Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
JVL2bXW1ch.elf

Overview

General Information

Sample name:JVL2bXW1ch.elf
renamed because original name is a hash value
Original sample name:766d13e52ec239528db092c98036cf9e.elf
Analysis ID:1532258
MD5:766d13e52ec239528db092c98036cf9e
SHA1:a4440805279305960c7ce6fada0cab758b21e9fd
SHA256:1485c22eb03f1e8e50b2ba4d6a5fdfd22cb4214b585e04929e670c4bfdeda864
Tags:32armelfmirai
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Connects to many ports of the same IP (likely port scanning)
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532258
Start date and time:2024-10-12 23:00:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 40s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:JVL2bXW1ch.elf
renamed because original name is a hash value
Original Sample Name:766d13e52ec239528db092c98036cf9e.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@19/0
Command:/tmp/JVL2bXW1ch.elf
PID:5467
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
JVL2bXW1ch.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    JVL2bXW1ch.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      JVL2bXW1ch.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xc640:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc654:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc668:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc67c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc690:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc6a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc6b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc6cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc6e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc6f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc708:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc71c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc730:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc744:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc758:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc76c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc780:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc794:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc7a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc7bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc7d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      5467.1.00007f77d8017000.00007f77d8025000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5467.1.00007f77d8017000.00007f77d8025000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5467.1.00007f77d8017000.00007f77d8025000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xc640:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc654:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc668:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc67c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc690:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc6a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc6b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc6cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc6e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc6f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc708:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc71c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc730:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc744:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc758:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc76c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc780:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc794:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc7a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc7bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xc7d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Process Memory Space: JVL2bXW1ch.elf PID: 5467JoeSecurity_Mirai_8Yara detected MiraiJoe Security
            Process Memory Space: JVL2bXW1ch.elf PID: 5467Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
            • 0x215c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x215d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x215e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x215fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x21610:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x21624:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x21638:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x2164c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x21660:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x21674:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x21688:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x2169c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x216b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x216c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x216d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x216ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x21700:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x21714:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x21728:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x2173c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x21750:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-12T23:01:08.454710+020020304911Malware Command and Control Activity Detected192.168.2.1344712107.189.4.20158431TCP
            2024-10-12T23:01:14.140908+020020304911Malware Command and Control Activity Detected192.168.2.1344714107.189.4.20158431TCP
            2024-10-12T23:01:25.806007+020020304911Malware Command and Control Activity Detected192.168.2.1344716107.189.4.20158431TCP
            2024-10-12T23:01:28.461864+020020304911Malware Command and Control Activity Detected192.168.2.1344718107.189.4.20158431TCP
            2024-10-12T23:01:32.120608+020020304911Malware Command and Control Activity Detected192.168.2.1344720107.189.4.20158431TCP
            2024-10-12T23:01:38.775362+020020304911Malware Command and Control Activity Detected192.168.2.1344722107.189.4.20158431TCP
            2024-10-12T23:01:46.432690+020020304911Malware Command and Control Activity Detected192.168.2.1344724107.189.4.20158431TCP
            2024-10-12T23:01:52.107698+020020304911Malware Command and Control Activity Detected192.168.2.1344726107.189.4.20158431TCP
            2024-10-12T23:02:03.798990+020020304911Malware Command and Control Activity Detected192.168.2.1344728107.189.4.20158431TCP
            2024-10-12T23:02:13.463765+020020304911Malware Command and Control Activity Detected192.168.2.1344730107.189.4.20158431TCP
