{"report_id":"462bfc3b-ffeb-431e-abef-98810e675689","version":6,"status":"done","tags":[],"date":"2024-10-09T02:56:49Z","url":{"schema":"http","addr":"219.155.203.28:59052/Mozi.m","fqdn":"219.155.203.28","domain":"219.155.203.28","tld":""},"ip":{"addr":"219.155.203.28","port":0,"asn":4837,"as":"CHINA UNICOM China169 Backbone","country":"China","country_code":"CN"},"final":{"url":{"schema":"about","addr":"about:privatebrowsing","fqdn":"","domain":"","tld":""},"title":"about:privatebrowsing"},"submit":{"url":{"schema":"","addr":"","fqdn":"","domain":"","tld":""},"ip":{"addr":"","port":0,"asn":0,"as":"","country":"","country_code":""},"tags":null,"meta":null},"settings":{"access":"public","device_type":"desktop","expires_at":"2026-12-20T08:43:26Z","useragent":"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0","referer":"","cookies":null,"exit_node":"z0yflva4pidy47h"},"stats":{"alert_count":{"ids":0,"urlquery":0,"analyzer":0}},"detection":{"ids":null,"analyzer":null,"urlquery":null},"summary":[{"fqdn":"r10.o.lencr.org","ip":{"addr":"23.33.119.27","port":0,"asn":20940,"as":"Akamai International B.V.","country":"Norway","country_code":"NO"},"domain_registered":"2020-06-29","domain_rank":0,"first_seen":"2024-06-06 21:45:11","last_seen":"2024-10-07 19:37:44","alert_count":0,"request_count":1,"received_data":887,"sent_data":327,"comment":"","tags":null,"fingerprints":null},{"fqdn":"219.155.203.28:59052","ip":{"addr":"219.155.203.28","port":59052,"asn":4837,"as":"CHINA UNICOM China169 Backbone","country":"China","country_code":"CN"},"domain_registered":"unknown","domain_rank":0,"first_seen":"No data","last_seen":"No data","alert_count":4,"request_count":1,"received_data":135890,"sent_data":397,"comment":"","tags":null,"fingerprints":null}],"files":null,"artifacts":{"windows_shortcuts":null,"files":[{"md5":"59ce0baba11893f90527fc951ac69912","sha1":"5857a7dd621c4c3ebb0b5a3bec915d409f70d39f","sha256":"4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7","sha512":"c5b12797b477e5e5964a78766bb40b1c0d9fdfb8eef1f9aee3df451e3441a40c61d325bf400ba51048811b68e1c70a95f15e4166b7a65a4eca0c624864328647","magic":"ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV)","size":135784,"url":{"schema":"http","addr":"219.155.203.28:59052/Mozi.m","fqdn":"219.155.203.28:59052","domain":"219.155.203.28","tld":"28:59052"},"ip":{"addr":"219.155.203.28","port":59052,"asn":4837,"as":"CHINA UNICOM China169 Backbone","country":"China","country_code":"CN"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2024-10-09","alert":"Detects a suspicious ELF binary with UPX compression","trigger":"219.155.203.28:59052/Mozi.m","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2018-12-12","description":"Detects a suspicious ELF binary with UPX compression","hash1":"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4","reference":"Internal Research","rule":"SUSP_ELF_LNX_UPX_Compressed_File","score":"40"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2024-10-09","alert":"Linux.Packer.Patched_UPX","trigger":"219.155.203.28:59052/Mozi.m","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-06-08","fingerprint":"3297b5c63e70c557e71b739428b453039b142e1e04c2ab15eea4627d023b686d","id":"62e11c64-fc7d-4a0a-9d72-ad53ec3987ff","last_modified":"2021-07-28","license":"Elastic License v2","os":"linux","reference":"https://cujo.com/upx-anti-unpacking-techniques-in-iot-malware/","reference_sample":"02f81a1e1edcb9032a1d7256a002b11e1e864b2e9989f5d24ea1c9b507895669","rule":"Linux_Packer_Patched_UPX_62e11c64","scan_context":"file","severity":"60","threat_name":"Linux.Packer.Patched_UPX"}},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2024-10-08","alert":"Scan result 49/65","trigger":"4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7","verdict":"malicious","severity":"","comment":"malicious - 49/65","link":"https://www.virustotal.com/gui/file/4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7","meta":null}]}}],"telegram":null,"pdfs":null,"clipboard":null},"sensors":{"ids":[{"sensor_name":"suricata","description":"Suricata /w Emerging Threats Pro","alerts":null}],"analyzer":[{"sensor_name":"infosec_yara","type":"yara","description":"Public InfoSec YARA rules","link":"","alerts":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2024-10-09","alert":"Detects a suspicious ELF binary with UPX compression","trigger":"219.155.203.28:59052/Mozi.m","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2018-12-12","description":"Detects a suspicious ELF binary with UPX compression","hash1":"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4","reference":"Internal Research","rule":"SUSP_ELF_LNX_UPX_Compressed_File","score":"40"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2024-10-09","alert":"Linux.Packer.Patched_UPX","trigger":"219.155.203.28:59052/Mozi.m","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-06-08","fingerprint":"3297b5c63e70c557e71b739428b453039b142e1e04c2ab15eea4627d023b686d","id":"62e11c64-fc7d-4a0a-9d72-ad53ec3987ff","last_modified":"2021-07-28","license":"Elastic License v2","os":"linux","reference":"https://cujo.com/upx-anti-unpacking-techniques-in-iot-malware/","reference_sample":"02f81a1e1edcb9032a1d7256a002b11e1e864b2e9989f5d24ea1c9b507895669","rule":"Linux_Packer_Patched_UPX_62e11c64","scan_context":"file","severity":"60","threat_name":"Linux.Packer.Patched_UPX"}}]},{"sensor_name":"openphish","type":"url","description":"OpenPhish","link":"","alerts":null},{"sensor_name":"phishtank","type":"url","description":"PhishTank","link":"","alerts":null},{"sensor_name":"mnemonic_dns","type":"domain","description":"mnemonic secure dns","link":"","alerts":null},{"sensor_name":"quad9","type":"domain","description":"Quad9 DNS","link":"","alerts":[{"sensor_name":"quad9","sensor_type":"domain","title":"","description":"Quad9 DNS","scan_date":"2024-10-09","alert":"Sinkholed","trigger":"219.155.203.28","verdict":"malicious","severity":"medium","comment":"Sinkholed","link":"https://www.quad9.net","meta":null}]},{"sensor_name":"threatfox","type":"url","description":"ThreatFox","link":"","alerts":null}],"urlquery":null},"javascript":{"script":null,"eval":null,"write":null},"http":[{"url":{"schema":"http","addr":"r10.o.lencr.org/","fqdn":"r10.o.lencr.org","domain":"lencr.org","tld":"org"},"ip":{"addr":"23.33.119.27","port":0,"asn":20940,"as":"Akamai International B.V.","country":"Norway","country_code":"NO"},"is_navigation_request":false,"resource_type":"","requested_by":"","date":"2024-10-09T02:56:24.455202646Z","timestamp":1728442584455,"http_version":"","security_state":"","security_info":null,"request":{"raw":"POST / HTTP/1.1\r\nHost: r10.o.lencr.org\r\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nContent-Type: application/ocsp-request\r\nContent-Length: 85\r\nConnection: keep-alive\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n","headers":null,"cookies":null,"method":""},"response":{"raw":"HTTP/1.1 200 OK\r\nServer: nginx\r\nContent-Type: application/ocsp-response\r\nContent-Length: 504\r\nETag: \"B6DB380F5EEB73AA56ABF90AFA43B52CC9F51B01F33AD1EEFECCC473A41FFB86\"\r\nLast-Modified: Tue, 08 Oct 2024 11:18:00 UTC\r\nCache-Control: public, no-transform, must-revalidate, max-age=4588\r\nExpires: Wed, 09 Oct 2024 04:12:52 GMT\r\nDate: Wed, 09 Oct 2024 02:56:24 GMT\r\nConnection: keep-alive\r\n","headers":null,"cookies":null,"status_code":"","status_text":"","fingerprints":null,"data":{"size":504,"size_decoded":504,"mime_type":"application/octet-stream","magic":"data","md5":"33985775df7b619cb33f4050d88c5fb9","sha1":"cf0b2ff92cd2f7e12ce788a164a73d75dea5da83","sha256":"b6db380f5eeb73aa56abf90afa43b52cc9f51b01f33ad1eefeccc473a41ffb86","sha512":"6bc0e873177bc8082b9b3d8fdb3e1c3d3b2adf2d27c0053919c540d80bdfffa7a6f41b0ea381ef7e077c08bbd371ab5a9cbae5cea92e4752c766d8ff25ddb8f5","ssdeep":"","tlshash":"81f07551c5b13da01bb01629d9a89003dd10cdfa14c05be451f443e23c02bfc468054c","first_seen":"2024-10-08T16:14:32Z","last_seen":"2024-10-11T08:49:31.751651Z","times_seen":5844,"resource_available":false,"data":null}},"time_used":0,"timings":{"blocked":0,"dns":0,"connect":0,"send":0,"wait":0,"receive":0,"ssl":0},"alerts":{"ids":null,"analyzer":null,"urlquery":null}},{"url":{"schema":"http","addr":"219.155.203.28:59052/Mozi.m","fqdn":"219.155.203.28:59052","domain":"219.155.203.28","tld":"28:59052"},"ip":{"addr":"219.155.203.28","port":59052,"asn":4837,"as":"CHINA