Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
iwir64.elf

Overview

General Information

Sample name:iwir64.elf
Analysis ID:1562600
MD5:df7da3ebaac8fc9abc23bb930c47bc52
SHA1:836a6e0603e7e263eb77def91466bbd3bbbe2368
SHA256:46fe51cd5a8e3adc4aa8687e86b4234fc78ae70dce372e49c69228aa3fe49838
Tags:elfuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found

Detection

Mirai
Score:76
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Machine Learning detection for sample
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1562600
Start date and time:2024-11-25 19:06:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 21s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:iwir64.elf
Detection:MAL
Classification:mal76.troj.linELF@0/0@0/0
  • No process behavior to analyse as no analysis process or sample was found
  • VT rate limit hit for: iwir64.elf
Command:/tmp/iwir64.elf
PID:6238
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
iwir64.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    iwir64.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0x1c340:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c354:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c368:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c37c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c390:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c3a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c3b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c3cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c3e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c3f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c408:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c41c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c430:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c444:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c458:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c46c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c480:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c494:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c4a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c4bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c4d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    iwir64.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
    • 0x11fec:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
    iwir64.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
    • 0x12863:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
    iwir64.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
    • 0xe716:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
    • 0xe908:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
    Click to see the 9 entries
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: iwir64.elfAvira: detected
    Source: iwir64.elfReversingLabs: Detection: 44%
    Source: iwir64.elfJoe Sandbox ML: detected
    Source: iwir64.elfString: AEOF/proc//proc/%s/cmdlinewgetcurlftpechokillbashrebootshutdownhaltpoweroff/fd/proc/%s/stat/proc/proc/%d/stat%d %s %c %dps -e -o pid,args=%d %255[^
    Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
    Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
    Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
    Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
    Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

    System Summary

    barindex
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
    Source: Initial sampleString containing 'busybox' found: BusyBox
    Source: Initial sampleString containing 'busybox' found: ]BusyBoxps:/proc/%d/exe/proc/%d/maps/var/run/mnt/root/var/tmp/boot/bin/sbin/../(deleted)/homedbgmpslmipselmipsarmarm4arm5arm6arm7sh4m68kx86x586x86_64i586i686ppcspc[locker] killed process: %s ;; pid: %d
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
    Source: iwir64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
    Source: classification engineClassification label: mal76.troj.linELF@0/0@0/0

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: iwir64.elf, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: iwir64.elf, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information1
    Scripting
    Valid AccountsWindows Management Instrumentation1
    Scripting
    Path InterceptionDirect Volume AccessOS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    No configs have been found
    SourceDetectionScannerLabelLink
    iwir64.elf45%ReversingLabsLinux.Backdoor.Mirai
    iwir64.elf100%AviraEXP/ELF.Mirai.Z.A
    iwir64.elf100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    109.202.202.202
    unknownSwitzerland
    13030INIT7CHfalse
    91.189.91.43
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    91.189.91.42
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
    • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
    91.189.91.43vwkjebwi686.elfGet hashmaliciousUnknownBrowse
      la.bot.arc.elfGet hashmaliciousMiraiBrowse
        loligang.m68k.elfGet hashmaliciousMiraiBrowse
          Mozi.m.elfGet hashmaliciousMiraiBrowse
            .i.elfGet hashmaliciousUnknownBrowse
              vwkjebwi686.elfGet hashmaliciousUnknownBrowse
                boatnet.x86.elfGet hashmaliciousMiraiBrowse
                  i.elfGet hashmaliciousUnknownBrowse
                    pXdN91.armv5l.elfGet hashmaliciousMirai, GafgytBrowse
                      91.189.91.42vwkjebwi686.elfGet hashmaliciousUnknownBrowse
                        la.bot.arc.elfGet hashmaliciousMiraiBrowse
                          loligang.m68k.elfGet hashmaliciousMiraiBrowse
                            Mozi.m.elfGet hashmaliciousMiraiBrowse
                              .i.elfGet hashmaliciousUnknownBrowse
                                vwkjebwi686.elfGet hashmaliciousUnknownBrowse
                                  boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                    i.elfGet hashmaliciousUnknownBrowse
                                      pXdN91.armv5l.elfGet hashmaliciousMirai, GafgytBrowse
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CANONICAL-ASGBvwkjebwi686.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        loligang.m68k.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        Mozi.m.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        .i.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        vwkjebwi686.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        i.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        sshd.elfGet hashmaliciousUnknownBrowse
                                        • 185.125.190.26
                                        CANONICAL-ASGBvwkjebwi686.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        loligang.m68k.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        Mozi.m.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        .i.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        vwkjebwi686.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        i.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        sshd.elfGet hashmaliciousUnknownBrowse
                                        • 185.125.190.26
                                        INIT7CHvwkjebwi686.elfGet hashmaliciousUnknownBrowse
                                        • 109.202.202.202
                                        la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                        • 109.202.202.202
                                        loligang.m68k.elfGet hashmaliciousMiraiBrowse
                                        • 109.202.202.202
                                        Mozi.m.elfGet hashmaliciousMiraiBrowse
                                        • 109.202.202.202
                                        .i.elfGet hashmaliciousUnknownBrowse
                                        • 109.202.202.202
                                        vwkjebwi686.elfGet hashmaliciousUnknownBrowse
                                        • 109.202.202.202
                                        boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                        • 109.202.202.202
                                        i.elfGet hashmaliciousUnknownBrowse
                                        • 109.202.202.202
                                        pXdN91.armv5l.elfGet hashmaliciousMirai, GafgytBrowse
                                        • 109.202.202.202
                                        No context
                                        No context
                                        No created / dropped files found
                                        File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, missing section headers at 168104
                                        Entropy (8bit):5.94211433063978
                                        TrID:
                                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                        File name:iwir64.elf
                                        File size:143'971 bytes
                                        MD5:df7da3ebaac8fc9abc23bb930c47bc52
                                        SHA1:836a6e0603e7e263eb77def91466bbd3bbbe2368
                                        SHA256:46fe51cd5a8e3adc4aa8687e86b4234fc78ae70dce372e49c69228aa3fe49838
                                        SHA512:93d3d78d03e784394bfe4fff86ca1103d235e1518e322b8676c8c543bb95c666c273b4bba46933c30b67c15eb45167142ced437d288375a948068edf9b9a294b
                                        SSDEEP:3072:m2dSBfqWx37k9o6JjDoZ2iYbCwjTPmEqhg/VyOPmV3Rt9NMYVB7BZ:m2gBfqWx37k9oKDoZCpeVvVtBZ
                                        TLSH:FBE35C06B5C188FDC4DAC1744B9EB53BAD31F19D1238B26B37D4AB272E8DE205B1DA50
                                        File Content Preview:.ELF..............>.......@.....@.......h...........@.8...@.......................@.......@...............................................R.......R.....(.......@...............Q.td....................................................H...._........H........
                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 25, 2024 19:06:52.166152000 CET43928443192.168.2.2391.189.91.42
                                        Nov 25, 2024 19:06:57.541796923 CET42836443192.168.2.2391.189.91.43
                                        Nov 25, 2024 19:06:58.821229935 CET4251680192.168.2.23109.202.202.202
                                        Nov 25, 2024 19:07:13.923255920 CET43928443192.168.2.2391.189.91.42
                                        Nov 25, 2024 19:07:24.161675930 CET42836443192.168.2.2391.189.91.43
                                        Nov 25, 2024 19:07:28.257143021 CET4251680192.168.2.23109.202.202.202
                                        Nov 25, 2024 19:07:54.877382040 CET43928443192.168.2.2391.189.91.42

                                        System Behavior