Summary | ZeroBOX

GoldAge3ATOm68k

ELF AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6403_us March 12, 2025, 11:25 a.m. March 12, 2025, 11:29 a.m.
Size 41.5KB
Type ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
MD5 bb0970d3af844bdb3252e4d471f1bf7a
SHA256 0e5a52ab7b26d9c7cc4f617cd9ab7a3603cd0c151ec7c5de7808c48c8d274e9c
CRC32 B1C76F1E
ssdeep 768:7zeNUS1Ex8/m3183PMEGnR7SbBJkC6w9dk1Xw8TO:n3SOC/C2EEGnBS3kC6wrk1A8S
Yara
  • IsELF - Executable and Linking Format executable file (Linux/Unix)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
45.33.6.223 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
file c:\program files\mozilla firefox\firefox.exe
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x744a0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74191000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74511000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74391000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74091000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74361000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75291000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x726e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74301000
process_handle: 0xffffffff
1 0 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
host 45.33.6.223
registry HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\EDITPLUS.EXE
registry HKEY_LOCAL_MACHINE\SOFTWARE\Clients\Mail\Mozilla Thunderbird\Capabilities\Hidden
Process injection Process 1476 resumed a thread in remote process 2112
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000028c
suspend_count: 1
process_identifier: 2112
1 0 0
Lionic Trojan.Linux.Mirai.K!c
Cynet Malicious (score: 99)
CTX elf.trojan.mirai
Skyhigh Linux/mirai.d
ALYac Trojan.Linux.Mirai.1
VIPRE Trojan.Linux.Mirai.1
Sangfor Suspicious.Linux.Save.a
Arcabit Trojan.Linux.Mirai.1
VirIT Linux.Mirai.YF
Symantec Linux.Mirai!g2
ESET-NOD32 a variant of Linux/Mirai.BC
TrendMicro-HouseCall Possible_MIRAI.SMLBO14
Avast ELF:Mirai-JW [Trj]
ClamAV Unix.Trojan.Mirai-6981989-0
Kaspersky HEUR:Backdoor.Linux.Mirai.ba
BitDefender Trojan.Linux.Mirai.1
MicroWorld-eScan Trojan.Linux.Mirai.1
Rising Backdoor.Mirai/Linux!1.128EC (CLASSIC)
Emsisoft Trojan.Linux.Mirai.1 (B)
F-Secure Exploit.EXP/ELF.Mirai.Bootnet.o
DrWeb Linux.Mirai.629
TrendMicro Possible_MIRAI.SMLBO14
Sophos Linux/DDoS-CI
Ikarus Trojan.Linux.Mirai
FireEye Trojan.Linux.Mirai.1
Google Detected
Avira EXP/ELF.Mirai.Bootnet.o
Antiy-AVL Trojan[Backdoor]/Linux.Mirai.ba
Microsoft Backdoor:Linux/Mirai.BO!xp
ZoneAlarm Linux/DDoS-CI
Avast-Mobile ELF:Mirai-KL [Trj]
GData Linux.Trojan.Mirai.J
Varist E32/ABApplication.POT
AhnLab-V3 Linux/Mirai.Gen3
McAfee Linux/mirai.d
Tencent Backdoor.Linux.Mirai.wba
huorong Trojan/Linux.Mirai.d
Fortinet ELF/Mirai.AT!tr
AVG ELF:Mirai-JW [Trj]
alibabacloud Trojan:Linux/Mirai.O