Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
RavHMt492R.elf

Overview

General Information

Sample name:RavHMt492R.elf
renamed because original name is a hash value
Original sample name:7dda33814ff1212372dd036e741139f0.elf
Analysis ID:1531365
MD5:7dda33814ff1212372dd036e741139f0
SHA1:d99680c442df3af44a2c7edd6555aa791c8bdb46
SHA256:c82ecfc2c898cb33564ddf6b82e0e973f3f10c755d93b6c88ced96088015393b
Tags:32armelfmirai
Infos:

Detection

Mirai
Score:72
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1531365
Start date and time:2024-10-11 05:36:57 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 10m 40s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:RavHMt492R.elf
renamed because original name is a hash value
Original Sample Name:7dda33814ff1212372dd036e741139f0.elf
Detection:MAL
Classification:mal72.troj.linELF@0/0@2/0
Cookbook Comments:
  • Analysis time extended to 480s due to sleep detection in submitted sample
  • Max analysis timeout: 600s exceeded, the analysis took too long
Command:/tmp/RavHMt492R.elf
PID:5508
Exit Code:255
Exit Code Info:
Killed:False
Standard Output:

Standard Error:/lib/ld-uClibc.so.0: No such file or directory
  • system is lnxubuntu20
  • RavHMt492R.elf (PID: 5508, Parent: 5423, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/RavHMt492R.elf
  • cleanup
SourceRuleDescriptionAuthorStrings
RavHMt492R.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    RavHMt492R.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0xd1d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd1ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd200:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd214:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd228:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd23c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd250:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd264:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd278:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd28c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd2a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd2b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd2c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd2dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd2f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd304:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd318:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd32c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd340:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd354:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xd368:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    RavHMt492R.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
    • 0xd730:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
    SourceRuleDescriptionAuthorStrings
    5508.1.00007fcd04017000.00007fcd04026000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5508.1.00007fcd04017000.00007fcd04026000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xd1d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd1ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd200:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd214:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd228:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd23c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd250:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd264:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd278:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd28c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd2a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd2b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd2c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd2dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd2f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd304:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd318:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd32c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd340:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd354:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd368:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5508.1.00007fcd04017000.00007fcd04026000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
      • 0xd730:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
      Process Memory Space: RavHMt492R.elf PID: 5508Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xd14:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd28:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd3c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd50:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd64:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd78:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd8c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xda0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdb4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdc8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xddc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdf0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xea4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      Process Memory Space: RavHMt492R.elf PID: 5508Linux_Trojan_Gafgyt_ea92cca8unknownunknown
      • 0x11d2:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: RavHMt492R.elfAvira: detected
      Source: RavHMt492R.elfReversingLabs: Detection: 68%
      Source: RavHMt492R.elfVirustotal: Detection: 61%Perma Link
      Source: global trafficTCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
      Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443

      System Summary

      barindex
      Source: RavHMt492R.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: RavHMt492R.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
      Source: 5508.1.00007fcd04017000.00007fcd04026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: 5508.1.00007fcd04017000.00007fcd04026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
      Source: Process Memory Space: RavHMt492R.elf PID: 5508, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: Process Memory Space: RavHMt492R.elf PID: 5508, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: RavHMt492R.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: RavHMt492R.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
      Source: 5508.1.00007fcd04017000.00007fcd04026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: 5508.1.00007fcd04017000.00007fcd04026000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
      Source: Process Memory Space: RavHMt492R.elf PID: 5508, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: Process Memory Space: RavHMt492R.elf PID: 5508, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
      Source: classification engineClassification label: mal72.troj.linELF@0/0@2/0
      Source: /tmp/RavHMt492R.elf (PID: 5508)Queries kernel information via 'uname': Jump to behavior
      Source: RavHMt492R.elf, 5508.1.00007ffd76663000.00007ffd76684000.rw-.sdmpBinary or memory string: qemu: %s: %s
      Source: RavHMt492R.elf, 5508.1.00007ffd76663000.00007ffd76684000.rw-.sdmpBinary or memory string: leqemu: %s: %s
      Source: RavHMt492R.elf, 5508.1.0000555ddf2e2000.0000555ddf410000.rw-.sdmpBinary or memory string: ]Urg.qemu.gdb.arm.sys.regs">
      Source: RavHMt492R.elf, 5508.1.0000555ddf2e2000.0000555ddf410000.rw-.sdmpBinary or memory string: ]U!/etc/qemu-binfmt/arm
      Source: RavHMt492R.elf, 5508.1.0000555ddf2e2000.0000555ddf410000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
      Source: RavHMt492R.elf, 5508.1.00007ffd76663000.00007ffd76684000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
      Source: RavHMt492R.elf, 5508.1.00007ffd76663000.00007ffd76684000.rw-.sdmpBinary or memory string: 2x86_64/usr/bin/qemu-arm/tmp/RavHMt492R.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/RavHMt492R.elf
      Source: RavHMt492R.elf, 5508.1.0000555ddf2e2000.0000555ddf410000.rw-.sdmpBinary or memory string: rg.qemu.gdb.arm.sys.regs">

