Size | 26.7KB |
---|---|
Type | ELF 32-bit LSB executable, ARM, EABI4 version 1 (GNU/Linux), statically linked, no section header |
MD5 | 8eb388579e8fb208b039ee236bdb286b |
SHA1 | 3bc60667d62de3a74f6107c552dd22ff36e98f63 |
SHA256 | 4dbe127e4408ddc5816d8756ee8b4b02646af7781798db935d8e2008f3949541 |
SHA512 |
35c78c618f328c912a227e1f5dbb692fe12cc2e6f40fac72444b343adb7cb969dbc20bbaf3c052aee812ee7d42b826170bb84f996450bdf003bcc4912a1a68d0
|
CRC32 | 949B1E5D |
ssdeep | None |
Yara | None matched |
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Dec. 25, 2024, 8:57 p.m. | Dec. 25, 2024, 8:58 p.m. | 81 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2024-12-25 20:56:34,001 [root] DEBUG: Starting analyzer from: /tmp/tmpYAKn0C 2024-12-25 20:56:34,001 [root] DEBUG: Storing results at: /tmp/ZZfHAEFy 2024-12-25 20:56:35,836 [modules.auxiliary.filecollector] INFO: FileCollector started v0.08 2024-12-25 20:56:35,839 [modules.auxiliary.human] INFO: Human started v0.02 2024-12-25 20:56:35,842 [modules.auxiliary.screenshots] INFO: Screenshots started v0.03 2024-12-25 20:56:40,760 [lib.core.packages] INFO: Process startup took 4.91 seconds 2024-12-25 20:56:40,761 [root] INFO: Added new process to list with pid: 2073 2024-12-25 20:56:52,780 [root] INFO: Process with pid 2073 has terminated 2024-12-25 20:56:52,781 [root] INFO: Process list is empty, terminating analysis. 2024-12-25 20:56:55,783 [lib.core.packages] INFO: Package requested stop 2024-12-25 20:56:55,783 [lib.core.packages] WARNING: Exception uploading log: [Errno 3] No such process
2024-12-25 20:57:06,796 [cuckoo.core.scheduler] INFO: Task #5695867: acquired machine Ubuntu1904x646 (label=Ubuntu1904x646) 2024-12-25 20:57:06,797 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.106 for task #5695867 2024-12-25 20:57:07,022 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 291669 (interface=vboxnet0, host=192.168.168.106) 2024-12-25 20:57:07,057 [cuckoo.machinery.virtualbox] DEBUG: Starting vm Ubuntu1904x646 2024-12-25 20:57:07,449 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine Ubuntu1904x646 to Snapshot 2024-12-25 20:57:13,770 [cuckoo.core.guest] INFO: Starting analysis #5695867 on guest (id=Ubuntu1904x646, ip=192.168.168.106) 2024-12-25 20:57:14,776 [cuckoo.core.guest] DEBUG: Ubuntu1904x646: not ready yet 2024-12-25 20:57:19,801 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=Ubuntu1904x646, ip=192.168.168.106) 2024-12-25 20:57:19,826 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=Ubuntu1904x646, ip=192.168.168.106, monitor=latest, size=73219) 2024-12-25 20:57:20,067 [cuckoo.core.resultserver] DEBUG: Task #5695867: live log analysis.log initialized. 2024-12-25 20:57:24,937 [cuckoo.core.resultserver] DEBUG: Task #5695867: File upload for 'shots/0001.jpg' 2024-12-25 20:57:24,968 [cuckoo.core.resultserver] DEBUG: Task #5695867 uploaded file length: 171572 2024-12-25 20:57:35,026 [cuckoo.core.guest] DEBUG: Ubuntu1904x646: analysis #5695867 still processing 2024-12-25 20:57:41,851 [cuckoo.core.resultserver] DEBUG: Task #5695867: File upload for 'logs/all.stap' 2024-12-25 20:57:41,873 [cuckoo.core.resultserver] DEBUG: Task #5695867 uploaded file length: 952788 2024-12-25 20:57:50,118 [cuckoo.core.guest] DEBUG: Ubuntu1904x646: analysis #5695867 still processing 2024-12-25 20:58:05,199 [cuckoo.core.guest] DEBUG: Ubuntu1904x646: analysis #5695867 still processing 2024-12-25 20:58:20,293 [cuckoo.core.guest] INFO: Ubuntu1904x646: end of analysis reached! 2024-12-25 20:58:20,312 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2024-12-25 20:58:20,340 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2024-12-25 20:58:21,000 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label Ubuntu1904x646 to path /srv/cuckoo/cwd/storage/analyses/5695867/memory.dmp 2024-12-25 20:58:21,002 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm Ubuntu1904x646 2024-12-25 20:58:28,147 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.106 for task #5695867 2024-12-25 20:58:28,148 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 5695867 2024-12-25 20:58:28,447 [cuckoo.core.scheduler] DEBUG: Released database task #5695867 2024-12-25 20:58:28,459 [cuckoo.core.scheduler] INFO: Task #5695867: analysis procedure completed
G Data Antivirus (Windows) | Virus: Trojan.Generic.35862564 (Engine A) |
Avast Core Security (Linux) | ELF:Mirai-GH [Trj] |
C4S ClamAV (Linux) | C4S.MALWARE.SHA256.AUTOGEN.61902844.UNOFFICIAL |
Windows Defender (Windows) | Trojan:Linux/Multiverze |
Forticlient (Linux) | ELF/Mirai.IA!tr |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
eScan Antivirus (Linux) | Trojan.Generic.35862564(DB) |
ESET Security (Windows) | a variant of Linux/Mirai.A trojan |
McAfee CLI scanner (Linux) | GenericRXIB-WL |
DrWeb Antivirus (Linux) | Linux.Siggen.9999 |
ClamAV (Linux) | Unix.Trojan.Mirai-9955692-0 |
Bitdefender Antivirus (Linux) | Trojan.Generic.35862564 |
Kaspersky Standard (Windows) | HEUR:Backdoor.Linux.Mirai.h |
Emsisoft Commandline Scanner (Windows) | Trojan.Generic.35862564 (B) |
MicroWorld-eScan | Trojan.Generic.35862564 |
CTX | elf.trojan.generic |
Skyhigh | GenericRXIB-WL!8EB388579E8F |
VIPRE | Trojan.Generic.35862564 |
Arcabit | Trojan.Generic.D2233824 |
Symantec | Linux.Mirai |
ESET-NOD32 | a variant of Linux/Mirai.A |
Avast | ELF:Mirai-GH [Trj] |
Kaspersky | HEUR:Backdoor.Linux.Mirai.h |
BitDefender | Trojan.Generic.35862564 |
Rising | Backdoor.Mirai/Linux!1.DAED (CLASSIC) |
Emsisoft | Trojan.Generic.35862564 (B) |
DrWeb | Linux.Siggen.9999 |
Ikarus | Trojan.Linux.Mirai |
FireEye | Trojan.Generic.35862564 |
Jiangmin | Backdoor.Linux.hzjf |
Detected | |
Microsoft | Trojan:Win32/Mirai!ml |
Avast-Mobile | ELF:Mirai-GH [Trj] |
Varist | E32/Mirai.BMN |
Tencent | Backdoor.Linux.Mirai.wam |
huorong | Trojan/Linux.Mirai.g |
Fortinet | ELF/Mirai.A!tr |
AVG | ELF:Mirai-GH [Trj] |