Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
bot.x86.elf

Overview

General Information

Sample name:bot.x86.elf
Analysis ID:1561932
MD5:338f31eaeab0b97a0bf4583d7d18d016
SHA1:dd7e265f4b5e8e879bde31d30f247a6d19268a0a
SHA256:24c72bd24a1669678df40e94367674f0a9e41303a8a63ca5c96819680c4fa888
Tags:user-elfdigest
Infos:

Detection

Mirai, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Okiru
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Uses dynamic DNS services
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1561932
Start date and time:2024-11-24 21:05:13 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 19s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:bot.x86.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@16/0
  • VT rate limit hit for: bot.x86.elf
Command:/tmp/bot.x86.elf
PID:5527
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • bot.x86.elf (PID: 5527, Parent: 5448, MD5: 338f31eaeab0b97a0bf4583d7d18d016) Arguments: /tmp/bot.x86.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
bot.x86.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    bot.x86.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
      bot.x86.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        bot.x86.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0xf6b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf6cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf6e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf6f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf708:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf71c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf730:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf744:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf758:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf76c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf780:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf794:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf7f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf80c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf820:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf834:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xf848:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        bot.x86.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
        • 0x32f0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
        Click to see the 5 entries
        SourceRuleDescriptionAuthorStrings
        5527.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
          5527.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
            5527.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              5527.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
              • 0xf6b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf6cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf6e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf6f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf708:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf71c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf730:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf744:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf758:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf76c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf780:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf794:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf7f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf80c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf820:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf834:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0xf848:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              5527.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
              • 0x32f0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
              Click to see the 9 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-24T21:06:01.478084+010020304901Malware Command and Control Activity Detected192.168.2.1544798185.7.78.8843957TCP
              2024-11-24T21:06:09.047999+010020304901Malware Command and Control Activity Detected192.168.2.1544800185.7.78.8843957TCP
              2024-11-24T21:06:20.603848+010020304901Malware Command and Control Activity Detected192.168.2.1544802185.7.78.8843957TCP
              2024-11-24T21:06:26.119363+010020304901Malware Command and Control Activity Detected192.168.2.1544804185.7.78.8843957TCP
              2024-11-24T21:06:37.541208+010020304901Malware Command and Control Activity Detected192.168.2.1544806185.7.78.8843957TCP
              2024-11-24T21:06:45.904756+010020304901Malware Command and Control Activity Detected192.168.2.1544808185.7.78.8843957TCP
              2024-11-24T21:06:53.291725+010020304901Malware Command and Control Activity Detected192.168.2.1544810185.7.78.8843957TCP
              2024-11-24T21:07:02.855208+010020304901Malware Command and Control Activity Detected192.168.2.1544812185.7.78.8843957TCP
              2024-11-24T21:07:12.257666+010020304901Malware Command and Control Activity Detected192.168.2.1544814185.7.78.8843957TCP
              2024-11-24T21:07:14.689693+010020304901Malware Command and Control Activity Detected192.168.2.1544816185.7.78.8843957TCP
              2024-11-24T21:07:21.015962+010020304901Malware Command and Control Activity Detected192.168.2.1544818185.7.78.8843957TCP
              2024-11-24T21:07:31.483595+010020304901Malware Command and Control Activity Detected192.168.2.1544820185.7.78.8843957TCP
              2024-11-24T21:07:36.956992+010020304901Malware Command and Control Activity Detected192.168.2.1544822185.7.78.8843957TCP
              2024-11-24T21:07:47.410758+010020304901Malware Command and Control Activity Detected192.168.2.1544824185.7.78.8843957TCP
              2024-11-24T21:07:53.814620+010020304901Malware Command and Control Activity Detected192.168.2.1544826185.7.78.8843957TCP
              2024-11-24T21:08:04.366766+010020304901Malware Command and Control Activity Detected192.168.2.1544828185.7.78.8843957TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: bot.x86.elfAvira: detected
              Source: bot.x86.elfReversingLabs: Detection: 57%
              Source: bot.x86.elfJoe Sandbox ML: detected
              Source: bot.x86.elfString: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44826 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44798 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44814 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44824 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44802 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44828 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44800 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44808 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44804 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44818 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44812 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44816 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44822 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44820 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44810 -> 185.7.78.88:43957
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:44806 -> 185.7.78.88:43957
              Source: global trafficTCP traffic: 185.7.78.88 ports 43957,3,4,5,7,9
              Source: unknownDNS query: name: testprodad.duckdns.org
              Source: global trafficTCP traffic: 192.168.2.15:44798 -> 185.7.78.88:43957
              Source: global trafficDNS traffic detected: DNS query: testprodad.duckdns.org