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: RavHMt492R.elf, type: SAMPLE
      Source: Yara matchFile source: 5508.1.00007fcd04017000.00007fcd04026000.r-x.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: RavHMt492R.elf, type: SAMPLE
      Source: Yara matchFile source: 5508.1.00007fcd04017000.00007fcd04026000.r-x.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
      Security Software Discovery
      Remote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      RavHMt492R.elf68%ReversingLabsLinux.Backdoor.Mirai
      RavHMt492R.elf62%VirustotalBrowse
      RavHMt492R.elf100%AviraEXP/ELF.Mirai.Bootnet.oc
      No Antivirus matches
      SourceDetectionScannerLabelLink
      daisy.ubuntu.com0%VirustotalBrowse
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      daisy.ubuntu.com
      162.213.35.24
      truefalseunknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      185.125.190.26
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      185.125.190.26VLi6LJSker.elfGet hashmaliciousMiraiBrowse
        17CiAkKMyC.elfGet hashmaliciousGafgyt, MiraiBrowse
          fNR6GoKo15.elfGet hashmaliciousMiraiBrowse
            na.elfGet hashmaliciousUnknownBrowse
              na.elfGet hashmaliciousUnknownBrowse
                na.elfGet hashmaliciousUnknownBrowse
                  na.elfGet hashmaliciousUnknownBrowse
                    na.elfGet hashmaliciousUnknownBrowse
                      oQoQiI0Pdz.elfGet hashmaliciousUnknownBrowse
                        na.elfGet hashmaliciousGafgytBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          daisy.ubuntu.com6DroQ0jTFY.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.24
                          2FsS4ASMcO.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.24
                          YtpxPCS4ke.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.24
                          bnrKk80Fa9.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.24
                          dNBHFhYkoO.elfGet hashmaliciousMirai, OkiruBrowse
                          • 162.213.35.24
                          Vxy5RbbhIU.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.24
                          gXYPejHot8.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.24
                          hwfx5XCqGs.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.25
                          iOdhAV91gt.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.25
                          iey3TUq7q1.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.25
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          CANONICAL-ASGB9BXz5oZUMh.elfGet hashmaliciousUnknownBrowse
                          • 91.189.91.42
                          yf4gVAbwwM.elfGet hashmaliciousUnknownBrowse
                          • 91.189.91.42
                          V4m23GTfgo.elfGet hashmaliciousUnknownBrowse
                          • 91.189.91.42
                          SecuriteInfo.com.Trojan.Linux.GenericKD.24541.15001.4284.elfGet hashmaliciousUnknownBrowse
                          • 91.189.91.42
                          6e1rv1WaB3.elfGet hashmaliciousMiraiBrowse
                          • 91.189.91.42
                          0XWsq1FRVD.elfGet hashmaliciousMiraiBrowse
                          • 91.189.91.42
                          oW92qFXhAp.elfGet hashmaliciousMiraiBrowse
                          • 91.189.91.42
                          VLi6LJSker.elfGet hashmaliciousMiraiBrowse
                          • 185.125.190.26
                          17CiAkKMyC.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 185.125.190.26
                          fNR6GoKo15.elfGet hashmaliciousMiraiBrowse
                          • 185.125.190.26
                          No context
                          No context
                          No created / dropped files found
                          File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), dynamically linked, interpreter /lib/ld-uClibc.so.0, stripped
                          Entropy (8bit):6.056793703718645
                          TrID:
                          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                          File name:RavHMt492R.elf
                          File size:59'300 bytes
                          MD5:7dda33814ff1212372dd036e741139f0
                          SHA1:d99680c442df3af44a2c7edd6555aa791c8bdb46
                          SHA256:c82ecfc2c898cb33564ddf6b82e0e973f3f10c755d93b6c88ced96088015393b
                          SHA512:f7820ce632c1807bafb326579b89ad1b7bc2b2c01626db55275b92ff27d7dc2004ea1bc1596348656a9e771e36975aa2adc1b465cd75a266774fe6177826ccfa
                          SSDEEP:1536:MnxUS9GToGVtm+3XNtBLozkR8JuQysg5Moh+fAosQ:Mn+xp8gl55FhYH
                          TLSH:B143E651BC825A2AC2E053BAF9AE558D332177E8D1EB3227CC611B107BCA55F1D63F81
                          File Content Preview:.ELF...a..........(.........4...........4. ...(.........4...4...4.......................................................................................................H...........................................Q.td............................/lib/ld-uCl

