Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
Mozi.m.elf

Overview

General Information

Sample name:Mozi.m.elf
Analysis ID:1561658
MD5:b7dd8ae293acac2ef8dbc7af95095668
SHA1:039e66a7d562f6cba38c4029b53d6f95ae6e6d5c
SHA256:ecf777a2d3f4abec13e04450a8ee1a75e2c3b151ca9528defb067ade4fa810a8
Tags:elfuser-abuse_ch
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Executes the "iptables" command to insert, remove and/or manipulate rules
Opens /proc/net/* files useful for finding connected devices and routers
Sample deletes itself
Creates hidden files and/or directories
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "iptables" command used for managing IP filtering and manipulation
Reads the 'hosts' file potentially containing internal network hosts
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1561658
Start date and time:2024-11-24 03:37:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 0s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:Mozi.m.elf
Detection:MAL
Classification:mal68.spre.evad.linELF@0/2@58/0
  • Excluded IPs from analysis (whitelisted): 212.138.170.134
  • Excluded domains from analysis (whitelisted): pool.ntp.org
Command:/tmp/Mozi.m.elf
PID:5408
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:iptables v1.8.4 (legacy): Couldn't load target `CWMP_CR':No such file or directory

Try `iptables -h' or 'iptables --help' for more information.
iptables: No chain/target/match by that name.
  • system is lnxubuntu20
  • Mozi.m.elf (PID: 5408, Parent: 5336, MD5: 0083f1f0e77be34ad27f849842bbb00c) Arguments: /tmp/Mozi.m.elf
    • Mozi.m.elf New Fork (PID: 5410, Parent: 5408)
      • Mozi.m.elf New Fork (PID: 5412, Parent: 5410)
        • sh (PID: 5416, Parent: 5412, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
          • sh New Fork (PID: 5422, Parent: 5416)
          • iptables (PID: 5422, Parent: 5416, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --destination-port 23 -j DROP
        • sh (PID: 5434, Parent: 5412, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
          • sh New Fork (PID: 5439, Parent: 5434)
          • iptables (PID: 5439, Parent: 5434, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --destination-port 7547 -j DROP
        • sh (PID: 5440, Parent: 5412, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
          • sh New Fork (PID: 5445, Parent: 5440)
          • iptables (PID: 5445, Parent: 5440, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --destination-port 5555 -j DROP
        • sh (PID: 5446, Parent: 5412, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
          • sh New Fork (PID: 5451, Parent: 5446)
          • iptables (PID: 5451, Parent: 5446, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -A INPUT -p tcp --destination-port 5358 -j DROP
        • sh (PID: 5452, Parent: 5412, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -D INPUT -j CWMP_CR"
          • sh New Fork (PID: 5457, Parent: 5452)
          • iptables (PID: 5457, Parent: 5452, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -D INPUT -j CWMP_CR
        • sh (PID: 5458, Parent: 5412, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -X CWMP_CR"
          • sh New Fork (PID: 5463, Parent: 5458)
          • iptables (PID: 5463, Parent: 5458, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -X CWMP_CR
        • sh (PID: 5464, Parent: 5412, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "iptables -I INPUT -p udp --dport 11002 -j ACCEPT"
          • sh New Fork (PID: 5469, Parent: 5464)
          • iptables (PID: 5469, Parent: 5464, MD5: 1ab05fef765b6342cdfadaa5275b33af) Arguments: iptables -I INPUT -p udp --dport 11002 -j ACCEPT
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Mozi.m.elfAvira: detected
Source: Mozi.m.elfReversingLabs: Detection: 48%
Source: Mozi.m.elfVirustotal: Detection: 46%Perma Link

Spreading

barindex
Source: /tmp/Mozi.m.elf (PID: 5410)Opens: /proc/net/routeJump to behavior

