Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
3UPhJmQfMS.elf

Overview

General Information

Sample name:3UPhJmQfMS.elf
renamed because original name is a hash value
Original sample name:50c35894ce2bae983c1fb02fcb6cebc2.elf
Analysis ID:1430210
MD5:50c35894ce2bae983c1fb02fcb6cebc2
SHA1:8cfdb745fc42aaba05a179b7c2bf028f10098578
SHA256:5131e38271b160de1385fffcffa15d1aac1445c9173363a0d1edd7da9d80237b
Tags:32elfgafgytintel
Infos:

Detection

Gafgyt, Mirai
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Gafgyt
Yara detected Mirai
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Opens /proc/net/* files useful for finding connected devices and routers
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Executes the "rm" command used to delete files or directories
Sample contains only a LOAD segment without any section mappings
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1430210
Start date and time:2024-04-23 10:24:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 6s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:3UPhJmQfMS.elf
renamed because original name is a hash value
Original Sample Name:50c35894ce2bae983c1fb02fcb6cebc2.elf
Detection:MAL
Classification:mal84.spre.troj.linELF@0/0@2/0
Command:/tmp/3UPhJmQfMS.elf
PID:5426
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • dash New Fork (PID: 5466, Parent: 3593)
  • rm (PID: 5466, Parent: 3593, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.ealSxqo2Xg /tmp/tmp.HCC54RocfC /tmp/tmp.03p31RU5X2
  • dash New Fork (PID: 5467, Parent: 3593)
  • cat (PID: 5467, Parent: 3593, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.ealSxqo2Xg
  • dash New Fork (PID: 5468, Parent: 3593)
  • head (PID: 5468, Parent: 3593, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5469, Parent: 3593)
  • tr (PID: 5469, Parent: 3593, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5470, Parent: 3593)
  • cut (PID: 5470, Parent: 3593, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5471, Parent: 3593)
  • cat (PID: 5471, Parent: 3593, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.ealSxqo2Xg
  • dash New Fork (PID: 5472, Parent: 3593)
  • head (PID: 5472, Parent: 3593, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5473, Parent: 3593)
  • tr (PID: 5473, Parent: 3593, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5474, Parent: 3593)
  • cut (PID: 5474, Parent: 3593, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5475, Parent: 3593)
  • rm (PID: 5475, Parent: 3593, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.ealSxqo2Xg /tmp/tmp.HCC54RocfC /tmp/tmp.03p31RU5X2
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Bashlite, GafgytBashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.bashlite
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
5427.1.0000000008048000.0000000008079000.r-x.sdmpJoeSecurity_GafgytYara detected GafgytJoe Security
    5427.1.0000000008048000.0000000008079000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5427.1.0000000008048000.0000000008079000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x164ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16500:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16514:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16528:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1653c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16550:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16564:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16578:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1658c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x165a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x165b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x165c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x165dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x165f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16604:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16618:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1662c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16640:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16654:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x16668:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1667c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5427.1.0000000008048000.0000000008079000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
      • 0x18f60:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
      5427.1.0000000008048000.0000000008079000.r-x.sdmpLinux_Trojan_Mirai_122ff2e6unknownunknown
      • 0xe9e7:$a: 24 EB 15 89 F0 83 C8 01 EB 03 8B 5B 08 3B 43 04 72 F8 8B 4B 0C 89
      Click to see the 13 entries
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 3UPhJmQfMS.elfReversingLabs: Detection: 34%
      Source: 3UPhJmQfMS.elfVirustotal: Detection: 40%Perma Link
      Source: 3UPhJmQfMS.elfJoe Sandbox ML: detected

      Spreading

      barindex
      Source: /tmp/3UPhJmQfMS.elf (PID: 5426)Opens: /proc/net/routeJump to behavior

