Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
bot.x86_64.elf

Overview

General Information

Sample name:bot.x86_64.elf
Analysis ID:1543923
MD5:c795d89293cd6dd1f765c876ab53490f
SHA1:ffdca75c56a48b7caeb47d015890810ab91144d0
SHA256:d7ce6ca6e9c3d8a8aebf73d4c2786ad4885ab58b685271a5812e33fed3cc6122
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Gafgyt, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Gafgyt
Yara detected Mirai
Yara detected Okiru
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Uses dynamic DNS services
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1543923
Start date and time:2024-10-28 16:24:01 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 47s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:bot.x86_64.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@23/0
  • VT rate limit hit for: bot.x86_64.elf
Command:/tmp/bot.x86_64.elf
PID:5590
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
Bashlite, GafgytBashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.bashlite
SourceRuleDescriptionAuthorStrings
bot.x86_64.elfJoeSecurity_GafgytYara detected GafgytJoe Security
    bot.x86_64.elfJoeSecurity_OkiruYara detected OkiruJoe Security
      bot.x86_64.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
        bot.x86_64.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          bot.x86_64.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x163c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x163dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x163f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16404:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16418:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1642c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16440:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16454:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16468:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1647c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16490:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x164f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16508:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1651c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16530:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16544:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x16558:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Click to see the 14 entries
          SourceRuleDescriptionAuthorStrings
          5590.1.0000000000400000.0000000000419000.r-x.sdmpJoeSecurity_GafgytYara detected GafgytJoe Security
            5590.1.0000000000400000.0000000000419000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
              5590.1.0000000000400000.0000000000419000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
                5590.1.0000000000400000.0000000000419000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
                  5590.1.0000000000400000.0000000000419000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
                  • 0x163c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x163dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x163f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16404:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16418:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x1642c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16440:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16454:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16468:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x1647c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16490:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x164f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16508:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x1651c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16530:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16544:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x16558:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  Click to see the 18 entries
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-28T16:25:30.325908+010020304901Malware Command and Control Activity Detected192.168.2.1436088190.123.46.5243957TCP
                  2024-10-28T16:25:44.143447+010020304901Malware Command and Control Activity Detected192.168.2.1436090190.123.46.5243957TCP
                  2024-10-28T16:25:51.951689+010020304901Malware Command and Control Activity Detected192.168.2.1436092190.123.46.5243957TCP
                  2024-10-28T16:26:04.915734+010020304901Malware Command and Control Activity Detected192.168.2.1436094190.123.46.5243957TCP
                  2024-10-28T16:26:15.732997+010020304901Malware Command and Control Activity Detected192.168.2.1436096190.123.46.5243957TCP
                  2024-10-28T16:26:17.457534+010020304901Malware Command and Control Activity Detected192.168.2.1436098190.123.46.5243957TCP
                  2024-10-28T16:26:27.182900+010020304901Malware Command and Control Activity Detected192.168.2.1436100190.123.46.5243957TCP
                  2024-10-28T16:26:32.899602+010020304901Malware Command and Control Activity Detected192.168.2.1436102190.123.46.5243957TCP
                  2024-10-28T16:26:38.644522+010020304901Malware Command and Control Activity Detected192.168.2.1436104190.123.46.5243957TCP
                  2024-10-28T16:27:03.662052+010020304901Malware Command and Control Activity Detected192.168.2.1436106190.123.46.5243957TCP
                  2024-10-28T16:27:07.493667+010020304901Malware Command and Control Activity Detected192.168.2.1436108190.123.46.5243957TCP
                  2024-10-28T16:27:19.224620+010020304901Malware Command and Control Activity Detected192.168.2.1436110190.123.46.5243957TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: bot.x86_64.elfAvira: detected
                  Source: bot.x86_64.elfReversingLabs: Detection: 55%
                  Source: bot.x86_64.elfJoe Sandbox ML: detected