Networking

barindex
Source: /bin/sh (PID: 5422)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROPJump to behavior
Source: /bin/sh (PID: 5439)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROPJump to behavior
Source: /bin/sh (PID: 5445)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROPJump to behavior
Source: /bin/sh (PID: 5451)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROPJump to behavior
Source: /bin/sh (PID: 5457)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CRJump to behavior
Source: /bin/sh (PID: 5463)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -X CWMP_CRJump to behavior
Source: /bin/sh (PID: 5469)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 11002 -j ACCEPTJump to behavior
Source: /bin/sh (PID: 5422)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROPJump to behavior
Source: /bin/sh (PID: 5439)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROPJump to behavior
Source: /bin/sh (PID: 5445)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROPJump to behavior
Source: /bin/sh (PID: 5451)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROPJump to behavior
Source: /bin/sh (PID: 5457)Iptables executable: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CRJump to behavior
Source: /bin/sh (PID: 5463)Iptables executable: /usr/sbin/iptables -> iptables -X CWMP_CRJump to behavior
Source: /bin/sh (PID: 5469)Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 11002 -j ACCEPTJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)Reads hosts file: /etc/hostsJump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 127.0.0.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 127.0.0.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 127.0.0.1
Source: unknownUDP traffic detected without corresponding DNS query: 127.0.0.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: router.utorrent.com
Source: global trafficDNS traffic detected: DNS query: router.bittorrent.com
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: LOAD without section mappingsProgram segment: 0x100000
Source: classification engineClassification label: mal68.spre.evad.linELF@0/2@58/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5422)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROPJump to behavior
Source: /bin/sh (PID: 5439)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROPJump to behavior
Source: /bin/sh (PID: 5445)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROPJump to behavior
Source: /bin/sh (PID: 5451)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROPJump to behavior
Source: /bin/sh (PID: 5457)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CRJump to behavior
Source: /bin/sh (PID: 5463)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -X CWMP_CRJump to behavior
Source: /bin/sh (PID: 5469)Iptables executable using switch for changing the iptables rules: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 11002 -j ACCEPTJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)Directory: /tmp/.pJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/238/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/239/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/914/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/917/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/5394/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/5394/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/5396/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/5396/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/3095/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/241/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/1/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/1588/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/800/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/1906/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/802/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/803/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/3420/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/1482/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/1482/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/490/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/1480/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/1480/fdJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/371/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5412)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/Mozi.m.elf (PID: 5416)Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"Jump to behavior
Source: /tmp/Mozi.m.elf (PID: 5434)Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"Jump to behavior
Source: /tmp/Mozi.m.elf (PID: 5440)Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"Jump to behavior
Source: /tmp/Mozi.m.elf (PID: 5446)Shell command executed: sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"Jump to behavior
Source: /tmp/Mozi.m.elf (PID: 5452)Shell command executed: sh -c "iptables -D INPUT -j CWMP_CR"Jump to behavior
Source: /tmp/Mozi.m.elf (PID: 5458)Shell command executed: sh -c "iptables -X CWMP_CR"Jump to behavior
Source: /tmp/Mozi.m.elf (PID: 5464)Shell command executed: sh -c "iptables -I INPUT -p udp --dport 11002 -j ACCEPT"Jump to behavior
Source: /bin/sh (PID: 5422)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 23 -j DROPJump to behavior
Source: /bin/sh (PID: 5439)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 7547 -j DROPJump to behavior
Source: /bin/sh (PID: 5445)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5555 -j DROPJump to behavior
Source: /bin/sh (PID: 5451)Iptables executable: /usr/sbin/iptables -> iptables -A INPUT -p tcp --destination-port 5358 -j DROPJump to behavior
Source: /bin/sh (PID: 5457)Iptables executable: /usr/sbin/iptables -> iptables -D INPUT -j CWMP_CRJump to behavior
Source: /bin/sh (PID: 5463)Iptables executable: /usr/sbin/iptables -> iptables -X CWMP_CRJump to behavior
Source: /bin/sh (PID: 5469)Iptables executable: /usr/sbin/iptables -> iptables -I INPUT -p udp --dport 11002 -j ACCEPTJump to behavior
Source: submitted sampleStderr: iptables v1.8.4 (legacy): Couldn't load target `CWMP_CR':No such file or directoryTry `iptables -h' or 'iptables --help' for more information.iptables: No chain/target/match by that name.: exit code = 0