      Networking

      barindex
      Source: global trafficTCP traffic: 193.35.18.127 ports 19286,1,2,6,8,9
      Source: global trafficTCP traffic: 192.168.2.13:51220 -> 193.35.18.127:19286
      Source: unknownTCP traffic detected without corresponding DNS query: 193.35.18.127
      Source: unknownTCP traffic detected without corresponding DNS query: 193.35.18.127
      Source: unknownTCP traffic detected without corresponding DNS query: 193.35.18.127
      Source: unknownTCP traffic detected without corresponding DNS query: 54.247.62.1
      Source: unknownTCP traffic detected without corresponding DNS query: 193.35.18.127
      Source: unknownTCP traffic detected without corresponding DNS query: 193.35.18.127
      Source: unknownTCP traffic detected without corresponding DNS query: 193.35.18.127
      Source: unknownTCP traffic detected without corresponding DNS query: 193.35.18.127
      Source: unknownTCP traffic detected without corresponding DNS query: 193.35.18.127
      Source: unknownTCP traffic detected without corresponding DNS query: 193.35.18.127
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: wget/1.20.3-1ubuntu1 Ubuntu/20.04.2/LTS GNU/Linux/5.4.0-72-generic/x86_64 Intel(R)/Xeon(R)/Silver/4210/CPU/@/2.20GHz cloud_id/noneAccept: */*Accept-Encoding: identityHost: motd.ubuntu.comConnection: Keep-Alive
      Source: unknownDNS traffic detected: queries for: daisy.ubuntu.com
      Source: 3UPhJmQfMS.elf, 5427.1.0000000008048000.0000000008079000.r-x.sdmpString found in binary or memory: http://code.google.com/appengine;
      Source: 3UPhJmQfMS.elf, 5427.1.0000000008048000.0000000008079000.r-x.sdmpString found in binary or memory: http://majestic12.co.uk/bot.php?
      Source: 3UPhJmQfMS.elf, 5427.1.0000000008048000.0000000008079000.r-x.sdmpString found in binary or memory: http://wortschatz.uni-leipzig.de/findlinks/)
      Source: 3UPhJmQfMS.elf, 5426.1.0000000008048000.0000000008079000.r-x.sdmp, 3UPhJmQfMS.elf, 5427.1.0000000008048000.0000000008079000.r-x.sdmpString found in binary or memory: http://www.brandwatch.net)
      Source: 3UPhJmQfMS.elf, 5427.1.0000000008048000.0000000008079000.r-x.sdmpString found in binary or memory: http://www.majestic12.co.uk/bot.php?
      Source: 3UPhJmQfMS.elf, 5426.1.0000000008048000.0000000008079000.r-x.sdmp, 3UPhJmQfMS.elf, 5427.1.0000000008048000.0000000008079000.r-x.sdmpString found in binary or memory: http://www.mojeek.com/bot.html)
      Source: unknownNetwork traffic detected: HTTP traffic on port 37688 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 37688
      Source: unknownNetwork traffic detected: HTTP traffic on port 57214 -> 443

      System Summary

      barindex
      Source: 5427.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: 5427.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
      Source: 5427.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_122ff2e6 Author: unknown
      Source: 5427.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa48b592 Author: unknown
      Source: 5426.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: 5426.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
      Source: 5426.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_122ff2e6 Author: unknown
      Source: 5426.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa48b592 Author: unknown
      Source: Process Memory Space: 3UPhJmQfMS.elf PID: 5426, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: Process Memory Space: 3UPhJmQfMS.elf PID: 5426, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
      Source: Process Memory Space: 3UPhJmQfMS.elf PID: 5427, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: Process Memory Space: 3UPhJmQfMS.elf PID: 5427, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
      Source: LOAD without section mappingsProgram segment: 0x8048000
      Source: 5427.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: 5427.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
      Source: 5427.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_122ff2e6 reference_sample = c7dd999a033fa3edc1936785b87cd69ce2f5cac5a084ddfaf527a1094e718bc4, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3c9ffd7537e30a21eefa6c174f801264b92a85a1bc73e34e6dc9e29f84658348, id = 122ff2e6-56e6-4aa8-a3ec-c19d31eb1f80, last_modified = 2021-09-16
      Source: 5427.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa48b592 reference_sample = c9e33befeec133720b3ba40bb3cd7f636aad80f72f324c5fe65ac7af271c49ee, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8838d2752b310dbf7d12f6cf023244aaff4fdf5b55cf1e3b71843210df0fcf88, id = fa48b592-8d80-45af-a3e4-232695b8f5dd, last_modified = 2021-09-16
      Source: 5426.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: 5426.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
      Source: 5426.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_122ff2e6 reference_sample = c7dd999a033fa3edc1936785b87cd69ce2f5cac5a084ddfaf527a1094e718bc4, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3c9ffd7537e30a21eefa6c174f801264b92a85a1bc73e34e6dc9e29f84658348, id = 122ff2e6-56e6-4aa8-a3ec-c19d31eb1f80, last_modified = 2021-09-16
      Source: 5426.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa48b592 reference_sample = c9e33befeec133720b3ba40bb3cd7f636aad80f72f324c5fe65ac7af271c49ee, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8838d2752b310dbf7d12f6cf023244aaff4fdf5b55cf1e3b71843210df0fcf88, id = fa48b592-8d80-45af-a3e4-232695b8f5dd, last_modified = 2021-09-16
      Source: Process Memory Space: 3UPhJmQfMS.elf PID: 5426, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: Process Memory Space: 3UPhJmQfMS.elf PID: 5426, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
      Source: Process Memory Space: 3UPhJmQfMS.elf PID: 5427, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: Process Memory Space: 3UPhJmQfMS.elf PID: 5427, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
      Source: classification engineClassification label: mal84.spre.troj.linELF@0/0@2/0
      Source: /usr/bin/dash (PID: 5466)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.ealSxqo2Xg /tmp/tmp.HCC54RocfC /tmp/tmp.03p31RU5X2Jump to behavior
      Source: /usr/bin/dash (PID: 5475)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.ealSxqo2Xg /tmp/tmp.HCC54RocfC /tmp/tmp.03p31RU5X2Jump to behavior
      Source: 3UPhJmQfMS.elfSubmission file: segment LOAD with 7.9827 entropy (max. 8.0)

