Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
ew3OL4dYca.elf

Overview

General Information

Sample name:ew3OL4dYca.elf
renamed because original name is a hash value
Original sample name:f3f909238b26928d0587e272fc702866.elf
Analysis ID:1428847
MD5:f3f909238b26928d0587e272fc702866
SHA1:aa2a80dc9db8553ea5e17958130662955ade4e10
SHA256:7452a8cd6d737917f4d19adcef67e8cc47b643da9d703a37fb2af6644a78edc1
Tags:32elfmipsmirai
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample deletes itself
Sample tries to kill multiple processes (SIGKILL)
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1428847
Start date and time:2024-04-19 17:50:04 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ew3OL4dYca.elf
renamed because original name is a hash value
Original Sample Name:f3f909238b26928d0587e272fc702866.elf
Detection:MAL
Classification:mal64.spre.evad.linELF@0/0@6/0
  • VT rate limit hit for: ew3OL4dYca.elf
Command:/tmp/ew3OL4dYca.elf
PID:6235
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
faggot got malware'd
Standard Error:
  • system is lnxubuntu20
  • sh (PID: 6265, Parent: 1477, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
  • gsd-rfkill (PID: 6265, Parent: 1477, MD5: 88a16a3c0aba1759358c06215ecfb5cc) Arguments: /usr/libexec/gsd-rfkill
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ew3OL4dYca.elfAvira: detected
Source: ew3OL4dYca.elfReversingLabs: Detection: 60%
Source: ew3OL4dYca.elfString: /proc//exe%s/%s/proc/%s/cmdlinerwgetcurlnetstatgreppslsmvechokillbashrebootshutdownhaltpowerofffaggot got malware'd/tmp/opt/home/dev/var/sbin/proc/self/exe
Source: /tmp/ew3OL4dYca.elf (PID: 6235)Socket: 127.0.0.1::39123Jump to behavior
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: tcpdown.su
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

System Summary

barindex
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 721, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 904, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 912, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 918, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 936, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 1601, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 1638, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 1877, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 6239, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 6243, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 6265, result: successfulJump to behavior
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 721, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 904, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 912, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 918, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 936, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 1601, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 1638, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 1877, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 6239, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 6243, result: successfulJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)SIGKILL sent: pid: 6265, result: successfulJump to behavior
Source: classification engineClassification label: mal64.spre.evad.linELF@0/0@6/0
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/3088/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/3088/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/3088/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/3088/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/3088/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/3088/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6240)File opened: /proc/114/cmdlineJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/ew3OL4dYca.elf (PID: 6235)File: /tmp/ew3OL4dYca.elfJump to behavior
Source: /tmp/ew3OL4dYca.elf (PID: 6235)Queries kernel information via 'uname': Jump to behavior
Source: ew3OL4dYca.elf, 6243.1.00005569fa0d9000.00005569fa160000.rw-.sdmpBinary or memory string: /sbin/mount.vmhgfs
Source: ew3OL4dYca.elf, 6235.1.00005569fa0d9000.00005569fa160000.rw-.sdmp, ew3OL4dYca.elf, 6239.1.00005569fa0d9000.00005569fa160000.rw-.sdmp, ew3OL4dYca.elf, 6243.1.00005569fa0d9000.00005569fa160000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
Source: ew3OL4dYca.elf, 6235.1.00007fff904ed000.00007fff9050e000.rw-.sdmp, ew3OL4dYca.elf, 6239.1.00007fff904ed000.00007fff9050e000.rw-.sdmp, ew3OL4dYca.elf, 6243.1.00007fff904ed000.00007fff9050e000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/ew3OL4dYca.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/ew3OL4dYca.elf
Source: ew3OL4dYca.elf, 6239.1.00007fc990468000.00007fc990474000.rw-.sdmpBinary or memory string: vmware
Source: ew3OL4dYca.elf, 6243.1.00005569fa0d9000.00005569fa160000.rw-.sdmpBinary or memory string: iU!/sbin/mount.vmhgfs
Source: ew3OL4dYca.elf, 6239.1.00007fc990468000.00007fc990474000.rw-.sdmpBinary or memory string: F`/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-timedated.service-Qc8Usi/tmpP/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-fwupd.service-gB0a9fT/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-fwupd.service-gB0a9f/tmpX/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-logind.service-IofUpj\/tmp/systemd-private-ec795e01d534441298b2bf519e4c51fc-systemd-logind.service-IofUpj/tmp$/tmp/vmware-root_721-42905598894/tmp/snap.lxdF