                          ELF header

                          Class:ELF32
                          Data:2's complement, little endian
                          Version:1 (current)
                          Machine:ARM
                          Version Number:0x1
                          Type:EXEC (Executable file)
                          OS/ABI:ARM - ABI
                          ABI Version:0
                          Entry Point Address:0x8ee8
                          Flags:0x2
                          ELF Header Size:52
                          Program Header Offset:52
                          Program Header Size:32
                          Number of Program Headers:6
                          Section Header Offset:58580
                          Section Header Size:40
                          Number of Section Headers:18
                          Header String Table Index:17
                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                          NULL0x00x00x00x00x0000
                          .interpPROGBITS0x80f40xf40x140x00x2A001
                          .hashHASH0x81080x1080x22c0x40x2A304
                          .dynsymDYNSYM0x83340x3340x4600x100x2A414
                          .dynstrSTRTAB0x87940x7940x2370x00x2A001
                          .rel.pltREL0x89cc0x9cc0x1a00x80x2A374
                          .initPROGBITS0x8b6c0xb6c0x180x00x6AX004
                          .pltPROGBITS0x8b840xb840x2840x40x6AX004
                          .textPROGBITS0x8e080xe080xc3bc0x00x6AX004
                          .finiPROGBITS0x151c40xd1c40x140x00x6AX004
                          .rodataPROGBITS0x151d80xd1d80x10d80x00x2A004
                          .ctorsPROGBITS0x1e2b40xe2b40x80x00x3WA004
                          .dtorsPROGBITS0x1e2bc0xe2bc0x80x00x3WA004
                          .dynamicDYNAMIC0x1e2c80xe2c80x980x80x3WA404
                          .gotPROGBITS0x1e3600xe3600xdc0x40x3WA004
                          .dataPROGBITS0x1e43c0xe43c0x240x00x3WA004
                          .bssNOBITS0x1e4600xe4600x19c0x00x3WA004
                          .shstrtabSTRTAB0x00xe4600x730x00x0001
                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                          PHDR0x340x80340x80340xc00xc02.27130x5R E0x4
                          INTERP0xf40x80f40x80f40x140x143.68420x4R 0x1/lib/ld-uClibc.so.0.interp
                          LOAD0x00x80000x80000xe2b00xe2b06.08690x5R E0x8000.interp .hash .dynsym .dynstr .rel.plt .init .plt .text .fini .rodata
                          LOAD0xe2b40x1e2b40x1e2b40x1ac0x3482.25810x6RW 0x8000.ctors .dtors .dynamic .got .data .bss
                          DYNAMIC0xe2c80x1e2c80x1e2c80x980x981.92470x6RW 0x4.dynamic
                          GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                          TypeMetaValueTag
                          DT_NEEDEDsharedliblibc.so.00x1
                          DT_INITvalue0x8b6c0xc
                          DT_FINIvalue0x151c40xd
                          DT_HASHvalue0x81080x4
                          DT_STRTABvalue0x87940x5
                          DT_SYMTABvalue0x83340x6
                          DT_STRSZbytes5670xa
                          DT_SYMENTbytes160xb
                          DT_DEBUGvalue0x00x15
                          DT_PLTGOTvalue0x1e3600x3
                          DT_PLTRELSZbytes4160x2
                          DT_PLTRELpltrelDT_REL0x14
                          DT_JMPRELvalue0x89cc0x17
                          DT_NULLvalue0x00x0