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 5427.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: 5426.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: 5427.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: 5426.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 3UPhJmQfMS.elf PID: 5426, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 3UPhJmQfMS.elf PID: 5427, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 5427.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: 5426.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: 5427.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: 5426.1.0000000008048000.0000000008079000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 3UPhJmQfMS.elf PID: 5426, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 3UPhJmQfMS.elf PID: 5427, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
      Obfuscated Files or Information
      OS Credential Dumping1
      Remote System Discovery
      Remote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      File Deletion
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging1
      Ingress Tool Transfer
      Scheduled TransferData Encrypted for Impact
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1430210 Sample: 3UPhJmQfMS.elf Startdate: 23/04/2024 Architecture: LINUX Score: 84 21 193.35.18.127, 19286, 51220 BIALLNET-ASPL Germany 2->21 23 54.217.10.153, 37688, 443 AMAZON-02US United States 2->23 25 2 other IPs or domains 2->25 27 Malicious sample detected (through community Yara rule) 2->27 29 Multi AV Scanner detection for submitted file 2->29 31 Yara detected Gafgyt 2->31 33 3 other signatures 2->33 8 3UPhJmQfMS.elf 2->8         started        11 dash rm 2->11         started        13 dash head 2->13         started        15 8 other processes 2->15 signatures3 process4 signatures5 35 Opens /proc/net/* files useful for finding connected devices and routers 8->35 17 3UPhJmQfMS.elf 8->17         started        process6 process7 19 3UPhJmQfMS.elf 17->19         started       
      SourceDetectionScannerLabelLink
      3UPhJmQfMS.elf34%ReversingLabsLinux.Trojan.Gafgyt
      3UPhJmQfMS.elf40%VirustotalBrowse
      3UPhJmQfMS.elf100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://www.majestic12.co.uk/bot.php?0%URL Reputationsafe
      http://majestic12.co.uk/bot.php?0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      daisy.ubuntu.com
      162.213.35.24
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        https://motd.ubuntu.com/false
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.majestic12.co.uk/bot.php?3UPhJmQfMS.elf, 5427.1.0000000008048000.0000000008079000.r-x.sdmpfalse
          • URL Reputation: safe
          unknown
          http://majestic12.co.uk/bot.php?3UPhJmQfMS.elf, 5427.1.0000000008048000.0000000008079000.r-x.sdmpfalse
          • URL Reputation: safe
          unknown
          http://wortschatz.uni-leipzig.de/findlinks/)3UPhJmQfMS.elf, 5427.1.0000000008048000.0000000008079000.r-x.sdmpfalse
            high
            http://code.google.com/appengine;3UPhJmQfMS.elf, 5427.1.0000000008048000.0000000008079000.r-x.sdmpfalse
              high
              http://www.brandwatch.net)3UPhJmQfMS.elf, 5426.1.0000000008048000.0000000008079000.r-x.sdmp, 3UPhJmQfMS.elf, 5427.1.0000000008048000.0000000008079000.r-x.sdmpfalse
                low
                http://www.mojeek.com/bot.html)3UPhJmQfMS.elf, 5426.1.0000000008048000.0000000008079000.r-x.sdmp, 3UPhJmQfMS.elf, 5427.1.0000000008048000.0000000008079000.r-x.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  193.35.18.127
                  unknownGermany
                  41865BIALLNET-ASPLtrue
                  54.217.10.153
                  unknownUnited States
                  16509AMAZON-02USfalse
                  54.247.62.1
                  unknownUnited States
                  16509AMAZON-02USfalse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  54.217.10.153tajma.x86_64-20240422-0536.elfGet hashmaliciousMirai, OkiruBrowse
                    tajma.x86_64-20240421-1028.elfGet hashmaliciousMirai, OkiruBrowse
                      QZQ12u96SP.elfGet hashmaliciousMirai, OkiruBrowse
                        OTBVplDFut.elfGet hashmaliciousUnknownBrowse
                          vlxx.mips-20240418-1853.elfGet hashmaliciousMirai, OkiruBrowse
                            MCKV8ZxDFs.elfGet hashmaliciousMiraiBrowse
                              yRXn4O3AgO.elfGet hashmaliciousGafgyt, MiraiBrowse
                                F5owD542qK.elfGet hashmaliciousMiraiBrowse
                                  IOBZiJI5W8.elfGet hashmaliciousGafgyt, MiraiBrowse
                                    pKz76hY1YS.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      54.247.62.1gwX4DFn6ue.elfGet hashmaliciousUnknownBrowse
                                        SecuriteInfo.com.Linux.Siggen.7228.11695.14684.elfGet hashmaliciousUnknownBrowse
                                          tajma.x86_64-20240422-0536.elfGet hashmaliciousMirai, OkiruBrowse
                                            client1.elfGet hashmaliciousUnknownBrowse
                                              NlF293hgXW.elfGet hashmaliciousMirai, OkiruBrowse