                  Source: bot.x86_64.elfString: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.14:36088 -> 190.123.46.52:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.14:36096 -> 190.123.46.52:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.14:36092 -> 190.123.46.52:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.14:36108 -> 190.123.46.52:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.14:36098 -> 190.123.46.52:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.14:36090 -> 190.123.46.52:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.14:36110 -> 190.123.46.52:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.14:36094 -> 190.123.46.52:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.14:36106 -> 190.123.46.52:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.14:36100 -> 190.123.46.52:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.14:36102 -> 190.123.46.52:43957
                  Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.14:36104 -> 190.123.46.52:43957
                  Source: global trafficTCP traffic: 190.123.46.52 ports 43957,3,4,5,7,9
                  Source: unknownDNS query: name: starforgemirai.duckdns.org
                  Source: global trafficTCP traffic: 192.168.2.14:36088 -> 190.123.46.52:43957
                  Source: global trafficDNS traffic detected: DNS query: starforgemirai.duckdns.org

                  System Summary

                  barindex
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
                  Source: Process Memory Space: bot.x86_64.elf PID: 5590, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                  Source: Initial sampleString containing 'busybox' found: /bin/busybox
                  Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
                  Source: ELF static info symbol of initial sample.symtab present: no
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
                  Source: bot.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
                  Source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
                  Source: Process Memory Space: bot.x86_64.elf PID: 5590, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                  Source: classification engineClassification label: mal100.troj.linELF@0/0@23/0
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/3760/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/1583/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/2672/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/110/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/3759/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/111/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/112/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/113/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/234/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/1577/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/114/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/235/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/115/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/116/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/117/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/118/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/119/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/3757/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/10/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/917/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/3758/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/11/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/12/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/13/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/14/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/15/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/16/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/17/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/18/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/19/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/1593/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/240/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/120/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/3094/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/121/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/242/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/3406/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/1/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/122/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/243/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/2/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/123/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/244/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/1589/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/3/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/124/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/245/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/1588/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/125/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/4/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/246/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/3402/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/126/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/5/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/247/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/127/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/6/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/248/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/128/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/7/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/249/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/8/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/129/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