{"report_id":"60a462dc-5fae-4c16-9d49-69fad3803b93","version":6,"status":"done","tags":[],"date":"2024-04-29T20:25:55Z","url":{"schema":"http","addr":"45.88.90.17/rebirth.arm4","fqdn":"45.88.90.17","domain":"45.88.90.17","tld":""},"ip":{"addr":"45.88.90.17","port":0,"asn":0,"as":"","country":"United States","country_code":"US"},"final":{"url":{"schema":"about","addr":"about:privatebrowsing","fqdn":"","domain":"","tld":""},"title":"about:privatebrowsing"},"submit":{"url":{"schema":"","addr":"","fqdn":"","domain":"","tld":""},"ip":{"addr":"","port":0,"asn":0,"as":"","country":"","country_code":""},"tags":null,"meta":null},"settings":{"access":"public","device_type":"desktop","expires_at":"2026-10-25T18:14:04Z","useragent":"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0","referer":"","cookies":null,"exit_node":"z0yflva4pidy47h"},"stats":{"alert_count":{"ids":0,"urlquery":0,"analyzer":0}},"detection":{"ids":null,"analyzer":null,"urlquery":null},"summary":[{"fqdn":"45.88.90.17","ip":{"addr":"45.88.90.17","port":80,"asn":0,"as":"","country":"United States","country_code":"US"},"domain_registered":"unknown","domain_rank":0,"first_seen":"2022-11-29 17:16:34","last_seen":"2023-01-28 20:02:32","alert_count":8,"request_count":1,"received_data":171478,"sent_data":394,"comment":"","tags":null,"fingerprints":null}],"files":null,"artifacts":{"windows_shortcuts":null,"files":[{"md5":"0426632af03c7d94760e06a50b1f9b58","sha1":"8d6c6b1e5da0ad3c4b73ede1bd91b6f5ac21e7c2","sha256":"5e4a314dd04e587c83f5af55537cd3ad9befc2afb0268906e9e9264fc145345a","sha512":"0160c37fd06d1db5c98a5dd8ef1aff7cdcdd9caa3bf2291ccc094f7f1ecd70cbd904caf923740e12bf9ea42a36aa135732acce62feed8d4fa5ab61d359d13bfd","magic":"ELF 32-bit LSB executable, ARM, version 1 (ARM)","size":171215,"url":{"schema":"http","addr":"45.88.90.17/rebirth.arm4","fqdn":"45.88.90.17","domain":"45.88.90.17","tld":"17"},"ip":{"addr":"45.88.90.17","port":80,"asn":0,"as":"","country":"United States","country_code":"US"},"archive":null,"alerts":{"urlquery":null,"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2024-04-29","alert":"Linux.Trojan.Gafgyt","trigger":"45.88.90.17/rebirth.arm4","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-01-12","fingerprint":"a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead","id":"28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd","last_modified":"2021-09-16","license":"Elastic License v2","os":"linux","rule":"Linux_Trojan_Gafgyt_28a2fe0c","scan_context":"file, memory","severity":"100","threat_name":"Linux.Trojan.Gafgyt"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2024-04-29","alert":"Linux.Trojan.Gafgyt","trigger":"45.88.90.17/rebirth.arm4","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-01-12","fingerprint":"aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e","id":"ea92cca8-bba7-4a1c-9b88-a2d051ad0021","last_modified":"2021-09-16","license":"Elastic License v2","os":"linux","rule":"Linux_Trojan_Gafgyt_ea92cca8","scan_context":"file, memory","severity":"100","threat_name":"Linux.Trojan.Gafgyt"}},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2024-04-29","alert":"Scan result 45/65","trigger":"5e4a314dd04e587c83f5af55537cd3ad9befc2afb0268906e9e9264fc145345a","verdict":"malicious","severity":"","comment":"malicious - 45/65","link":"https://www.virustotal.com/gui/file/5e4a314dd04e587c83f5af55537cd3ad9befc2afb0268906e9e9264fc145345a","meta":null}]}}],"telegram":null,"pdfs":null,"clipboard":null},"sensors":{"ids":[{"sensor_name":"suricata","description":"Suricata /w Emerging Threats Pro","alerts":[{"sensor_name":"suricata","title":"","description":"","date":"2024-04-29T20:25:30Z","timestamp":1714422330,"ip_dst":{"addr":"45.88.90.17","port":80,"asn":0,"as":"","country":"United States","country_code":"US"},"ip_src":{"addr":"Client IP","port":51048,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"high","alert":"ThreatFox