Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
3qI83sDZlt.elf

Overview

General Information

Sample name:3qI83sDZlt.elf
renamed because original name is a hash value
Original sample name:3cd0d2b3c9359e95d6522fb18508ec5f.elf
Analysis ID:1532763
MD5:3cd0d2b3c9359e95d6522fb18508ec5f
SHA1:f28ee5961f157611852e1f58f199256a1ac08e97
SHA256:e094fa55e07372a8937b51387f98b3a995980d4727a78480203ed31f783d1cf4
Tags:32armelfmirai
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532763
Start date and time:2024-10-13 21:54:32 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:3qI83sDZlt.elf
renamed because original name is a hash value
Original Sample Name:3cd0d2b3c9359e95d6522fb18508ec5f.elf
Detection:MAL
Classification:mal60.evad.linELF@0/0@0/0
  • VT rate limit hit for: 3qI83sDZlt.elf
Command:/tmp/3qI83sDZlt.elf
PID:5434
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • cleanup
SourceRuleDescriptionAuthorStrings
5438.1.00007f88d4017000.00007f88d402f000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x15320:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15334:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15348:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1535c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15370:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15384:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15398:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15410:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15424:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15438:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1544c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15460:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15474:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15488:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1549c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x154b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
5434.1.00007f88d4017000.00007f88d402f000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x15320:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15334:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15348:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1535c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15370:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15384:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15398:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15410:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15424:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15438:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1544c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15460:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15474:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15488:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1549c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x154b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
5444.1.00007f88d4017000.00007f88d402f000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x15320:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15334:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15348:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1535c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15370:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15384:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15398:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15410:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15424:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15438:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1544c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15460:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15474:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15488:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1549c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x154b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
5436.1.00007f88d4017000.00007f88d402f000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x15320:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15334:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15348:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1535c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15370:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15384:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15398:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x153fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15410:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15424:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15438:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1544c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15460:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15474:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x15488:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1549c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x154b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
Process Memory Space: 3qI83sDZlt.elf PID: 5434Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0xc2:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xd6:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xea:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0xfe:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x112:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x126:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x13a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x14e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x162:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x176:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x18a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x19e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1b2:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1c6:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1da:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1ee:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x202:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x216:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x22a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x23e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x252:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
Click to see the 3 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 3qI83sDZlt.elfReversingLabs: Detection: 36%
Source: global trafficTCP traffic: 192.168.2.13:37462 -> 45.131.65.138:3778
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: 3qI83sDZlt.elfString found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: 5438.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5434.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5444.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5436.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5434, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5436, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5438, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5444, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: LOAD without section mappingsProgram segment: 0x8000
Source: 5438.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5434.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5444.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5436.1.00007f88d4017000.00007f88d402f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5434, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5436, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5438, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: 3qI83sDZlt.elf PID: 5444, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: classification engineClassification label: mal60.evad.linELF@0/0@0/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/5265/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/230/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/5381/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/110/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/231/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/111/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/232/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/112/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/233/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/113/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/234/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/114/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/235/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/115/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/236/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/116/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/237/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/117/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/238/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/118/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/239/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/119/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/914/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/10/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/917/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/3758/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/11/