Source: ew3OL4dYca.elf, 6239.1.00007fc990468000.00007fc990474000.rw-.sdmpBinary or memory string: /tmp/vmware-root_721-4290559889
Source: ew3OL4dYca.elf, 6239.1.00005569fa0d9000.00005569fa160000.rw-.sdmpBinary or memory string: iU1/var/log/installer/block1/tmp/vmware-root_721-42905598890
Source: ew3OL4dYca.elf, 6235.1.00007fff904ed000.00007fff9050e000.rw-.sdmp, ew3OL4dYca.elf, 6239.1.00007fff904ed000.00007fff9050e000.rw-.sdmp, ew3OL4dYca.elf, 6243.1.00007fff904ed000.00007fff9050e000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
Source: ew3OL4dYca.elf, 6235.1.00005569fa0d9000.00005569fa160000.rw-.sdmp, ew3OL4dYca.elf, 6239.1.00005569fa0d9000.00005569fa160000.rw-.sdmp, ew3OL4dYca.elf, 6243.1.00005569fa0d9000.00005569fa160000.rw-.sdmpBinary or memory string: iU!/etc/qemu-binfmt/mipsel
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
File Deletion
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network Medium1
Service Stop
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1428847 Sample: ew3OL4dYca.elf Startdate: 19/04/2024 Architecture: LINUX Score: 64 23 109.202.202.202, 80 INIT7CH Switzerland 2->23 25 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->25 27 4 other IPs or domains 2->27 31 Antivirus / Scanner detection for submitted sample 2->31 33 Multi AV Scanner detection for submitted file 2->33 9 ew3OL4dYca.elf 2->9         started        12 gnome-session-binary sh gsd-rfkill 2->12         started        signatures3 process4 signatures5 35 Sample deletes itself 9->35 14 ew3OL4dYca.elf 9->14         started        process6 process7 16 ew3OL4dYca.elf 14->16         started        19 ew3OL4dYca.elf 14->19         started        signatures8 29 Sample tries to kill multiple processes (SIGKILL) 16->29 21 ew3OL4dYca.elf 16->21         started        process9
SourceDetectionScannerLabelLink
ew3OL4dYca.elf61%ReversingLabsLinux.Trojan.Mirai
ew3OL4dYca.elf100%AviraEXP/ELF.Mirai.W
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
tcpdown.su
185.216.70.250
truefalse
    unknown
    tcpdown.suE
    unknown
    unknownfalse
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      172.245.119.63
      unknownUnited States
      36352AS-COLOCROSSINGUSfalse
      109.202.202.202
      unknownSwitzerland
      13030INIT7CHfalse
      91.189.91.43
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      91.189.91.42
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      172.245.119.6303-2022.xlsxGet hashmaliciousLokibotBrowse
      • 172.245.119.63/433/vbc.exe
      CERERE DE OFERTA -02-03-2022.xlsxGet hashmaliciousLokibotBrowse
      • 172.245.119.63/70/vbc.exe
      #U00daJ RENDEL#U00c9S UD72672738.xlsxGet hashmaliciousLokibotBrowse
      • 172.245.119.63/80/vbc.exe
      Objedn#U00e1vka EUI894MD5684633.xlsxGet hashmaliciousLokibotBrowse
      • 172.245.119.63/222/vbc.exe
      ZAHTJEV ZA PONUDU 01-03-2022.xlsxGet hashmaliciousLokibotBrowse
      • 172.245.119.63/111/vbc.exe
      REQUEST FOR OFFER 28-02-2022.xlsxGet hashmaliciousLokibotBrowse
      • 172.245.119.63/77/vbc.exe
      2_10-56.xlsxGet hashmaliciousLokibot NeshtaBrowse
      • 172.245.119.63/51/vbc.exe
      02-2022.xlsxGet hashmaliciousLokibotBrowse
      • 172.245.119.63/56/vbc.exe
      LISTA DE COMAND#U0102 EUI894BU4633.xlsxGet hashmaliciousLokibotBrowse
      • 172.245.119.63/541/vbc.exe
      4BU4633.xlsxGet hashmaliciousLokibotBrowse
      • 172.245.119.63/255/vbc.exe
      109.202.202.202JGG1a56dcB.elfGet hashmaliciousMiraiBrowse
        pXwuZJXauT.elfGet hashmaliciousMirai, OkiruBrowse
          uycqnGcDJD.elfGet hashmaliciousMirai, OkiruBrowse
            wn8pgKNArU.elfGet hashmaliciousMirai, OkiruBrowse
              JX1KTFsitM.elfGet hashmaliciousOkiruBrowse
                qlgIEbAy2D.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                  qbmHR5ZIJL.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                    FZqYclxRiu.elfGet hashmaliciousMirai, OkiruBrowse
                      qlt52dfogC.elfGet hashmaliciousMirai, OkiruBrowse
                        46t2vW6nO9.elfGet hashmaliciousMirai, OkiruBrowse
                          91.189.91.43JGG1a56dcB.elfGet hashmaliciousMiraiBrowse
                            pXwuZJXauT.elfGet hashmaliciousMirai, OkiruBrowse
                              uycqnGcDJD.elfGet hashmaliciousMirai, OkiruBrowse
                                wn8pgKNArU.elfGet hashmaliciousMirai, OkiruBrowse
                                  JX1KTFsitM.elfGet hashmaliciousOkiruBrowse
                                    qlgIEbAy2D.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                      qbmHR5ZIJL.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                        qlt52dfogC.elfGet hashmaliciousMirai, OkiruBrowse
                                          46t2vW6nO9.elfGet hashmaliciousMirai, OkiruBrowse
                                            l1uxT537eS.elfGet hashmaliciousUnknownBrowse
                                              91.189.91.42JGG1a56dcB.elfGet hashmaliciousMiraiBrowse
                                                pXwuZJXauT.elfGet hashmaliciousMirai, OkiruBrowse