/800/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/9/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/801/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/803/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/3886/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/20/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/806/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/21/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/807/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/928/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/22/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/23/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/24/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/25/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/26/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/27/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/28/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/3661/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/29/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/3420/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/490/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/250/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/130/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/251/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/131/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/252/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/132/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/253/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/254/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/255/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/135/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/256/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/1599/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/257/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/378/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/258/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/3412/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/259/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/30/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/35/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/1371/cmdlineJump to behavior
                  Source: /tmp/bot.x86_64.elf (PID: 5592)File opened: /proc/260/cmdlineJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 5590, type: MEMORYSTR
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 5590, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 5590, type: MEMORYSTR
                  Source: Yara matchFile source: bot.x86_64.elf, type: SAMPLE
                  Source: Yara matchFile source: 5590.1.0000000000400000.0000000000419000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: bot.x86_64.elf PID: 5590, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  Valid AccountsWindows Management Instrumentation1
                  Scripting
                  Path InterceptionDirect Volume Access1
                  OS Credential Dumping
                  System Service DiscoveryRemote ServicesData from Local System1
                  Non-Standard Port
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
                  Non-Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive11
                  Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  No configs have been found
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Number of created Files
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  bot.x86_64.elf55%ReversingLabsLinux.Backdoor.Mirai
                  bot.x86_64.elf100%AviraEXP/ELF.Mirai.Z.A
                  bot.x86_64.elf100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  starforgemirai.duckdns.org
                  190.123.46.52
                  truetrue
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    190.123.46.52
                    starforgemirai.duckdns.orgPanama
                    265540ALTANREDESSAPIdeCVMXtrue
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    190.123.46.52bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                      bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        starforgemirai.duckdns.orgbot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        • 190.123.46.52
                        bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        • 190.123.46.52
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        ALTANREDESSAPIdeCVMXbot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        • 190.123.46.52
                        bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        • 190.123.46.52
                        https://mtrpw.nieza.site/Get hashmaliciousUnknownBrowse
                        • 190.123.45.15
                        Rechnung_2024-09-03_100148163067_V21648588.htmlGet hashmaliciousUnknownBrowse
                        • 190.123.45.232
                        https://codes-connect.net/Get hashmaliciousUnknownBrowse
                        • 190.123.45.35
                        http://smoga.luxxeeu.com/Get hashmaliciousUnknownBrowse
                        • 190.123.45.15
                        New Order14112016gpj.exeGet hashmaliciousNetWireBrowse
                        • 190.123.44.137
                        https://herinnering-ontvangen.org/belastingdienst/nl/Get hashmaliciousUnknownBrowse
                        • 190.123.44.105
                        9l72TMHrLC.exeGet hashmaliciousBlackNET, PureLog StealerBrowse
                        • 190.123.44.240
                        Techspan Statement.xlsmGet hashmaliciousUnknownBrowse
                        • 190.123.45.87
                        No context
                        No context
                        No created / dropped files found
                        File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):5.223666088671577