              System Summary

              barindex
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: Process Memory Space: bot.x86.elf PID: 5527, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Initial sampleString containing 'busybox' found: /bin/busybox
              Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: Process Memory Space: bot.x86.elf PID: 5527, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.linELF@0/0@16/0
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/231/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/233/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/1333/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/1695/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/911/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/3875/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/914/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/19/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/1591/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/246/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/5/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/1585/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/7/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/129/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/8/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/802/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/804/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/3407/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/1484/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/131/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/133/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/1479/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/378/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/931/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/1595/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/812/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/933/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/3419/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/35/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/3310/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/260/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/261/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/262/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/142/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/263/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/264/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/265/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/145/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/266/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/267/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/268/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/3303/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/269/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/1486/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/1806/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/3684/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5529)File opened: /proc/3440/cmdlineJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5527, type: MEMORYSTR
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5527, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5527, type: MEMORYSTR
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5527.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5527, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              Valid AccountsWindows Management Instrumentation1
              Scripting
              Path InterceptionDirect Volume Access1
              OS Credential Dumping
              System Service DiscoveryRemote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive11
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              bot.x86.elf58%ReversingLabsLinux.Backdoor.Mirai
              bot.x86.elf100%AviraEXP/ELF.Mirai.Z.A
              bot.x86.elf100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              testprodad.duckdns.org
              185.7.78.88
              truetrue
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                185.7.78.88
                testprodad.duckdns.orgNetherlands
                43350NFORCENLtrue
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                NFORCENLsh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                • 212.92.113.245
                https://files-pdf-73j.pages.dev/?e=info@camida.comGet hashmaliciousUnknownBrowse
                • 185.66.143.73
                https://mikkymax.comGet hashmaliciousUnknownBrowse
                • 185.107.56.57
                dlr.x86.elfGet hashmaliciousMiraiBrowse
                • 77.247.181.219
                dlr.mpsl.elfGet hashmaliciousMiraiBrowse
                • 77.247.181.219
                dlr.arm7.elfGet hashmaliciousMiraiBrowse
                • 77.247.181.219
                dlr.mips.elfGet hashmaliciousMiraiBrowse
                • 77.247.181.219
                dlr.ppc.elfGet hashmaliciousMiraiBrowse
                • 77.247.181.219
                dlr.sh4.elfGet hashmaliciousMiraiBrowse
                • 77.247.181.219
                Payload 94.75.225.exeGet hashmaliciousUnknownBrowse
                • 185.107.57.64
                No context
                No context
                No created / dropped files found
                File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                Entropy (8bit):5.712438066938945
                TrID:
                • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                File name:bot.x86.elf
                File size:89'608 bytes
                MD5:338f31eaeab0b97a0bf4583d7d18d016
                SHA1:dd7e265f4b5e8e879bde31d30f247a6d19268a0a
                SHA256:24c72bd24a1669678df40e94367674f0a9e41303a8a63ca5c96819680c4fa888
                SHA512:c6a86259f2f4e0181fd52c6cd4c95bf4ce444939ded9af0508e81c82d633bc3c753445de7f48aaf20d26000e3c92d7d9ccc4e106f2d2d1749ec2c1a453d1dbd2
                SSDEEP:1536:xpG2cWAcCghsZcWU3S8QsStqU1gQI68jne8Fs8F2c/dw8SAwHEoSrtAjA0xZ:xpG3WrCEjWUifLZ98FIcK8SFk1IA0x
                TLSH:58936CC5F683D4F5EC9705B1113BAB375B33F0B52029EA42C769A932ECA1510EA16B9C
                File Content Preview:.ELF....................d...4...x\......4. ...(......................................................G..8...........Q.td............................U..S......./$...h........[]...$.............U......=@....t..5...................u........t....h............