                                                  uycqnGcDJD.elfGet hashmaliciousMirai, OkiruBrowse
                                                    wn8pgKNArU.elfGet hashmaliciousMirai, OkiruBrowse
                                                      JX1KTFsitM.elfGet hashmaliciousOkiruBrowse
                                                        qlgIEbAy2D.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                          qbmHR5ZIJL.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                            FZqYclxRiu.elfGet hashmaliciousMirai, OkiruBrowse
                                                              qlt52dfogC.elfGet hashmaliciousMirai, OkiruBrowse
                                                                46t2vW6nO9.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  tcpdown.suVtMI9Eirot.elfGet hashmaliciousUnknownBrowse
                                                                  • 172.245.119.70
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  CANONICAL-ASGBJGG1a56dcB.elfGet hashmaliciousMiraiBrowse
                                                                  • 91.189.91.42
                                                                  1NSVzJh1X7.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 185.125.190.26
                                                                  pXwuZJXauT.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 91.189.91.42
                                                                  FtRTuVcia6.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 185.125.190.26
                                                                  uycqnGcDJD.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 91.189.91.42
                                                                  wn8pgKNArU.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 91.189.91.42
                                                                  JX1KTFsitM.elfGet hashmaliciousOkiruBrowse
                                                                  • 91.189.91.42
                                                                  qlgIEbAy2D.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                                  • 91.189.91.42
                                                                  3M2y5KkOrL.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 185.125.190.26
                                                                  qbmHR5ZIJL.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                                  • 91.189.91.42
                                                                  CANONICAL-ASGBJGG1a56dcB.elfGet hashmaliciousMiraiBrowse
                                                                  • 91.189.91.42
                                                                  1NSVzJh1X7.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 185.125.190.26
                                                                  pXwuZJXauT.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 91.189.91.42
                                                                  FtRTuVcia6.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 185.125.190.26
                                                                  uycqnGcDJD.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 91.189.91.42
                                                                  wn8pgKNArU.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 91.189.91.42
                                                                  JX1KTFsitM.elfGet hashmaliciousOkiruBrowse
                                                                  • 91.189.91.42
                                                                  qlgIEbAy2D.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                                  • 91.189.91.42
                                                                  3M2y5KkOrL.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 185.125.190.26
                                                                  qbmHR5ZIJL.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                                  • 91.189.91.42
                                                                  INIT7CHJGG1a56dcB.elfGet hashmaliciousMiraiBrowse
                                                                  • 109.202.202.202
                                                                  pXwuZJXauT.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 109.202.202.202
                                                                  uycqnGcDJD.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 109.202.202.202
                                                                  wn8pgKNArU.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 109.202.202.202
                                                                  JX1KTFsitM.elfGet hashmaliciousOkiruBrowse
                                                                  • 109.202.202.202
                                                                  qlgIEbAy2D.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                                  • 109.202.202.202
                                                                  qbmHR5ZIJL.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                                  • 109.202.202.202