MooBot botnet C2 traffic (ip:port - confidence level: 100%)","source":"{\"timestamp\":\"2024-04-29T20:25:30.119906+0000\",\"flow_id\":244007866913890,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.5\",\"src_port\":51048,\"dest_ip\":\"45.88.90.17\",\"dest_port\":80,\"proto\":\"TCP\",\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":91261756,\"rev\":1,\"signature\":\"ThreatFox MooBot botnet C2 traffic (ip:port - confidence level: 100%)\",\"category\":\"A Network Trojan was detected\",\"severity\":1,\"source\":{\"ip\":\"45.88.90.17\",\"port\":80},\"target\":{\"ip\":\"172.18.0.5\",\"port\":51048},\"metadata\":{\"confidence_level\":[\"100\"],\"first_seen\":[\"2024_04_24\"]}},\"flow\":{\"pkts_toserver\":1,\"pkts_toclient\":0,\"bytes_toserver\":74,\"bytes_toclient\":0,\"start\":\"2024-04-29T20:25:30.119906+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2024-04-29T20:25:30Z","timestamp":1714422330,"ip_dst":{"addr":"45.88.90.17","port":80,"asn":0,"as":"","country":"United States","country_code":"US"},"ip_src":{"addr":"Client IP","port":51048,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"high","alert":"URLhaus Known malware download URL detected (2828763)","source":"{\"timestamp\":\"2024-04-29T20:25:30.175392+0000\",\"flow_id\":244007866913890,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.5\",\"src_port\":51048,\"dest_ip\":\"45.88.90.17\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"ET.Evil\",\"ET.DROPIP\",\"http.dottedquadhost\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":83691863,\"rev\":1,\"signature\":\"URLhaus Known malware download URL detected (2828763)\",\"category\":\"A Network Trojan was detected\",\"severity\":1,\"metadata\":{\"created_at\":[\"2024_04_27\"]}},\"http\":{\"hostname\":\"45.88.90.17\",\"url\":\"/rebirth.arm4\",\"http_user_agent\":\"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":1183},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":6,\"bytes_toserver\":668,\"bytes_toclient\":6196,\"start\":\"2024-04-29T20:25:30.119906+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2024-04-29T20:25:30Z","timestamp":1714422330,"ip_dst":{"addr":"45.88.90.17","port":80,"asn":0,"as":"","country":"United States","country_code":"US"},"ip_src":{"addr":"Client IP","port":51048,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"medium","alert":"ET HUNTING Suspicious GET Request for .arm file File","source":"{\"timestamp\":\"2024-04-29T20:25:30.175392+0000\",\"flow_id\":244007866913890,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.5\",\"src_port\":51048,\"dest_ip\":\"45.88.90.17\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"ET.Evil\",\"ET.DROPIP\",\"http.dottedquadhost\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2038656,\"rev\":1,\"signature\":\"ET HUNTING Suspicious GET Request for .arm file File\",\"category\":\"Potentially Bad Traffic\",\"severity\":2,\"metadata\":{\"created_at\":[\"2022_08_29\"],\"deployment\":[\"SSLDecrypt\",\"Perimeter\"],\"former_category\":[\"HUNTING\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2022_08_29\"]}},\"http\":{\"hostname\":\"45.88.90.17\",\"url\":\"/rebirth.arm4\",\"http_user_agent\":\"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":1183},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":6,\"bytes_toserver\":668,\"bytes_toclient\":6196,\"start\":\"2024-04-29T20:25:30.119906+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2024-04-29T20:25:30Z","timestamp":1714422330,"ip_dst":{"addr":"Client IP","port":51048,"asn":0,"as":"","country":"","country_code":"zz"},"ip_src":{"addr":"45.88.90.17","port":80,"asn":0,"as":"","country":"United States","country_code":"US"},"severity":"high","alert":"ET POLICY Executable and linking format (ELF) file download Over