                                                PN9QHDmpS1.elfGet hashmaliciousMirai, OkiruBrowse
                                                  s02RKS8Moh.elfGet hashmaliciousUnknownBrowse
                                                    7NoSwE5r4C.elfGet hashmaliciousChaosBrowse
                                                      FMBz4fK3Fo.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        z3u7dnBStL.elfGet hashmaliciousMiraiBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          daisy.ubuntu.comgwX4DFn6ue.elfGet hashmaliciousUnknownBrowse
                                                          • 162.213.35.25
                                                          9ciLh6edh3.elfGet hashmaliciousUnknownBrowse
                                                          • 162.213.35.24
                                                          5mvyNjbs8N.elfGet hashmaliciousUnknownBrowse
                                                          • 162.213.35.25
                                                          SecuriteInfo.com.Linux.Siggen.9999.6529.26985.elfGet hashmaliciousMiraiBrowse
                                                          • 162.213.35.25
                                                          SecuriteInfo.com.Linux.DownLoader.523.19080.5007.elfGet hashmaliciousUnknownBrowse
                                                          • 162.213.35.25
                                                          SecuriteInfo.com.Linux.DownLoader.532.20148.6112.elfGet hashmaliciousUnknownBrowse
                                                          • 162.213.35.24
                                                          SecuriteInfo.com.Linux.Siggen.9999.10949.15787.elfGet hashmaliciousUnknownBrowse
                                                          • 162.213.35.25
                                                          SecuriteInfo.com.Linux.Siggen.9999.22447.5558.elfGet hashmaliciousMiraiBrowse
                                                          • 162.213.35.24
                                                          SecuriteInfo.com.Linux.Siggen.9999.29052.16568.elfGet hashmaliciousMiraiBrowse
                                                          • 162.213.35.25
                                                          SecuriteInfo.com.Linux.DownLoader.517.7938.4881.elfGet hashmaliciousUnknownBrowse
                                                          • 162.213.35.25
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          AMAZON-02USgwX4DFn6ue.elfGet hashmaliciousUnknownBrowse
                                                          • 54.247.62.1
                                                          SecuriteInfo.com.Linux.Siggen.7228.11695.14684.elfGet hashmaliciousUnknownBrowse
                                                          • 54.247.62.1
                                                          https://url.avanan.click/v2/___https:/novafr-my.sharepoint.com/:b:/g/personal/mfranco_nova-fr_org/EZPaIwPkDApNno6rWIAO20YB4ByiRCAe_VGScx-2iiONBw?e=magUuY/___.YXAzOmVuLW1kYTphOm86ZDA4MDI5MGVhZTA1MzJiMWZlYTg0YjE1OWE2NmVhNjc6NjplYTNkOjc2NzNkYWE0NTMzNWVhMjkxM2VjMGU1NGMyNDY3ZjVhNmJhNjU0MTk1ZmRjMzUzM2QxODAyNDVjY2E1Y2M1ODY6aDpUGet hashmaliciousHTMLPhisherBrowse
                                                          • 108.156.172.86
                                                          BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                                          • 99.86.228.107
                                                          BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                                          • 99.86.228.107
                                                          SecuriteInfo.com.Linux.DownLoader.533.23350.4113.elfGet hashmaliciousUnknownBrowse
                                                          • 34.249.145.219
                                                          SecuriteInfo.com.Linux.Siggen.9999.7014.17279.elfGet hashmaliciousMiraiBrowse
                                                          • 34.249.145.219
                                                          SecuriteInfo.com.Linux.DownLoader.532.20148.6112.elfGet hashmaliciousUnknownBrowse
                                                          • 54.171.230.55
                                                          SecuriteInfo.com.Linux.DownLoader.523.26836.26051.elfGet hashmaliciousUnknownBrowse
                                                          • 34.249.145.219
                                                          https://5gpzyf.cn/Get hashmaliciousUnknownBrowse
                                                          • 52.85.151.86
                                                          BIALLNET-ASPLcoritDumjn.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          • 193.35.18.56
                                                          XIbeqhmmQI.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          • 193.35.18.56
                                                          Q6nZ2Ofvlv.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          • 193.35.18.56