                                                                  FZqYclxRiu.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 109.202.202.202
                                                                  qlt52dfogC.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 109.202.202.202
                                                                  46t2vW6nO9.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 109.202.202.202
                                                                  AS-COLOCROSSINGUSH6ccnU1094.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 23.95.165.132
                                                                  SecuriteInfo.com.Trojan.Siggen28.27399.23329.29047.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                  • 192.3.193.55
                                                                  Invoice No. 03182024.docxGet hashmaliciousRemcosBrowse
                                                                  • 192.210.201.57
                                                                  PO_983888123.xlsGet hashmaliciousUnknownBrowse
                                                                  • 107.173.4.2
                                                                  PO_983888123.xlsGet hashmaliciousUnknownBrowse
                                                                  • 107.173.4.2
                                                                  PO_983888123.xlsGet hashmaliciousUnknownBrowse
                                                                  • 107.173.4.2
                                                                  Kt28gy4sgm.elfGet hashmaliciousMiraiBrowse
                                                                  • 104.168.45.11
                                                                  SecuriteInfo.com.Exploit.ShellCode.69.31966.31539.rtfGet hashmaliciousRemcosBrowse
                                                                  • 192.3.101.153
                                                                  Yui1pUgieI.elfGet hashmaliciousMiraiBrowse
                                                                  • 104.168.61.51
                                                                  Vedtb2CYvY.elfGet hashmaliciousMiraiBrowse
                                                                  • 104.170.167.222
                                                                  No context
                                                                  No context
                                                                  No created / dropped files found
                                                                  File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
                                                                  Entropy (8bit):5.348809863116576
                                                                  TrID:
                                                                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                  File name:ew3OL4dYca.elf
                                                                  File size:99'820 bytes
                                                                  MD5:f3f909238b26928d0587e272fc702866
                                                                  SHA1:aa2a80dc9db8553ea5e17958130662955ade4e10
                                                                  SHA256:7452a8cd6d737917f4d19adcef67e8cc47b643da9d703a37fb2af6644a78edc1
                                                                  SHA512:2b09a7fd4391dd9bc48314eaaa75a40eabe8b7332099da2525193cb5f79a0b8d654de0d668fc35806f8fe45bdfa21095f1411c9fe29cbf85eb605bee6d154085
                                                                  SSDEEP:1536:8wPBYpO2CUIO2/M+LIjrqr1oNgfR34b7ZZ/myEhmJ:8yBYpO2rI/u2R3C7gcJ
                                                                  TLSH:46A3D60ABF650FFBDC6BCD370AA9170534CC651A22A57F3A7534D828F54B24B4AE3864
                                                                  File Content Preview:.ELF....................`.@.4...........4. ...(...............@...@.`y..`y..............dy..dyE.dyE.................Q.td...............................<...'!......'.......................<...'!...$.........9'.. ........................<...'!... .......@P9

                                                                  ELF header

                                                                  Class:ELF32
                                                                  Data:2's complement, little endian
                                                                  Version:1 (current)
                                                                  Machine:MIPS R3000
                                                                  Version Number:0x1
                                                                  Type:EXEC (Executable file)
                                                                  OS/ABI:UNIX - System V
                                                                  ABI Version:0
                                                                  Entry Point Address:0x400260
                                                                  Flags:0x1007
