL sent: pid: 1444, result: successfulJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)SIGKILL sent: pid: 1610, result: successfulJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)SIGKILL sent: pid: 5529, result: successfulJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)SIGKILL sent: pid: 5531, result: successfulJump to behavior
Source: classification engineClassification label: mal52.troj.linELF@0/0@3/0
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1583/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1583/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/2672/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/2672/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1577/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1593/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1593/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3406/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3406/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1589/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3402/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3402/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/806/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/806/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/807/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/807/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/928/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/928/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3412/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3412/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1371/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/5607/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1369/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3304/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3304/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3425/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3425/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/940/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/940/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/941/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/941/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1364/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1383/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1382/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1381/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3319/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3319/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3691/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3691/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/5510/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1394/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3329/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3329/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3207/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3207/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/725/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/725/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3687/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3687/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/726/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/726/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3688/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3688/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3689/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3689/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/5520/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/5521/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3341/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3341/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/5519/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3218/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3218/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3337/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3337/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3215/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3215/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/1399/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/853/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/853/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3213/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3213/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3212/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/3212/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5489)File opened: /proc/5511/cmdlineJump to behavior
Source: /tmp/NLHiAJgSnj.elf (PID: 5487)Queries kernel information via 'uname': Jump to behavior
Source: NLHiAJgSnj.elf, 5487.1.00007ffcfc391000.00007ffcfc3b2000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/NLHiAJgSnj.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/NLHiAJgSnj.elf
Source: NLHiAJgSnj.elf, 5487.1.00005578c7dbe000.00005578c7f0d000.rw-.sdmpBinary or memory string: xU!/etc/qemu-binfmt/arm
Source: NLHiAJgSnj.elf, 5487.1.00005578c7dbe000.00005578c7f0d000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: NLHiAJgSnj.elf, 5487.1.00007ffcfc391000.00007ffcfc3b2000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1529270 Sample: NLHiAJgSnj.elf Startdate: 08/10/2024 Architecture: LINUX Score: 52 19 krddnsnet.dyn 154.90.62.142, 38429, 38794 CNSERVERSUS Seychelles 2->19 21 daisy.ubuntu.com 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 Connects to many ports of the same IP (likely port scanning) 2->25 7 NLHiAJgSnj.elf 2->7         started        9 gnome-session-binary sh gnome-shell 2->9         started        11 gnome-session-binary sh gsd-sharing 2->11         started        13 3 other processes 2->13 signatures3 process4 process5 15 NLHiAJgSnj.elf 7->15         started        17 NLHiAJgSnj.elf 7->17         started       
SourceDetectionScannerLabelLink
NLHiAJgSnj.elf24%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    unknown
    krddnsnet.dyn
    154.90.62.142
    truetrue
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      154.90.62.142
      krddnsnet.dynSeychelles
      40065CNSERVERSUStrue
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      154.90.62.142na.elfGet hashmaliciousUnknownBrowse
        na.elfGet hashmaliciousUnknownBrowse
          na.elfGet hashmaliciousUnknownBrowse
            na.elfGet hashmaliciousUnknownBrowse
              na.elfGet hashmaliciousUnknownBrowse
                na.elfGet hashmaliciousUnknownBrowse
                  na.elfGet hashmaliciousUnknownBrowse
                    na.elfGet hashmaliciousUnknownBrowse
                      na.elfGet hashmaliciousUnknownBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        daisy.ubuntu.comirods-runtime-4.1.9-centos7-x86_64.rpmGet hashmaliciousXmrigBrowse
                        • 162.213.35.24
                        na.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        na.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        logrotate_malware.elfGet hashmaliciousXmrigBrowse
                        • 162.213.35.25
                        na.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        na.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        na.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        na.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        na.elfGet hashmaliciousMiraiBrowse
                        • 162.213.35.25
                        krddnsnet.dynna.elfGet hashmaliciousUnknownBrowse
                        • 154.90.62.142
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CNSERVERSUSfJD7ivEnzm.exeGet hashmaliciousFormBookBrowse
                        • 43.242.202.169
                        Z6s208B9QX.exeGet hashmaliciousFormBookBrowse
                        • 23.224.37.76
                        5FRWRDOqk7.exeGet hashmaliciousFormBookBrowse
                        • 43.242.202.169
                        jpdy1E8K4A.exeGet hashmaliciousFormBookBrowse
                        • 43.242.202.169
                        na.elfGet hashmaliciousUnknownBrowse
                        • 154.90.62.142
                        na.elfGet hashmaliciousUnknownBrowse
                        • 154.90.62.142
                        na.elfGet hashmaliciousUnknownBrowse
                        • 154.90.62.142
                        na.elfGet hashmaliciousUnknownBrowse
                        • 154.90.62.142
                        na.elfGet hashmaliciousUnknownBrowse
                        • 154.90.62.142
                        na.elfGet hashmaliciousUnknownBrowse
                        • 154.90.62.142
                        No context
                        No context
                        No created / dropped files found
                        File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):5.877902064626029
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:NLHiAJgSnj.elf
                        File size:58'652 bytes
                        MD5:d79c81f5e8f405f76b0d77f543379653
                        SHA1:b67d6128d3d27de64ff29a24082bc736514b51dd
                        SHA256:ca8548f71a92e380a154ef983cb4d5af98f5af77537fc6522f0c41592ca0dedb
                        SHA512:4bb8f64fbdea34ab22fb12ff2739a168fef75b9f6cee26348c88698b0a9e5b782a066f8f428398722b20f32f097d0745e55051f9941b9718618aaf54fbb487e0
                        SSDEEP:1536:VlnXIAyT9Q5kk1C3vKbXzU0h+1Mxi8JAgPfPqB:PwT9Q2ibjjAgPfPq
                        TLSH:03430956B9828A15C8D4037EFE0E518E3323776CE3DE72139E216F1437CA56B0A7B816
                        File Content Preview:.ELF..............(.....T...4...<.......4. ...(..........................................................w..........Q.td..................................-...L..................@-.,@...0....S..... 0....S.........../..0...0...@..../...............-.@0....S