                                                          jnJdG31oiA.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          • 193.35.18.56
                                                          OkTC3AlPZZ.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          • 193.35.18.56
                                                          D2sLkFb0Il.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          • 193.35.18.56
                                                          T2bvctwzcE.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          • 193.35.18.56
                                                          D88pI7Bo4B.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          • 193.35.18.56
                                                          ehDbsf5C6M.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          • 193.35.18.56
                                                          78mfG4QdNn.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          • 193.35.18.56
                                                          AMAZON-02USgwX4DFn6ue.elfGet hashmaliciousUnknownBrowse
                                                          • 54.247.62.1
                                                          SecuriteInfo.com.Linux.Siggen.7228.11695.14684.elfGet hashmaliciousUnknownBrowse
                                                          • 54.247.62.1
                                                          https://url.avanan.click/v2/___https:/novafr-my.sharepoint.com/:b:/g/personal/mfranco_nova-fr_org/EZPaIwPkDApNno6rWIAO20YB4ByiRCAe_VGScx-2iiONBw?e=magUuY/___.YXAzOmVuLW1kYTphOm86ZDA4MDI5MGVhZTA1MzJiMWZlYTg0YjE1OWE2NmVhNjc6NjplYTNkOjc2NzNkYWE0NTMzNWVhMjkxM2VjMGU1NGMyNDY3ZjVhNmJhNjU0MTk1ZmRjMzUzM2QxODAyNDVjY2E1Y2M1ODY6aDpUGet hashmaliciousHTMLPhisherBrowse
                                                          • 108.156.172.86
                                                          BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                                          • 99.86.228.107
                                                          BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                                          • 99.86.228.107
                                                          SecuriteInfo.com.Linux.DownLoader.533.23350.4113.elfGet hashmaliciousUnknownBrowse
                                                          • 34.249.145.219
                                                          SecuriteInfo.com.Linux.Siggen.9999.7014.17279.elfGet hashmaliciousMiraiBrowse
                                                          • 34.249.145.219
                                                          SecuriteInfo.com.Linux.DownLoader.532.20148.6112.elfGet hashmaliciousUnknownBrowse
                                                          • 54.171.230.55
                                                          SecuriteInfo.com.Linux.DownLoader.523.26836.26051.elfGet hashmaliciousUnknownBrowse
                                                          • 34.249.145.219
                                                          https://5gpzyf.cn/Get hashmaliciousUnknownBrowse
                                                          • 52.85.151.86
                                                          No context
                                                          No context
                                                          No created / dropped files found
                                                          File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
                                                          Entropy (8bit):7.984979742032278
                                                          TrID:
                                                          • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                                          • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                                          File name:3UPhJmQfMS.elf
                                                          File size:68'280 bytes
                                                          MD5:50c35894ce2bae983c1fb02fcb6cebc2
                                                          SHA1:8cfdb745fc42aaba05a179b7c2bf028f10098578
                                                          SHA256:5131e38271b160de1385fffcffa15d1aac1445c9173363a0d1edd7da9d80237b
                                                          SHA512:a4827d905b537fd47f86c2c77fca5ac6ea56a665129893dd8464c5abcd9c7c1ac16253b28a62626aced3439333b76645a70f4d2677736121f1a286bb75312329
                                                          SSDEEP:1536:AMIYdAcn/Jh4vdV+Iry8bViZEOFR6Q7vV1Df1nouy8qq4So1QA6:uJohaGayzZzFR6Qzb5outzK1e
                                                          TLSH:FF63F1B2C6B34E41C52F067D385EF6E94524961DF564CCFD6BAC22AA89E073B2E1C301
                                                          File Content Preview:.ELF.....................X..4...........4. ...(..............................................p...p......L...........Q.td.............................4._YTS........._..._.......e..........?..k.I/.j....\..w...t..8.;..g6<{...9.jc.W.....I.F...E_...jx.B.b.bz.?