                                                                  ELF Header Size:52
                                                                  Program Header Offset:52
                                                                  Program Header Size:32
                                                                  Number of Program Headers:3
                                                                  Section Header Offset:99260
                                                                  Section Header Size:40
                                                                  Number of Section Headers:14
                                                                  Header String Table Index:13
                                                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                  NULL0x00x00x00x00x0000
                                                                  .initPROGBITS0x4000940x940x8c0x00x6AX004
                                                                  .textPROGBITS0x4001200x1200x14f900x00x6AX0016
                                                                  .finiPROGBITS0x4150b00x150b00x5c0x00x6AX004
                                                                  .rodataPROGBITS0x4151100x151100x28500x00x2A0016
                                                                  .ctorsPROGBITS0x4579640x179640x80x00x3WA004
                                                                  .dtorsPROGBITS0x45796c0x1796c0x80x00x3WA004
                                                                  .data.rel.roPROGBITS0x4579780x179780x40x00x3WA004
                                                                  .dataPROGBITS0x4579800x179800x4000x00x3WA0016
                                                                  .gotPROGBITS0x457d800x17d800x5d80x40x10000003WAp0016
                                                                  .sbssNOBITS0x4583580x183580x300x00x10000003WAp004
                                                                  .bssNOBITS0x4583900x183580xe7700x00x3WA0016
                                                                  .mdebug.abi32PROGBITS0xb400x183580x00x00x0001
                                                                  .shstrtabSTRTAB0x00x183580x640x00x0001
                                                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                  LOAD0x00x4000000x4000000x179600x179605.36750x5R E0x10000.init .text .fini .rodata
                                                                  LOAD0x179640x4579640x4579640x9f40xf19c3.93160x6RW 0x10000.ctors .dtors .data.rel.ro .data .got .sbss .bss
                                                                  GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Apr 19, 2024 17:50:50.290168047 CEST43928443192.168.2.2391.189.91.42
                                                                  Apr 19, 2024 17:50:52.428478003 CEST4532621425192.168.2.23172.245.119.63
                                                                  Apr 19, 2024 17:50:52.648824930 CEST2142545326172.245.119.63192.168.2.23
                                                                  Apr 19, 2024 17:50:52.649028063 CEST4532621425192.168.2.23172.245.119.63
                                                                  Apr 19, 2024 17:50:52.649214983 CEST4532621425192.168.2.23172.245.119.63
                                                                  Apr 19, 2024 17:50:52.869632959 CEST2142545326172.245.119.63192.168.2.23
                                                                  Apr 19, 2024 17:50:52.869837999 CEST4532621425192.168.2.23172.245.119.63
                                                                  Apr 19, 2024 17:50:53.090296030 CEST2142545326172.245.119.63192.168.2.23
                                                                  Apr 19, 2024 17:50:55.926098108 CEST42836443192.168.2.2391.189.91.43
                                                                  Apr 19, 2024 17:50:56.693200111 CEST4251680192.168.2.23109.202.202.202
                                                                  Apr 19, 2024 17:51:02.656462908 CEST4532621425192.168.2.23172.245.119.63
                                                                  Apr 19, 2024 17:51:02.877338886 CEST2142545326172.245.119.63192.168.2.23
                                                                  Apr 19, 2024 17:51:02.877386093 CEST2142545326172.245.119.63192.168.2.23
                                                                  Apr 19, 2024 17:51:02.877449036 CEST4532621425192.168.2.23172.245.119.63
                                                                  Apr 19, 2024 17:51:10.255299091 CEST43928443192.168.2.2391.189.91.42
                                                                  Apr 19, 2024 17:51:18.123539925 CEST2142545326172.245.119.63192.168.2.23
                                                                  Apr 19, 2024 17:51:18.123627901 CEST4532621425192.168.2.23172.245.119.63
                                                                  Apr 19, 2024 17:51:22.541794062 CEST42836443192.168.2.2391.189.91.43