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/12/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/13/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/14/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/15/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/16/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/17/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/18/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/19/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/240/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/3095/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/120/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/241/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/121/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/242/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/1/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/122/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/243/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/2/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/123/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/244/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/3/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/124/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/245/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/1588/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/125/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/4/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/246/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/126/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/5/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/247/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/127/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/6/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/248/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/128/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/7/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/249/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/129/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/8/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/800/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/9/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/1906/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/3642/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/802/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/803/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/20/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/21/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/22/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/23/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/24/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/25/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/26/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/27/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/28/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/29/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/3420/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/1482/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/490/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/1480/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/250/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/371/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/130/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/251/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/131/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/252/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/132/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/253/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/254/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/1238/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/134/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/255/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/256/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/257/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/378/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/3413/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/258/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/259/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/1475/statusJump to behavior
Source: /tmp/3qI83sDZlt.elf (PID: 5434)File opened: /proc/936/statusJump to behavior
Source: 3qI83sDZlt.elfSubmission file: segment LOAD with 7.9742 entropy (max. 8.0)
Source: /tmp/3qI83sDZlt.elf (PID: 5434)Queries kernel information via 'uname': Jump to behavior
Source: 3qI83sDZlt.elf, 5434.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp, 3qI83sDZlt.elf, 5436.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp, 3qI83sDZlt.elf, 5438.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp, 3qI83sDZlt.elf, 5444.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/3qI83sDZlt.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/3qI83sDZlt.elf
Source: 3qI83sDZlt.elf, 5434.1.000055e7d7594000.000055e7d7782000.rw-.sdmp, 3qI83sDZlt.elf, 5436.1.000055e7d7594000.000055e7d7782000.rw-.sdmp, 3qI83sDZlt.elf, 5438.1.000055e7d7594000.000055e7d7782000.rw-.sdmp, 3qI83sDZlt.elf, 5444.1.000055e7d7594000.000055e7d7782000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: 3qI83sDZlt.elf, 5434.1.000055e7d7594000.000055e7d7782000.rw-.sdmp, 3qI83sDZlt.elf, 5436.1.000055e7d7594000.000055e7d7782000.rw-.sdmp, 3qI83sDZlt.elf, 5438.1.000055e7d7594000.000055e7d7782000.rw-.sdmp, 3qI83sDZlt.elf, 5444.1.000055e7d7594000.000055e7d7782000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: 3qI83sDZlt.elf, 5434.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp, 3qI83sDZlt.elf, 5436.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp, 3qI83sDZlt.elf, 5438.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmp, 3qI83sDZlt.elf, 5444.1.00007ffdfb7f1000.00007ffdfb812000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Obfuscated Files or Information
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532763 Sample: 3qI83sDZlt.elf Startdate: 13/10/2024 Architecture: LINUX Score: 60 20 45.131.65.138, 37462, 37464, 37466 LOVESERVERSGB Germany 2->20 22 Malicious sample detected (through community Yara rule) 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Sample is packed with UPX 2->26 8 3qI83sDZlt.elf 2->8         started        signatures3 process4 process5 10 3qI83sDZlt.elf 8->10         started        12 3qI83sDZlt.elf 8->12         started        14 3qI83sDZlt.elf 8->14         started        process6 16 3qI83sDZlt.elf 10->16         started        18 3qI83sDZlt.elf 10->18         started       
SourceDetectionScannerLabelLink
3qI83sDZlt.elf37%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.net3qI83sDZlt.elftrue
  • URL Reputation: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
45.131.65.138
unknownGermany
47987LOVESERVERSGBfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
45.131.65.138Ds02VJxaG4.elfGet hashmaliciousUnknownBrowse
    tc2iriCZdi.elfGet hashmaliciousUnknownBrowse
      6ryuhM7ras.elfGet hashmaliciousUnknownBrowse
        LM762mO6Jt.elfGet hashmaliciousUnknownBrowse
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          LOVESERVERSGBDs02VJxaG4.elfGet hashmaliciousUnknownBrowse
          • 45.131.65.138
          tc2iriCZdi.elfGet hashmaliciousUnknownBrowse
          • 45.131.65.138
          6ryuhM7ras.elfGet hashmaliciousUnknownBrowse
          • 45.131.65.138
          LM762mO6Jt.elfGet hashmaliciousUnknownBrowse
          • 45.131.65.138
          M88FIQFvyo.elfGet hashmaliciousMiraiBrowse
          • 45.150.101.154
          i7b3uBlM8k.elfGet hashmaliciousMiraiBrowse
          • 45.150.101.181
          TV7RLVOmvl.elfGet hashmaliciousMiraiBrowse
          • 45.150.101.140
          dDPKtLvVp6.elfGet hashmaliciousMirai, MoobotBrowse
          • 85.9.214.159
          yCUczQYIGe.elfGet hashmaliciousMiraiBrowse
          • 45.150.101.148
          a75e3f3e506051b9e4313a407c2a993f9d662a142f2ec.exeGet hashmaliciousRHADAMANTHYS, SmokeLoader, Stealc, VidarBrowse
          • 45.131.66.61
          No context
          No context
          No created / dropped files found
          File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (GNU/Linux), statically linked, no section header
          Entropy (8bit):7.972545551116009
          TrID:
          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
          File name:3qI83sDZlt.elf
          File size:44'600 bytes
          MD5:3cd0d2b3c9359e95d6522fb18508ec5f
          SHA1:f28ee5961f157611852e1f58f199256a1ac08e97
          SHA256:e094fa55e07372a8937b51387f98b3a995980d4727a78480203ed31f783d1cf4
          SHA512:8f9a0edc316c8820ead01be527f8910d9b3546eb1331ca323455e49734ff05ea9994f3912effd7e2a31cb89670191624e8928bc4ffbe3bdd196cab062b493741
          SSDEEP:768:oBZOKj8x/QSQ3y/4qFTOdeoJWBhdYnjWcBWDW4s5GyZDa6XXzeYUO9q3UELA:gXwQSYPqFHI8rOjBn4+9DXzetLA
          TLSH:CD13F191CF067EC3DD626E33FFA899CB431C4AE6C27B3613BA2846B85993640D5D4483
          File Content Preview:.ELF..............(.........4...........4. ...(.........................................H...H...H...................Q.td...............................OUPX!...................._..........?.E.h;....#..$.......L..T.|..r.F..ZS..n.8.I+.e......rQN..D....I.:#/.