                          NameVersion Info NameVersion Info File NameSection NameValueSizeSymbol TypeSymbol BindSymbol VisibilityNdx
                          .dynsym0x00NOTYPE<unknown>DEFAULTSHN_UNDEF
                          __aeabi_idiv0.dynsym0x151844FUNC<unknown>DEFAULT8
                          __aeabi_ldiv0.dynsym0x151844FUNC<unknown>DEFAULT8
                          __aeabi_uidiv.dynsym0x14ec40FUNC<unknown>DEFAULT8
                          __aeabi_uidivmod.dynsym0x14fbc24FUNC<unknown>DEFAULT8
                          __bss_end__.dynsym0x1e5fc0NOTYPE<unknown>DEFAULTSHN_ABS
                          __bss_start.dynsym0x1e4600NOTYPE<unknown>DEFAULTSHN_ABS
                          __bss_start__.dynsym0x1e4600NOTYPE<unknown>DEFAULTSHN_ABS
                          __data_start.dynsym0x1e43c0NOTYPE<unknown>DEFAULT17
                          __div0.dynsym0x151844FUNC<unknown>DEFAULT8
                          __end__.dynsym0x1e5fc0NOTYPE<unknown>DEFAULTSHN_ABS
                          __errno_location.dynsym0x8d7832FUNC<unknown>DEFAULTSHN_UNDEF
                          __modsi3.dynsym0x150a0228FUNC<unknown>DEFAULT8
                          __uClibc_main.dynsym0x8d30488FUNC<unknown>DEFAULTSHN_UNDEF
                          __udivsi3.dynsym0x14ec4248FUNC<unknown>DEFAULT8
                          __umodsi3.dynsym0x14fd4204FUNC<unknown>DEFAULT8
                          _bss_end__.dynsym0x1e5fc0NOTYPE<unknown>DEFAULTSHN_ABS
                          _edata.dynsym0x1e4600NOTYPE<unknown>DEFAULTSHN_ABS
                          _end.dynsym0x1e5fc0NOTYPE<unknown>DEFAULTSHN_ABS
                          _start.dynsym0x8ee880FUNC<unknown>DEFAULT8
                          abort.dynsym0x8c70352FUNC<unknown>DEFAULTSHN_UNDEF
                          accept.dynsym0x8c7c44FUNC<unknown>DEFAULTSHN_UNDEF
                          atoi.dynsym0x8d9012FUNC<unknown>DEFAULTSHN_UNDEF
                          bind.dynsym0x8cac44FUNC<unknown>DEFAULTSHN_UNDEF
                          calloc.dynsym0x8c8888FUNC<unknown>DEFAULTSHN_UNDEF
                          clock.dynsym0x8da852FUNC<unknown>DEFAULTSHN_UNDEF
                          close.dynsym0x8dd844FUNC<unknown>DEFAULTSHN_UNDEF
                          closedir.dynsym0x8dc0196FUNC<unknown>DEFAULTSHN_UNDEF
                          connect.dynsym0x8bbc44FUNC<unknown>DEFAULTSHN_UNDEF
                          exit.dynsym0x8d84172FUNC<unknown>DEFAULTSHN_UNDEF
                          fcntl.dynsym0x8dcc116FUNC<unknown>DEFAULTSHN_UNDEF
                          fork.dynsym0x8d2444FUNC<unknown>DEFAULTSHN_UNDEF
                          free.dynsym0x8de4288FUNC<unknown>DEFAULTSHN_UNDEF
                          getpid.dynsym0x8be044FUNC<unknown>DEFAULTSHN_UNDEF
                          getppid.dynsym0x8d4844FUNC<unknown>DEFAULTSHN_UNDEF
                          getsockname.dynsym0x8dfc44FUNC<unknown>DEFAULTSHN_UNDEF
                          getsockopt.dynsym0x8d6c48FUNC<unknown>DEFAULTSHN_UNDEF
                          inet_addr.dynsym0x8cb836FUNC<unknown>DEFAULTSHN_UNDEF
                          ioctl.dynsym0x8ba480FUNC<unknown>DEFAULTSHN_UNDEF
                          kill.dynsym0x8ca044FUNC<unknown>DEFAULTSHN_UNDEF
                          listen.dynsym0x8d1844FUNC<unknown>DEFAULTSHN_UNDEF
                          malloc.dynsym0x8c10400FUNC<unknown>DEFAULTSHN_UNDEF
                          memcpy.dynsym0x8bf84FUNC<unknown>DEFAULTSHN_UNDEF
                          memmove.dynsym0x8bd44FUNC<unknown>DEFAULTSHN_UNDEF
