Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
ThYeAADbuc.elf

Overview

General Information

Sample name:ThYeAADbuc.elf
renamed because original name is a hash value
Original sample name:a460bd5739f2ed553acdbb22a85b813d.elf
Analysis ID:1532766
MD5:a460bd5739f2ed553acdbb22a85b813d
SHA1:54fb2f10e46941231021b954322848cc221de87b
SHA256:ec1b4bd25c941959d242b33e9ea0948b98c4a1b34d1e17590604ab36a9bfdda8
Tags:32armelfmirai
Infos:

Detection

Mirai
Score:68
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample is packed with UPX
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532766
Start date and time:2024-10-13 21:58:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ThYeAADbuc.elf
renamed because original name is a hash value
Original Sample Name:a460bd5739f2ed553acdbb22a85b813d.elf
Detection:MAL
Classification:mal68.troj.evad.linELF@0/0@0/0
  • VT rate limit hit for: ThYeAADbuc.elf
Command:/tmp/ThYeAADbuc.elf
PID:5488
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
5488.1.00007f0a18017000.00007f0a1802c000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    5488.1.00007f0a18017000.00007f0a1802c000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0x11f2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11f40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11f54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11f68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11f7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11f90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11fa4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11fb8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11fcc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11fe0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11ff4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x12008:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1201c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x12030:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x12044:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x12058:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1206c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x12080:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x12094:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x120a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x120bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    5490.1.00007f0a18017000.00007f0a1802c000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5490.1.00007f0a18017000.00007f0a1802c000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x11f2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11f40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11f54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11f68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11f7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11f90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11fa4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11fb8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11fcc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11fe0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x11ff4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12008:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1201c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12030:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12044:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12058:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1206c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12080:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12094:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x120a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x120bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5501.1.00007f0a18017000.00007f0a1802c000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        Click to see the 11 entries
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: ThYeAADbuc.elfReversingLabs: Detection: 31%
        Source: global trafficTCP traffic: 192.168.2.14:55972 -> 45.131.65.138:3778
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
        Source: ThYeAADbuc.elfString found in binary or memory: http://upx.sf.net

        System Summary

        barindex
        Source: 5488.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: 5490.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: 5501.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: 5492.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: Process Memory Space: ThYeAADbuc.elf PID: 5488, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: Process Memory Space: ThYeAADbuc.elf PID: 5490, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: Process Memory Space: ThYeAADbuc.elf PID: 5492, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: Process Memory Space: ThYeAADbuc.elf PID: 5501, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: LOAD without section mappingsProgram segment: 0x8000
        Source: 5488.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: 5490.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: 5501.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: 5492.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: Process Memory Space: ThYeAADbuc.elf PID: 5488, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: Process Memory Space: ThYeAADbuc.elf PID: 5490, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: Process Memory Space: ThYeAADbuc.elf PID: 5492, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: Process Memory Space: ThYeAADbuc.elf PID: 5501, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: classification engineClassification label: mal68.troj.evad.linELF@0/0@0/0