            2024-10-12T23:02:18.121949+020020304911Malware Command and Control Activity Detected192.168.2.1344732107.189.4.20158431TCP
            2024-10-12T23:02:21.153657+020020304911Malware Command and Control Activity Detected192.168.2.1344734107.189.4.20158431TCP
            2024-10-12T23:02:28.821634+020020304911Malware Command and Control Activity Detected192.168.2.1344736107.189.4.20158431TCP
            2024-10-12T23:02:37.481453+020020304911Malware Command and Control Activity Detected192.168.2.1344738107.189.4.20158431TCP
            2024-10-12T23:02:44.138224+020020304911Malware Command and Control Activity Detected192.168.2.1344740107.189.4.20158431TCP
            2024-10-12T23:02:52.813085+020020304911Malware Command and Control Activity Detected192.168.2.1344742107.189.4.20158431TCP
            2024-10-12T23:03:01.472423+020020304911Malware Command and Control Activity Detected192.168.2.1344744107.189.4.20158431TCP
            2024-10-12T23:03:07.162485+020020304911Malware Command and Control Activity Detected192.168.2.1344746107.189.4.20158431TCP
            2024-10-12T23:03:09.849426+020020304911Malware Command and Control Activity Detected192.168.2.1344748107.189.4.20158431TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: JVL2bXW1ch.elfAvira: detected
            Source: JVL2bXW1ch.elfReversingLabs: Detection: 68%
            Source: JVL2bXW1ch.elfVirustotal: Detection: 64%Perma Link

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44716 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44720 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44712 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44714 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44722 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44724 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44730 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44726 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44728 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44734 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44732 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44740 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44738 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44746 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44736 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44718 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44744 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44742 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44748 -> 107.189.4.201:58431
            Source: global trafficTCP traffic: 107.189.4.201 ports 58431,1,3,4,5,8
            Source: global trafficTCP traffic: 192.168.2.13:44712 -> 107.189.4.201:58431
            Source: global trafficDNS traffic detected: DNS query: update.byeux.com

            System Summary

            barindex
            Source: JVL2bXW1ch.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: 5467.1.00007f77d8017000.00007f77d8025000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: Process Memory Space: JVL2bXW1ch.elf PID: 5467, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: ELF static info symbol of initial sample.symtab present: no
            Source: JVL2bXW1ch.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: 5467.1.00007f77d8017000.00007f77d8025000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: Process Memory Space: JVL2bXW1ch.elf PID: 5467, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@19/0
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/230/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/110/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/231/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/111/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/232/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/112/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/233/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/113/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/234/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/114/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/235/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/115/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/236/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/116/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/237/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/117/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/238/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/118/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/239/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/119/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/914/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/10/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/917/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/11/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/12/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/13/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/14/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/15/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/16/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/17/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/18/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/19/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/240/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/3095/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/120/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/241/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/121/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/242/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/1/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/122/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/243/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/2/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/123/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/244/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/3/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/124/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/245/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/1588/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/125/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/4/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/246/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/126/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/5/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/247/