                                                                  Apr 19, 2024 17:51:26.637187004 CEST4251680192.168.2.23109.202.202.202
                                                                  Apr 19, 2024 17:51:33.348160982 CEST2142545326172.245.119.63192.168.2.23
                                                                  Apr 19, 2024 17:51:33.348572016 CEST4532621425192.168.2.23172.245.119.63
                                                                  Apr 19, 2024 17:51:48.588886976 CEST2142545326172.245.119.63192.168.2.23
                                                                  Apr 19, 2024 17:51:48.589297056 CEST4532621425192.168.2.23172.245.119.63
                                                                  Apr 19, 2024 17:51:51.209702969 CEST43928443192.168.2.2391.189.91.42
                                                                  Apr 19, 2024 17:52:02.920355082 CEST4532621425192.168.2.23172.245.119.63
                                                                  Apr 19, 2024 17:52:03.141216040 CEST2142545326172.245.119.63192.168.2.23
                                                                  Apr 19, 2024 17:52:03.141649008 CEST4532621425192.168.2.23172.245.119.63
                                                                  Apr 19, 2024 17:52:18.541569948 CEST2142545326172.245.119.63192.168.2.23
                                                                  Apr 19, 2024 17:52:18.542870998 CEST4532621425192.168.2.23172.245.119.63
                                                                  Apr 19, 2024 17:52:33.765707016 CEST2142545326172.245.119.63192.168.2.23
                                                                  Apr 19, 2024 17:52:33.766258955 CEST4532621425192.168.2.23172.245.119.63
                                                                  Apr 19, 2024 17:52:49.005990028 CEST2142545326172.245.119.63192.168.2.23
                                                                  Apr 19, 2024 17:52:49.006306887 CEST4532621425192.168.2.23172.245.119.63
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Apr 19, 2024 17:50:51.621082067 CEST4268053192.168.2.231.1.1.1
                                                                  Apr 19, 2024 17:50:51.837692022 CEST53426801.1.1.1192.168.2.23
                                                                  Apr 19, 2024 17:50:51.838402987 CEST4546153192.168.2.231.1.1.1
                                                                  Apr 19, 2024 17:50:51.955897093 CEST53454611.1.1.1192.168.2.23
                                                                  Apr 19, 2024 17:50:51.956296921 CEST4399853192.168.2.231.1.1.1
                                                                  Apr 19, 2024 17:50:52.073827982 CEST53439981.1.1.1192.168.2.23
                                                                  Apr 19, 2024 17:50:52.073978901 CEST5556853192.168.2.231.1.1.1
                                                                  Apr 19, 2024 17:50:52.198102951 CEST53555681.1.1.1192.168.2.23
                                                                  Apr 19, 2024 17:50:52.198376894 CEST6096653192.168.2.231.1.1.1
                                                                  Apr 19, 2024 17:50:52.303849936 CEST53609661.1.1.1192.168.2.23
                                                                  Apr 19, 2024 17:50:52.304018021 CEST4948553192.168.2.231.1.1.1
                                                                  Apr 19, 2024 17:50:52.428042889 CEST53494851.1.1.1192.168.2.23
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Apr 19, 2024 17:50:51.621082067 CEST192.168.2.231.1.1.10xade5Standard query (0)tcpdown.suA (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:51.838402987 CEST192.168.2.231.1.1.10xe28eStandard query (0)tcpdown.suEA (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:51.956296921 CEST192.168.2.231.1.1.10xe28eStandard query (0)tcpdown.suEA (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:52.073978901 CEST192.168.2.231.1.1.10xe28eStandard query (0)tcpdown.suEA (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:52.198376894 CEST192.168.2.231.1.1.10xe28eStandard query (0)tcpdown.suEA (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:52.304018021 CEST192.168.2.231.1.1.10xe28eStandard query (0)tcpdown.suEA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Apr 19, 2024 17:50:51.837692022 CEST1.1.1.1192.168.2.230xade5No error (0)tcpdown.su185.216.70.250A (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:51.837692022 CEST1.1.1.1192.168.2.230xade5No error (0)tcpdown.su185.216.70.168A (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:51.837692022 CEST1.1.1.1192.168.2.230xade5No error (0)tcpdown.su104.168.32.17A (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:51.837692022 CEST1.1.1.1192.168.2.230xade5No error (0)tcpdown.su104.168.45.11A (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:51.837692022 CEST1.1.1.1192.168.2.230xade5No error (0)tcpdown.su172.245.119.63A (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:51.837692022 CEST1.1.1.1192.168.2.230xade5No error (0)tcpdown.su198.12.124.76A (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:51.837692022 CEST1.1.1.1192.168.2.230xade5No error (0)tcpdown.su185.216.70.169A (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:51.837692022 CEST1.1.1.1192.168.2.230xade5No error (0)tcpdown.su172.245.119.70A (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:51.955897093 CEST1.1.1.1192.168.2.230xe28eName error (3)tcpdown.suEnonenoneA (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:52.073827982 CEST1.1.1.1192.168.2.230xe28eName error (3)tcpdown.suEnonenoneA (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:52.198102951 CEST1.1.1.1192.168.2.230xe28eName error (3)tcpdown.suEnonenoneA (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:52.303849936 CEST1.1.1.1192.168.2.230xe28eName error (3)tcpdown.suEnonenoneA (IP address)IN (0x0001)false