HTTP","source":"{\"timestamp\":\"2024-04-29T20:25:30.229892+0000\",\"flow_id\":244007866913890,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"45.88.90.17\",\"src_port\":80,\"dest_ip\":\"172.18.0.5\",\"dest_port\":51048,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"ET.Evil\",\"ET.DROPIP\",\"http.dottedquadhost\",\"ET.ELFDownload\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2019240,\"rev\":14,\"signature\":\"ET POLICY Executable and linking format (ELF) file download Over HTTP\",\"category\":\"Potential Corporate Privacy Violation\",\"severity\":1,\"metadata\":{\"created_at\":[\"2014_09_25\"],\"former_category\":[\"POLICY\"],\"updated_at\":[\"2023_04_12\"]}},\"http\":{\"hostname\":\"45.88.90.17\",\"url\":\"/rebirth.arm4\",\"http_user_agent\":\"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":43175},\"files\":[{\"filename\":\"/rebirth.arm4\",\"sid\":[],\"gaps\":false,\"state\":\"TRUNCATED\",\"stored\":false,\"size\":43175,\"tx_id\":0}],\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":22,\"pkts_toclient\":33,\"bytes_toserver\":1856,\"bytes_toclient\":47074,\"start\":\"2024-04-29T20:25:30.119906+0000\"}}"}]}],"analyzer":[{"sensor_name":"infosec_yara","type":"yara","description":"Public InfoSec YARA rules","link":"","alerts":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2024-04-29","alert":"Linux.Trojan.Gafgyt","trigger":"45.88.90.17/rebirth.arm4","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-01-12","fingerprint":"a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead","id":"28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd","last_modified":"2021-09-16","license":"Elastic License v2","os":"linux","rule":"Linux_Trojan_Gafgyt_28a2fe0c","scan_context":"file, memory","severity":"100","threat_name":"Linux.Trojan.Gafgyt"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2024-04-29","alert":"Linux.Trojan.Gafgyt","trigger":"45.88.90.17/rebirth.arm4","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-01-12","fingerprint":"aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e","id":"ea92cca8-bba7-4a1c-9b88-a2d051ad0021","last_modified":"2021-09-16","license":"Elastic License v2","os":"linux","rule":"Linux_Trojan_Gafgyt_ea92cca8","scan_context":"file, memory","severity":"100","threat_name":"Linux.Trojan.Gafgyt"}}]},{"sensor_name":"openphish","type":"url","description":"OpenPhish","link":"","alerts":null},{"sensor_name":"phishtank","type":"url","description":"PhishTank","link":"","alerts":null},{"sensor_name":"mnemonic_dns","type":"domain","description":"mnemonic secure dns","link":"","alerts":null},{"sensor_name":"quad9","type":"domain","description":"Quad9 DNS","link":"","alerts":[{"sensor_name":"quad9","sensor_type":"domain","title":"","description":"Quad9 DNS","scan_date":"2024-04-29","alert":"Sinkholed","trigger":"45.88.90.17","verdict":"malicious","severity":"medium","comment":"Sinkholed","link":"https://www.quad9.net","meta":null}]},{"sensor_name":"threatfox","type":"url","description":"ThreatFox","link":"","alerts":[{"sensor_name":"threatfox","sensor_type":"url","title":"","description":"ThreatFox","scan_date":"2024-04-24","alert":"MooBot","trigger":"45.88.90.17","verdict":"malicious","severity":"medium","comment":"MooBot","link":"https://threatfox.abuse.ch/","meta":null}]}],"urlquery":null},"javascript":{"script":null,"eval":null,"write":null},"http":[{"url":{"schema":"http","addr":"45.88.90.17/rebirth.arm4","fqdn":"45.88.90.17","domain":"45.88.90.17","tld":"17"},"ip":{"addr":"45.88.90.17","port":80,"asn":0,"as":"","country":"United States","country_code":"US"},"is_navigation_request":true,"resource_type":"document","requested_by":"","date":"2024-04-29T20:25:30.121Z","timestamp":1714422330121,"http_version":"HTTP/1.1","security_state":"insecure","security_info":null,"request":{"raw":"GET /rebirth.arm4 HTTP/1.1\r\nHost: 45.88.90.17\r\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nDNT: 1\r\nConnection: keep-alive\r\nUpgrade-Insecure-Requests: 1\r\nPragma: no-cache\r\nCache-Control: no-cache\r\n","headers":null,"cookies":null,"method":"GET"},"response":{"raw":"HTTP/1.1 200 OK\r\nDate: Mon, 29 Apr 2024 20:25:35 GMT\r\nServer: Apache/2.4.41 (Ubuntu)\r\nLast-Modified: Fri, 26 Apr 2024 16:26:52 GMT\r\nETag: \"29ccf-617025f12af2a\"\r\nAccept-Ranges: bytes\r\nContent-Length: 171215\r\nKeep-Alive: timeout=5, max=100\r\nConnection: Keep-Alive\r\n","headers":null,"cookies":null,"status_code":"200","status_text":"OK","fingerprints":null,"data":{"size":171215,"size_decoded":171215,"mime_type":"application/octet-stream","magic":"ELF 32-bit LSB executable, ARM, version 1 (ARM)","md5":"0426632af03c7d94760e06a50b1f9b58","sha1":"8d6c6b1e5da0ad3c4b73ede1bd91b6f5ac21e7c2","sha256":"5e4a314dd04e587c83f5af55537cd3ad9befc2afb0268906e9e9264fc145345a","sha512":"0160c37fd06d1db5c98a5dd8ef1aff7cdcdd9caa3bf2291ccc094f7f1ecd70cbd904caf923740e12bf9ea42a36aa135732acce62feed8d4fa5ab61d359d13bfd","ssdeep":"3072:Bdy8WoZkeDGOvvlIAFZ3U5c0xkuQn3f5h1X7cKUmSQnNbGUBn:bZv9KBxkuQ3f5h1X7xUmSQnNbGUBn","tlshash":"44f31824f5408267c2d327faa69e838d3f3557e223d733145a389fb02fc2b952d66964","first_seen":"2024-04-27T09:59:46Z","last_seen":"2024-08-20T02:23:37.6989Z","times_seen":3,"resource_available":false,"data":null}},"time_used":169,"timings":{"blocked":26,"dns":0,"connect":27,"send":0,"wait":28,"receive":87,"ssl":0},"alerts":{"ids":[{"sensor_name":"suricata","title":"","description":"","date":"2024-04-29T20:25:30Z","timestamp":1714422330,"ip_dst":{"addr":"45.88.90.17","port":80,"asn":0,"as":"","country":"United States","country_code":"US"},"ip_src":{"addr":"172.18.0.5","port":51048,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"high","alert":"URLhaus Known malware download URL detected (2828763)","source":"{\"timestamp\":\"2024-04-29T20:25:30.175392+0000\",\"flow_id\":244007866913890,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.5\",\"src_port\":51048,\"dest_ip\":\"45.88.90.17\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"ET.Evil\",\"ET.DROPIP\",\"http.dottedquadhost\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":83691863,\"rev\":1,\"signature\":\"URLhaus Known malware download URL detected (2828763)\",\"category\":\"A Network Trojan was detected\",\"severity\":1,\"metadata\":{\"created_at\":[\"2024_04_27\"]}},\"http\":{\"hostname\":\"45.88.90.17\",\"url\":\"/rebirth.arm4\",\"http_user_agent\":\"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":1183},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":6,\"bytes_toserver\":668,\"bytes_toclient\":6196,\"start\":\"2024-04-29T20:25:30.119906+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2024-04-29T20:25:30Z","timestamp":1714422330,"ip_dst":{"addr":"45.88.90.17","port":80,"asn":0,"as":"","country":"United States","country_code":"US"},"ip_src":{"addr":"172.18.0.5","port":51048,"asn":0,"as":"","country":"","country_code":"zz"},"severity":"medium","alert":"ET HUNTING Suspicious GET Request for .arm file File","source":"{\"timestamp\":\"2024-04-29T20:25:30.175392+0000\",\"flow_id\":244007866913890,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"172.18.0.5\",\"src_port\":51048,\"dest_ip\":\"45.88.90.17\",\"dest_port\":80,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"ET.Evil\",\"ET.DROPIP\",\"http.dottedquadhost\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2038656,\"rev\":1,\"signature\":\"ET HUNTING Suspicious GET Request for .arm file File\",\"category\":\"Potentially Bad Traffic\",\"severity\":2,\"metadata\":{\"created_at\":[\"2022_08_29\"],\"deployment\":[\"SSLDecrypt\",\"Perimeter\"],\"former_category\":[\"HUNTING\"],\"signature_severity\":[\"Informational\"],\"updated_at\":[\"2022_08_29\"]}},\"http\":{\"hostname\":\"45.88.90.17\",\"url\":\"/rebirth.arm4\",\"http_user_agent\":\"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":1183},\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":4,\"pkts_toclient\":6,\"bytes_toserver\":668,\"bytes_toclient\":6196,\"start\":\"2024-04-29T20:25:30.119906+0000\"}}"},{"sensor_name":"suricata","title":"","description":"","date":"2024-04-29T20:25:30Z","timestamp":1714422330,"ip_dst":{"addr":"172.18.0.5","port":51048,"asn":0,"as":"","country":"","country_code":"zz"},"ip_src":{"addr":"45.88.90.17","port":80,"asn":0,"as":"","country":"United