                ELF header

                Class:ELF32
                Data:2's complement, little endian
                Version:1 (current)
                Machine:Intel 80386
                Version Number:0x1
                Type:EXEC (Executable file)
                OS/ABI:UNIX - System V
                ABI Version:0
                Entry Point Address:0x8048164
                Flags:0x0
                ELF Header Size:52
                Program Header Offset:52
                Program Header Size:32
                Number of Program Headers:3
                Section Header Offset:89208
                Section Header Size:40
                Number of Section Headers:10
                Header String Table Index:9
                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                NULL0x00x00x00x00x0000
                .initPROGBITS0x80480940x940x1c0x00x6AX001
                .textPROGBITS0x80480b00xb00xf1360x00x6AX0016
                .finiPROGBITS0x80571e60xf1e60x170x00x6AX001
                .rodataPROGBITS0x80572000xf2000x22b00x00x2A0032
                .ctorsPROGBITS0x805a4b40x114b40xc0x00x3WA004
                .dtorsPROGBITS0x805a4c00x114c00x80x00x3WA004
                .dataPROGBITS0x805a4e00x114e00x47580x00x3WA0032
                .bssNOBITS0x805ec400x15c380x49ac0x00x3WA0032
                .shstrtabSTRTAB0x00x15c380x3e0x00x0001
                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                LOAD0x00x80480000x80480000x114b00x114b06.58670x5R E0x1000.init .text .fini .rodata
                LOAD0x114b40x805a4b40x805a4b40x47840x91380.36160x6RW 0x1000.ctors .dtors .data .bss
                GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2024-11-24T21:06:01.478084+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544798185.7.78.8843957TCP
                2024-11-24T21:06:09.047999+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544800185.7.78.8843957TCP
                2024-11-24T21:06:20.603848+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544802185.7.78.8843957TCP
                2024-11-24T21:06:26.119363+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544804185.7.78.8843957TCP
                2024-11-24T21:06:37.541208+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544806185.7.78.8843957TCP
                2024-11-24T21:06:45.904756+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544808185.7.78.8843957TCP
                2024-11-24T21:06:53.291725+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544810185.7.78.8843957TCP
                2024-11-24T21:07:02.855208+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544812185.7.78.8843957TCP
                2024-11-24T21:07:12.257666+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544814185.7.78.8843957TCP
                2024-11-24T21:07:14.689693+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544816185.7.78.8843957TCP
                2024-11-24T21:07:21.015962+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544818185.7.78.8843957TCP
                2024-11-24T21:07:31.483595+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544820185.7.78.8843957TCP
                2024-11-24T21:07:36.956992+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544822185.7.78.8843957TCP
                2024-11-24T21:07:47.410758+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544824185.7.78.8843957TCP
                2024-11-24T21:07:53.814620+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544826185.7.78.8843957TCP
                2024-11-24T21:08:04.366766+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1544828185.7.78.8843957TCP
                TimestampSource PortDest PortSource IPDest IP
                Nov 24, 2024 21:06:01.357985020 CET4479843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:01.478008032 CET4395744798185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:01.478051901 CET4479843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:01.478084087 CET4479843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:01.598697901 CET4395744798185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:02.579291105 CET4395744798185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:02.579413891 CET4479843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:02.699213028 CET4395744798185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:08.924004078 CET4480043957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:09.043936968 CET4395744800185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:09.047975063 CET4480043957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:09.047998905 CET4480043957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:09.167588949 CET4395744800185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:10.148663044 CET4395744800185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:10.148825884 CET4480043957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:10.268559933 CET4395744800185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:20.483836889 CET4480243957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:20.603663921 CET4395744802185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:20.603847980 