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:bot.x86_64.elf
                        File size:139'576 bytes
                        MD5:c795d89293cd6dd1f765c876ab53490f
                        SHA1:ffdca75c56a48b7caeb47d015890810ab91144d0
                        SHA256:d7ce6ca6e9c3d8a8aebf73d4c2786ad4885ab58b685271a5812e33fed3cc6122
                        SHA512:7f9d31fac4c0254afd10a3797fc155592a88bac851ae7921edf4cfef6a755761bd692fba62bd7eaa83dd79318a3db155d25b7b3be92fe4725c93541b9d9bcb57
                        SSDEEP:3072:tGtwnNiaOnUTaFyPT9OSQb9OaogjV2a5li7CF1HzA/QPdL:tGtwnNiaOnUTQZL9u/QPd
                        TLSH:93D33A17B5C180FDC4DAC1B44F9EF53ADD32B1AC1238B16B2BD4AA221E5AE315F1DA50
                        File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@...............................................Q.......Q.....x....... ...............Q.td....................................................H...._.....]..H........

                        ELF header

                        Class:ELF64
                        Data:2's complement, little endian
                        Version:1 (current)
                        Machine:Advanced Micro Devices X86-64
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x400194
                        Flags:0x0
                        ELF Header Size:64
                        Program Header Offset:64
                        Program Header Size:56
                        Number of Program Headers:3
                        Section Header Offset:138936
                        Section Header Size:64
                        Number of Section Headers:10
                        Header String Table Index:9
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x4000e80xe80x130x00x6AX001
                        .textPROGBITS0x4001000x1000x15dd60x00x6AX0016
                        .finiPROGBITS0x415ed60x15ed60xe0x00x6AX001
                        .rodataPROGBITS0x415f000x15f000x30e00x00x2A0032
                        .ctorsPROGBITS0x5190000x190000x180x00x3WA008
                        .dtorsPROGBITS0x5190180x190180x100x00x3WA008
                        .dataPROGBITS0x5190400x190400x8e380x00x3WA0032
                        .bssNOBITS0x521e800x21e780x72a00x00x3WA0032
                        .shstrtabSTRTAB0x00x21e780x3e0x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x4000000x4000000x18fe00x18fe06.39600x5R E0x100000.init .text .fini .rodata
                        LOAD0x190000x5190000x5190000x8e780x101200.22740x6RW 0x100000.ctors .dtors .data .bss
                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2024-10-28T16:25:30.325908+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1436088190.123.46.5243957TCP
                        2024-10-28T16:25:44.143447+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1436090190.123.46.5243957TCP
                        2024-10-28T16:25:51.951689+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1436092190.123.46.5243957TCP
                        2024-10-28T16:26:04.915734+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1436094190.123.46.5243957TCP
                        2024-10-28T16:26:15.732997+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1436096190.123.46.5243957TCP
                        2024-10-28T16:26:17.457534+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1436098190.123.46.5243957TCP
                        2024-10-28T16:26:27.182900+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1436100190.123.46.5243957TCP
                        2024-10-28T16:26:32.899602+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1436102190.123.46.5243957TCP
                        2024-10-28T16:26:38.644522+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1436104190.123.46.5243957TCP
                        2024-10-28T16:27:03.662052+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1436106190.123.46.5243957TCP
                        2024-10-28T16:27:07.493667+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1436108190.123.46.5243957TCP
                        2024-10-28T16:27:19.224620+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1436110190.123.46.5243957TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 28, 2024 16:25:30.319724083 CET3608843957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:25:30.325078964 CET4395736088190.123.46.52192.168.2.14
                        Oct 28, 2024 16:25:30.325169086 CET3608843957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:25:30.325907946 CET3608843957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:25:30.331424952 CET4395736088190.123.46.52192.168.2.14
                        Oct 28, 2024 16:25:31.028538942 CET4395736088190.123.46.52192.168.2.14
                        Oct 28, 2024 16:25:31.028707981 CET3608843957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:25:31.034356117 CET4395736088190.123.46.52192.168.2.14
                        Oct 28, 2024 16:25:44.137098074 CET3609043957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:25:44.142455101 CET4395736090190.123.46.52192.168.2.14
                        Oct 28, 2024 16:25:44.142525911 CET3609043957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:25:44.143446922 CET3609043957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:25:44.149104118 CET4395736090190.123.46.52192.168.2.14
                        Oct 28, 2024 16:25:44.838646889 CET4395736090190.123.46.52192.168.2.14
                        Oct 28, 2024 16:25:44.839026928 CET3609043957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:25:44.845304012 CET4395736090190.123.46.52192.168.2.14
                        Oct 28, 2024 16:25:51.945600986 CET3609243957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:25:51.951009035 CET4395736092190.123.46.52192.168.2.14
                        Oct 28, 2024 16:25:51.951072931 CET3609243957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:25:51.951689005 CET3609243957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:25:51.957118988 CET4395736092190.123.46.52192.168.2.14
