Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
linux_mips.elf

Overview

General Information

Sample name:linux_mips.elf
Analysis ID:1562734
MD5:b278faff343d0b85b85ed80e9b7a006e
SHA1:5ffe8d0e9e27f7e04f5d3b86f4dcf5dc91e1e5ec
SHA256:7c80fc1f6eb3cbf0c1e38f40dac92d1f3c3107eadbc05fcda29375fc603e85ed
Tags:elfuser-abuse_ch
Infos:

Detection

Chaos
Score:56
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Chaos
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1562734
Start date and time:2024-11-25 23:50:12 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 2s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:linux_mips.elf
Detection:MAL
Classification:mal56.troj.linELF@0/0@0/0
  • VT rate limit hit for: linux_mips.elf
Command:/tmp/linux_mips.elf
PID:6273
Exit Code:2
Exit Code Info:
Killed:False
Standard Output:

Standard Error:fatal error: sigaction failed

runtime stack:
runtime.throw({0x3a34cb, 0x10})
/usr/lib/go-1.18/src/runtime/panic.go:992 +0x60
runtime.sysSigaction.func1()
/usr/lib/go-1.18/src/runtime/os_linux.go:529 +0x48
runtime.sysSigaction(0x41, 0x7ffffd10, 0x0)
/usr/lib/go-1.18/src/runtime/os_linux.go:528 +0x78
runtime.sigaction(0x41, 0x7ffffd10, 0x0)
/usr/lib/go-1.18/src/runtime/sigaction.go:15 +0x28
runtime.setsig(0x41, 0x6c8c4)
/usr/lib/go-1.18/src/runtime/os_linux.go:478 +0xb4
runtime.initsig(0x0)
/usr/lib/go-1.18/src/runtime/signal_unix.go:147 +0x294
runtime.mstartm0()
/usr/lib/go-1.18/src/runtime/proc.go:1442 +0x6c
runtime.mstart1()
/usr/lib/go-1.18/src/runtime/proc.go:1414 +0x90
runtime.mstart0()
/usr/lib/go-1.18/src/runtime/proc.go:1376 +0x74
runtime.mstart()
/usr/lib/go-1.18/src/runtime/asm_mipsx.s:89 +0x10

