Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
pbFjyPSrdP.elf

Overview

General Information

Sample name:pbFjyPSrdP.elf
renamed because original name is a hash value
Original sample name:67ed9c2dd29a6b191b7a767664c81767.elf
Analysis ID:1532767
MD5:67ed9c2dd29a6b191b7a767664c81767
SHA1:1b640c5f0cd63d4bc0df07bd026a539a94571198
SHA256:0ae2b49237ef0bbfc6a494eb3e44d340e79c20de258cb5c262518311251b5049
Tags:32elfintelmirai
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Sample is packed with UPX
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Sample contains only a LOAD segment without any section mappings
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532767
Start date and time:2024-10-13 21:58:30 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 25s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:pbFjyPSrdP.elf
renamed because original name is a hash value
Original Sample Name:67ed9c2dd29a6b191b7a767664c81767.elf
Detection:MAL
Classification:mal64.evad.linELF@0/0@0/0
  • VT rate limit hit for: pbFjyPSrdP.elf
Command:/tmp/pbFjyPSrdP.elf
PID:5706
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • cleanup
SourceRuleDescriptionAuthorStrings
5714.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x10874:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10888:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1089c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10900:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10914:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10928:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1093c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10950:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10964:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10978:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1098c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10a04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
5714.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Mirai_3a56423bunknownunknown
  • 0x8f3b:$a: 24 1C 8B 44 24 20 0F B6 D0 C1 E8 08 89 54 24 24 89 44 24 20 BA 01 00
5714.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Mirai_dab39a25unknownunknown
  • 0x7726:$a: 0E 75 20 50 6A 00 6A 00 6A 00 53 6A 0E FF 74 24 48 68 DD 00
5714.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Mirai_8aa7b5d3unknownunknown
  • 0x7052:$a: 8B 4C 24 14 8B 74 24 0C 8B 5C 24 10 85 C9 74 0D 31 D2 8A 04 1A 88
5706.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x10874:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10888:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1089c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10900:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10914:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10928:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1093c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10950:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10964:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10978:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1098c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10a04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
Click to see the 15 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: pbFjyPSrdP.elfReversingLabs: Detection: 44%
Source: pbFjyPSrdP.elfJoe Sandbox ML: detected
Source: global trafficTCP traffic: 192.168.2.13:37482 -> 45.131.65.138:3778
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: unknownTCP traffic detected without corresponding DNS query: 45.131.65.138
Source: pbFjyPSrdP.elfString found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: 5714.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5714.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b Author: unknown
Source: 5714.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 Author: unknown
Source: 5714.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5706.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5706.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b Author: unknown
Source: 5706.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 Author: unknown
Source: 5706.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5707.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5707.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b Author: unknown
Source: 5707.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 Author: unknown
Source: 5707.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5708.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5708.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b Author: unknown
Source: 5708.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 Author: unknown
Source: 5708.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: Process Memory Space: pbFjyPSrdP.elf PID: 5706, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: pbFjyPSrdP.elf PID: 5707, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: pbFjyPSrdP.elf PID: 5708, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: pbFjyPSrdP.elf PID: 5714, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: LOAD without section mappingsProgram segment: 0xc01000
Source: 5714.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5714.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 117d6eb47f000c9d475119ca0e6a1b49a91bbbece858758aaa3d7f30d0777d75, id = 3a56423b-c0cf-4483-87e3-552beb40563a, last_modified = 2021-09-16
Source: 5714.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 reference_sample = 3e02fb63803110cabde08e809cf4acc1b8fb474ace531959a311858fdd578bab, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 5a628d9af9d6dccf29e78f780bb74a2fa25167954c34d4a1529bdea5ea891ac0, id = dab39a25-852b-441f-86ab-23d945daa62c, last_modified = 2022-01-26
Source: 5714.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5706.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5706.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 117d6eb47f000c9d475119ca0e6a1b49a91bbbece858758aaa3d7f30d0777d75, id = 3a56423b-c0cf-4483-87e3-552beb40563a, last_modified = 2021-09-16