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/Mozi.m.elf (PID: 5412)File: /tmp/Mozi.m.elfJump to behavior
Source: Mozi.m.elfSubmission file: segment LOAD with 7.9794 entropy (max. 8.0)
Source: /tmp/Mozi.m.elf (PID: 5408)Queries kernel information via 'uname': Jump to behavior
Source: Mozi.m.elf, 5408.1.000055a783853000.000055a7838da000.rw-.sdmp, Mozi.m.elf, 5410.1.000055a783853000.000055a7838da000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mips
Source: Mozi.m.elf, 5410.1.00007fffbd94b000.00007fffbd96c000.rw-.sdmpBinary or memory string: /tmp/qemu-open.421wig
Source: Mozi.m.elf, 5408.1.000055a783853000.000055a7838da000.rw-.sdmp, Mozi.m.elf, 5410.1.000055a783853000.000055a7838da000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips
Source: Mozi.m.elf, 5408.1.00007fffbd94b000.00007fffbd96c000.rw-.sdmp, Mozi.m.elf, 5410.1.00007fffbd94b000.00007fffbd96c000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips
Source: Mozi.m.elf, 5408.1.00007fffbd94b000.00007fffbd96c000.rw-.sdmp, Mozi.m.elf, 5410.1.00007fffbd94b000.00007fffbd96c000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mips/tmp/Mozi.m.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/Mozi.m.elf
Source: Mozi.m.elf, 5410.1.00007fffbd94b000.00007fffbd96c000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.421wig
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Hidden Files and Directories
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
File Deletion
Security Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
System Network Configuration Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1561658 Sample: Mozi.m.elf Startdate: 24/11/2024 Architecture: LINUX Score: 68 41 router.utorrent.com 2->41 43 router.bittorrent.com 2->43 45 daisy.ubuntu.com 2->45 47 Antivirus / Scanner detection for submitted sample 2->47 49 Multi AV Scanner detection for submitted file 2->49 10 Mozi.m.elf 2->10         started        signatures3 process4 process5 12 Mozi.m.elf 10->12         started        signatures6 53 Opens /proc/net/* files useful for finding connected devices and routers 12->53 15 Mozi.m.elf 12->15         started        process7 signatures8 55 Sample deletes itself 15->55 18 Mozi.m.elf sh 15->18         started        20 Mozi.m.elf sh 15->20         started        22 Mozi.m.elf sh 15->22         started        24 4 other processes 15->24 process9 process10 26 sh iptables 18->26         started        29 sh iptables 20->29         started        31 sh iptables 22->31         started        33 sh iptables 24->33         started        35 sh iptables 24->35         started        37 sh iptables 24->37         started        39 sh iptables 24->39         started        signatures11 51 Executes the "iptables" command to insert, remove and/or manipulate rules 26->51

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Mozi.m.elf49%ReversingLabsLinux.Backdoor.Hajime
Mozi.m.elf47%VirustotalBrowse
Mozi.m.elf100%AviraLINUX/Hajime.icukp
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    router.bittorrent.com
    unknown
    unknownfalse
      high
      router.utorrent.com
      unknown
      unknownfalse
        high
        No contacted IP infos
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        daisy.ubuntu.comarm.nn.elfGet hashmaliciousMirai, OkiruBrowse
        • 162.213.35.24
        sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
        • 162.213.35.25
        m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
        • 162.213.35.25
        arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
        • 162.213.35.25
        main_arm6.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.25
        jzyKEkkDsV.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.25
        sora.arm.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.25
        sora.m68k.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.24
        sora.x86.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.24
        sora.mips.elfGet hashmaliciousMiraiBrowse
        • 162.213.35.24
        No context
        No context
        No context
        Process:/tmp/Mozi.m.elf
        File Type:ASCII text
        Category:dropped
        Size (bytes):230
        Entropy (8bit):3.709552666863289
        Encrypted:false
        SSDEEP:6:iekrEcvwAsE5KlwSd4pzKaV6Lpms/a/1VCxGF:ur+m5MwSdIKaV6L1adVRF
        MD5:2E667F43AE18CD1FE3C108641708A82C
        SHA1:12B90DE2DA0FBCFE66F3D6130905E56C8D6A68D3
        SHA-256:6F721492E7A337C5B498A8F55F5EB7AC745AFF716D0B5B08EFF2C1B6B250F983
        SHA-512:D2A0EE2509154EC1098994F38BE172F98F4150399C534A04D5C675D7C05630802225019F19344CC9070C576BC465A4FEB382AC7712DE6BF25E9244B54A9DB830
        Malicious:false
        Reputation:high, very likely benign file
        Preview:Iface.Destination.Gateway .Flags.RefCnt.Use.Metric.Mask..MTU.Window.IRTT .ens160.00000000.c0a80201.0003.0.0.0.00000000.0.0.0.ens160.c0a80200.00000000.0001.0.0.0.ffffff00.0.0.0.
        Process:/tmp/Mozi.m.elf
        File Type:data
        Category:dropped
        Size (bytes):16
        Entropy (8bit):3.625
        Encrypted:false
        SSDEEP:3:Tg0803:TgY3
        MD5:4F7F03D352C472368B7F66407166FBC7
        SHA1:0BE49B90F139A38920B5B7B1770554316EB98327
        SHA-256:B3CD09C2F093683F2F2C3FAE3E711701B0F9690C1889644E7B9039DB0D18CCF6
        SHA-512:4FCAD17E605DC7F00FAF3CEE5898A378B7801F584BA0D54A670D7DFF33F66306CE0B72444B5B85B049156582313B036D434C4FD5F7A5D5663A957FD1AB29B783
        Malicious:false
        Reputation:low
        Preview:/tmp/Mozi.m.elf.
        File type:ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, no section header
        Entropy (8bit):7.979558736499395
        TrID:
        • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
        • ELF Executable and Linkable format (generic) (4004/1) 49.84%
        File name:Mozi.m.elf
        File size:84'180 bytes
        MD5:b7dd8ae293acac2ef8dbc7af95095668
        SHA1:039e66a7d562f6cba38c4029b53d6f95ae6e6d5c
        SHA256:ecf777a2d3f4abec13e04450a8ee1a75e2c3b151ca9528defb067ade4fa810a8
        SHA512:8dde41064398a31d50e38de80a84cb4f58250f3b0f0934159b82c9499bc268441a7394388a0425a7fe3adc8121ad0fd1ad0ee8b62ea79f5f56e07bdb1f194cf4
        SSDEEP:1536:yYI0ARqw1qAEW67UIWi7M8gmfmJo0WgswnD6Efyq8PxlRkp2K3/J1V+uBNi:yYI0ARqw1qAEv7UIFM8oJorFquyjkRks
        TLSH:90831229135514E9D62681F1D3FD1F84AD591F68CEE2EC157812BC99ED333AD3CC2618
        File Content Preview:.ELF....................../....4.........4. ...(......................Bd..Bd.................G...G.................................................^.......?.E.h4...@b..) ..]..0...a.t<..mc.zy/..>..!c...gM\<j..W`xD'..}...\..].j.L.u...S..i...../..F...@`..'k.