        Data Obfuscation

        barindex
        Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
        Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
        Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/3760/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/3761/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/1583/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/2672/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/110/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/3638/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/3759/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/111/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/112/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/113/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/234/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/1577/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/114/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/235/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/115/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/116/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/117/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/118/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/119/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/10/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/917/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/3758/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/11/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/12/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/13/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/14/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/15/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/16/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/17/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/18/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/19/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/1593/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/240/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/120/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/3094/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/121/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/242/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/3406/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/1/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/122/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/243/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/2/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/123/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/244/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/1589/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/3/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/124/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/245/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/1588/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/125/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/4/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/246/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/3402/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/126/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/5/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/247/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/127/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/6/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/248/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/128/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/7/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/249/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/8/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/129/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/800/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/9/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/801/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/803/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/20/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/806/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/21/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/807/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/928/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/22/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/23/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/24/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/25/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/26/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/27/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/28/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/29/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/3420/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/490/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/250/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/130/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/251/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/131/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/252/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/132/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/253/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/254/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/255/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/135/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/256/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/1599/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/257/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/378/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/258/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/3412/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/259/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/30/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/35/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/1371/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/260/statusJump to behavior
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)File opened: /proc/261/statusJump to behavior
        Source: ThYeAADbuc.elfSubmission file: segment LOAD with 7.971 entropy (max. 8.0)
        Source: /tmp/ThYeAADbuc.elf (PID: 5488)Queries kernel information via 'uname': Jump to behavior
        Source: ThYeAADbuc.elf, 5488.1.00005565980ed000.000055659829d000.rw-.sdmp, ThYeAADbuc.elf, 5490.1.00005565980ed000.000055659827b000.rw-.sdmp, ThYeAADbuc.elf, 5492.1.00005565980ed000.000055659827b000.rw-.sdmp, ThYeAADbuc.elf, 5501.1.00005565980ed000.000055659829d000.rw-.sdmpBinary or memory string: eU!/etc/qemu-binfmt/arm
        Source: ThYeAADbuc.elf, 5488.1.00005565980ed000.000055659829d000.rw-.sdmp, ThYeAADbuc.elf, 5490.1.00005565980ed000.000055659827b000.rw-.sdmp, ThYeAADbuc.elf, 5492.1.00005565980ed000.000055659827b000.rw-.sdmp, ThYeAADbuc.elf, 5501.1.00005565980ed000.000055659829d000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
        Source: ThYeAADbuc.elf, 5488.1.00007ffe053a2000.00007ffe053c3000.rw-.sdmp, ThYeAADbuc.elf, 5490.1.00007ffe053a2000.00007ffe053c3000.rw-.sdmp, ThYeAADbuc.elf, 5492.1.00007ffe053a2000.00007ffe053c3000.rw-.sdmp, ThYeAADbuc.elf, 5501.1.00007ffe053a2000.00007ffe053c3000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
        Source: ThYeAADbuc.elf, 5488.1.00007ffe053a2000.00007ffe053c3000.rw-.sdmp, ThYeAADbuc.elf, 5490.1.00007ffe053a2000.00007ffe053c3000.rw-.sdmp, ThYeAADbuc.elf, 5492.1.00007ffe053a2000.00007ffe053c3000.rw-.sdmp, ThYeAADbuc.elf, 5501.1.00007ffe053a2000.00007ffe053c3000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/ThYeAADbuc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/ThYeAADbuc.elf

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 5488.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5490.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5501.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5492.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ThYeAADbuc.elf PID: 5488, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: ThYeAADbuc.elf PID: 5490, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: ThYeAADbuc.elf PID: 5492, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: ThYeAADbuc.elf PID: 5501, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 5488.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5490.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5501.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5492.1.00007f0a18017000.00007f0a1802c000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ThYeAADbuc.elf PID: 5488, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: ThYeAADbuc.elf PID: 5490, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: ThYeAADbuc.elf PID: 5492, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: ThYeAADbuc.elf PID: 5501, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
        Obfuscated Files or Information
        1
        OS Credential Dumping
        11
        Security Software Discovery
        Remote ServicesData from Local System1
        Non-Standard Port
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532766 Sample: ThYeAADbuc.elf Startdate: 13/10/2024 Architecture: LINUX Score: 68 20 45.131.65.138, 3778, 55972, 55974 LOVESERVERSGB Germany 2->20 22 Malicious sample detected (through community Yara rule) 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Yara detected Mirai 2->26 28 Sample is packed with UPX 2->28 8 ThYeAADbuc.elf 2->8         started        signatures3 process4 process5 10 ThYeAADbuc.elf 8->10         started        12 ThYeAADbuc.elf 8->12         started        14 ThYeAADbuc.elf 8->14         started        process6 16 ThYeAADbuc.elf 10->16         started        18 ThYeAADbuc.elf 10->18         started       