Source: 5706.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 reference_sample = 3e02fb63803110cabde08e809cf4acc1b8fb474ace531959a311858fdd578bab, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 5a628d9af9d6dccf29e78f780bb74a2fa25167954c34d4a1529bdea5ea891ac0, id = dab39a25-852b-441f-86ab-23d945daa62c, last_modified = 2022-01-26
Source: 5706.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5707.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5707.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 117d6eb47f000c9d475119ca0e6a1b49a91bbbece858758aaa3d7f30d0777d75, id = 3a56423b-c0cf-4483-87e3-552beb40563a, last_modified = 2021-09-16
Source: 5707.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 reference_sample = 3e02fb63803110cabde08e809cf4acc1b8fb474ace531959a311858fdd578bab, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 5a628d9af9d6dccf29e78f780bb74a2fa25167954c34d4a1529bdea5ea891ac0, id = dab39a25-852b-441f-86ab-23d945daa62c, last_modified = 2022-01-26
Source: 5707.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5708.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5708.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 117d6eb47f000c9d475119ca0e6a1b49a91bbbece858758aaa3d7f30d0777d75, id = 3a56423b-c0cf-4483-87e3-552beb40563a, last_modified = 2021-09-16
Source: 5708.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 reference_sample = 3e02fb63803110cabde08e809cf4acc1b8fb474ace531959a311858fdd578bab, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 5a628d9af9d6dccf29e78f780bb74a2fa25167954c34d4a1529bdea5ea891ac0, id = dab39a25-852b-441f-86ab-23d945daa62c, last_modified = 2022-01-26
Source: 5708.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: Process Memory Space: pbFjyPSrdP.elf PID: 5706, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: pbFjyPSrdP.elf PID: 5707, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: pbFjyPSrdP.elf PID: 5708, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: pbFjyPSrdP.elf PID: 5714, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: classification engineClassification label: mal64.evad.linELF@0/0@0/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/230/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/110/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/231/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/111/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/232/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/112/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/233/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/113/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/234/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/114/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/235/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/115/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/236/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/116/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/237/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/117/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/238/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/118/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/239/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/119/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/914/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/10/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/917/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/11/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/12/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/13/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/14/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/15/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/16/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/17/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/18/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/19/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/240/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/3095/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/120/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/241/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/121/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/242/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/5706/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/1/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/122/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/243/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/2/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/123/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/244/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/3/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/124/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/245/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/1588/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/5709/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/125/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/4/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/246/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/126/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/5/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/247/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/127/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/6/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/248/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/128/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/7/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/249/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/129/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/8/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/800/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/9/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/1906/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/802/