                                                          ELF header

                                                          Class:ELF32
                                                          Data:2's complement, little endian
                                                          Version:1 (current)
                                                          Machine:Intel 80386
                                                          Version Number:0x1
                                                          Type:EXEC (Executable file)
                                                          OS/ABI:UNIX - Linux
                                                          ABI Version:0
                                                          Entry Point Address:0x80558f0
                                                          Flags:0x0
                                                          ELF Header Size:52
                                                          Program Header Offset:52
                                                          Program Header Size:32
                                                          Number of Program Headers:3
                                                          Section Header Offset:0
                                                          Section Header Size:40
                                                          Number of Section Headers:0
                                                          Header String Table Index:0
                                                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                          LOAD0x00x80480000x80480000xeae40xeae47.98270x5R E0x1000
                                                          LOAD0x00x80570000x80570000x00x29c4c0.00000x6RW 0x1000
                                                          GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 23, 2024 10:24:56.824250937 CEST5122019286192.168.2.13193.35.18.127
                                                          Apr 23, 2024 10:24:57.035058975 CEST1928651220193.35.18.127192.168.2.13
                                                          Apr 23, 2024 10:24:57.035291910 CEST5122019286192.168.2.13193.35.18.127
                                                          Apr 23, 2024 10:24:57.035442114 CEST5122019286192.168.2.13193.35.18.127
                                                          Apr 23, 2024 10:24:57.246117115 CEST1928651220193.35.18.127192.168.2.13
                                                          Apr 23, 2024 10:24:57.318691969 CEST57214443192.168.2.1354.247.62.1
                                                          Apr 23, 2024 10:25:25.739586115 CEST37688443192.168.2.1354.217.10.153
                                                          Apr 23, 2024 10:25:25.739648104 CEST4433768854.217.10.153192.168.2.13
                                                          Apr 23, 2024 10:25:25.739763975 CEST37688443192.168.2.1354.217.10.153
                                                          Apr 23, 2024 10:25:25.754421949 CEST37688443192.168.2.1354.217.10.153
                                                          Apr 23, 2024 10:25:25.754450083 CEST4433768854.217.10.153192.168.2.13
                                                          Apr 23, 2024 10:25:26.385899067 CEST4433768854.217.10.153192.168.2.13
                                                          Apr 23, 2024 10:25:26.386079073 CEST37688443192.168.2.1354.217.10.153
                                                          Apr 23, 2024 10:25:26.386358023 CEST37688443192.168.2.1354.217.10.153
                                                          Apr 23, 2024 10:25:26.386377096 CEST4433768854.217.10.153192.168.2.13
                                                          Apr 23, 2024 10:25:26.388346910 CEST4433768854.217.10.153192.168.2.13
                                                          Apr 23, 2024 10:25:26.388420105 CEST37688443192.168.2.1354.217.10.153
                                                          Apr 23, 2024 10:25:26.389245033 CEST37688443192.168.2.1354.217.10.153
                                                          Apr 23, 2024 10:25:26.389856100 CEST4433768854.217.10.153192.168.2.13
                                                          Apr 23, 2024 10:25:26.389904976 CEST37688443192.168.2.1354.217.10.153
                                                          Apr 23, 2024 10:25:26.389914036 CEST4433768854.217.10.153192.168.2.13
                                                          Apr 23, 2024 10:25:26.389945984 CEST37688443192.168.2.1354.217.10.153
                                                          Apr 23, 2024 10:25:26.595254898 CEST4433768854.217.10.153192.168.2.13
                                                          Apr 23, 2024 10:25:26.595355988 CEST4433768854.217.10.153192.168.2.13
                                                          Apr 23, 2024 10:25:26.595391989 CEST37688443192.168.2.1354.217.10.153
                                                          Apr 23, 2024 10:25:26.595781088 CEST37688443192.168.2.1354.217.10.153
                                                          Apr 23, 2024 10:25:26.595804930 CEST4433768854.217.10.153192.168.2.13
                                                          Apr 23, 2024 10:25:26.595841885 CEST37688443192.168.2.1354.217.10.153