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        ThYeAADbuc.elf32%ReversingLabsLinux.Trojan.Mirai
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://upx.sf.net0%URL Reputationsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://upx.sf.netThYeAADbuc.elftrue
        • URL Reputation: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        45.131.65.138
        unknownGermany
        47987LOVESERVERSGBfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        45.131.65.1383MKM0SWv7x.elfGet hashmaliciousMiraiBrowse
          3qI83sDZlt.elfGet hashmaliciousUnknownBrowse
            Ds02VJxaG4.elfGet hashmaliciousUnknownBrowse
              tc2iriCZdi.elfGet hashmaliciousUnknownBrowse
                6ryuhM7ras.elfGet hashmaliciousUnknownBrowse
                  LM762mO6Jt.elfGet hashmaliciousUnknownBrowse
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    LOVESERVERSGB3MKM0SWv7x.elfGet hashmaliciousMiraiBrowse
                    • 45.131.65.138
                    3qI83sDZlt.elfGet hashmaliciousUnknownBrowse
                    • 45.131.65.138
                    Ds02VJxaG4.elfGet hashmaliciousUnknownBrowse
                    • 45.131.65.138
                    tc2iriCZdi.elfGet hashmaliciousUnknownBrowse
                    • 45.131.65.138
                    6ryuhM7ras.elfGet hashmaliciousUnknownBrowse
                    • 45.131.65.138
                    LM762mO6Jt.elfGet hashmaliciousUnknownBrowse
                    • 45.131.65.138
                    M88FIQFvyo.elfGet hashmaliciousMiraiBrowse
                    • 45.150.101.154
                    i7b3uBlM8k.elfGet hashmaliciousMiraiBrowse
                    • 45.150.101.181
                    TV7RLVOmvl.elfGet hashmaliciousMiraiBrowse
                    • 45.150.101.140
                    dDPKtLvVp6.elfGet hashmaliciousMirai, MoobotBrowse
                    • 85.9.214.159
                    No context
                    No context
                    No created / dropped files found
                    File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, no section header
                    Entropy (8bit):7.969123478751464
                    TrID:
                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                    File name:ThYeAADbuc.elf
                    File size:39'288 bytes
                    MD5:a460bd5739f2ed553acdbb22a85b813d
                    SHA1:54fb2f10e46941231021b954322848cc221de87b
                    SHA256:ec1b4bd25c941959d242b33e9ea0948b98c4a1b34d1e17590604ab36a9bfdda8
                    SHA512:16b1103e96afd2a6f24c4bcadcb0f9967eab6bc9fdf9d88d0a172e853535a47505db7cac3d3bf5150bea843326ed6b76422d412764d7ad8bc9aa9179adc9e377
                    SSDEEP:768:Hu7RATMUu4f7RDdP6NM8I52VNbvdFsDJ4pBTps3UozOs:ARAC4fNDdP6N5pd+DyT0zOs
                    TLSH:0E03F296789ED512DC608534FE3F14137B27BBBCC1E77128F1160A39B9E1A06362CB66
                    File Content Preview:.ELF...a..........(.........4...........4. ...(.....................W...W................{...{...{..................Q.td............................s.y.UPX!.........T...T......S..........?.E.h;.}...^..........fK..z..,vU...].XLU..0.)..0(7n..V5.'...,;.q9...