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/803/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/20/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/21/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/22/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/23/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/24/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/25/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/26/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/27/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/28/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/29/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/3420/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/1482/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/490/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/1480/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/250/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/371/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/130/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/251/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/131/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/252/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/132/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/253/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/254/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/1238/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/134/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/255/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/256/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/257/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/378/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/3413/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/258/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/259/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/1475/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/936/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/30/statusJump to behavior
Source: /tmp/pbFjyPSrdP.elf (PID: 5706)File opened: /proc/816/statusJump to behavior
Source: pbFjyPSrdP.elfSubmission file: segment LOAD with 7.9644 entropy (max. 8.0)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Obfuscated Files or Information
1
OS Credential Dumping
System Service DiscoveryRemote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532767 Sample: pbFjyPSrdP.elf Startdate: 13/10/2024 Architecture: LINUX Score: 64 20 45.131.65.138, 37482, 37484, 37486 LOVESERVERSGB Germany 2->20 22 Malicious sample detected (through community Yara rule) 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Machine Learning detection for sample 2->26 28 Sample is packed with UPX 2->28 8 pbFjyPSrdP.elf 2->8         started        signatures3 process4 process5 10 pbFjyPSrdP.elf 8->10         started        12 pbFjyPSrdP.elf 8->12         started        14 pbFjyPSrdP.elf 8->14         started        process6 16 pbFjyPSrdP.elf 10->16         started        18 pbFjyPSrdP.elf 10->18         started       
SourceDetectionScannerLabelLink
pbFjyPSrdP.elf45%ReversingLabsLinux.Backdoor.Mirai
pbFjyPSrdP.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netpbFjyPSrdP.elftrue
  • URL Reputation: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
45.131.65.138
unknownGermany
47987LOVESERVERSGBfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
45.131.65.138ThYeAADbuc.elfGet hashmaliciousMiraiBrowse
    3MKM0SWv7x.elfGet hashmaliciousMiraiBrowse
      3qI83sDZlt.elfGet hashmaliciousUnknownBrowse
        Ds02VJxaG4.elfGet hashmaliciousUnknownBrowse
          tc2iriCZdi.elfGet hashmaliciousUnknownBrowse
            6ryuhM7ras.elfGet hashmaliciousUnknownBrowse
              LM762mO6Jt.elfGet hashmaliciousUnknownBrowse
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                LOVESERVERSGBThYeAADbuc.elfGet hashmaliciousMiraiBrowse
                • 45.131.65.138
                3MKM0SWv7x.elfGet hashmaliciousMiraiBrowse
                • 45.131.65.138
                3qI83sDZlt.elfGet hashmaliciousUnknownBrowse
                • 45.131.65.138
                Ds02VJxaG4.elfGet hashmaliciousUnknownBrowse
                • 45.131.65.138
                tc2iriCZdi.elfGet hashmaliciousUnknownBrowse
                • 45.131.65.138
                6ryuhM7ras.elfGet hashmaliciousUnknownBrowse
                • 45.131.65.138
                LM762mO6Jt.elfGet hashmaliciousUnknownBrowse
                • 45.131.65.138
                M88FIQFvyo.elfGet hashmaliciousMiraiBrowse
                • 45.150.101.154
                i7b3uBlM8k.elfGet hashmaliciousMiraiBrowse
                • 45.150.101.181
                TV7RLVOmvl.elfGet hashmaliciousMiraiBrowse
                • 45.150.101.140
                No context
                No context
                No created / dropped files found
                File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
                Entropy (8bit):7.962528002354592
                TrID:
                • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                File name:pbFjyPSrdP.elf
                File size:38'724 bytes
                MD5:67ed9c2dd29a6b191b7a767664c81767
                SHA1:1b640c5f0cd63d4bc0df07bd026a539a94571198
                SHA256:0ae2b49237ef0bbfc6a494eb3e44d340e79c20de258cb5c262518311251b5049
                SHA512:fe847c47ed13fd2efb2d2565f52c26c1b2215d3da1cbc53177a10f961d3a50647224297aec3007ac587779edb50b97d7d5f50cca4253dd13855432debee06857
                SSDEEP:768:ha+BWS+ZPwIIBPGXna4nvdQL5zc6R96SMO/ieUeSMI//EFVxynbcuyD7UrQRjN:ha+BH+hKBAa4Vcc6RwSMO/ieCMw/EF2E
                TLSH:B803012199DF9A51D7E154B41D7FFD0D30C2D228512D36B1EDC01235AE28FAE263DAC2
                File Content Preview:.ELF....................X...4...........4. ...(.....................L...L...........................................Q.td.............................-..UPX!.........2...2......W..........?..k.I/.j....\.R......)..n.4go.|.>#.....{~o....8.F.^...MFL.f.5 ..I.r