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/127/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/6/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/248/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/128/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/7/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/249/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/129/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/8/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/800/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/9/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/1906/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/802/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/803/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/3644/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/20/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/21/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/22/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/23/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/24/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/25/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/26/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/27/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/28/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/29/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/3420/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/1482/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/490/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/1480/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/250/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/371/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/130/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/251/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/131/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/252/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/132/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/253/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/254/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/1238/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/134/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/255/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/256/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/257/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/378/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/3413/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/258/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/259/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/1475/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/936/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/30/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/816/cmdlineJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5471)File opened: /proc/35/cmdlineJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: /tmp/JVL2bXW1ch.elf (PID: 5467)File: /tmp/JVL2bXW1ch.elfJump to behavior
            Source: /tmp/JVL2bXW1ch.elf (PID: 5467)Queries kernel information via 'uname': Jump to behavior
            Source: JVL2bXW1ch.elf, 5467.1.0000556c5a27a000.0000556c5a3a8000.rw-.sdmpBinary or memory string: )ZlU!/etc/qemu-binfmt/arm
            Source: JVL2bXW1ch.elf, 5467.1.0000556c5a27a000.0000556c5a3a8000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
            Source: JVL2bXW1ch.elf, 5467.1.00007fff20515000.00007fff20536000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
            Source: JVL2bXW1ch.elf, 5467.1.00007fff20515000.00007fff20536000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/JVL2bXW1ch.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/JVL2bXW1ch.elf

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: JVL2bXW1ch.elf, type: SAMPLE
            Source: Yara matchFile source: 5467.1.00007f77d8017000.00007f77d8025000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: JVL2bXW1ch.elf PID: 5467, type: MEMORYSTR
            Source: Yara matchFile source: JVL2bXW1ch.elf, type: SAMPLE
            Source: Yara matchFile source: 5467.1.00007f77d8017000.00007f77d8025000.r-x.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: Yara matchFile source: JVL2bXW1ch.elf, type: SAMPLE
            Source: Yara matchFile source: 5467.1.00007f77d8017000.00007f77d8025000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: JVL2bXW1ch.elf PID: 5467, type: MEMORYSTR
            Source: Yara matchFile source: JVL2bXW1ch.elf, type: SAMPLE
            Source: Yara matchFile source: 5467.1.00007f77d8017000.00007f77d8025000.r-x.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
            File Deletion
            1
            OS Credential Dumping
            11
            Security Software Discovery
            Remote ServicesData from Local System1
            Non-Standard Port
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            No configs have been found
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Number of created Files
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532258 Sample: JVL2bXW1ch.elf Startdate: 12/10/2024 Architecture: LINUX Score: 100 20 update.byeux.com 107.189.4.201, 44712, 44714, 44716 PONYNETUS United States 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 5 other signatures 2->28 9 JVL2bXW1ch.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 JVL2bXW1ch.elf 9->12         started        process6 process7 14 JVL2bXW1ch.elf 12->14         started        16 JVL2bXW1ch.elf 12->16         started        process8 18 JVL2bXW1ch.elf 14->18         started       
            SourceDetectionScannerLabelLink
            JVL2bXW1ch.elf68%ReversingLabsLinux.Trojan.Mirai
            JVL2bXW1ch.elf64%VirustotalBrowse
            JVL2bXW1ch.elf100%AviraEXP/ELF.Mirai.Z.A
            No Antivirus matches
            SourceDetectionScannerLabelLink
            update.byeux.com2%VirustotalBrowse
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            update.byeux.com
            107.189.4.201
            truetrueunknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            107.189.4.201
            update.byeux.comUnited States
            53667PONYNETUStrue
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            107.189.4.201arm7.elfGet hashmaliciousMirai, MoobotBrowse
              mips.elfGet hashmaliciousMirai, MoobotBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                update.byeux.comarm7.elfGet hashmaliciousMirai, MoobotBrowse
                • 107.189.4.201
                mips.elfGet hashmaliciousMirai, MoobotBrowse