CET4480243957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:20.603847980 CET4480243957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:20.725430965 CET4395744802185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:21.861027002 CET4395744802185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:21.861186028 CET4480243957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:21.980838060 CET4395744802185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:25.996706009 CET4480443957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:26.119210958 CET4395744804185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:26.119335890 CET4480443957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:26.119363070 CET4480443957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:26.239283085 CET4395744804185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:27.289160013 CET4395744804185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:27.289485931 CET4480443957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:27.409471989 CET4395744804185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:37.415824890 CET4480643957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:37.541004896 CET4395744806185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:37.541208029 CET4480643957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:37.541208029 CET4480643957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:37.667987108 CET4395744806185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:38.648705006 CET4395744806185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:38.648906946 CET4480643957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:38.768498898 CET4395744806185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:45.784924984 CET4480843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:45.904642105 CET4395744808185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:45.904736042 CET4480843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:45.904756069 CET4480843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:46.024662971 CET4395744808185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:47.027427912 CET4395744808185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:47.027570009 CET4480843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:47.147355080 CET4395744808185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:53.171160936 CET4481043957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:53.291547060 CET4395744810185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:53.291708946 CET4481043957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:53.291724920 CET4481043957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:53.411365032 CET4395744810185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:54.393018007 CET4395744810185.7.78.88192.168.2.15
                Nov 24, 2024 21:06:54.393192053 CET4481043957192.168.2.15185.7.78.88
                Nov 24, 2024 21:06:54.512820005 CET4395744810185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:02.729577065 CET4481243957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:02.855030060 CET4395744812185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:02.855109930 CET4481243957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:02.855207920 CET4481243957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:02.975703955 CET4395744812185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:03.983752966 CET4395744812185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:03.984271049 CET4481243957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:04.104768038 CET4395744812185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:12.129834890 CET4481443957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:12.257395983 CET4395744814185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:12.257550955 CET4481443957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:12.257666111 CET4481443957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:12.383776903 CET4395744814185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:13.421555042 CET4395744814185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:13.421664953 CET4481443957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:13.548219919 CET4395744814185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:14.563707113 CET4481643957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:14.689553022 CET4395744816185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:14.689647913 CET4481643957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:14.689692974 CET4481643957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:14.814568996 CET4395744816185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:15.761032104 CET4395744816185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:15.761346102 CET4481643957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:15.883619070 CET4395744816185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:20.892765999 CET4481843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:21.015836954 CET4395744818185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:21.015961885 