                ELF header

                Class:ELF32
                Data:2's complement, little endian
                Version:1 (current)
                Machine:Intel 80386
                Version Number:0x1
                Type:EXEC (Executable file)
                OS/ABI:UNIX - Linux
                ABI Version:0
                Entry Point Address:0xc09458
                Flags:0x0
                ELF Header Size:52
                Program Header Offset:52
                Program Header Size:32
                Number of Program Headers:3
                Section Header Offset:0
                Section Header Size:40
                Number of Section Headers:0
                Header String Table Index:0
                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                LOAD0x00xc010000xc010000x964c0x964c7.96440x5R E0x1000
                LOAD0xc080x805bc080x805bc080x00x00.00000x6RW 0x1000
                GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                TimestampSource PortDest PortSource IPDest IP
                Oct 13, 2024 22:00:10.907845020 CEST374823778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:10.913289070 CEST37783748245.131.65.138192.168.2.13
                Oct 13, 2024 22:00:10.913369894 CEST374823778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:10.913454056 CEST374823778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:10.918812990 CEST37783748245.131.65.138192.168.2.13
                Oct 13, 2024 22:00:10.918873072 CEST374823778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:10.924005985 CEST37783748245.131.65.138192.168.2.13
                Oct 13, 2024 22:00:16.427885056 CEST374843778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:16.561809063 CEST37783748445.131.65.138192.168.2.13
                Oct 13, 2024 22:00:16.562050104 CEST374843778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:16.562133074 CEST374843778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:16.567461014 CEST37783748445.131.65.138192.168.2.13
                Oct 13, 2024 22:00:16.567737103 CEST374843778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:16.573025942 CEST37783748445.131.65.138192.168.2.13
                Oct 13, 2024 22:00:17.238550901 CEST37783748445.131.65.138192.168.2.13
                Oct 13, 2024 22:00:17.238827944 CEST374863778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:17.238853931 CEST374843778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:17.238853931 CEST374843778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:17.244540930 CEST37783748645.131.65.138192.168.2.13
                Oct 13, 2024 22:00:17.244719982 CEST374863778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:17.245033979 CEST374863778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:17.250077009 CEST37783748645.131.65.138192.168.2.13
                Oct 13, 2024 22:00:17.250381947 CEST374863778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:17.255548000 CEST37783748645.131.65.138192.168.2.13
                Oct 13, 2024 22:00:17.874304056 CEST37783748645.131.65.138192.168.2.13
                Oct 13, 2024 22:00:17.874648094 CEST374863778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:17.874789000 CEST374863778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:17.875041962 CEST374883778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:17.880290985 CEST37783748845.131.65.138192.168.2.13
                Oct 13, 2024 22:00:17.880418062 CEST374883778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:17.880821943 CEST374883778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:17.886042118 CEST37783748845.131.65.138192.168.2.13
                Oct 13, 2024 22:00:17.886301994 CEST374883778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:17.891829014 CEST37783748845.131.65.138192.168.2.13
                Oct 13, 2024 22:00:18.518747091 CEST37783748845.131.65.138192.168.2.13
                Oct 13, 2024 22:00:18.518852949 CEST374883778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:18.519123077 CEST374883778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:18.519125938 CEST374903778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:18.524348021 CEST37783749045.131.65.138192.168.2.13
                Oct 13, 2024 22:00:18.524620056 CEST374903778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:18.524620056 CEST374903778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:18.530260086 CEST37783749045.131.65.138192.168.2.13
                Oct 13, 2024 22:00:18.530560970 CEST374903778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:18.535742998 CEST37783749045.131.65.138192.168.2.13
                Oct 13, 2024 22:00:19.166800976 CEST37783749045.131.65.138192.168.2.13
                Oct 13, 2024 22:00:19.167263985 CEST374903778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:19.167263985 CEST374903778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:19.167377949 CEST374923778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:19.172791004 CEST37783749245.131.65.138192.168.2.13
                Oct 13, 2024 22:00:19.173175097 CEST374923778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:19.173268080 CEST374923778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:19.178179979 CEST37783749245.131.65.138192.168.2.13
                Oct 13, 2024 22:00:19.178513050 CEST374923778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:19.184098959 CEST37783749245.131.65.138192.168.2.13
                Oct 13, 2024 22:00:19.802493095 CEST37783749245.131.65.138192.168.2.13
                Oct 13, 2024 22:00:19.802669048 CEST374923778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:19.802669048 CEST374923778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:19.802735090 CEST374943778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:19.807673931 CEST37783749445.131.65.138192.168.2.13
                Oct 13, 2024 22:00:19.807742119 CEST374943778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:19.807784081 CEST374943778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:19.813016891 CEST37783749445.131.65.138192.168.2.13
                Oct 13, 2024 22:00:19.813071012 CEST374943778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:19.817888975 CEST37783749445.131.65.138192.168.2.13
                Oct 13, 2024 22:00:20.444869041 CEST37783749445.131.65.138192.168.2.13
                Oct 13, 2024 22:00:20.445410013 CEST374943778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:20.445482969 CEST374943778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:20.445550919 CEST374963778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:20.450663090 CEST37783749645.131.65.138192.168.2.13
                Oct 13, 2024 22:00:20.450782061 CEST374963778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:20.450983047 CEST374963778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:20.456347942 CEST37783749645.131.65.138192.168.2.13
                Oct 13, 2024 22:00:20.456513882 CEST374963778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:20.461929083 CEST37783749645.131.65.138192.168.2.13
                Oct 13, 2024 22:00:20.923790932 CEST374823778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:20.929605007 CEST37783748245.131.65.138192.168.2.13
                Oct 13, 2024 22:00:21.108428955 CEST37783748245.131.65.138192.168.2.13
                Oct 13, 2024 22:00:21.108676910 CEST374823778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:30.459036112 CEST374963778192.168.2.1345.131.65.138
                Oct 13, 2024 22:00:30.488519907 CEST37783749645.131.65.138192.168.2.13
                Oct 13, 2024 22:00:30.663640022 CEST37783749645.131.65.138192.168.2.13
                Oct 13, 2024 22:00:30.664269924 CEST374963778192.168.2.1345.131.65.138
                Oct 13, 2024 22:01:21.169737101 CEST374823778192.168.2.1345.131.65.138
                Oct 13, 2024 22:01:21.175122023 CEST37783748245.131.65.138192.168.2.13
                Oct 13, 2024 22:01:21.374293089 CEST37783748245.131.65.138192.168.2.13
                Oct 13, 2024 22:01:21.374739885 CEST374823778192.168.2.1345.131.65.138
                Oct 13, 2024 22:01:30.715009928 CEST374963778192.168.2.1345.131.65.138
                Oct 13, 2024 22:01:30.720866919 CEST37783749645.131.65.138192.168.2.13
                Oct 13, 2024 22:01:30.903976917 CEST37783749645.131.65.138192.168.2.13
                Oct 13, 2024 22:01:30.904537916 CEST374963778192.168.2.1345.131.65.138

