File kwari.x86

Size 23.5KB
Type ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
MD5 4fab12c74067b9ddba88dc71994cddc1
SHA1 2278ebd8676598a1be260584cae55c8a50c531f9
SHA256 146b588976af58692202a7c6f715a52dda4390a04f750f4d07f75b4438659d0e
SHA512
3849ef5455496b0b2ecafb158b35e804bc79e5c95c2839d58b69da0f79ba629ccb7e8673debc64cdd6e08fb65583a9e11b7a864f3748989a923c2aacacf276fd
CRC32 9B5D8B3A
ssdeep None
Yara None matched

Score

This file is very suspicious, with a score of 10 out of 10!

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE May 16, 2025, 2:48 p.m. May 16, 2025, 2:55 p.m. 426 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-05-16 14:24:49,003 [root] DEBUG: Starting analyzer from: /tmp/tmp4HGacw
2025-05-16 14:24:49,003 [root] DEBUG: Storing results at: /tmp/UjfdOX
2025-05-16 14:24:51,580 [modules.auxiliary.filecollector] INFO: FileCollector started v0.08
2025-05-16 14:24:52,081 [modules.auxiliary.human] INFO: Human started v0.02
2025-05-16 14:24:52,583 [modules.auxiliary.screenshots] INFO: Screenshots started v0.03
2025-05-16 14:24:57,727 [lib.core.packages] INFO: Process startup took 5.14 seconds
2025-05-16 14:24:57,728 [root] INFO: Added new process to list with pid: 2060
2025-05-16 14:25:03,745 [root] INFO: Process with pid 2060 has terminated
2025-05-16 14:25:03,745 [root] INFO: Process list is empty, terminating analysis.
2025-05-16 14:25:06,797 [lib.core.packages] INFO: Package requested stop
2025-05-16 14:25:06,798 [lib.core.packages] WARNING: Exception uploading log: [Errno 3] No such process

Cuckoo Log

2025-05-16 14:48:45,436 [cuckoo.core.scheduler] INFO: Task #6481396: acquired machine Ubuntu1904x645 (label=Ubuntu1904x645)
2025-05-16 14:48:45,437 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.105 for task #6481396
2025-05-16 14:48:45,765 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2810076 (interface=vboxnet0, host=192.168.168.105)
2025-05-16 14:48:45,794 [cuckoo.machinery.virtualbox] DEBUG: Starting vm Ubuntu1904x645
2025-05-16 14:48:46,359 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine Ubuntu1904x645 to Snapshot
2025-05-16 14:51:41,423 [cuckoo.core.guest] INFO: Starting analysis #6481396 on guest (id=Ubuntu1904x645, ip=192.168.168.105)
2025-05-16 14:51:42,427 [cuckoo.core.guest] DEBUG: Ubuntu1904x645: not ready yet
2025-05-16 14:51:47,623 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=Ubuntu1904x645, ip=192.168.168.105)
2025-05-16 14:51:47,647 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=Ubuntu1904x645, ip=192.168.168.105, monitor=latest, size=73219)
2025-05-16 14:51:47,899 [cuckoo.core.resultserver] DEBUG: Task #6481396: live log analysis.log initialized.
2025-05-16 14:51:54,054 [cuckoo.core.resultserver] DEBUG: Task #6481396: File upload for 'shots/0001.jpg'
2025-05-16 14:51:54,068 [cuckoo.core.resultserver] DEBUG: Task #6481396 uploaded file length: 171569
2025-05-16 14:52:02,942 [cuckoo.core.guest] DEBUG: Ubuntu1904x645: analysis #6481396 still processing
2025-05-16 14:52:05,713 [cuckoo.core.resultserver] DEBUG: Task #6481396: File upload for 'logs/all.stap'
2025-05-16 14:52:05,715 [cuckoo.core.resultserver] DEBUG: Task #6481396 uploaded file length: 4247
2025-05-16 14:52:18,243 [cuckoo.core.guest] DEBUG: Ubuntu1904x645: analysis #6481396 still processing
2025-05-16 14:52:33,378 [cuckoo.core.guest] DEBUG: Ubuntu1904x645: analysis #6481396 still processing
2025-05-16 14:52:48,485 [cuckoo.core.guest] INFO: Ubuntu1904x645: end of analysis reached!
2025-05-16 14:52:48,500 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-05-16 14:52:48,537 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-05-16 14:52:49,527 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label Ubuntu1904x645 to path /srv/cuckoo/cwd/storage/analyses/6481396/memory.dmp
2025-05-16 14:52:49,528 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm Ubuntu1904x645
2025-05-16 14:55:51,151 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.105 for task #6481396
2025-05-16 14:55:51,152 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 6481396
2025-05-16 14:55:51,592 [cuckoo.core.scheduler] DEBUG: Released database task #6481396
2025-05-16 14:55:51,608 [cuckoo.core.scheduler] INFO: Task #6481396: analysis procedure completed

Signatures

Port scanning (2 events)
Port: 2323 4975 times
Port: 23 44407 times
File has been identified by 10 AntiVirus engine on IRMA as malicious (10 events)
G Data Antivirus (Windows) Virus: Trojan.Linux.Mirai.1 (Engine A)
Avast Core Security (Linux) ELF:Mirai-APD [Trj]
C4S ClamAV (Linux) YARA.suspicious_packer_section.UNOFFICIAL
Trellix (Linux) GenericRXSY-ER
eScan Antivirus (Linux) Trojan.Linux.Mirai.1(DB)
ESET Security (Windows) a variant of Linux/Mirai.L trojan
Sophos Anti-Virus (Linux) Linux/DDoS-CI
DrWeb Antivirus (Linux) Linux.Siggen.9999
Kaspersky Standard (Windows) HEUR:Backdoor.Linux.Mirai.b
Emsisoft Commandline Scanner (Windows) Trojan.Linux.Mirai.1 (B)
File has been identified by 28 AntiVirus engines on VirusTotal as malicious (28 events)
CTX elf.trojan.mirai
Skyhigh GenericRXSY-ER!4FAB12C74067
ALYac Trojan.Linux.Mirai.1
VIPRE Trojan.Linux.Mirai.1
Arcabit Trojan.Linux.Mirai.1
ESET-NOD32 a variant of Linux/Mirai.L
Avast ELF:Mirai-APD [Trj]
Kaspersky HEUR:Backdoor.Linux.Mirai.b
BitDefender Trojan.Linux.Mirai.1
MicroWorld-eScan Trojan.Linux.Mirai.1
Rising Backdoor.Mirai/Linux!1.12D23 (CLASSIC)
Emsisoft Trojan.Linux.Mirai.1 (B)
DrWeb Linux.Siggen.9999
Sophos Linux/DDoS-CI
SentinelOne Static AI - Malicious ELF
Jiangmin Backdoor.Linux.bccj
Google Detected
Microsoft Backdoor:Linux/Mirai.AW!MTB
ZoneAlarm Linux/DDoS-CI
GData Trojan.Linux.Mirai.1
Varist E32/Mirai.BNC
McAfee GenericRXSY-ER!4FAB12C74067
Ikarus Trojan.Linux.Mirai
Tencent Backdoor.Linux.Mirai.wan
huorong Backdoor/Linux.Mirai.q
Fortinet ELF/Mirai.AT!tr
AVG ELF:Mirai-APD [Trj]
alibabacloud Backdoor:Linux/Mirai.afd7592d
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.