CET4481843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:21.015961885 CET4481843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:21.138400078 CET4395744818185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:22.207235098 CET4395744818185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:22.207436085 CET4481843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:22.328510046 CET4395744818185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:31.358534098 CET4482043957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:31.483444929 CET4395744820185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:31.483525038 CET4482043957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:31.483594894 CET4482043957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:31.611094952 CET4395744820185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:32.695523024 CET4395744820185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:32.695688009 CET4482043957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:32.826983929 CET4395744820185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:36.833367109 CET4482243957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:36.956837893 CET4395744822185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:36.956933975 CET4482243957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:36.956991911 CET4482243957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:37.078847885 CET4395744822185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:38.142924070 CET4395744822185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:38.143155098 CET4482243957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:38.266908884 CET4395744822185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:47.285551071 CET4482443957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:47.410459995 CET4395744824185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:47.410525084 CET4482443957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:47.410758018 CET4482443957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:47.535015106 CET4395744824185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:48.542423010 CET4395744824185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:48.542779922 CET4482443957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:48.668519020 CET4395744824185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:53.689353943 CET4482643957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:53.814428091 CET4395744826185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:53.814512968 CET4482643957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:53.814620018 CET4482643957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:53.940197945 CET4395744826185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:54.890408993 CET4395744826185.7.78.88192.168.2.15
                Nov 24, 2024 21:07:54.890566111 CET4482643957192.168.2.15185.7.78.88
                Nov 24, 2024 21:07:55.016002893 CET4395744826185.7.78.88192.168.2.15
                Nov 24, 2024 21:08:04.239480972 CET4482843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:08:04.366612911 CET4395744828185.7.78.88192.168.2.15
                Nov 24, 2024 21:08:04.366724014 CET4482843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:08:04.366765976 CET4482843957192.168.2.15185.7.78.88
                Nov 24, 2024 21:08:04.493494987 CET4395744828185.7.78.88192.168.2.15
                TimestampSource PortDest PortSource IPDest IP
                Nov 24, 2024 21:06:01.016969919 CET5144853192.168.2.158.8.8.8
                Nov 24, 2024 21:06:01.357877970 CET53514488.8.8.8192.168.2.15
                Nov 24, 2024 21:06:08.587968111 CET4892453192.168.2.158.8.8.8
                Nov 24, 2024 21:06:08.921056032 CET53489248.8.8.8192.168.2.15
                Nov 24, 2024 21:06:20.149730921 CET4674353192.168.2.158.8.8.8
                Nov 24, 2024 21:06:20.483599901 CET53467438.8.8.8192.168.2.15
                Nov 24, 2024 21:06:25.862206936 CET4812653192.168.2.158.8.8.8
                Nov 24, 2024 21:06:25.996551991 CET53481268.8.8.8192.168.2.15
                Nov 24, 2024 21:06:37.290589094 CET5858953192.168.2.158.8.8.8
                Nov 24, 2024 21:06:37.415709972 CET53585898.8.8.8192.168.2.15
                Nov 24, 2024 21:06:45.650068998 CET4983353192.168.2.158.8.8.8
                Nov 24, 2024 21:06:45.784810066 CET53498338.8.8.8192.168.2.15
                Nov 24, 2024 21:06:53.028908968 CET4618453192.168.2.158.8.8.8
                Nov 24, 2024 21:06:53.170974016 CET53461848.8.8.8192.168.2.15
                Nov 24, 2024 21:07:02.394278049 CET5722153192.168.2.158.8.8.8
                Nov 24, 2024 21:07:02.729331017 CET53572218.8.8.8192.168.2.15
                Nov 24, 2024 21:07:11.985712051 CET4857653192.168.2.158.8.8.8
                Nov 24, 2024 21:07:12.129477024 CET53485768.8.8.8192.168.2.15
                Nov 24, 2024 21:07:14.423043013 CET4402653192.168.2.158.8.8.8
                Nov 24, 2024 21:07:14.563540936 CET53440268.8.8.8192.168.2.15
                Nov 24, 2024 21:07:20.762456894 CET4864253192.168.2.158.8.8.8