                        Oct 28, 2024 16:25:52.649149895 CET4395736092190.123.46.52192.168.2.14
                        Oct 28, 2024 16:25:52.649300098 CET3609243957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:25:52.654706955 CET4395736092190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:04.909276009 CET3609443957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:04.914752007 CET4395736094190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:04.914834976 CET3609443957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:04.915734053 CET3609443957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:04.921385050 CET4395736094190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:05.622082949 CET4395736094190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:05.622250080 CET3609443957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:05.627552032 CET4395736094190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:15.726602077 CET3609643957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:15.732075930 CET4395736096190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:15.732172012 CET3609643957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:15.732996941 CET3609643957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:15.738765001 CET4395736096190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:16.440016985 CET4395736096190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:16.440212011 CET3609643957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:16.445621014 CET4395736096190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:17.450783014 CET3609843957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:17.456589937 CET4395736098190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:17.456672907 CET3609843957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:17.457534075 CET3609843957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:17.463649035 CET4395736098190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:18.160237074 CET4395736098190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:18.160451889 CET3609843957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:18.165843964 CET4395736098190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:27.176599979 CET3610043957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:27.181981087 CET4395736100190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:27.182250023 CET3610043957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:27.182899952 CET3610043957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:27.188704967 CET4395736100190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:27.879585981 CET4395736100190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:27.879791021 CET3610043957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:27.885443926 CET4395736100190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:32.892134905 CET3610243957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:32.898247957 CET4395736102190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:32.898320913 CET3610243957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:32.899601936 CET3610243957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:32.905106068 CET4395736102190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:33.626590967 CET4395736102190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:33.626897097 CET3610243957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:33.632472992 CET4395736102190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:38.638103008 CET3610443957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:38.643671036 CET4395736104190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:38.643771887 CET3610443957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:38.644521952 CET3610443957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:38.649954081 CET4395736104190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:39.351813078 CET4395736104190.123.46.52192.168.2.14
                        Oct 28, 2024 16:26:39.352041960 CET3610443957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:26:39.357588053 CET4395736104190.123.46.52192.168.2.14
                        Oct 28, 2024 16:27:03.654853106 CET3610643957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:27:03.660953999 CET4395736106190.123.46.52192.168.2.14
                        Oct 28, 2024 16:27:03.661048889 CET3610643957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:27:03.662051916 CET3610643957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:27:03.668289900 CET4395736106190.123.46.52192.168.2.14
                        Oct 28, 2024 16:27:04.384008884 CET4395736106190.123.46.52192.168.2.14
                        Oct 28, 2024 16:27:04.384314060 CET3610643957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:27:04.384314060 CET3610643957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:27:04.390108109 CET4395736106190.123.46.52192.168.2.14
                        Oct 28, 2024 16:27:07.487585068 CET3610843957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:27:07.492939949 CET4395736108190.123.46.52192.168.2.14
                        Oct 28, 2024 16:27:07.492991924 CET3610843957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:27:07.493666887 CET3610843957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:27:07.498946905 CET4395736108190.123.46.52192.168.2.14
                        Oct 28, 2024 16:27:08.202832937 CET4395736108190.123.46.52192.168.2.14
                        Oct 28, 2024 16:27:08.202971935 CET3610843957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:27:08.208308935 CET4395736108190.123.46.52192.168.2.14
                        Oct 28, 2024 16:27:19.217681885 CET3611043957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:27:19.223550081 CET4395736110190.123.46.52192.168.2.14