                                                          Apr 23, 2024 10:25:34.476488113 CEST1928651220193.35.18.127192.168.2.13
                                                          Apr 23, 2024 10:25:34.476722002 CEST5122019286192.168.2.13193.35.18.127
                                                          Apr 23, 2024 10:25:34.687912941 CEST1928651220193.35.18.127192.168.2.13
                                                          Apr 23, 2024 10:25:34.688096046 CEST5122019286192.168.2.13193.35.18.127
                                                          Apr 23, 2024 10:26:34.480317116 CEST1928651220193.35.18.127192.168.2.13
                                                          Apr 23, 2024 10:26:34.480464935 CEST5122019286192.168.2.13193.35.18.127
                                                          Apr 23, 2024 10:26:34.691410065 CEST1928651220193.35.18.127192.168.2.13
                                                          Apr 23, 2024 10:26:34.691807985 CEST5122019286192.168.2.13193.35.18.127
                                                          Apr 23, 2024 10:27:34.484716892 CEST1928651220193.35.18.127192.168.2.13
                                                          Apr 23, 2024 10:27:34.484852076 CEST5122019286192.168.2.13193.35.18.127
                                                          Apr 23, 2024 10:27:34.695858002 CEST1928651220193.35.18.127192.168.2.13
                                                          Apr 23, 2024 10:27:34.696053982 CEST5122019286192.168.2.13193.35.18.127
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 23, 2024 10:27:40.398415089 CEST3536453192.168.2.131.1.1.1
                                                          Apr 23, 2024 10:27:40.398560047 CEST3332353192.168.2.131.1.1.1
                                                          Apr 23, 2024 10:27:40.503496885 CEST53333231.1.1.1192.168.2.13
                                                          Apr 23, 2024 10:27:40.504168034 CEST53353641.1.1.1192.168.2.13
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Apr 23, 2024 10:27:40.398415089 CEST192.168.2.131.1.1.10x6ebeStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                                          Apr 23, 2024 10:27:40.398560047 CEST192.168.2.131.1.1.10x28a1Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Apr 23, 2024 10:27:40.504168034 CEST1.1.1.1192.168.2.130x6ebeNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                                          Apr 23, 2024 10:27:40.504168034 CEST1.1.1.1192.168.2.130x6ebeNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                                                          • motd.ubuntu.com
                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          0192.168.2.133768854.217.10.153443
                                                          TimestampBytes transferredDirectionData
                                                          2024-04-23 08:25:26 UTC249OUTGET / HTTP/1.1
                                                          User-Agent: wget/1.20.3-1ubuntu1 Ubuntu/20.04.2/LTS GNU/Linux/5.4.0-72-generic/x86_64 Intel(R)/Xeon(R)/Silver/4210/CPU/@/2.20GHz cloud_id/none
                                                          Accept: */*
                                                          Accept-Encoding: identity
                                                          Host: motd.ubuntu.com
                                                          Connection: Keep-Alive
                                                          2024-04-23 08:25:26 UTC271INHTTP/1.1 200 OK
                                                          Date: Tue, 23 Apr 2024 08:25:26 GMT
                                                          Server: Apache/2.4.18 (Ubuntu)
                                                          Last-Modified: Tue, 23 Apr 2024 08:15:30 GMT
                                                          ETag: "d8-616bf284b2158"
                                                          Accept-Ranges: bytes
                                                          Content-Length: 216
                                                          Vary: Accept-Encoding
                                                          Connection: close
                                                          Content-Type: text/plain
                                                          2024-04-23 08:25:26 UTC216INData Raw: 20 2a 20 53 74 72 69 63 74 6c 79 20 63 6f 6e 66 69 6e 65 64 20 4b 75 62 65 72 6e 65 74 65 73 20 6d 61 6b 65 73 20 65 64 67 65 20 61 6e 64 20 49 6f 54 20 73 65 63 75 72 65 2e 20 4c 65 61 72 6e 20 68 6f 77 20 4d 69 63 72 6f 4b 38 73 0a 20 20 20 6a 75 73 74 20 72 61 69 73 65 64 20 74 68 65 20 62 61 72 20 66 6f 72 20 65 61 73 79 2c 20 72 65 73 69 6c 69 65 6e 74 20 61 6e 64 20 73 65 63 75 72 65 20 4b 38 73 20 63 6c 75 73 74 65 72 20 64 65 70 6c 6f 79 6d 65 6e 74 2e 0a 0a 20 20 20 68 74 74 70 73 3a 2f 2f 75 62 75 6e 74 75 2e 63 6f 6d 2f 65 6e 67 61 67 65 2f 73 65 63 75 72 65 2d 6b 75 62 65 72 6e 65 74 65 73 2d 61 74 2d 74 68 65 2d 65 64 67 65 0a
                                                          Data Ascii: * Strictly confined Kubernetes makes edge and IoT secure. Learn how MicroK8s just raised the bar for easy, resilient and secure K8s cluster deployment. https://ubuntu.com/engage/secure-kubernetes-at-the-edge