        ELF header

        Class:ELF32
        Data:2's complement, big endian
        Version:1 (current)
        Machine:MIPS R3000
        Version Number:0x1
        Type:EXEC (Executable file)
        OS/ABI:UNIX - System V
        ABI Version:0
        Entry Point Address:0x112fe8
        Flags:0x1007
        ELF Header Size:52
        Program Header Offset:52
        Program Header Size:32
        Number of Program Headers:2
        Section Header Offset:0
        Section Header Size:40
        Number of Section Headers:0
        Header String Table Index:0
        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
        LOAD0x00x1000000x1000000x142640x142647.97940x5R E0x10000
        LOAD0xa6c00x47a6c00x47a6c00x00x00.00000x6RW 0x10000
        TimestampSource PortDest PortSource IPDest IP
        Nov 24, 2024 03:38:00.799072027 CET4836153192.168.2.131.1.1.1
        Nov 24, 2024 03:38:05.819101095 CET3828653192.168.2.138.8.8.8
        Nov 24, 2024 03:38:11.068955898 CET4907253192.168.2.131.1.1.1
        Nov 24, 2024 03:38:16.319180012 CET4817453192.168.2.138.8.8.8
        Nov 24, 2024 03:38:21.569052935 CET6018053192.168.2.131.1.1.1
        Nov 24, 2024 03:38:26.819120884 CET5166553192.168.2.138.8.8.8
        Nov 24, 2024 03:38:30.830652952 CET4573553192.168.2.138.8.8.8
        Nov 24, 2024 03:38:32.069109917 CET5863753192.168.2.131.1.1.1
        Nov 24, 2024 03:38:35.832880974 CET4723453192.168.2.138.8.8.8
        Nov 24, 2024 03:38:37.319190025 CET3721053192.168.2.138.8.8.8
        Nov 24, 2024 03:38:40.841986895 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:38:42.569080114 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:38:46.069298983 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:38:47.819135904 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:38:51.318998098 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:38:53.069101095 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:38:56.569169998 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:38:58.318948984 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:39:01.819026947 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:39:03.568965912 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:39:07.069156885 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:39:08.819106102 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:39:10.876123905 CET3542253192.168.2.13127.0.0.1
        Nov 24, 2024 03:39:12.319180965 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:39:14.069106102 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:39:15.882545948 CET4584253192.168.2.13127.0.0.1
        Nov 24, 2024 03:39:17.569066048 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:39:19.319087982 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:39:22.818994045 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:39:24.569094896 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:39:28.068944931 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:39:29.818973064 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:39:33.319037914 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:39:35.068974018 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:39:38.569000006 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:39:40.319001913 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:39:43.819170952 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:39:45.568945885 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:39:49.069075108 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:39:50.819103003 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:39:50.952332973 CET5425753192.168.2.138.8.8.8
        Nov 24, 2024 03:39:54.319076061 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:39:55.955984116 CET5240753192.168.2.138.8.8.8
        Nov 24, 2024 03:39:56.068979979 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:39:59.569006920 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:40:01.319025993 CET5232753192.168.2.131.1.1.1
        Nov 24, 2024 03:40:04.818975925 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:40:10.069071054 CET5853753192.168.2.138.8.8.8
        Nov 24, 2024 03:40:15.319031000 CET4068453192.168.2.131.1.1.1
        Nov 24, 2024 03:40:20.569205999 CET4131753192.168.2.138.8.8.8
        Nov 24, 2024 03:40:25.819019079 CET5104853192.168.2.131.1.1.1
        Nov 24, 2024 03:40:30.995634079 CET5051553192.168.2.13127.0.0.1
        Nov 24, 2024 03:40:31.068983078 CET5267253192.168.2.138.8.8.8
        Nov 24, 2024 03:40:36.002476931 CET3510053192.168.2.13127.0.0.1
        Nov 24, 2024 03:40:36.319210052 CET5259153192.168.2.131.1.1.1
        Nov 24, 2024 03:40:40.268867970 CET4004053192.168.2.131.1.1.1
        Nov 24, 2024 03:40:40.268867970 CET4313453192.168.2.131.1.1.1
        Nov 24, 2024 03:40:40.493083954 CET53400401.1.1.1192.168.2.13
        Nov 24, 2024 03:40:40.494590044 CET53431341.1.1.1192.168.2.13
        Nov 24, 2024 03:40:41.568959951 CET4538353192.168.2.138.8.8.8
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Nov 24, 2024 03:38:00.799072027 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:05.819101095 CET192.168.2.138.8.8.80x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:11.068955898 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:16.319180012 CET192.168.2.138.8.8.80x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:21.569052935 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:26.819120884 CET192.168.2.138.8.8.80x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:30.830652952 CET192.168.2.138.8.8.80x9dd1Standard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:32.069109917 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:35.832880974 CET192.168.2.138.8.8.80x9dd1Standard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:37.319190025 CET192.168.2.138.8.8.80x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:40.841986895 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:42.569080114 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:46.069298983 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:47.819135904 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:51.318998098 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:53.069101095 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:56.569169998 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:38:58.318948984 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:01.819026947 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:03.568965912 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:07.069156885 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:08.819106102 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:10.876123905 CET192.168.2.13127.0.0.10x21a5Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:12.319180965 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:14.069106102 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:15.882545948 CET192.168.2.13127.0.0.10x21a5Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:17.569066048 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:19.319087982 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:22.818994045 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:24.569094896 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:28.068944931 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:29.818973064 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:33.319037914 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:35.068974018 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:38.569000006 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:40.319001913 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:43.819170952 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:45.568945885 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:49.069075108 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:50.819103003 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:50.952332973 CET192.168.2.138.8.8.80x7de4Standard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:54.319076061 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:55.955984116 CET192.168.2.138.8.8.80x7de4Standard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:56.068979979 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:39:59.569006920 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:40:01.319025993 CET192.168.2.131.1.1.10x9ccfStandard query (0)router.utorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:40:04.818975925 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:40:10.069071054 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:40:15.319031000 CET192.168.2.131.1.1.10xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:40:20.569205999 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:40:25.819019079 CET192.168.2.131.1.1.10xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:40:30.995634079 CET192.168.2.13127.0.0.10xe0a6Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:40:31.068983078 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:40:36.002476931 CET192.168.2.13127.0.0.10xe0a6Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:40:36.319210052 CET192.168.2.131.1.1.10xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:40:40.268867970 CET192.168.2.131.1.1.10xb19aStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
        Nov 24, 2024 03:40:40.268867970 CET192.168.2.131.1.1.10x932dStandard query (0)daisy.ubuntu.com28IN (0x0001)false
        Nov 24, 2024 03:40:41.568959951 CET192.168.2.138.8.8.80xc540Standard query (0)router.bittorrent.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Nov 24, 2024 03:40:40.493083954 CET1.1.1.1192.168.2.130xb19aNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
        Nov 24, 2024 03:40:40.493083954 CET1.1.1.1192.168.2.130xb19aNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

