File boatnet.arm6

Size 26.7KB
Type ELF 32-bit LSB executable, ARM, EABI4 version 1 (GNU/Linux), statically linked, no section header
MD5 8eb388579e8fb208b039ee236bdb286b
SHA1 3bc60667d62de3a74f6107c552dd22ff36e98f63
SHA256 4dbe127e4408ddc5816d8756ee8b4b02646af7781798db935d8e2008f3949541
SHA512
35c78c618f328c912a227e1f5dbb692fe12cc2e6f40fac72444b343adb7cb969dbc20bbaf3c052aee812ee7d42b826170bb84f996450bdf003bcc4912a1a68d0
CRC32 949B1E5D
ssdeep None
Yara None matched

Score

This file is very suspicious, with a score of 10 out of 10!

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE Dec. 25, 2024, 8:57 p.m. Dec. 25, 2024, 8:58 p.m. 81 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2024-12-25 20:56:34,001 [root] DEBUG: Starting analyzer from: /tmp/tmpYAKn0C
2024-12-25 20:56:34,001 [root] DEBUG: Storing results at: /tmp/ZZfHAEFy
2024-12-25 20:56:35,836 [modules.auxiliary.filecollector] INFO: FileCollector started v0.08
2024-12-25 20:56:35,839 [modules.auxiliary.human] INFO: Human started v0.02
2024-12-25 20:56:35,842 [modules.auxiliary.screenshots] INFO: Screenshots started v0.03
2024-12-25 20:56:40,760 [lib.core.packages] INFO: Process startup took 4.91 seconds
2024-12-25 20:56:40,761 [root] INFO: Added new process to list with pid: 2073
2024-12-25 20:56:52,780 [root] INFO: Process with pid 2073 has terminated
2024-12-25 20:56:52,781 [root] INFO: Process list is empty, terminating analysis.
2024-12-25 20:56:55,783 [lib.core.packages] INFO: Package requested stop
2024-12-25 20:56:55,783 [lib.core.packages] WARNING: Exception uploading log: [Errno 3] No such process

Cuckoo Log

2024-12-25 20:57:06,796 [cuckoo.core.scheduler] INFO: Task #5695867: acquired machine Ubuntu1904x646 (label=Ubuntu1904x646)
2024-12-25 20:57:06,797 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.106 for task #5695867
2024-12-25 20:57:07,022 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 291669 (interface=vboxnet0, host=192.168.168.106)
2024-12-25 20:57:07,057 [cuckoo.machinery.virtualbox] DEBUG: Starting vm Ubuntu1904x646
2024-12-25 20:57:07,449 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine Ubuntu1904x646 to Snapshot
2024-12-25 20:57:13,770 [cuckoo.core.guest] INFO: Starting analysis #5695867 on guest (id=Ubuntu1904x646, ip=192.168.168.106)
2024-12-25 20:57:14,776 [cuckoo.core.guest] DEBUG: Ubuntu1904x646: not ready yet
2024-12-25 20:57:19,801 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=Ubuntu1904x646, ip=192.168.168.106)
2024-12-25 20:57:19,826 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=Ubuntu1904x646, ip=192.168.168.106, monitor=latest, size=73219)
2024-12-25 20:57:20,067 [cuckoo.core.resultserver] DEBUG: Task #5695867: live log analysis.log initialized.
2024-12-25 20:57:24,937 [cuckoo.core.resultserver] DEBUG: Task #5695867: File upload for 'shots/0001.jpg'
2024-12-25 20:57:24,968 [cuckoo.core.resultserver] DEBUG: Task #5695867 uploaded file length: 171572
2024-12-25 20:57:35,026 [cuckoo.core.guest] DEBUG: Ubuntu1904x646: analysis #5695867 still processing
2024-12-25 20:57:41,851 [cuckoo.core.resultserver] DEBUG: Task #5695867: File upload for 'logs/all.stap'
2024-12-25 20:57:41,873 [cuckoo.core.resultserver] DEBUG: Task #5695867 uploaded file length: 952788
2024-12-25 20:57:50,118 [cuckoo.core.guest] DEBUG: Ubuntu1904x646: analysis #5695867 still processing
2024-12-25 20:58:05,199 [cuckoo.core.guest] DEBUG: Ubuntu1904x646: analysis #5695867 still processing
2024-12-25 20:58:20,293 [cuckoo.core.guest] INFO: Ubuntu1904x646: end of analysis reached!
2024-12-25 20:58:20,312 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2024-12-25 20:58:20,340 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2024-12-25 20:58:21,000 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label Ubuntu1904x646 to path /srv/cuckoo/cwd/storage/analyses/5695867/memory.dmp
2024-12-25 20:58:21,002 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm Ubuntu1904x646
2024-12-25 20:58:28,147 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.106 for task #5695867
2024-12-25 20:58:28,148 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 5695867
2024-12-25 20:58:28,447 [cuckoo.core.scheduler] DEBUG: Released database task #5695867
2024-12-25 20:58:28,459 [cuckoo.core.scheduler] INFO: Task #5695867: analysis procedure completed

Signatures

File has been identified by 14 AntiVirus engine on IRMA as malicious (14 events)
G Data Antivirus (Windows) Virus: Trojan.Generic.35862564 (Engine A)
Avast Core Security (Linux) ELF:Mirai-GH [Trj]
C4S ClamAV (Linux) C4S.MALWARE.SHA256.AUTOGEN.61902844.UNOFFICIAL
Windows Defender (Windows) Trojan:Linux/Multiverze
Forticlient (Linux) ELF/Mirai.IA!tr
Sophos Anti-Virus (Linux) Mal/Generic-S
eScan Antivirus (Linux) Trojan.Generic.35862564(DB)
ESET Security (Windows) a variant of Linux/Mirai.A trojan
McAfee CLI scanner (Linux) GenericRXIB-WL
DrWeb Antivirus (Linux) Linux.Siggen.9999
ClamAV (Linux) Unix.Trojan.Mirai-9955692-0
Bitdefender Antivirus (Linux) Trojan.Generic.35862564
Kaspersky Standard (Windows) HEUR:Backdoor.Linux.Mirai.h
Emsisoft Commandline Scanner (Windows) Trojan.Generic.35862564 (B)
File has been identified by 24 AntiVirus engines on VirusTotal as malicious (24 events)
MicroWorld-eScan Trojan.Generic.35862564
CTX elf.trojan.generic
Skyhigh GenericRXIB-WL!8EB388579E8F
VIPRE Trojan.Generic.35862564
Arcabit Trojan.Generic.D2233824
Symantec Linux.Mirai
ESET-NOD32 a variant of Linux/Mirai.A
Avast ELF:Mirai-GH [Trj]
Kaspersky HEUR:Backdoor.Linux.Mirai.h
BitDefender Trojan.Generic.35862564
Rising Backdoor.Mirai/Linux!1.DAED (CLASSIC)
Emsisoft Trojan.Generic.35862564 (B)
DrWeb Linux.Siggen.9999
Ikarus Trojan.Linux.Mirai
FireEye Trojan.Generic.35862564
Jiangmin Backdoor.Linux.hzjf
Google Detected
Microsoft Trojan:Win32/Mirai!ml
Avast-Mobile ELF:Mirai-GH [Trj]
Varist E32/Mirai.BMN
Tencent Backdoor.Linux.Mirai.wam
huorong Trojan/Linux.Mirai.g
Fortinet ELF/Mirai.A!tr
AVG ELF:Mirai-GH [Trj]
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.