                    ELF header

                    Class:ELF32
                    Data:2's complement, little endian
                    Version:1 (current)
                    Machine:ARM
                    Version Number:0x1
                    Type:EXEC (Executable file)
                    OS/ABI:ARM - ABI
                    ABI Version:0
                    Entry Point Address:0x106a8
                    Flags:0x202
                    ELF Header Size:52
                    Program Header Offset:52
                    Program Header Size:32
                    Number of Program Headers:3
                    Section Header Offset:0
                    Section Header Size:40
                    Number of Section Headers:0
                    Header String Table Index:0
                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                    LOAD0x00x80000x80000x98570x98577.97100x5R E0x8000
                    LOAD0x7bc80x27bc80x27bc80x00x00.00000x6RW 0x8000
                    GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 13, 2024 21:59:04.656476021 CEST559723778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:04.662080050 CEST37785597245.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:04.662174940 CEST559723778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:04.703934908 CEST559723778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:04.708873987 CEST37785597245.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:04.708918095 CEST559723778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:04.713805914 CEST37785597245.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:05.289695978 CEST37785597245.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:05.290020943 CEST559723778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:05.290020943 CEST559723778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:05.290554047 CEST559743778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:05.295378923 CEST37785597445.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:05.295449972 CEST559743778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:05.296641111 CEST559743778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:05.301606894 CEST37785597445.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:05.301671028 CEST559743778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:05.306544065 CEST37785597445.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:05.931098938 CEST37785597445.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:05.931430101 CEST559743778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:05.931431055 CEST559743778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:05.933255911 CEST559763778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:05.938328028 CEST37785597645.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:05.938587904 CEST559763778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:05.940587997 CEST559763778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:05.945806980 CEST37785597645.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:05.946113110 CEST559763778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:05.951525927 CEST37785597645.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:06.580141068 CEST37785597645.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:06.584388971 CEST559763778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:06.584388971 CEST559763778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:06.590595007 CEST559783778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:06.595566988 CEST37785597845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:06.595644951 CEST559783778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:06.599762917 CEST559783778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:06.604607105 CEST37785597845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:06.604671001 CEST559783778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:06.609822989 CEST37785597845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:10.485117912 CEST559803778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:10.490590096 CEST37785598045.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:10.490724087 CEST559803778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:10.549201965 CEST559803778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:10.554215908 CEST37785598045.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:10.554411888 CEST559803778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:10.559268951 CEST37785598045.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:11.121119976 CEST37785598045.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:11.124402046 CEST559803778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:11.124402046 CEST559803778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:11.129391909 CEST559823778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:11.134732962 CEST37785598245.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:11.134917974 CEST559823778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:11.146778107 CEST559823778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:11.152410984 CEST37785598245.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:11.152493000 CEST559823778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:11.157767057 CEST37785598245.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:11.879493952 CEST37785598245.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:11.879695892 CEST559823778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:11.879744053 CEST559823778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:11.888257027 CEST559843778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:11.893162966 CEST37785598445.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:11.893223047 CEST559843778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:11.900917053 CEST559843778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:11.905726910 CEST37785598445.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:11.905782938 CEST559843778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:11.910650969 CEST37785598445.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:12.664823055 CEST37785598445.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:12.665194035 CEST559843778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:12.665280104 CEST559843778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:12.666434050 CEST559863778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:12.671444893 CEST37785598645.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:12.671624899 CEST559863778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:12.672445059 CEST559863778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:12.677336931 CEST37785598645.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:12.677396059 CEST559863778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:12.682589054 CEST37785598645.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:13.311444998 CEST37785598645.