        System Behavior

        Start time (UTC):02:37:54
        Start date (UTC):24/11/2024
        Path:/tmp/Mozi.m.elf
        Arguments:/tmp/Mozi.m.elf
        File size:5777432 bytes
        MD5 hash:0083f1f0e77be34ad27f849842bbb00c

        Start time (UTC):02:37:54
        Start date (UTC):24/11/2024
        Path:/tmp/Mozi.m.elf
        Arguments:-
        File size:5777432 bytes
        MD5 hash:0083f1f0e77be34ad27f849842bbb00c

        Start time (UTC):02:37:55
        Start date (UTC):24/11/2024
        Path:/tmp/Mozi.m.elf
        Arguments:-
        File size:5777432 bytes
        MD5 hash:0083f1f0e77be34ad27f849842bbb00c

        Start time (UTC):02:37:58
        Start date (UTC):24/11/2024
        Path:/tmp/Mozi.m.elf
        Arguments:-
        File size:5777432 bytes
        MD5 hash:0083f1f0e77be34ad27f849842bbb00c

        Start time (UTC):02:37:58
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:sh -c "iptables -A INPUT -p tcp --destination-port 23 -j DROP"
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:58
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:-
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:58
        Start date (UTC):24/11/2024
        Path:/usr/sbin/iptables
        Arguments:iptables -A INPUT -p tcp --destination-port 23 -j DROP
        File size:99296 bytes
        MD5 hash:1ab05fef765b6342cdfadaa5275b33af

        Start time (UTC):02:37:58
        Start date (UTC):24/11/2024
        Path:/tmp/Mozi.m.elf
        Arguments:-
        File size:5777432 bytes
        MD5 hash:0083f1f0e77be34ad27f849842bbb00c

        Start time (UTC):02:37:58
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:sh -c "iptables -A INPUT -p tcp --destination-port 7547 -j DROP"
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:58
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:-
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:58
        Start date (UTC):24/11/2024
        Path:/usr/sbin/iptables
        Arguments:iptables -A INPUT -p tcp --destination-port 7547 -j DROP
        File size:99296 bytes
        MD5 hash:1ab05fef765b6342cdfadaa5275b33af

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/tmp/Mozi.m.elf
        Arguments:-
        File size:5777432 bytes
        MD5 hash:0083f1f0e77be34ad27f849842bbb00c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:sh -c "iptables -A INPUT -p tcp --destination-port 5555 -j DROP"
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:-
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/usr/sbin/iptables
        Arguments:iptables -A INPUT -p tcp --destination-port 5555 -j DROP
        File size:99296 bytes
        MD5 hash:1ab05fef765b6342cdfadaa5275b33af

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/tmp/Mozi.m.elf
        Arguments:-
        File size:5777432 bytes
        MD5 hash:0083f1f0e77be34ad27f849842bbb00c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:sh -c "iptables -A INPUT -p tcp --destination-port 5358 -j DROP"
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:-
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/usr/sbin/iptables
        Arguments:iptables -A INPUT -p tcp --destination-port 5358 -j DROP
        File size:99296 bytes
        MD5 hash:1ab05fef765b6342cdfadaa5275b33af

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/tmp/Mozi.m.elf
        Arguments:-
        File size:5777432 bytes
        MD5 hash:0083f1f0e77be34ad27f849842bbb00c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:sh -c "iptables -D INPUT -j CWMP_CR"
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:-
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/usr/sbin/iptables
        Arguments:iptables -D INPUT -j CWMP_CR
        File size:99296 bytes
        MD5 hash:1ab05fef765b6342cdfadaa5275b33af

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/tmp/Mozi.m.elf
        Arguments:-
        File size:5777432 bytes
        MD5 hash:0083f1f0e77be34ad27f849842bbb00c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:sh -c "iptables -X CWMP_CR"
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:-
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/usr/sbin/iptables
        Arguments:iptables -X CWMP_CR
        File size:99296 bytes
        MD5 hash:1ab05fef765b6342cdfadaa5275b33af

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/tmp/Mozi.m.elf
        Arguments:-
        File size:5777432 bytes
        MD5 hash:0083f1f0e77be34ad27f849842bbb00c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:sh -c "iptables -I INPUT -p udp --dport 11002 -j ACCEPT"
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/bin/sh
        Arguments:-
        File size:129816 bytes
        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

        Start time (UTC):02:37:59
        Start date (UTC):24/11/2024
        Path:/usr/sbin/iptables
        Arguments:iptables -I INPUT -p udp --dport 11002 -j ACCEPT
        File size:99296 bytes
        MD5 hash:1ab05fef765b6342cdfadaa5275b33af