                System Behavior

                Start time (UTC):20:00:10
                Start date (UTC):13/10/2024
                Path:/tmp/pbFjyPSrdP.elf
                Arguments:/tmp/pbFjyPSrdP.elf
                File size:38724 bytes
                MD5 hash:67ed9c2dd29a6b191b7a767664c81767

                Start time (UTC):20:00:10
                Start date (UTC):13/10/2024
                Path:/tmp/pbFjyPSrdP.elf
                Arguments:-
                File size:38724 bytes
                MD5 hash:67ed9c2dd29a6b191b7a767664c81767

                Start time (UTC):20:00:10
                Start date (UTC):13/10/2024
                Path:/tmp/pbFjyPSrdP.elf
                Arguments:-
                File size:38724 bytes
                MD5 hash:67ed9c2dd29a6b191b7a767664c81767

                Start time (UTC):20:00:10
                Start date (UTC):13/10/2024
                Path:/tmp/pbFjyPSrdP.elf
                Arguments:-
                File size:38724 bytes
                MD5 hash:67ed9c2dd29a6b191b7a767664c81767
                Start time (UTC):20:00:15
                Start date (UTC):13/10/2024
                Path:/tmp/pbFjyPSrdP.elf
                Arguments:-
                File size:38724 bytes
                MD5 hash:67ed9c2dd29a6b191b7a767664c81767

                Start time (UTC):20:00:15
                Start date (UTC):13/10/2024
                Path:/tmp/pbFjyPSrdP.elf
                Arguments:-
                File size:38724 bytes
                MD5 hash:67ed9c2dd29a6b191b7a767664c81767