                • 107.189.4.201
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                PONYNETUSO1cd60GrHb.exeGet hashmaliciousRHADAMANTHYSBrowse
                • 198.251.84.78
                O1cd60GrHb.exeGet hashmaliciousRHADAMANTHYSBrowse
                • 198.251.84.78
                fBcMVl6ns6.lnkGet hashmaliciousRHADAMANTHYSBrowse
                • 198.98.51.198
                rpQF1aDIK4.lnkGet hashmaliciousRHADAMANTHYSBrowse
                • 198.98.51.198
                test.ps1Get hashmaliciousRHADAMANTHYSBrowse
                • 198.98.51.198
                path.ps1Get hashmaliciousDcRatBrowse
                • 198.98.51.198
                SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                • 199.195.251.28
                SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                • 199.195.251.28
                http://www.auth.coin-cloud.info/Get hashmaliciousUnknownBrowse
                • 172.86.113.248
                http://www.auth.coin-cloud.info/Get hashmaliciousUnknownBrowse
                • 172.86.113.248
                No context
                No context
                No created / dropped files found
                File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                Entropy (8bit):6.074228500499579
                TrID:
                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                File name:JVL2bXW1ch.elf
                File size:58'676 bytes
                MD5:766d13e52ec239528db092c98036cf9e
                SHA1:a4440805279305960c7ce6fada0cab758b21e9fd
                SHA256:1485c22eb03f1e8e50b2ba4d6a5fdfd22cb4214b585e04929e670c4bfdeda864
                SHA512:ba0d91c83947af9abc6b26769a50db480204a1dde52f10478f88e7b1c9b12d9608ab373c03a8f82d995e5a5c323bc753467935efcbea80e6bcc0c3e95d434bdd
                SSDEEP:1536:bxlKAMJTgLd2og1nKJyAL1KWoPWPpDGmf9awven5:bxunu35/oGpim4Gen5
                TLSH:1E434A51F8819623C6D1127BF66E428D3B2213E8E2DBB307AD225F20378686B0D77F55
                File Content Preview:.ELF...a..........(.........4...........4. ...(.....................................................d...8%..........Q.td..................................-...L."....1..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                ELF header

                Class:ELF32
                Data:2's complement, little endian
                Version:1 (current)
                Machine:ARM
                Version Number:0x1
                Type:EXEC (Executable file)
                OS/ABI:ARM - ABI
                ABI Version:0
                Entry Point Address:0x8190
                Flags:0x202
                ELF Header Size:52
                Program Header Offset:52
                Program Header Size:32
                Number of Program Headers:3
                Section Header Offset:58276
                Section Header Size:40
                Number of Section Headers:10
                Header String Table Index:9
                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                NULL0x00x00x00x00x0000
                .initPROGBITS0x80940x940x180x00x6AX004
                .textPROGBITS0x80b00xb00xc4a00x00x6AX0016
                .finiPROGBITS0x145500xc5500x140x00x6AX004
                .rodataPROGBITS0x145640xc5640x197c0x00x2A004
                .ctorsPROGBITS0x1e0000xe0000x80x00x3WA004
                .dtorsPROGBITS0x1e0080xe0080x80x00x3WA004
                .dataPROGBITS0x1e0140xe0140x3500x00x3WA004
                .bssNOBITS0x1e3640xe3640x21d40x00x3WA004
                .shstrtabSTRTAB0x00xe3640x3e0x00x0001
                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                LOAD0x00x80000x80000xdee00xdee06.13270x5R E0x8000.init .text .fini .rodata
                LOAD0xe0000x1e0000x1e0000x3640x25382.62960x6RW 0x8000.ctors .dtors .data .bss
                GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2024-10-12T23:01:08.454710+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344712107.189.4.20158431TCP
                2024-10-12T23:01:14.140908+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344714107.189.4.20158431TCP
                2024-10-12T23:01:25.806007+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344716107.189.4.20158431TCP
                2024-10-12T23:01:28.461864+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344718107.189.4.20158431TCP
                2024-10-12T23:01:32.120608+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344720107.189.4.20158431TCP
                2024-10-12T23:01:38.775362+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344722107.189.4.20158431TCP
                2024-10-12T23:01:46.432690+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344724107.189.4.20158431TCP
                2024-10-12T23:01:52.107698+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344726107.189.4.20158431TCP
                2024-10-12T23:02:03.798990+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344728107.189.4.20158431TCP
                2024-10-12T23:02:13.463765+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344730107.189.4.20158431TCP
                2024-10-12T23:02:18.121949+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344732107.189.4.20158431TCP
                2024-10-12T23:02:21.153657+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344734107.189.4.20158431TCP
                2024-10-12T23:02:28.821634+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344736107.189.4.20158431TCP
                2024-10-12T23:02:37.481453+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344738107.189.4.20158431TCP
                2024-10-12T23:02:44.138224+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344740107.189.4.20158431TCP
                2024-10-12T23:02:52.813085+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344742107.189.4.20158431TCP
                2024-10-12T23:03:01.472423+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344744107.189.4.20158431TCP
                2024-10-12T23:03:07.162485+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344746107.189.4.20158431TCP
                2024-10-12T23:03:09.849426+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344748107.189.4.20158431TCP
                TimestampSource PortDest PortSource IPDest IP