goroutine 1 [runnable]:
runtime.main()
/usr/lib/go-1.18/src/runtime/proc.go:145
runtime.goexit()
/usr/lib/go-1.18/src/runtime/asm_mipsx.s:610 +0x4
  • system is lnxubuntu20
  • linux_mips.elf (PID: 6273, Parent: 6195, MD5: 0083f1f0e77be34ad27f849842bbb00c) Arguments: /tmp/linux_mips.elf
  • dash New Fork (PID: 6282, Parent: 4331)
  • rm (PID: 6282, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.Gs0cdNJSPO /tmp/tmp.1kZpxOWwGK /tmp/tmp.CQPRMVBEGG
  • dash New Fork (PID: 6283, Parent: 4331)
  • rm (PID: 6283, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.Gs0cdNJSPO /tmp/tmp.1kZpxOWwGK /tmp/tmp.CQPRMVBEGG
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
ChaosMulti-functional malware written in Go, targeting both Linux and Windows, evolved from elf.kaiji.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.chaos
SourceRuleDescriptionAuthorStrings
linux_mips.elfJoeSecurity_ChaosGoYara detected ChaosJoe Security
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: linux_mips.elfReversingLabs: Detection: 52%
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: unknownTCP traffic detected without corresponding DNS query: 34.249.145.219
    Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: linux_mips.elfString found in binary or memory: http2: Transport conn %p received error from processing frame %v: %vhttp2: Transport received unsolicited DATA frame; closing connectionhttp: message cannot contain multiple Content-Length headers; got %qpadding bytes must all be zeros unless AllowIllegalWrites is enabledreflect: reflect.Value.UnsafePointer on an invalid notinheap pointerhttp2: Transport closing idle conn %p (forSingleUse=%v, maxStream=%v)tls: handshake message of length %d bytes exceeds maximum of %d bytestls: peer doesn't support the certificate custom signature algorithmsbytes.Buffer: UnreadByte: previous operation was not a successful readcannot convert slice with length %y to pointer to array with length %xgot %s for stream %d; expected CONTINUATION following %s for stream %dx509: PKCS#8 wrapping contained private key with unknown algorithm: %vx509: certificate relies on legacy Common Name field, use SANs insteadMozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)Sogou Pic Spider/3.0(+http://www.sogou.com/docs/help/webmasters.htm#07)Sogou web spider/4.0(+http://www.sogou.com/docs/help/webmasters.htm#07)dynamic table size update MUST occur at the beginning of a header blockssh: no common algorithm for %s; client offered: %v, server offered: %vtls: peer doesn't support any of the certificate's signature algorithmstoo many concurrent operations on a single file or socket (max 1048575)x509: issuer has name constraints but leaf doesn't have a SAN extensionMozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)tls: server's certificate contains an unsupported type of public key: %Ttls: received unexpected handshake message of type %T when waiting for %T91289437fa036b34da55d57af6192768c27bd433fa012169d626d934e0051b24dd67dd3cf49d7cc827bc012d259d7ac226e70829239d7ac226e7082968de60d520eb433722c07fd236f6crypto/elliptic: internal error: Unmarshal rejected a valid point encodingmalformed response from server: malformed non-numeric status pseudo headernet/http: server replied with more than declared Content-Length; truncatedtls: certificate RSA key size too small for supported signature algorithmsUnsolicited response received on idle HTTP channel starting with %q; err=%vtls: internal error: attempted to read record with pending application datatls: failed to send closeNotify alert (but connection was closed anyway): %wtls: server certificate contains incorrect key type for selected ciphersuite((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})(\.((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})){3}MapIter.Next called on an iterator that does not have an associated map Valuecrypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled115792089210356248762697446949407573529996955224135760342422259061068512044369115792089210356248762697446949407573530086143415290314195533631308867097853951ssh: internal error: algorithmSignerWrapper invoked with non-default algorithmssh: unable to authenticate, attempted methods %v, no supported methods remainx509: signature check attempt
    Source: linux_mips.elfString found in binary or memory: http: RoundTripper implementation (%T) returned a nil *Response with a nil errortls: either ServerName or InsecureSkipVerify must be specified in the tls.Configx509: invalid signature: parent certificate cannot sign this kind of certificaterefusing to use HTTP_PROXY value in CGI environment; see golang.org/s/cgihttpproxyx509: a root or intermediate certificate is not authorized to sign for this name: (possibly because of %q while trying to verify candidate authority certificate %q)Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)x509: issuer has name constraints but leaf contains unknown or unconstrained name: tls: downgrade attempt detected, possibly due to a MitM attack or a broken middleboxx509: signature algorithm specifies an %s public key, but have public key of type %Treflect.Value.Interface: cannot return value obtained from unexported field or methodx509: failed to parse private key (use ParseECPrivateKey instead for this key format)Mozilla/5.0 (compatible; YoudaoBot/1.0; http://www.youdao.com/help/webmaster/spider/;)reflect: New of type that may not be allocated in heap (possibly undefined cgo C type)x509: a root or intermediate certificate is not authorized for an extended key usage: fxfzUc6gtMGc/i26ld3KydGKy1k7QqyMMyxjbU1Rlk+F9LQxnaTeCHGHsDUpaBeOWDeY6l+2kHlB7EWTLcGwfg==whv+Kf1cEtOXzr+zuvmef2as0WfbUDm8l2LMWBMel10NDnbShg9CsMUt327VJhOTbXLoPYJVTKy8MBPCVwoT8A==x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)http2: server sent GOAWAY and closed the connection; LastStreamID=%v, ErrCode=%v, debug=%qapplication/xml,application/xhtml+xml,text/html;q=0.9, text/plain;q=0.8,image/png,*/*;q=0.5tls: handshake hash for a client certificate requested after discarding the handshake buffertls: unsupported certificate: private key is *ed25519.PrivateKey, expected ed25519.PrivateKey3617de4a96262c6f5d9e98bf9292dc29f8f41dbd289a147ce9da3113b5f0b8c00a60b1ce1d7e819d7a431d7c90ea0e5faa87ca22be8b05378eb1c71ef320ad746e1d3b628ba79b9859f741e082542a385502f25dbf55296c3a545e3872760ab7b3312fa7e23ee7e4988e056be3f82d19181d9c6efe8141120314088f5013875ac656398d8a2ed19d2a85c8edd3ec2aefhttp: RoundTripper implementation (%T) returned a *Response with content length %d but a nil BodyNoClientCertRequestClientCertRequireAnyClientCertVerifyClientCertIfGivenRequireAndVerifyClientCertcipher: the nonce can't have zero length, or the security of the key will be immediately compromisedssh<<RMS>> equals www.yahoo.com (Yahoo)
    Source: linux_mips.elfString found in binary or memory: http://help.yahoo.com/help/us/ysearch/slurp)x509:
    Source: linux_mips.elfString found in binary or memory: http://search.msn.com/msnbot.htm
    Source: linux_mips.elfString found in binary or memory: http://www.baidu.com/search/spider.html)
    Source: linux_mips.elfString found in binary or memory: http://www.baidu.com/search/spider.html)000102030405060708091011121314151617181920212223242526272829
    Source: linux_mips.elfString found in binary or memory: http://www.baidu.com/search/spider.html)Mozilla/5.0
    Source: linux_mips.elfString found in binary or memory: http://www.baidu.com/search/spider.html)http2:
    Source: linux_mips.elfString found in binary or memory: http://www.entireweb.com/about/search_tech/speedy_spider/)text/html
    Source: linux_mips.elfString found in binary or memory: http://www.google.com/mobile/adsbot.html)
    Source: linux_mips.elfString found in binary or memory: http://www.haosou.com/help/help_3_2.htmlMozilla/5.0
    Source: linux_mips.elfString found in binary or memory: http://www.huaweisymantec.com/cn/IRL/spider)Mozilla/5.0
    Source: linux_mips.elfString found in binary or memory: http://www.youdao.com/help/webmaster/spider/;)reflect:
    Source: linux_mips.elfString found in binary or memory: http://yandex.com/bots)http:
    Source: linux_mips.elfString found in binary or memory: https://search.yahoo.com/search?p=illegal
    Source: linux_mips.elfString found in binary or memory: https://www.baidu.com/s?wd=insufficient
    Source: linux_mips.elfString found in binary or memory: https://www.so.com/s?q=index
    Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39256
    Source: unknownNetwork traffic detected: HTTP traffic on port 39256 -> 443
    Source: ELF static info symbol of initial sample.symtab present: no
    Source: classification engineClassification label: mal56.troj.linELF@0/0@0/0
    Source: ELF file sectionSubmission: linux_mips.elf
    Source: /usr/bin/dash (PID: 6282)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Gs0cdNJSPO /tmp/tmp.1kZpxOWwGK /tmp/tmp.CQPRMVBEGGJump to behavior
    Source: /usr/bin/dash (PID: 6283)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Gs0cdNJSPO /tmp/tmp.1kZpxOWwGK /tmp/tmp.CQPRMVBEGGJump to behavior
    Source: /tmp/linux_mips.elf (PID: 6273)Queries kernel information via 'uname': Jump to behavior
    Source: linux_mips.elf, 6273.1.00005598e5b27000.00005598e5e72000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mips
    Source: linux_mips.elf, 6273.1.00005598e5b27000.00005598e5e72000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips
    Source: linux_mips.elf, 6273.1.00007ffe24069000.00007ffe2408a000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mips/tmp/linux_mips.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/linux_mips.elf
    Source: linux_mips.elf, 6273.1.00007ffe24069000.00007ffe2408a000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: linux_mips.elf, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: linux_mips.elf, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
    File Deletion
    OS Credential Dumping11
    Security Software Discovery
    Remote ServicesData from Local System1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    No configs have been found
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    SourceDetectionScannerLabelLink
    linux_mips.elf53%ReversingLabsLinux.Trojan.Kaiji
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.baidu.com/search/spider.html)linux_mips.elffalse
      high
      http://search.msn.com/msnbot.htmlinux_mips.elffalse
        high
        http://www.baidu.com/search/spider.html)000102030405060708091011121314151617181920212223242526272829linux_mips.elffalse
          high
          https://www.so.com/s?q=indexlinux_mips.elffalse
            high
            http://help.yahoo.com/help/us/ysearch/slurp)x509:linux_mips.elffalse
              high
              http://www.google.com/mobile/adsbot.html)linux_mips.elffalse
                high
                http://www.huaweisymantec.com/cn/IRL/spider)Mozilla/5.0linux_mips.elffalse
                  high
                  http://www.baidu.com/search/spider.html)http2:linux_mips.elffalse
                    high
                    http://yandex.com/bots)http:linux_mips.elffalse
                      high
                      http://www.baidu.com/search/spider.html)Mozilla/5.0linux_mips.elffalse
                        high
                        http://www.entireweb.com/about/search_tech/speedy_spider/)text/htmllinux_mips.elffalse
                          high
                          http://www.haosou.com/help/help_3_2.htmlMozilla/5.0linux_mips.elffalse