UNICOM China169 Backbone","country":"China","country_code":"CN"},"is_navigation_request":true,"resource_type":"document","requested_by":"","date":"2024-10-09T02:56:24.572Z","timestamp":1728442584572,"http_version":"HTTP/1.1","security_state":"insecure","security_info":null,"request":{"raw":"GET /Mozi.m HTTP/1.1\r\nHost: 219.155.203.28:59052\r\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nDNT: 1\r\nConnection: keep-alive\r\nUpgrade-Insecure-Requests: 1\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n","headers":null,"cookies":null,"method":"GET"},"response":{"raw":"HTTP/1.1 200 OK\r\nServer: nginx\r\nContent-Length: 135784\r\nConnection: close\r\nContent-Type: application/zip\r\n","headers":null,"cookies":null,"status_code":"200","status_text":"OK","fingerprints":null,"data":{"size":135784,"size_decoded":135784,"mime_type":"application/zip","magic":"ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV)","md5":"59ce0baba11893f90527fc951ac69912","sha1":"5857a7dd621c4c3ebb0b5a3bec915d409f70d39f","sha256":"4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7","sha512":"c5b12797b477e5e5964a78766bb40b1c0d9fdfb8eef1f9aee3df451e3441a40c61d325bf400ba51048811b68e1c70a95f15e4166b7a65a4eca0c624864328647","ssdeep":"3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xioP:p3lOYoaja8xzx/0wsxzSi2","tlshash":"e5d3128bef36dc1ecf001eb226da5b9e9c6d756b41cbf0a4b9c1818f13a01c97d52215","first_seen":"2023-05-05T13:34:54Z","last_seen":"2026-04-05T17:16:39.696504Z","times_seen":380297,"resource_available":true,"data":null}},"time_used":1643,"timings":{"blocked":258,"dns":0,"connect":269,"send":0,"wait":270,"receive":846,"ssl":0},"alerts":{"ids":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Public Nextron YARA rules","scan_date":"2024-10-09","alert":"Detects a suspicious ELF binary with UPX compression","trigger":"219.155.203.28:59052/Mozi.m","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/Neo23x0/signature-base","meta":{"author":"Florian Roth (Nextron Systems)","date":"2018-12-12","description":"Detects a suspicious ELF binary with UPX compression","hash1":"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4","reference":"Internal Research","rule":"SUSP_ELF_LNX_UPX_Compressed_File","score":"40"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2024-10-09","alert":"Linux.Packer.Patched_UPX","trigger":"219.155.203.28:59052/Mozi.m","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-06-08","fingerprint":"3297b5c63e70c557e71b739428b453039b142e1e04c2ab15eea4627d023b686d","id":"62e11c64-fc7d-4a0a-9d72-ad53ec3987ff","last_modified":"2021-07-28","license":"Elastic License v2","os":"linux","reference":"https://cujo.com/upx-anti-unpacking-techniques-in-iot-malware/","reference_sample":"02f81a1e1edcb9032a1d7256a002b11e1e864b2e9989f5d24ea1c9b507895669","rule":"Linux_Packer_Patched_UPX_62e11c64","scan_context":"file","severity":"60","threat_name":"Linux.Packer.Patched_UPX"}},{"sensor_name":"quad9","sensor_type":"domain","title":"","description":"Quad9 DNS","scan_date":"2024-10-09","alert":"Sinkholed","trigger":"219.155.203.28","verdict":"malicious","severity":"medium","comment":"Sinkholed","link":"https://www.quad9.net","meta":null},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2024-10-08","alert":"Scan result 49/65","trigger":"4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7","verdict":"malicious","severity":"","comment":"malicious - 49/65","link":"https://www.virustotal.com/gui/file/4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7","meta":null}],"urlquery":null}}]}
