File boatnet.mpsl

Size 59.6KB
Type ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, no section header
MD5 846190cd194253a50643e83a0b47c98e
SHA1 665fedf49b81995a0e14a0acc607d700adbe428a
SHA256 e8363f720afccc3a550a4f63801820553a727cce808b50e07f21ceb424440677
SHA512
00adc41ac49b426bf75ce11a2d968955fad0f757ae32ffbcbd88a2456ca4606b180018b4b680aac7a88ff40c73baa88731d2bccaf20d068fba2d053de05f4e5e
CRC32 C174AB4D
ssdeep None
Yara None matched

Score

This file is very suspicious, with a score of 10 out of 10!

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE Aug. 18, 2025, 3 p.m. Aug. 18, 2025, 3:07 p.m. 445 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-08-18 14:48:21,007 [root] DEBUG: Starting analyzer from: /tmp/tmpT16qQ4
2025-08-18 14:48:21,007 [root] DEBUG: Storing results at: /tmp/ulVvwZ
2025-08-18 14:48:23,064 [modules.auxiliary.filecollector] INFO: FileCollector started v0.08
2025-08-18 14:48:23,566 [modules.auxiliary.human] INFO: Human started v0.02
2025-08-18 14:48:24,067 [modules.auxiliary.screenshots] INFO: Screenshots started v0.03
2025-08-18 14:48:34,081 [lib.core.packages] INFO: Process startup took 10.01 seconds
2025-08-18 14:48:34,083 [root] INFO: Added new process to list with pid: 2078
2025-08-18 14:48:46,102 [root] INFO: Process with pid 2078 has terminated
2025-08-18 14:48:46,103 [root] INFO: Process list is empty, terminating analysis.
2025-08-18 14:48:49,107 [lib.core.packages] INFO: Package requested stop
2025-08-18 14:48:49,109 [lib.core.packages] WARNING: Exception uploading log: [Errno 3] No such process

Cuckoo Log

2025-08-18 15:00:01,368 [cuckoo.core.scheduler] INFO: Task #6893786: acquired machine Ubuntu1904x643 (label=Ubuntu1904x643)
2025-08-18 15:00:01,369 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.103 for task #6893786
2025-08-18 15:00:01,830 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 515592 (interface=vboxnet0, host=192.168.168.103)
2025-08-18 15:00:01,880 [cuckoo.machinery.virtualbox] DEBUG: Starting vm Ubuntu1904x643
2025-08-18 15:00:02,692 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine Ubuntu1904x643 to Snapshot
2025-08-18 15:03:11,094 [cuckoo.core.guest] INFO: Starting analysis #6893786 on guest (id=Ubuntu1904x643, ip=192.168.168.103)
2025-08-18 15:03:12,098 [cuckoo.core.guest] DEBUG: Ubuntu1904x643: not ready yet
2025-08-18 15:03:17,322 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=Ubuntu1904x643, ip=192.168.168.103)
2025-08-18 15:03:17,355 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=Ubuntu1904x643, ip=192.168.168.103, monitor=latest, size=73219)
2025-08-18 15:03:17,576 [cuckoo.core.resultserver] DEBUG: Task #6893786: live log analysis.log initialized.
2025-08-18 15:03:23,582 [cuckoo.core.resultserver] DEBUG: Task #6893786: File upload for 'shots/0001.jpg'
2025-08-18 15:03:23,633 [cuckoo.core.resultserver] DEBUG: Task #6893786 uploaded file length: 171582
2025-08-18 15:03:32,572 [cuckoo.core.guest] DEBUG: Ubuntu1904x643: analysis #6893786 still processing
2025-08-18 15:03:45,918 [cuckoo.core.resultserver] DEBUG: Task #6893786: File upload for 'logs/all.stap'
2025-08-18 15:03:45,922 [cuckoo.core.resultserver] DEBUG: Task #6893786 uploaded file length: 74228
2025-08-18 15:03:47,909 [cuckoo.core.guest] DEBUG: Ubuntu1904x643: analysis #6893786 still processing
2025-08-18 15:04:03,077 [cuckoo.core.guest] DEBUG: Ubuntu1904x643: analysis #6893786 still processing
2025-08-18 15:04:18,185 [cuckoo.core.guest] INFO: Ubuntu1904x643: end of analysis reached!
2025-08-18 15:04:18,210 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-08-18 15:04:18,237 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-08-18 15:04:19,704 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label Ubuntu1904x643 to path /srv/cuckoo/cwd/storage/analyses/6893786/memory.dmp
2025-08-18 15:04:19,706 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm Ubuntu1904x643
2025-08-18 15:07:25,564 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.103 for task #6893786
2025-08-18 15:07:25,565 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 6893786
2025-08-18 15:07:26,239 [cuckoo.core.scheduler] DEBUG: Released database task #6893786
2025-08-18 15:07:26,285 [cuckoo.core.scheduler] INFO: Task #6893786: analysis procedure completed

Signatures

File has been identified by 7 AntiVirus engine on IRMA as malicious (7 events)
Avast Core Security (Linux) ELF:Agent-AYQ [Trj]
C4S ClamAV (Linux) YARA.suspicious_packer_section.UNOFFICIAL
WithSecure (Linux) Trojan:W32/Generic.abch!mind
ESET Security (Windows) a variant of Linux/Mirai.A trojan
Sophos Anti-Virus (Linux) Linux/DDoS-CI
DrWeb Antivirus (Linux) Linux.Siggen.9999
Kaspersky Standard (Windows) HEUR:Backdoor.Linux.Mirai.h
File has been identified by 22 AntiVirus engines on VirusTotal as malicious (22 events)
Lionic Trojan.ELF.Mirai.4!c
Cynet Malicious (score: 99)
ESET-NOD32 a variant of Linux/Mirai.A
Avast ELF:Agent-AYQ [Trj]
Kaspersky HEUR:Backdoor.Linux.Mirai.h
Rising Backdoor.Gafgyt/Linux!1.12AC3 (CLASSIC)
F-Secure Exploit.EXP/ELF.Agent.M.28
DrWeb Linux.Siggen.9999
Sophos Linux/DDoS-CI
Ikarus Trojan.Linux.Mirai
Google Detected
Avira EXP/ELF.Agent.M.28
Antiy-AVL Trojan[Backdoor]/Linux.Mirai.b
Kingsoft Linux.Backdoor.Mirai.h
Microsoft Trojan:Linux/Multiverze!rfn
ZoneAlarm Linux/DDoS-CI
Varist E32/Mirai.BMO
Tencent Backdoor.Linux.Mirai.wav
huorong Backdoor/Linux.Marai.u
Fortinet ELF/Mirai.J!tr
AVG ELF:Agent-AYQ [Trj]
alibabacloud DDOS:Linux/Mirai
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.