                Nov 24, 2024 21:07:20.892642021 CET53486428.8.8.8192.168.2.15
                Nov 24, 2024 21:07:31.208688021 CET3721553192.168.2.158.8.8.8
                Nov 24, 2024 21:07:31.358381987 CET53372158.8.8.8192.168.2.15
                Nov 24, 2024 21:07:36.697138071 CET4696653192.168.2.158.8.8.8
                Nov 24, 2024 21:07:36.833193064 CET53469668.8.8.8192.168.2.15
                Nov 24, 2024 21:07:47.145065069 CET5415153192.168.2.158.8.8.8
                Nov 24, 2024 21:07:47.285382986 CET53541518.8.8.8192.168.2.15
                Nov 24, 2024 21:07:53.544754028 CET5667453192.168.2.158.8.8.8
                Nov 24, 2024 21:07:53.689172029 CET53566748.8.8.8192.168.2.15
                Nov 24, 2024 21:08:03.892277002 CET3906053192.168.2.158.8.8.8
                Nov 24, 2024 21:08:04.239257097 CET53390608.8.8.8192.168.2.15
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Nov 24, 2024 21:06:01.016969919 CET192.168.2.158.8.8.80x3238Standard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:06:08.587968111 CET192.168.2.158.8.8.80x522dStandard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:06:20.149730921 CET192.168.2.158.8.8.80x5a22Standard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:06:25.862206936 CET192.168.2.158.8.8.80xc2eStandard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:06:37.290589094 CET192.168.2.158.8.8.80xb177Standard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:06:45.650068998 CET192.168.2.158.8.8.80xe7ffStandard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:06:53.028908968 CET192.168.2.158.8.8.80xe12dStandard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:02.394278049 CET192.168.2.158.8.8.80xb07eStandard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:11.985712051 CET192.168.2.158.8.8.80x6aa7Standard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:14.423043013 CET192.168.2.158.8.8.80x8212Standard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:20.762456894 CET192.168.2.158.8.8.80x7b0Standard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:31.208688021 CET192.168.2.158.8.8.80x84c4Standard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:36.697138071 CET192.168.2.158.8.8.80xb7b2Standard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:47.145065069 CET192.168.2.158.8.8.80x63c8Standard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:53.544754028 CET192.168.2.158.8.8.80x70ceStandard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                Nov 24, 2024 21:08:03.892277002 CET192.168.2.158.8.8.80xd70bStandard query (0)testprodad.duckdns.orgA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Nov 24, 2024 21:06:01.357877970 CET8.8.8.8192.168.2.150x3238No error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:06:08.921056032 CET8.8.8.8192.168.2.150x522dNo error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:06:20.483599901 CET8.8.8.8192.168.2.150x5a22No error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:06:25.996551991 CET8.8.8.8192.168.2.150xc2eNo error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:06:37.415709972 CET8.8.8.8192.168.2.150xb177No error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:06:45.784810066 CET8.8.8.8192.168.2.150xe7ffNo error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:06:53.170974016 CET8.8.8.8192.168.2.150xe12dNo error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:02.729331017 CET8.8.8.8192.168.2.150xb07eNo error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:12.129477024 CET8.8.8.8192.168.2.150x6aa7No error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:14.563540936 CET8.8.8.8192.168.2.150x8212No error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:20.892642021 CET8.8.8.8192.168.2.150x7b0No error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:31.358381987 CET8.8.8.8192.168.2.150x84c4No error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:36.833193064 CET8.8.8.8192.168.2.150xb7b2No error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:47.285382986 CET8.8.8.8192.168.2.150x63c8No error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:07:53.689172029 CET8.8.8.8192.168.2.150x70ceNo error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false
                Nov 24, 2024 21:08:04.239257097 CET8.8.8.8192.168.2.150xd70bNo error (0)testprodad.duckdns.org185.7.78.88A (IP address)IN (0x0001)false

                System Behavior

                Start time (UTC):20:06:00
                Start date (UTC):24/11/2024
                Path:/tmp/bot.x86.elf
                Arguments:/tmp/bot.x86.elf
                File size:89608 bytes
                MD5 hash:338f31eaeab0b97a0bf4583d7d18d016

                Start time (UTC):20:06:00
                Start date (UTC):24/11/2024
                Path:/tmp/bot.x86.elf
                Arguments:-
                File size:89608 bytes
                MD5 hash:338f31eaeab0b97a0bf4583d7d18d016

                Start time (UTC):20:06:00
                Start date (UTC):24/11/2024
                Path:/tmp/bot.x86.elf
                Arguments:-
                File size:89608 bytes
                MD5 hash:338f31eaeab0b97a0bf4583d7d18d016