                        ELF header

                        Class:ELF32
                        Data:2's complement, little endian
                        Version:1 (current)
                        Machine:ARM
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x8154
                        Flags:0x4000002
                        ELF Header Size:52
                        Program Header Offset:52
                        Program Header Size:32
                        Number of Program Headers:3
                        Section Header Offset:58172
                        Section Header Size:40
                        Number of Section Headers:12
                        Header String Table Index:11
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x80940x940x100x00x6AX004
                        .textPROGBITS0x80b00xb00xd26c0x00x6AX0016
                        .finiPROGBITS0x1531c0xd31c0x100x00x6AX004
                        .rodataPROGBITS0x1532c0xd32c0x7c40x00x2A004
                        .eh_framePROGBITS0x1e0000xe0000x40x00x3WA004
                        .init_arrayINIT_ARRAY0x1e0040xe0040x40x00x3WA004
                        .fini_arrayFINI_ARRAY0x1e0080xe0080x40x00x3WA004
                        .gotPROGBITS0x1e0100xe0100x740x40x3WA004
                        .dataPROGBITS0x1e0840xe0840x2600x00x3WA004
                        .bssNOBITS0x1e2e40xe2e40x74300x00x3WA004
                        .shstrtabSTRTAB0x00xe2e40x570x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x80000x80000xdaf00xdaf05.98200x5R E0x8000.init .text .fini .rodata
                        LOAD0xe0000x1e0000x1e0000x2e40x77143.65640x6RW 0x8000.eh_frame .init_array .fini_array .got .data .bss
                        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 8, 2024 20:11:00.834243059 CEST3879438429192.168.2.14154.90.62.142
                        Oct 8, 2024 20:11:00.839114904 CEST3842938794154.90.62.142192.168.2.14
                        Oct 8, 2024 20:11:00.839173079 CEST3879438429192.168.2.14154.90.62.142
                        Oct 8, 2024 20:11:00.840281963 CEST3879438429192.168.2.14154.90.62.142
                        Oct 8, 2024 20:11:00.845071077 CEST3842938794154.90.62.142192.168.2.14
                        Oct 8, 2024 20:11:02.559911013 CEST3842938794154.90.62.142192.168.2.14
                        Oct 8, 2024 20:11:02.560133934 CEST3879438429192.168.2.14154.90.62.142
                        Oct 8, 2024 20:11:17.564369917 CEST3879438429192.168.2.14154.90.62.142
                        Oct 8, 2024 20:11:17.569433928 CEST3842938794154.90.62.142192.168.2.14
                        Oct 8, 2024 20:12:13.610270977 CEST3842938794154.90.62.142192.168.2.14
                        Oct 8, 2024 20:12:13.610781908 CEST3879438429192.168.2.14154.90.62.142
                        Oct 8, 2024 20:12:18.127815962 CEST3842938794154.90.62.142192.168.2.14
                        Oct 8, 2024 20:12:18.128424883 CEST3879438429192.168.2.14154.90.62.142
                        Oct 8, 2024 20:13:03.145242929 CEST3879438429192.168.2.14154.90.62.142
                        Oct 8, 2024 20:13:03.151166916 CEST3842938794154.90.62.142192.168.2.14
                        Oct 8, 2024 20:13:59.960434914 CEST3842938794154.90.62.142192.168.2.14
                        Oct 8, 2024 20:13:59.960944891 CEST3879438429192.168.2.14154.90.62.142
                        Oct 8, 2024 20:13:59.960999966 CEST3842938794154.90.62.142192.168.2.14
                        Oct 8, 2024 20:13:59.961451054 CEST3879438429192.168.2.14154.90.62.142
                        Oct 8, 2024 20:14:05.170851946 CEST3842938794154.90.62.142192.168.2.14
                        Oct 8, 2024 20:14:05.171066046 CEST3879438429192.168.2.14154.90.62.142
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 8, 2024 20:11:00.695430040 CEST5903853192.168.2.14130.61.69.123
                        Oct 8, 2024 20:11:00.832942009 CEST5359038130.61.69.123192.168.2.14
                        Oct 8, 2024 20:13:41.302314997 CEST5457553192.168.2.141.1.1.1
                        Oct 8, 2024 20:13:41.302382946 CEST3735453192.168.2.141.1.1.1
                        Oct 8, 2024 20:13:41.310858965 CEST53373541.1.1.1192.168.2.14
                        Oct 8, 2024 20:13:41.312892914 CEST53545751.1.1.1192.168.2.14
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Oct 8, 2024 20:11:00.695430040 CEST192.168.2.14130.61.69.1230x4eacStandard query (0)krddnsnet.dynA (IP address)IN (0x0001)false
                        Oct 8, 2024 20:13:41.302314997 CEST192.168.2.141.1.1.10x410cStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                        Oct 8, 2024 20:13:41.302382946 CEST192.168.2.141.1.1.10xbceStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Oct 8, 2024 20:11:00.832942009 CEST130.61.69.123192.168.2.140x4eacNo error (0)krddnsnet.dyn154.90.62.142A (IP address)IN (0x0001)false
                        Oct 8, 2024 20:13:41.312892914 CEST1.1.1.1192.168.2.140x410cNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                        Oct 8, 2024 20:13:41.312892914 CEST1.1.1.1192.168.2.140x410cNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):18:10:57
                        Start date (UTC):08/10/2024
                        Path:/tmp/NLHiAJgSnj.elf
                        Arguments:/tmp/NLHiAJgSnj.elf
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):18:10:59
                        Start date (UTC):08/10/2024
                        Path:/tmp/NLHiAJgSnj.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):18:10:59
                        Start date (UTC):08/10/2024
                        Path:/tmp/NLHiAJgSnj.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):18:11:29
                        Start date (UTC):08/10/2024
                        Path:/usr/libexec/gnome-session-binary
                        Arguments:-
                        File size:334664 bytes
                        MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                        Start time (UTC):18:11:29
                        Start date (UTC):08/10/2024
                        Path:/bin/sh
                        Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/bin/gnome-shell
                        File size:129816 bytes
                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                        Start time (UTC):18:11:29
                        Start date (UTC):08/10/2024
                        Path:/usr/bin/gnome-shell
                        Arguments:/usr/bin/gnome-shell
                        File size:23168 bytes
                        MD5 hash:da7a257239677622fe4b3a65972c9e87

