Size | 23.5KB |
---|---|
Type | ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header |
MD5 | 4fab12c74067b9ddba88dc71994cddc1 |
SHA1 | 2278ebd8676598a1be260584cae55c8a50c531f9 |
SHA256 | 146b588976af58692202a7c6f715a52dda4390a04f750f4d07f75b4438659d0e |
SHA512 |
3849ef5455496b0b2ecafb158b35e804bc79e5c95c2839d58b69da0f79ba629ccb7e8673debc64cdd6e08fb65583a9e11b7a864f3748989a923c2aacacf276fd
|
CRC32 | 9B5D8B3A |
ssdeep | None |
Yara | None matched |
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | May 16, 2025, 2:48 p.m. | May 16, 2025, 2:55 p.m. | 426 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-05-16 14:24:49,003 [root] DEBUG: Starting analyzer from: /tmp/tmp4HGacw 2025-05-16 14:24:49,003 [root] DEBUG: Storing results at: /tmp/UjfdOX 2025-05-16 14:24:51,580 [modules.auxiliary.filecollector] INFO: FileCollector started v0.08 2025-05-16 14:24:52,081 [modules.auxiliary.human] INFO: Human started v0.02 2025-05-16 14:24:52,583 [modules.auxiliary.screenshots] INFO: Screenshots started v0.03 2025-05-16 14:24:57,727 [lib.core.packages] INFO: Process startup took 5.14 seconds 2025-05-16 14:24:57,728 [root] INFO: Added new process to list with pid: 2060 2025-05-16 14:25:03,745 [root] INFO: Process with pid 2060 has terminated 2025-05-16 14:25:03,745 [root] INFO: Process list is empty, terminating analysis. 2025-05-16 14:25:06,797 [lib.core.packages] INFO: Package requested stop 2025-05-16 14:25:06,798 [lib.core.packages] WARNING: Exception uploading log: [Errno 3] No such process
2025-05-16 14:48:45,436 [cuckoo.core.scheduler] INFO: Task #6481396: acquired machine Ubuntu1904x645 (label=Ubuntu1904x645) 2025-05-16 14:48:45,437 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.105 for task #6481396 2025-05-16 14:48:45,765 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2810076 (interface=vboxnet0, host=192.168.168.105) 2025-05-16 14:48:45,794 [cuckoo.machinery.virtualbox] DEBUG: Starting vm Ubuntu1904x645 2025-05-16 14:48:46,359 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine Ubuntu1904x645 to Snapshot 2025-05-16 14:51:41,423 [cuckoo.core.guest] INFO: Starting analysis #6481396 on guest (id=Ubuntu1904x645, ip=192.168.168.105) 2025-05-16 14:51:42,427 [cuckoo.core.guest] DEBUG: Ubuntu1904x645: not ready yet 2025-05-16 14:51:47,623 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=Ubuntu1904x645, ip=192.168.168.105) 2025-05-16 14:51:47,647 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=Ubuntu1904x645, ip=192.168.168.105, monitor=latest, size=73219) 2025-05-16 14:51:47,899 [cuckoo.core.resultserver] DEBUG: Task #6481396: live log analysis.log initialized. 2025-05-16 14:51:54,054 [cuckoo.core.resultserver] DEBUG: Task #6481396: File upload for 'shots/0001.jpg' 2025-05-16 14:51:54,068 [cuckoo.core.resultserver] DEBUG: Task #6481396 uploaded file length: 171569 2025-05-16 14:52:02,942 [cuckoo.core.guest] DEBUG: Ubuntu1904x645: analysis #6481396 still processing 2025-05-16 14:52:05,713 [cuckoo.core.resultserver] DEBUG: Task #6481396: File upload for 'logs/all.stap' 2025-05-16 14:52:05,715 [cuckoo.core.resultserver] DEBUG: Task #6481396 uploaded file length: 4247 2025-05-16 14:52:18,243 [cuckoo.core.guest] DEBUG: Ubuntu1904x645: analysis #6481396 still processing 2025-05-16 14:52:33,378 [cuckoo.core.guest] DEBUG: Ubuntu1904x645: analysis #6481396 still processing 2025-05-16 14:52:48,485 [cuckoo.core.guest] INFO: Ubuntu1904x645: end of analysis reached! 2025-05-16 14:52:48,500 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-05-16 14:52:48,537 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-05-16 14:52:49,527 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label Ubuntu1904x645 to path /srv/cuckoo/cwd/storage/analyses/6481396/memory.dmp 2025-05-16 14:52:49,528 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm Ubuntu1904x645 2025-05-16 14:55:51,151 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.105 for task #6481396 2025-05-16 14:55:51,152 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 6481396 2025-05-16 14:55:51,592 [cuckoo.core.scheduler] DEBUG: Released database task #6481396 2025-05-16 14:55:51,608 [cuckoo.core.scheduler] INFO: Task #6481396: analysis procedure completed
Port: 2323 | 4975 times |
Port: 23 | 44407 times |
G Data Antivirus (Windows) | Virus: Trojan.Linux.Mirai.1 (Engine A) |
Avast Core Security (Linux) | ELF:Mirai-APD [Trj] |
C4S ClamAV (Linux) | YARA.suspicious_packer_section.UNOFFICIAL |
Trellix (Linux) | GenericRXSY-ER |
eScan Antivirus (Linux) | Trojan.Linux.Mirai.1(DB) |
ESET Security (Windows) | a variant of Linux/Mirai.L trojan |
Sophos Anti-Virus (Linux) | Linux/DDoS-CI |
DrWeb Antivirus (Linux) | Linux.Siggen.9999 |
Kaspersky Standard (Windows) | HEUR:Backdoor.Linux.Mirai.b |
Emsisoft Commandline Scanner (Windows) | Trojan.Linux.Mirai.1 (B) |
CTX | elf.trojan.mirai |
Skyhigh | GenericRXSY-ER!4FAB12C74067 |
ALYac | Trojan.Linux.Mirai.1 |
VIPRE | Trojan.Linux.Mirai.1 |
Arcabit | Trojan.Linux.Mirai.1 |
ESET-NOD32 | a variant of Linux/Mirai.L |
Avast | ELF:Mirai-APD [Trj] |
Kaspersky | HEUR:Backdoor.Linux.Mirai.b |
BitDefender | Trojan.Linux.Mirai.1 |
MicroWorld-eScan | Trojan.Linux.Mirai.1 |
Rising | Backdoor.Mirai/Linux!1.12D23 (CLASSIC) |
Emsisoft | Trojan.Linux.Mirai.1 (B) |
DrWeb | Linux.Siggen.9999 |
Sophos | Linux/DDoS-CI |
SentinelOne | Static AI - Malicious ELF |
Jiangmin | Backdoor.Linux.bccj |
Detected | |
Microsoft | Backdoor:Linux/Mirai.AW!MTB |
ZoneAlarm | Linux/DDoS-CI |
GData | Trojan.Linux.Mirai.1 |
Varist | E32/Mirai.BNC |
McAfee | GenericRXSY-ER!4FAB12C74067 |
Ikarus | Trojan.Linux.Mirai |
Tencent | Backdoor.Linux.Mirai.wan |
huorong | Backdoor/Linux.Mirai.q |
Fortinet | ELF/Mirai.AT!tr |
AVG | ELF:Mirai-APD [Trj] |
alibabacloud | Backdoor:Linux/Mirai.afd7592d |