                            high
                            https://www.baidu.com/s?wd=insufficientlinux_mips.elffalse
                              high
                              http://www.youdao.com/help/webmaster/spider/;)reflect:linux_mips.elffalse
                                high
                                https://search.yahoo.com/search?p=illegallinux_mips.elffalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  34.249.145.219
                                  unknownUnited States
                                  16509AMAZON-02USfalse
                                  109.202.202.202
                                  unknownSwitzerland
                                  13030INIT7CHfalse
                                  91.189.91.42
                                  unknownUnited Kingdom
                                  41231CANONICAL-ASGBfalse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  34.249.145.219yakuza.arm6.elfGet hashmaliciousMiraiBrowse
                                    UnHAnaAW.sh4.elfGet hashmaliciousMiraiBrowse
                                      m-i.p-s.Logicnet.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        anarchy.arm6.elfGet hashmaliciousMiraiBrowse
                                          IGxModz.arm7.elfGet hashmaliciousMiraiBrowse
                                            i586.elfGet hashmaliciousUnknownBrowse
                                              sh4.elfGet hashmaliciousUnknownBrowse
                                                m68k.elfGet hashmaliciousUnknownBrowse
                                                  mmb3.elfGet hashmaliciousMirai, OkiruBrowse
                                                    wnbw86.elfGet hashmaliciousMiraiBrowse
                                                      109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                                      • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                                      91.189.91.42linux_arm6.elfGet hashmaliciousChaosBrowse
                                                        x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          fbot.arm5.elfGet hashmaliciousMiraiBrowse
                                                            sshd.elfGet hashmaliciousUnknownBrowse
                                                              iwir64.elfGet hashmaliciousMiraiBrowse
                                                                vwkjebwi686.elfGet hashmaliciousUnknownBrowse
                                                                  la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                                                    loligang.m68k.elfGet hashmaliciousMiraiBrowse
                                                                      Mozi.m.elfGet hashmaliciousMiraiBrowse
                                                                        .i.elfGet hashmaliciousUnknownBrowse
                                                                          No context
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          CANONICAL-ASGBlinux_arm6.elfGet hashmaliciousChaosBrowse
                                                                          • 91.189.91.42
                                                                          x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 91.189.91.42
                                                                          fbot.arm5.elfGet hashmaliciousMiraiBrowse
                                                                          • 91.189.91.42
                                                                          sshd.elfGet hashmaliciousUnknownBrowse
                                                                          • 91.189.91.42
                                                                          iwir64.elfGet hashmaliciousMiraiBrowse
                                                                          • 91.189.91.42
                                                                          vwkjebwi686.elfGet hashmaliciousUnknownBrowse
                                                                          • 91.189.91.42
                                                                          la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                                                          • 91.189.91.42
                                                                          loligang.m68k.elfGet hashmaliciousMiraiBrowse
                                                                          • 91.189.91.42
                                                                          Mozi.m.elfGet hashmaliciousMiraiBrowse
                                                                          • 91.189.91.42
                                                                          .i.elfGet hashmaliciousUnknownBrowse
                                                                          • 91.189.91.42
                                                                          INIT7CHlinux_arm6.elfGet hashmaliciousChaosBrowse
                                                                          • 109.202.202.202
                                                                          x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 109.202.202.202
                                                                          fbot.arm5.elfGet hashmaliciousMiraiBrowse
                                                                          • 109.202.202.202
                                                                          sshd.elfGet hashmaliciousUnknownBrowse