                Oct 12, 2024 23:01:08.447690964 CEST4471258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:08.452610016 CEST5843144712107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:08.452656031 CEST4471258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:08.454710007 CEST4471258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:08.459562063 CEST5843144712107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:10.105041981 CEST5843144712107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:10.109415054 CEST4471258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:10.113548040 CEST4471258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:10.118298054 CEST5843144712107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:14.135159016 CEST4471458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:14.139976978 CEST5843144714107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:14.140049934 CEST4471458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:14.140908003 CEST4471458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:14.145735979 CEST5843144714107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:15.789098978 CEST5843144714107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:15.789335012 CEST4471458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:15.794235945 CEST5843144714107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:25.800002098 CEST4471658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:25.804984093 CEST5843144716107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:25.805064917 CEST4471658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:25.806006908 CEST4471658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:25.810749054 CEST5843144716107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:27.445257902 CEST5843144716107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:27.445817947 CEST4471658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:27.451219082 CEST5843144716107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:28.456240892 CEST4471858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:28.461159945 CEST5843144718107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:28.461226940 CEST4471858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:28.461863995 CEST4471858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:28.466670990 CEST5843144718107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:30.103655100 CEST5843144718107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:30.104132891 CEST4471858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:30.109416008 CEST5843144718107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:32.114455938 CEST4472058431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:32.119402885 CEST5843144720107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:32.119474888 CEST4472058431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:32.120608091 CEST4472058431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:32.126816988 CEST5843144720107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:33.758184910 CEST5843144720107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:33.758470058 CEST4472058431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:33.763340950 CEST5843144720107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:38.769268036 CEST4472258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:38.774169922 CEST5843144722107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:38.774318933 CEST4472258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:38.775362015 CEST4472258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:38.780186892 CEST5843144722107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:40.415930986 CEST5843144722107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:40.416122913 CEST4472258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:40.421401024 CEST5843144722107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:46.426551104 CEST4472458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:46.431372881 CEST5843144724107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:46.431442976 CEST4472458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:46.432689905 CEST4472458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:46.437477112 CEST5843144724107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:48.090709925 CEST5843144724107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:48.091078997 CEST4472458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:48.095938921 CEST5843144724107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:52.101453066 CEST4472658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:52.106307030 CEST5843144726107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:52.106452942 CEST4472658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:52.107697964 CEST4472658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:52.112622976 CEST5843144726107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:53.778215885 CEST5843144726107.189.4.201192.168.2.13
                Oct 12, 2024 23:01:53.778866053 CEST4472658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:01:53.783833027 CEST5843144726107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:03.793040991 CEST4472858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:03.797918081 CEST5843144728107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:03.797972918 CEST4472858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:03.798990011 CEST4472858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:03.803783894 CEST5843144728107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:05.446997881 CEST5843144728107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:05.447571993 CEST4472858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:05.452474117 CEST5843144728107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:13.457941055 CEST4473058431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:13.462892056 CEST5843144730107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:13.462954044 CEST4473058431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:13.463764906 CEST4473058431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:13.468574047 CEST5843144730107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:15.103998899 CEST5843144730107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:15.104396105 CEST4473058431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:15.109221935 CEST5843144730107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:18.115715027 CEST4473258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:18.120553970 CEST5843144732107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:18.120606899 CEST4473258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:18.121948957 CEST4473258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:18.125833988 