                                                                  Apr 19, 2024 17:50:52.428042889 CEST1.1.1.1192.168.2.230xe28eName error (3)tcpdown.suEnonenoneA (IP address)IN (0x0001)false

                                                                  System Behavior

                                                                  Start time (UTC):15:50:50
                                                                  Start date (UTC):19/04/2024
                                                                  Path:/tmp/ew3OL4dYca.elf
                                                                  Arguments:/tmp/ew3OL4dYca.elf
                                                                  File size:5773336 bytes
                                                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                                                  Start time (UTC):15:50:50
                                                                  Start date (UTC):19/04/2024
                                                                  Path:/tmp/ew3OL4dYca.elf
                                                                  Arguments:-
                                                                  File size:5773336 bytes
                                                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                                                  Start time (UTC):15:50:50
                                                                  Start date (UTC):19/04/2024
                                                                  Path:/tmp/ew3OL4dYca.elf
                                                                  Arguments:-
                                                                  File size:5773336 bytes
                                                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                                                  Start time (UTC):15:50:51
                                                                  Start date (UTC):19/04/2024
                                                                  Path:/tmp/ew3OL4dYca.elf
                                                                  Arguments:-
                                                                  File size:5773336 bytes
                                                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                                                  Start time (UTC):15:50:51
                                                                  Start date (UTC):19/04/2024
                                                                  Path:/tmp/ew3OL4dYca.elf
                                                                  Arguments:-
                                                                  File size:5773336 bytes
                                                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                                                  Start time (UTC):15:50:53
                                                                  Start date (UTC):19/04/2024
                                                                  Path:/usr/libexec/gnome-session-binary
                                                                  Arguments:-
                                                                  File size:334664 bytes
                                                                  MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                                                  Start time (UTC):15:50:53
                                                                  Start date (UTC):19/04/2024
                                                                  Path:/bin/sh
                                                                  Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
                                                                  File size:129816 bytes
                                                                  MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                  Start time (UTC):15:50:53
                                                                  Start date (UTC):19/04/2024
                                                                  Path:/usr/libexec/gsd-rfkill
                                                                  Arguments:/usr/libexec/gsd-rfkill
                                                                  File size:51808 bytes
                                                                  MD5 hash:88a16a3c0aba1759358c06215ecfb5cc