States","country_code":"US"},"severity":"high","alert":"ET POLICY Executable and linking format (ELF) file download Over HTTP","source":"{\"timestamp\":\"2024-04-29T20:25:30.229892+0000\",\"flow_id\":244007866913890,\"in_iface\":\"br-31613a7ed13b\",\"event_type\":\"alert\",\"src_ip\":\"45.88.90.17\",\"src_port\":80,\"dest_ip\":\"172.18.0.5\",\"dest_port\":51048,\"proto\":\"TCP\",\"metadata\":{\"flowbits\":[\"ET.Evil\",\"ET.DROPIP\",\"http.dottedquadhost\",\"ET.ELFDownload\"]},\"tx_id\":0,\"alert\":{\"action\":\"allowed\",\"gid\":1,\"signature_id\":2019240,\"rev\":14,\"signature\":\"ET POLICY Executable and linking format (ELF) file download Over HTTP\",\"category\":\"Potential Corporate Privacy Violation\",\"severity\":1,\"metadata\":{\"created_at\":[\"2014_09_25\"],\"former_category\":[\"POLICY\"],\"updated_at\":[\"2023_04_12\"]}},\"http\":{\"hostname\":\"45.88.90.17\",\"url\":\"/rebirth.arm4\",\"http_user_agent\":\"Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0\",\"http_method\":\"GET\",\"protocol\":\"HTTP/1.1\",\"status\":200,\"length\":43175},\"files\":[{\"filename\":\"/rebirth.arm4\",\"sid\":[],\"gaps\":false,\"state\":\"TRUNCATED\",\"stored\":false,\"size\":43175,\"tx_id\":0}],\"app_proto\":\"http\",\"flow\":{\"pkts_toserver\":22,\"pkts_toclient\":33,\"bytes_toserver\":1856,\"bytes_toclient\":47074,\"start\":\"2024-04-29T20:25:30.119906+0000\"}}"}],"analyzer":[{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2024-04-29","alert":"Linux.Trojan.Gafgyt","trigger":"45.88.90.17/rebirth.arm4","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-01-12","fingerprint":"a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead","id":"28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd","last_modified":"2021-09-16","license":"Elastic License v2","os":"linux","rule":"Linux_Trojan_Gafgyt_28a2fe0c","scan_context":"file, memory","severity":"100","threat_name":"Linux.Trojan.Gafgyt"}},{"sensor_name":"infosec_yara","sensor_type":"yara","title":"","description":"Elastic Security YARA Rules","scan_date":"2024-04-29","alert":"Linux.Trojan.Gafgyt","trigger":"45.88.90.17/rebirth.arm4","verdict":"malware","severity":"medium","comment":"","link":"https://github.com/elastic/protections-artifacts/tree/main/yara","meta":{"arch_context":"x86","author":"Elastic Security","creation_date":"2021-01-12","fingerprint":"aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e","id":"ea92cca8-bba7-4a1c-9b88-a2d051ad0021","last_modified":"2021-09-16","license":"Elastic License v2","os":"linux","rule":"Linux_Trojan_Gafgyt_ea92cca8","scan_context":"file, memory","severity":"100","threat_name":"Linux.Trojan.Gafgyt"}},{"sensor_name":"threatfox","sensor_type":"url","title":"","description":"ThreatFox","scan_date":"2024-04-24","alert":"MooBot","trigger":"45.88.90.17","verdict":"malicious","severity":"medium","comment":"MooBot","link":"https://threatfox.abuse.ch/","meta":null},{"sensor_name":"quad9","sensor_type":"domain","title":"","description":"Quad9 DNS","scan_date":"2024-04-29","alert":"Sinkholed","trigger":"45.88.90.17","verdict":"malicious","severity":"medium","comment":"Sinkholed","link":"https://www.quad9.net","meta":null},{"sensor_name":"virustotal","sensor_type":"file","title":"","description":"VirusTotal","scan_date":"2024-04-29","alert":"Scan result 45/65","trigger":"5e4a314dd04e587c83f5af55537cd3ad9befc2afb0268906e9e9264fc145345a","verdict":"malicious","severity":"","comment":"malicious - 45/65","link":"https://www.virustotal.com/gui/file/5e4a314dd04e587c83f5af55537cd3ad9befc2afb0268906e9e9264fc145345a","meta":null}],"urlquery":null}}]}