CEST5843144732107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:18.125916004 CEST4473258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:18.126792908 CEST5843144732107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:18.130785942 CEST5843144732107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:21.146373987 CEST4473458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:21.151942968 CEST5843144734107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:21.152081966 CEST4473458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:21.153656960 CEST4473458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:21.158562899 CEST5843144734107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:22.800190926 CEST5843144734107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:22.800548077 CEST4473458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:22.805517912 CEST5843144734107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:28.814258099 CEST4473658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:28.819869041 CEST5843144736107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:28.819964886 CEST4473658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:28.821634054 CEST4473658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:28.826641083 CEST5843144736107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:30.462995052 CEST5843144736107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:30.463323116 CEST4473658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:30.468303919 CEST5843144736107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:37.474868059 CEST4473858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:37.479696989 CEST5843144738107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:37.479799986 CEST4473858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:37.481452942 CEST4473858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:37.486296892 CEST5843144738107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:39.119107962 CEST5843144738107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:39.119673967 CEST4473858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:39.124742031 CEST5843144738107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:44.132165909 CEST4474058431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:44.137006044 CEST5843144740107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:44.137098074 CEST4474058431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:44.138223886 CEST4474058431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:44.143045902 CEST5843144740107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:45.794951916 CEST5843144740107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:45.795341969 CEST4474058431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:45.800470114 CEST5843144740107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:52.807261944 CEST4474258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:52.812088013 CEST5843144742107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:52.812148094 CEST4474258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:52.813085079 CEST4474258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:52.817981958 CEST5843144742107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:54.447340965 CEST5843144742107.189.4.201192.168.2.13
                Oct 12, 2024 23:02:54.447901011 CEST4474258431192.168.2.13107.189.4.201
                Oct 12, 2024 23:02:54.453588963 CEST5843144742107.189.4.201192.168.2.13
                Oct 12, 2024 23:03:01.464776039 CEST4474458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:03:01.470344067 CEST5843144744107.189.4.201192.168.2.13
                Oct 12, 2024 23:03:01.470608950 CEST4474458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:03:01.472423077 CEST4474458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:03:01.477705002 CEST5843144744107.189.4.201192.168.2.13
                Oct 12, 2024 23:03:03.140695095 CEST5843144744107.189.4.201192.168.2.13
                Oct 12, 2024 23:03:03.141071081 CEST4474458431192.168.2.13107.189.4.201
                Oct 12, 2024 23:03:03.146414042 CEST5843144744107.189.4.201192.168.2.13
                Oct 12, 2024 23:03:07.155505896 CEST4474658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:03:07.160496950 CEST5843144746107.189.4.201192.168.2.13
                Oct 12, 2024 23:03:07.160732985 CEST4474658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:03:07.162484884 CEST4474658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:03:07.167663097 CEST5843144746107.189.4.201192.168.2.13
                Oct 12, 2024 23:03:08.824372053 CEST5843144746107.189.4.201192.168.2.13
                Oct 12, 2024 23:03:08.825145006 CEST4474658431192.168.2.13107.189.4.201
                Oct 12, 2024 23:03:08.830498934 CEST5843144746107.189.4.201192.168.2.13
                Oct 12, 2024 23:03:09.842142105 CEST4474858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:03:09.847496986 CEST5843144748107.189.4.201192.168.2.13
                Oct 12, 2024 23:03:09.847609043 CEST4474858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:03:09.849426031 CEST4474858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:03:09.854407072 CEST5843144748107.189.4.201192.168.2.13
                Oct 12, 2024 23:03:11.530927896 CEST5843144748107.189.4.201192.168.2.13
                Oct 12, 2024 23:03:11.531831980 CEST4474858431192.168.2.13107.189.4.201
                Oct 12, 2024 23:03:11.537348032 CEST5843144748107.189.4.201192.168.2.13
                TimestampSource PortDest PortSource IPDest IP
                Oct 12, 2024 23:01:08.287813902 CEST5823753192.168.2.138.8.8.8
                Oct 12, 2024 23:01:08.446027040 CEST53582378.8.8.8192.168.2.13
                Oct 12, 2024 23:01:14.127722025 CEST5160253192.168.2.138.8.8.8
                Oct 12, 2024 23:01:14.134630919 CEST53516028.8.8.8192.168.2.13
                Oct 12, 2024 23:01:25.792181969 CEST5008653192.168.2.138.8.8.8
                Oct 12, 2024 23:01:25.799350977 CEST53500868.8.8.8192.168.2.13
                Oct 12, 2024 23:01:28.448400021 CEST5656853192.168.2.138.8.8.8
                Oct 12, 2024 23:01:28.455816984 CEST53565688.8.8.8192.168.2.13
                Oct 12, 2024 23:01:32.107034922 CEST5044053192.168.2.138.8.8.8
                Oct 12, 2024 23:01:32.113754988 CEST53504408.8.8.8192.168.2.13
                Oct 12, 2024 23:01:38.760715008 CEST4263253192.168.2.138.8.8.8
                Oct 12, 2024 23:01:38.768155098 CEST53426328.8.8.8192.168.2.13
                Oct 12, 2024 23:01:46.419697046 CEST4902853192.168.2.138.8.8.8