                                                                          • 109.202.202.202
                                                                          iwir64.elfGet hashmaliciousMiraiBrowse
                                                                          • 109.202.202.202
                                                                          vwkjebwi686.elfGet hashmaliciousUnknownBrowse
                                                                          • 109.202.202.202
                                                                          la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                                                          • 109.202.202.202
                                                                          loligang.m68k.elfGet hashmaliciousMiraiBrowse
                                                                          • 109.202.202.202
                                                                          Mozi.m.elfGet hashmaliciousMiraiBrowse
                                                                          • 109.202.202.202
                                                                          .i.elfGet hashmaliciousUnknownBrowse
                                                                          • 109.202.202.202
                                                                          AMAZON-02USfbot.m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                                                          • 13.255.9.85
                                                                          fbot.x86.elfGet hashmaliciousMirai, MoobotBrowse
                                                                          • 198.251.185.163
                                                                          fbot.mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                                                          • 18.155.174.208
                                                                          fbot.arm.elfGet hashmaliciousMirai, MoobotBrowse
                                                                          • 18.152.179.1
                                                                          3.ps1Get hashmaliciousCobaltStrike, MetasploitBrowse
                                                                          • 3.78.244.11
                                                                          Fumari INC.emlGet hashmaliciousUnknownBrowse
                                                                          • 108.138.7.117
                                                                          https://invites-doc.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                                                                          • 52.222.232.144
                                                                          Fumari INC.emlGet hashmaliciousUnknownBrowse
                                                                          • 108.138.7.117
                                                                          http://www.thecrownstate.co.uk/Get hashmaliciousUnknownBrowse
                                                                          • 34.247.101.32
                                                                          3.ps1Get hashmaliciousCobaltStrike, MetasploitBrowse
                                                                          • 3.78.244.11
                                                                          No context
                                                                          No context
                                                                          No created / dropped files found
                                                                          File type:ELF 32-bit MSB executable, MIPS, MIPS32 version 1 (SYSV), statically linked, Go BuildID=6wxccpkjHbKRisys33qq/jZOOILuj3TWxc5Sz66xa/MNxzOsUpQdfQKMH0mhJh/09dZPQyN-G58wxw1Se8a, stripped
                                                                          Entropy (8bit):5.509307146160816
                                                                          TrID:
                                                                          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                          File name:linux_mips.elf
                                                                          File size:5'898'240 bytes
                                                                          MD5:b278faff343d0b85b85ed80e9b7a006e
                                                                          SHA1:5ffe8d0e9e27f7e04f5d3b86f4dcf5dc91e1e5ec
                                                                          SHA256:7c80fc1f6eb3cbf0c1e38f40dac92d1f3c3107eadbc05fcda29375fc603e85ed
                                                                          SHA512:fdf57394426ea1a223958e2ffa1bbe9ba746435e640234c88d44b644756681c5721d7caf0ef19c9b4fff0d2b1ffc51bba4a8c5c14cec356f9a301624261417f7
                                                                          SSDEEP:49152:H2EpH9kX4nazMqH5Erob6XMv7fn3FuL9idt42uXYfTYetBDa9zrHAMnzHsLFnoeF:WEiAQmMZudhDM
                                                                          TLSH:335627037E18D71EC62922305DB2CAD4672A3C8546DB9613B391F31EB8F11AC696EDF1
                                                                          File Content Preview:.ELF.......................x...4...4P....4. ...(...........4...4...4...................................d...d.........................2*..2*..............3...4...4..."..."...............V...W...W..................dt.Q............................e..........