          ELF header

          Class:ELF32
          Data:2's complement, little endian
          Version:1 (current)
          Machine:ARM
          Version Number:0x1
          Type:EXEC (Executable file)
          OS/ABI:UNIX - Linux
          ABI Version:0
          Entry Point Address:0x11b00
          Flags:0x4000002
          ELF Header Size:52
          Program Header Offset:52
          Program Header Size:32
          Number of Program Headers:3
          Section Header Offset:0
          Section Header Size:40
          Number of Section Headers:0
          Header String Table Index:0
          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
          LOAD0x00x80000x80000xaced0xaced7.97420x5R E0x8000
          LOAD0xb480x20b480x20b480x00x00.00000x6RW 0x8000
          GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
          TimestampSource PortDest PortSource IPDest IP
          Oct 13, 2024 21:55:15.485547066 CEST374623778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:15.490813017 CEST37783746245.131.65.138192.168.2.13
          Oct 13, 2024 21:55:15.490876913 CEST374623778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:15.525507927 CEST374623778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:15.530415058 CEST37783746245.131.65.138192.168.2.13
          Oct 13, 2024 21:55:15.530463934 CEST374623778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:15.535326958 CEST37783746245.131.65.138192.168.2.13
          Oct 13, 2024 21:55:16.116297007 CEST37783746245.131.65.138192.168.2.13
          Oct 13, 2024 21:55:16.116358995 CEST374623778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:16.116607904 CEST374623778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:16.117328882 CEST374643778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:16.122345924 CEST37783746445.131.65.138192.168.2.13
          Oct 13, 2024 21:55:16.122399092 CEST374643778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:16.125611067 CEST374643778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:16.130568027 CEST37783746445.131.65.138192.168.2.13
          Oct 13, 2024 21:55:16.130605936 CEST374643778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:16.135744095 CEST37783746445.131.65.138192.168.2.13
          Oct 13, 2024 21:55:21.336725950 CEST374663778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:21.341828108 CEST37783746645.131.65.138192.168.2.13
          Oct 13, 2024 21:55:21.341933012 CEST374663778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:21.403281927 CEST374663778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:21.408349037 CEST37783746645.131.65.138192.168.2.13
          Oct 13, 2024 21:55:21.408412933 CEST374663778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:21.413362980 CEST37783746645.131.65.138192.168.2.13
          Oct 13, 2024 21:55:26.135783911 CEST374643778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:26.141206980 CEST37783746445.131.65.138192.168.2.13
          Oct 13, 2024 21:55:26.321006060 CEST37783746445.131.65.138192.168.2.13
          Oct 13, 2024 21:55:26.321099043 CEST374643778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:31.413942099 CEST374663778192.168.2.1345.131.65.138
          Oct 13, 2024 21:55:31.419461012 CEST37783746645.131.65.138192.168.2.13
          Oct 13, 2024 21:55:31.603173018 CEST37783746645.131.65.138192.168.2.13
          Oct 13, 2024 21:55:31.603413105 CEST374663778192.168.2.1345.131.65.138
          Oct 13, 2024 21:56:26.380125999 CEST374643778192.168.2.1345.131.65.138
          Oct 13, 2024 21:56:26.386118889 CEST37783746445.131.65.138192.168.2.13
          Oct 13, 2024 21:56:26.565454960 CEST37783746445.131.65.138192.168.2.13
          Oct 13, 2024 21:56:26.566020966 CEST374643778192.168.2.1345.131.65.138
          Oct 13, 2024 21:56:31.664973021 CEST374663778192.168.2.1345.131.65.138
          Oct 13, 2024 21:56:31.670865059 CEST37783746645.131.65.138192.168.2.13
          Oct 13, 2024 21:56:31.861473083 CEST37783746645.131.65.138192.168.2.13
          Oct 13, 2024 21:56:31.862113953 CEST374663778192.168.2.1345.131.65.138

          System Behavior

          Start time (UTC):19:55:14
          Start date (UTC):13/10/2024
          Path:/tmp/3qI83sDZlt.elf
          Arguments:/tmp/3qI83sDZlt.elf
          File size:4956856 bytes
          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

          Start time (UTC):19:55:14
          Start date (UTC):13/10/2024
          Path:/tmp/3qI83sDZlt.elf
          Arguments:-
          File size:4956856 bytes
          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

          Start time (UTC):19:55:14
          Start date (UTC):13/10/2024
          Path:/tmp/3qI83sDZlt.elf
          Arguments:-
          File size:4956856 bytes
          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

          Start time (UTC):19:55:14
          Start date (UTC):13/10/2024
          Path:/tmp/3qI83sDZlt.elf
          Arguments:-
          File size:4956856 bytes
          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

          Start time (UTC):19:55:20
          Start date (UTC):13/10/2024
          Path:/tmp/3qI83sDZlt.elf
          Arguments:-
          File size:4956856 bytes
          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

          Start time (UTC):19:55:20
          Start date (UTC):13/10/2024
          Path:/tmp/3qI83sDZlt.elf
          Arguments:-
          File size:4956856 bytes
          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1