                          memset.dynsym0x8d3c156FUNC<unknown>DEFAULTSHN_UNDEF
                          open.dynsym0x8d9c92FUNC<unknown>DEFAULTSHN_UNDEF
                          opendir.dynsym0x8d60264FUNC<unknown>DEFAULTSHN_UNDEF
                          prctl.dynsym0x8bec48FUNC<unknown>DEFAULTSHN_UNDEF
                          rand.dynsym0x8cd04FUNC<unknown>DEFAULTSHN_UNDEF
                          read.dynsym0x8ce844FUNC<unknown>DEFAULTSHN_UNDEF
                          readdir.dynsym0x8c4c224FUNC<unknown>DEFAULTSHN_UNDEF
                          readlink.dynsym0x8c0444FUNC<unknown>DEFAULTSHN_UNDEF
                          realloc.dynsym0x8d0c312FUNC<unknown>DEFAULTSHN_UNDEF
                          recv.dynsym0x8bb044FUNC<unknown>DEFAULTSHN_UNDEF
                          recvfrom.dynsym0x8c2852FUNC<unknown>DEFAULTSHN_UNDEF
                          select.dynsym0x8c4048FUNC<unknown>DEFAULTSHN_UNDEF
                          send.dynsym0x8c6444FUNC<unknown>DEFAULTSHN_UNDEF
                          sendto.dynsym0x8d0052FUNC<unknown>DEFAULTSHN_UNDEF
                          setsid.dynsym0x8db444FUNC<unknown>DEFAULTSHN_UNDEF
                          setsockopt.dynsym0x8cc448FUNC<unknown>DEFAULTSHN_UNDEF
                          sigaddset.dynsym0x8c5848FUNC<unknown>DEFAULTSHN_UNDEF
                          sigemptyset.dynsym0x8bc824FUNC<unknown>DEFAULTSHN_UNDEF
                          signal.dynsym0x8cdc200FUNC<unknown>DEFAULTSHN_UNDEF
                          sigprocmask.dynsym0x8df084FUNC<unknown>DEFAULTSHN_UNDEF
                          sleep.dynsym0x8c1c420FUNC<unknown>DEFAULTSHN_UNDEF
                          socket.dynsym0x8c3444FUNC<unknown>DEFAULTSHN_UNDEF
                          strcpy.dynsym0x8b9828FUNC<unknown>DEFAULTSHN_UNDEF
                          time.dynsym0x8d5444FUNC<unknown>DEFAULTSHN_UNDEF
                          unlink.dynsym0x8cf444FUNC<unknown>DEFAULTSHN_UNDEF
                          write.dynsym0x8c9444FUNC<unknown>DEFAULTSHN_UNDEF
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 11, 2024 05:37:59.385529995 CEST46540443192.168.2.14185.125.190.26
                          Oct 11, 2024 05:38:29.592070103 CEST46540443192.168.2.14185.125.190.26
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 11, 2024 05:40:34.543356895 CEST5225653192.168.2.148.8.8.8
                          Oct 11, 2024 05:40:34.543476105 CEST5496353192.168.2.148.8.8.8
                          Oct 11, 2024 05:40:34.667870998 CEST53549638.8.8.8192.168.2.14
                          Oct 11, 2024 05:40:34.667926073 CEST53522568.8.8.8192.168.2.14
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Oct 11, 2024 05:40:34.543356895 CEST192.168.2.148.8.8.80x9c89Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                          Oct 11, 2024 05:40:34.543476105 CEST192.168.2.148.8.8.80x35b8Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Oct 11, 2024 05:40:34.667926073 CEST8.8.8.8192.168.2.140x9c89No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                          Oct 11, 2024 05:40:34.667926073 CEST8.8.8.8192.168.2.140x9c89No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                          System Behavior

                          Start time (UTC):03:37:50
                          Start date (UTC):11/10/2024
                          Path:/tmp/RavHMt492R.elf
                          Arguments:/tmp/RavHMt492R.elf
                          File size:4956856 bytes
                          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1