                                                                          ELF header

                                                                          Class:ELF32
                                                                          Data:2's complement, big endian
                                                                          Version:1 (current)
                                                                          Machine:MIPS R3000
                                                                          Version Number:0x1
                                                                          Type:EXEC (Executable file)
                                                                          OS/ABI:UNIX - System V
                                                                          ABI Version:0
                                                                          Entry Point Address:0x8c778
                                                                          Flags:0x50001004
                                                                          ELF Header Size:52
                                                                          Program Header Offset:52
                                                                          Program Header Size:32
                                                                          Number of Program Headers:8
                                                                          Section Header Offset:308
                                                                          Section Header Size:40
                                                                          Number of Section Headers:16
                                                                          Header String Table Index:4
                                                                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                          NULL0x00x00x00x00x0000
                                                                          .textPROGBITS0x110000x10000x321acc0x00x6AX004
                                                                          .rodataPROGBITS0x3400000x3300000xdc0630x00x2A0032
                                                                          .gnu.attributesGNU_ATTRIBUTES0x00x40c0700x100x00x0001
                                                                          .shstrtabSTRTAB0x00x40c0800xc40x00x0001
                                                                          .typelinkPROGBITS0x41c1600x40c1600x17bc0x00x2A0032
                                                                          .itablinkPROGBITS0x41d9200x40d9200x4a40x00x2A0032
                                                                          .gosymtabPROGBITS0x41ddc40x40ddc40x00x00x2A001
                                                                          .gopclntabPROGBITS0x41dde00x40dde00x14a1380x00x2A0032
                                                                          .go.buildinfoPROGBITS0x5700000x5600000xe00x00x3WA0016
                                                                          .noptrdataPROGBITS0x5700e00x5600e00x301d80x00x3WA0032
                                                                          .dataPROGBITS0x5a02c00x5902c00x81b00x00x3WA0032
                                                                          .bssNOBITS0x5a84800x5984800x1347c0x00x3WA0032
                                                                          .noptrbssNOBITS0x5bb9000x5ab9000xe7ec0x00x3WA0032
                                                                          .note.go.buildidNOTE0x10f9c0xf9c0x640x00x2A004
                                                                          .MIPS.abiflagsMIPS_ABIFLAGS0x10f840xf840x180x00x2A008
                                                                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                          PHDR0x340x100340x100340x1000x1002.32240x4R 0x10000
                                                                          NOTE0xf9c0x10f9c0x10f9c0x640x645.28210x4R 0x4.note.go.buildid
                                                                          LOAD0x00x100000x100000x322acc0x322acc5.16250x5R E0x10000.text .note.go.buildid .MIPS.abiflags
                                                                          LOAD0x3300000x3400000x3400000x227f180x227f185.59960x4R 0x10000.rodata .typelink .itablink .gosymtab .gopclntab
                                                                          LOAD0x5600000x5700000x5700000x384800x5a0ec5.67190x6RW 0x10000.go.buildinfo .noptrdata .data .bss .noptrbss
                                                                          GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                                          LOOS+50415800x00x00x00x00x00.00000x2a00 0x4
                                                                          ABIFLAGS0xf840x10f840x10f840x180x180.88870x4R 0x8.MIPS.abiflags
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Nov 25, 2024 23:51:25.271811008 CET43928443192.168.2.2391.189.91.42
                                                                          Nov 25, 2024 23:51:41.303688049 CET4433925634.249.145.219192.168.2.23
                                                                          Nov 25, 2024 23:51:41.304198980 CET39256443192.168.2.2334.249.145.219
                                                                          Nov 25, 2024 23:51:41.424088001 CET4433925634.249.145.219192.168.2.23
                                                                          Nov 25, 2024 23:51:44.469099998 CET4251680192.168.2.23109.202.202.202
                                                                          Nov 25, 2024 23:51:46.516875982 CET43928443192.168.2.2391.189.91.42
                                                                          Nov 25, 2024 23:52:27.471112967 CET43928443192.168.2.2391.189.91.42

                                                                          System Behavior

                                                                          Start time (UTC):22:51:23
                                                                          Start date (UTC):25/11/2024
                                                                          Path:/tmp/linux_mips.elf
                                                                          Arguments:/tmp/linux_mips.elf
                                                                          File size:5777432 bytes
                                                                          MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                                                                          Start time (UTC):22:51:40
                                                                          Start date (UTC):25/11/2024
                                                                          Path:/usr/bin/dash
                                                                          Arguments:-
                                                                          File size:129816 bytes
                                                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                          Start time (UTC):22:51:40
                                                                          Start date (UTC):25/11/2024
                                                                          Path:/usr/bin/rm
                                                                          Arguments:rm -f /tmp/tmp.Gs0cdNJSPO /tmp/tmp.1kZpxOWwGK /tmp/tmp.CQPRMVBEGG
                                                                          File size:72056 bytes
                                                                          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                          Start time (UTC):22:51:40
                                                                          Start date (UTC):25/11/2024
                                                                          Path:/usr/bin/dash
                                                                          Arguments:-
                                                                          File size:129816 bytes
                                                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                          Start time (UTC):22:51:40
                                                                          Start date (UTC):25/11/2024
                                                                          Path:/usr/bin/rm
                                                                          Arguments:rm -f /tmp/tmp.Gs0cdNJSPO /tmp/tmp.1kZpxOWwGK /tmp/tmp.CQPRMVBEGG
                                                                          File size:72056 bytes
                                                                          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b