                        Oct 28, 2024 16:27:19.223628998 CET3611043957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:27:19.224620104 CET3611043957192.168.2.14190.123.46.52
                        Oct 28, 2024 16:27:19.230113029 CET4395736110190.123.46.52192.168.2.14
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 28, 2024 16:25:14.210861921 CET4419353192.168.2.148.8.8.8
                        Oct 28, 2024 16:25:19.213809013 CET5548153192.168.2.148.8.8.8
                        Oct 28, 2024 16:25:19.218322992 CET53441938.8.8.8192.168.2.14
                        Oct 28, 2024 16:25:24.216941118 CET5237953192.168.2.148.8.8.8
                        Oct 28, 2024 16:25:24.222086906 CET53554818.8.8.8192.168.2.14
                        Oct 28, 2024 16:25:29.220782995 CET4839153192.168.2.148.8.8.8
                        Oct 28, 2024 16:25:29.223870039 CET53523798.8.8.8192.168.2.14
                        Oct 28, 2024 16:25:30.319025993 CET53483918.8.8.8192.168.2.14
                        Oct 28, 2024 16:25:34.030396938 CET4647453192.168.2.148.8.8.8
                        Oct 28, 2024 16:25:39.032552004 CET3377753192.168.2.148.8.8.8
                        Oct 28, 2024 16:25:39.037700891 CET53464748.8.8.8192.168.2.14
                        Oct 28, 2024 16:25:44.036525965 CET4543553192.168.2.148.8.8.8
                        Oct 28, 2024 16:25:44.040301085 CET53337778.8.8.8192.168.2.14
                        Oct 28, 2024 16:25:44.136399031 CET53454358.8.8.8192.168.2.14
                        Oct 28, 2024 16:25:48.841027975 CET4336153192.168.2.148.8.8.8
                        Oct 28, 2024 16:25:51.944859982 CET53433618.8.8.8192.168.2.14
                        Oct 28, 2024 16:25:55.651282072 CET5523353192.168.2.148.8.8.8
                        Oct 28, 2024 16:26:00.656047106 CET5992353192.168.2.148.8.8.8
                        Oct 28, 2024 16:26:00.735460997 CET53552338.8.8.8192.168.2.14
                        Oct 28, 2024 16:26:04.908471107 CET53599238.8.8.8192.168.2.14
                        Oct 28, 2024 16:26:14.624453068 CET4786253192.168.2.148.8.8.8
                        Oct 28, 2024 16:26:15.725764036 CET53478628.8.8.8192.168.2.14
                        Oct 28, 2024 16:26:17.442555904 CET4002853192.168.2.148.8.8.8
                        Oct 28, 2024 16:26:17.450273991 CET53400288.8.8.8192.168.2.14
                        Oct 28, 2024 16:26:22.162457943 CET5722553192.168.2.148.8.8.8
                        Oct 28, 2024 16:26:27.168240070 CET4069653192.168.2.148.8.8.8
                        Oct 28, 2024 16:26:27.169848919 CET53572258.8.8.8192.168.2.14
                        Oct 28, 2024 16:26:27.176098108 CET53406968.8.8.8192.168.2.14
                        Oct 28, 2024 16:26:32.882215977 CET5925353192.168.2.148.8.8.8
                        Oct 28, 2024 16:26:32.891546965 CET53592538.8.8.8192.168.2.14
                        Oct 28, 2024 16:26:38.629215002 CET5200053192.168.2.148.8.8.8
                        Oct 28, 2024 16:26:38.637545109 CET53520008.8.8.8192.168.2.14
                        Oct 28, 2024 16:26:49.353982925 CET5902753192.168.2.148.8.8.8
                        Oct 28, 2024 16:26:54.355246067 CET3495153192.168.2.148.8.8.8
                        Oct 28, 2024 16:26:54.361697912 CET53590278.8.8.8192.168.2.14
                        Oct 28, 2024 16:26:54.363192081 CET53349518.8.8.8192.168.2.14
                        Oct 28, 2024 16:26:54.364217997 CET3393253192.168.2.148.8.8.8
                        Oct 28, 2024 16:26:59.369267941 CET3915953192.168.2.148.8.8.8
                        Oct 28, 2024 16:26:59.563920021 CET53339328.8.8.8192.168.2.14
                        Oct 28, 2024 16:27:03.653959990 CET53391598.8.8.8192.168.2.14
                        Oct 28, 2024 16:27:05.386794090 CET5092353192.168.2.148.8.8.8
                        Oct 28, 2024 16:27:07.486938953 CET53509238.8.8.8192.168.2.14
                        Oct 28, 2024 16:27:14.205017090 CET3587853192.168.2.148.8.8.8
                        Oct 28, 2024 16:27:19.208972931 CET4726153192.168.2.148.8.8.8
                        Oct 28, 2024 16:27:19.213594913 CET53358788.8.8.8192.168.2.14
                        Oct 28, 2024 16:27:19.217077017 CET53472618.8.8.8192.168.2.14
                        TimestampSource IPDest IPChecksumCodeType
                        Oct 28, 2024 16:25:19.218430996 CET192.168.2.148.8.8.8d008(Port unreachable)Destination Unreachable
                        Oct 28, 2024 16:25:24.222172022 CET192.168.2.148.8.8.8d008(Port unreachable)Destination Unreachable
                        Oct 28, 2024 16:25:29.223977089 CET192.168.2.148.8.8.8d008(Port unreachable)Destination Unreachable
                        Oct 28, 2024 16:25:39.037779093 CET192.168.2.148.8.8.8d008(Port unreachable)Destination Unreachable
                        Oct 28, 2024 16:25:44.040620089 CET192.168.2.148.8.8.8d008(Port unreachable)Destination Unreachable
                        Oct 28, 2024 16:26:00.735585928 CET192.168.2.148.8.8.8d008(Port unreachable)Destination Unreachable
                        Oct 28, 2024 16:26:27.169918060 CET192.168.2.148.8.8.8d008(Port unreachable)Destination Unreachable
                        Oct 28, 2024 16:26:54.361793995 CET192.168.2.148.8.8.8d008(Port unreachable)Destination Unreachable
                        Oct 28, 2024 16:26:59.564047098 CET192.168.2.148.8.8.8d008(Port unreachable)Destination Unreachable
                        Oct 28, 2024 16:27:19.213671923 CET192.168.2.148.8.8.8d008(Port unreachable)Destination Unreachable