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:13.311670065 CEST559863778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:13.311671019 CEST559863778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:13.312258005 CEST559883778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:13.317142010 CEST37785598845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:13.317456007 CEST559883778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:13.318176985 CEST559883778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:13.323205948 CEST37785598845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:13.323457003 CEST559883778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:13.328735113 CEST37785598845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:14.008251905 CEST37785598845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:14.008588076 CEST559883778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:14.008656979 CEST559883778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:14.009440899 CEST559903778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:14.014380932 CEST37785599045.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:14.014457941 CEST559903778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:14.015207052 CEST559903778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:14.019962072 CEST37785599045.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:14.020054102 CEST559903778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:14.025254011 CEST37785599045.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:14.652564049 CEST37785599045.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:14.653027058 CEST559903778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:14.653027058 CEST559903778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:14.653639078 CEST559923778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:14.659106970 CEST37785599245.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:14.659214020 CEST559923778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:14.659934044 CEST559923778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:14.664871931 CEST37785599245.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:14.664932966 CEST559923778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:14.669792891 CEST37785599245.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:15.298476934 CEST37785599245.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:15.298774958 CEST559923778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:15.298774958 CEST559923778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:15.299355030 CEST559943778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:15.304493904 CEST37785599445.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:15.304635048 CEST559943778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:15.305475950 CEST559943778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:15.321641922 CEST37785599445.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:15.321701050 CEST559943778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:15.327097893 CEST37785599445.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:15.985877037 CEST37785599445.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:15.986253977 CEST559943778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:15.986253977 CEST559943778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:15.986839056 CEST559963778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:15.991681099 CEST37785599645.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:15.991801023 CEST559963778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:15.992484093 CEST559963778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:15.997406006 CEST37785599645.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:15.997530937 CEST559963778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:16.002509117 CEST37785599645.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:16.608139992 CEST559783778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:16.613830090 CEST37785597845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:16.629404068 CEST37785599645.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:16.629537106 CEST559963778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:16.629635096 CEST559963778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:16.630503893 CEST559983778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:16.635637045 CEST37785599845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:16.635838032 CEST559983778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:16.636611938 CEST559983778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:16.641866922 CEST37785599845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:16.642052889 CEST559983778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:16.647499084 CEST37785599845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:16.814521074 CEST37785597845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:16.814723015 CEST559783778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:26.646836042 CEST559983778192.168.2.1445.131.65.138
                    Oct 13, 2024 21:59:26.652087927 CEST37785599845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:26.832051039 CEST37785599845.131.65.138192.168.2.14
                    Oct 13, 2024 21:59:26.832192898 CEST559983778192.168.2.1445.131.65.138
                    Oct 13, 2024 22:00:16.860327959 CEST559783778192.168.2.1445.131.65.138
                    Oct 13, 2024 22:00:16.865560055 CEST37785597845.131.65.138192.168.2.14
                    Oct 13, 2024 22:00:17.072324038 CEST37785597845.131.65.138192.168.2.14
                    Oct 13, 2024 22:00:17.072623014 CEST559783778192.168.2.1445.131.65.138
                    Oct 13, 2024 22:00:26.885749102 CEST559983778192.168.2.1445.131.65.138
                    Oct 13, 2024 22:00:26.891525984 CEST37785599845.131.65.138192.168.2.14
                    Oct 13, 2024 22:00:27.116808891 CEST37785599845.131.65.138192.168.2.14
                    Oct 13, 2024 22:00:27.117391109 CEST559983778192.168.2.1445.131.65.138

                    System Behavior

                    Start time (UTC):19:59:03
                    Start date (UTC):13/10/2024
                    Path:/tmp/ThYeAADbuc.elf
                    Arguments:/tmp/ThYeAADbuc.elf
                    File size:4956856 bytes
                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                    Start time (UTC):19:59:03
                    Start date (UTC):13/10/2024
                    Path:/tmp/ThYeAADbuc.elf
                    Arguments:-
                    File size:4956856 bytes
                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                    Start time (UTC):19:59:03
                    Start date (UTC):13/10/2024
                    Path:/tmp/ThYeAADbuc.elf
                    Arguments:-
                    File size:4956856 bytes
                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                    Start time (UTC):19:59:03
                    Start date (UTC):13/10/2024
                    Path:/tmp/ThYeAADbuc.elf
                    Arguments:-
                    File size:4956856 bytes
                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                    Start time (UTC):19:59:09
                    Start date (UTC):13/10/2024
                    Path:/tmp/ThYeAADbuc.elf
                    Arguments:-
                    File size:4956856 bytes
                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                    Start time (UTC):19:59:09
                    Start date (UTC):13/10/2024
                    Path:/tmp/ThYeAADbuc.elf
                    Arguments:-
                    File size:4956856 bytes
                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1