                        Start time (UTC):18:11:29
                        Start date (UTC):08/10/2024
                        Path:/usr/libexec/gnome-session-binary
                        Arguments:-
                        File size:334664 bytes
                        MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                        Start time (UTC):18:11:29
                        Start date (UTC):08/10/2024
                        Path:/bin/sh
                        Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-sharing
                        File size:129816 bytes
                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                        Start time (UTC):18:11:29
                        Start date (UTC):08/10/2024
                        Path:/usr/libexec/gsd-sharing
                        Arguments:/usr/libexec/gsd-sharing
                        File size:35424 bytes
                        MD5 hash:e29d9025d98590fbb69f89fdbd4438b3

                        Start time (UTC):18:11:30
                        Start date (UTC):08/10/2024
                        Path:/usr/sbin/gdm3
                        Arguments:-
                        File size:453296 bytes
                        MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                        Start time (UTC):18:11:30
                        Start date (UTC):08/10/2024
                        Path:/etc/gdm3/PrimeOff/Default
                        Arguments:/etc/gdm3/PrimeOff/Default
                        File size:129816 bytes
                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                        Start time (UTC):18:11:30
                        Start date (UTC):08/10/2024
                        Path:/usr/sbin/gdm3
                        Arguments:-
                        File size:453296 bytes
                        MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                        Start time (UTC):18:11:30
                        Start date (UTC):08/10/2024
                        Path:/etc/gdm3/PrimeOff/Default
                        Arguments:/etc/gdm3/PrimeOff/Default
                        File size:129816 bytes
                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                        Start time (UTC):18:11:40
                        Start date (UTC):08/10/2024
                        Path:/usr/lib/systemd/systemd
                        Arguments:-
                        File size:1620224 bytes
                        MD5 hash:9b2bec7092a40488108543f9334aab75

                        Start time (UTC):18:11:40
                        Start date (UTC):08/10/2024
                        Path:/lib/systemd/systemd-user-runtime-dir
                        Arguments:/lib/systemd/systemd-user-runtime-dir stop 127
                        File size:22672 bytes
                        MD5 hash:d55f4b0847f88131dbcfb07435178e54