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Oct 28, 2024 16:25:14.210861921 CET192.168.2.148.8.8.80xd4d5Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:19.213809013 CET192.168.2.148.8.8.80xd4d5Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:24.216941118 CET192.168.2.148.8.8.80xd4d5Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:29.220782995 CET192.168.2.148.8.8.80xd4d5Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:34.030396938 CET192.168.2.148.8.8.80x6dc4Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:39.032552004 CET192.168.2.148.8.8.80x6dc4Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:44.036525965 CET192.168.2.148.8.8.80x6dc4Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:48.841027975 CET192.168.2.148.8.8.80xf6f8Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:55.651282072 CET192.168.2.148.8.8.80x7acdStandard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:00.656047106 CET192.168.2.148.8.8.80x7acdStandard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:14.624453068 CET192.168.2.148.8.8.80xab57Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:17.442555904 CET192.168.2.148.8.8.80x82dcStandard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:22.162457943 CET192.168.2.148.8.8.80xec4aStandard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:27.168240070 CET192.168.2.148.8.8.80xec4aStandard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:32.882215977 CET192.168.2.148.8.8.80x3104Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:38.629215002 CET192.168.2.148.8.8.80x1905Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:49.353982925 CET192.168.2.148.8.8.80x6724Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:54.355246067 CET192.168.2.148.8.8.80x6724Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:54.364217997 CET192.168.2.148.8.8.80x6724Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:59.369267941 CET192.168.2.148.8.8.80x6724Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:27:05.386794090 CET192.168.2.148.8.8.80xe659Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:27:14.205017090 CET192.168.2.148.8.8.80x2a45Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:27:19.208972931 CET192.168.2.148.8.8.80x2a45Standard query (0)starforgemirai.duckdns.orgA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Oct 28, 2024 16:25:19.218322992 CET8.8.8.8192.168.2.140xd4d5Server failure (2)starforgemirai.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:24.222086906 CET8.8.8.8192.168.2.140xd4d5Server failure (2)starforgemirai.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:29.223870039 CET8.8.8.8192.168.2.140xd4d5Server failure (2)starforgemirai.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:30.319025993 CET8.8.8.8192.168.2.140xd4d5No error (0)starforgemirai.duckdns.org190.123.46.52A (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:39.037700891 CET8.8.8.8192.168.2.140x6dc4Server failure (2)starforgemirai.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:44.040301085 CET8.8.8.8192.168.2.140x6dc4Server failure (2)starforgemirai.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:44.136399031 CET8.8.8.8192.168.2.140x6dc4No error (0)starforgemirai.duckdns.org190.123.46.52A (IP address)IN (0x0001)false
                        Oct 28, 2024 16:25:51.944859982 CET8.8.8.8192.168.2.140xf6f8No error (0)starforgemirai.duckdns.org190.123.46.52A (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:00.735460997 CET8.8.8.8192.168.2.140x7acdServer failure (2)starforgemirai.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:04.908471107 CET8.8.8.8192.168.2.140x7acdNo error (0)starforgemirai.duckdns.org190.123.46.52A (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:15.725764036 CET8.8.8.8192.168.2.140xab57No error (0)starforgemirai.duckdns.org190.123.46.52A (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:17.450273991 CET8.8.8.8192.168.2.140x82dcNo error (0)starforgemirai.duckdns.org190.123.46.52A (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:27.169848919 CET8.8.8.8192.168.2.140xec4aServer failure (2)starforgemirai.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:27.176098108 CET8.8.8.8192.168.2.140xec4aNo error (0)starforgemirai.duckdns.org190.123.46.52A (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:32.891546965 CET8.8.8.8192.168.2.140x3104No error (0)starforgemirai.duckdns.org190.123.46.52A (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:38.637545109 CET8.8.8.8192.168.2.140x1905No error (0)starforgemirai.duckdns.org190.123.46.52A (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:54.361697912 CET8.8.8.8192.168.2.140x6724Server failure (2)starforgemirai.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:54.363192081 CET8.8.8.8192.168.2.140x6724Server failure (2)starforgemirai.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:26:59.563920021 CET8.8.8.8192.168.2.140x6724Server failure (2)starforgemirai.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:27:03.653959990 CET8.8.8.8192.168.2.140x6724No error (0)starforgemirai.duckdns.org190.123.46.52A (IP address)IN (0x0001)false
                        Oct 28, 2024 16:27:07.486938953 CET8.8.8.8192.168.2.140xe659No error (0)starforgemirai.duckdns.org190.123.46.52A (IP address)IN (0x0001)false
                        Oct 28, 2024 16:27:19.213594913 CET8.8.8.8192.168.2.140x2a45Server failure (2)starforgemirai.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                        Oct 28, 2024 16:27:19.217077017 CET8.8.8.8192.168.2.140x2a45No error (0)starforgemirai.duckdns.org190.123.46.52A (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):15:25:13
                        Start date (UTC):28/10/2024
                        Path:/tmp/bot.x86_64.elf
                        Arguments:/tmp/bot.x86_64.elf
                        File size:139576 bytes
                        MD5 hash:c795d89293cd6dd1f765c876ab53490f

                        Start time (UTC):15:25:13
                        Start date (UTC):28/10/2024
                        Path:/tmp/bot.x86_64.elf
                        Arguments:-
                        File size:139576 bytes
                        MD5 hash:c795d89293cd6dd1f765c876ab53490f

                        Start time (UTC):15:25:13
                        Start date (UTC):28/10/2024
                        Path:/tmp/bot.x86_64.elf
                        Arguments:-
                        File size:139576 bytes
                        MD5 hash:c795d89293cd6dd1f765c876ab53490f