                Oct 12, 2024 23:01:46.425765038 CEST53490288.8.8.8192.168.2.13
                Oct 12, 2024 23:01:52.093771935 CEST5279953192.168.2.138.8.8.8
                Oct 12, 2024 23:01:52.100806952 CEST53527998.8.8.8192.168.2.13
                Oct 12, 2024 23:02:03.784280062 CEST5383353192.168.2.138.8.8.8
                Oct 12, 2024 23:02:03.791680098 CEST53538338.8.8.8192.168.2.13
                Oct 12, 2024 23:02:13.450175047 CEST5230053192.168.2.138.8.8.8
                Oct 12, 2024 23:02:13.457483053 CEST53523008.8.8.8192.168.2.13
                Oct 12, 2024 23:02:18.107960939 CEST5389253192.168.2.138.8.8.8
                Oct 12, 2024 23:02:18.115024090 CEST53538928.8.8.8192.168.2.13
                Oct 12, 2024 23:02:21.129661083 CEST5454153192.168.2.138.8.8.8
                Oct 12, 2024 23:02:21.145186901 CEST53545418.8.8.8192.168.2.13
                Oct 12, 2024 23:02:28.805218935 CEST4145053192.168.2.138.8.8.8
                Oct 12, 2024 23:02:28.813235998 CEST53414508.8.8.8192.168.2.13
                Oct 12, 2024 23:02:37.467117071 CEST5126753192.168.2.138.8.8.8
                Oct 12, 2024 23:02:37.474037886 CEST53512678.8.8.8192.168.2.13
                Oct 12, 2024 23:02:44.123907089 CEST3593653192.168.2.138.8.8.8
                Oct 12, 2024 23:02:44.131458044 CEST53359368.8.8.8192.168.2.13
                Oct 12, 2024 23:02:52.799885035 CEST3997753192.168.2.138.8.8.8
                Oct 12, 2024 23:02:52.806592941 CEST53399778.8.8.8192.168.2.13
                Oct 12, 2024 23:03:01.454943895 CEST5496953192.168.2.138.8.8.8
                Oct 12, 2024 23:03:01.462950945 CEST53549698.8.8.8192.168.2.13
                Oct 12, 2024 23:03:07.146104097 CEST4814653192.168.2.138.8.8.8
                Oct 12, 2024 23:03:07.153480053 CEST53481468.8.8.8192.168.2.13
                Oct 12, 2024 23:03:09.832556963 CEST4937453192.168.2.138.8.8.8
                Oct 12, 2024 23:03:09.840336084 CEST53493748.8.8.8192.168.2.13
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Oct 12, 2024 23:01:08.287813902 CEST192.168.2.138.8.8.80xb048Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:14.127722025 CEST192.168.2.138.8.8.80x214fStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:25.792181969 CEST192.168.2.138.8.8.80xe00Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:28.448400021 CEST192.168.2.138.8.8.80xe7bcStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:32.107034922 CEST192.168.2.138.8.8.80x1b04Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:38.760715008 CEST192.168.2.138.8.8.80x57d1Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:46.419697046 CEST192.168.2.138.8.8.80x9a66Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:52.093771935 CEST192.168.2.138.8.8.80x18ceStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:03.784280062 CEST192.168.2.138.8.8.80x2818Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:13.450175047 CEST192.168.2.138.8.8.80x4eb0Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:18.107960939 CEST192.168.2.138.8.8.80xe95eStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:21.129661083 CEST192.168.2.138.8.8.80x2949Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:28.805218935 CEST192.168.2.138.8.8.80xbb3dStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:37.467117071 CEST192.168.2.138.8.8.80xd845Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:44.123907089 CEST192.168.2.138.8.8.80x7d91Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:52.799885035 CEST192.168.2.138.8.8.80xb504Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:03:01.454943895 CEST192.168.2.138.8.8.80x1d1dStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:03:07.146104097 CEST192.168.2.138.8.8.80x17d3Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                Oct 12, 2024 23:03:09.832556963 CEST192.168.2.138.8.8.80x1237Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Oct 12, 2024 23:01:08.446027040 CEST8.8.8.8192.168.2.130xb048No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:14.134630919 CEST8.8.8.8192.168.2.130x214fNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:25.799350977 CEST8.8.8.8192.168.2.130xe00No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:28.455816984 CEST8.8.8.8192.168.2.130xe7bcNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:32.113754988 CEST8.8.8.8192.168.2.130x1b04No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:38.768155098 CEST8.8.8.8192.168.2.130x57d1No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:46.425765038 CEST8.8.8.8192.168.2.130x9a66No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:01:52.100806952 CEST8.8.8.8192.168.2.130x18ceNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:03.791680098 CEST8.8.8.8192.168.2.130x2818No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:13.457483053 CEST8.8.8.8192.168.2.130x4eb0No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:18.115024090 CEST8.8.8.8192.168.2.130xe95eNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:21.145186901 CEST8.8.8.8192.168.2.130x2949No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:28.813235998 CEST8.8.8.8192.168.2.130xbb3dNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:37.474037886 CEST8.8.8.8192.168.2.130xd845No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:44.131458044 CEST8.8.8.8192.168.2.130x7d91No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:02:52.806592941 CEST8.8.8.8192.168.2.130xb504No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:03:01.462950945 CEST8.8.8.8192.168.2.130x1d1dNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:03:07.153480053 CEST8.8.8.8192.168.2.130x17d3No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                Oct 12, 2024 23:03:09.840336084 CEST8.8.8.8192.168.2.130x1237No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false

                System Behavior

                Start time (UTC):21:01:07
                Start date (UTC):12/10/2024
                Path:/tmp/JVL2bXW1ch.elf
                Arguments:/tmp/JVL2bXW1ch.elf
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):21:01:07
                Start date (UTC):12/10/2024
                Path:/tmp/JVL2bXW1ch.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):21:01:07
                Start date (UTC):12/10/2024
                Path:/tmp/JVL2bXW1ch.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):21:01:07
                Start date (UTC):12/10/2024
                Path:/tmp/JVL2bXW1ch.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):21:01:07
                Start date (UTC):12/10/2024
                Path:/tmp/JVL2bXW1ch.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1