                                                          System Behavior

                                                          Start time (UTC):08:24:55
                                                          Start date (UTC):23/04/2024
                                                          Path:/tmp/3UPhJmQfMS.elf
                                                          Arguments:/tmp/3UPhJmQfMS.elf
                                                          File size:68280 bytes
                                                          MD5 hash:50c35894ce2bae983c1fb02fcb6cebc2

                                                          Start time (UTC):08:24:56
                                                          Start date (UTC):23/04/2024
                                                          Path:/tmp/3UPhJmQfMS.elf
                                                          Arguments:-
                                                          File size:68280 bytes
                                                          MD5 hash:50c35894ce2bae983c1fb02fcb6cebc2

                                                          Start time (UTC):08:24:56
                                                          Start date (UTC):23/04/2024
                                                          Path:/tmp/3UPhJmQfMS.elf
                                                          Arguments:-
                                                          File size:68280 bytes
                                                          MD5 hash:50c35894ce2bae983c1fb02fcb6cebc2
                                                          Start time (UTC):08:25:25
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/dash
                                                          Arguments:-
                                                          File size:129816 bytes
                                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                          Start time (UTC):08:25:25
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/rm
                                                          Arguments:rm -f /tmp/tmp.ealSxqo2Xg /tmp/tmp.HCC54RocfC /tmp/tmp.03p31RU5X2
                                                          File size:72056 bytes
                                                          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/dash
                                                          Arguments:-
                                                          File size:129816 bytes
                                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/cat
                                                          Arguments:cat /tmp/tmp.ealSxqo2Xg
                                                          File size:43416 bytes
                                                          MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/dash
                                                          Arguments:-
                                                          File size:129816 bytes
                                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/head
                                                          Arguments:head -n 10
                                                          File size:47480 bytes
                                                          MD5 hash:fd96a67145172477dd57131396fc9608

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/dash
                                                          Arguments:-
                                                          File size:129816 bytes
                                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/tr
                                                          Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                                                          File size:51544 bytes
                                                          MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/dash
                                                          Arguments:-
                                                          File size:129816 bytes
                                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/cut
                                                          Arguments:cut -c -80
                                                          File size:47480 bytes
                                                          MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/dash
                                                          Arguments:-
                                                          File size:129816 bytes
                                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/cat
                                                          Arguments:cat /tmp/tmp.ealSxqo2Xg
                                                          File size:43416 bytes
                                                          MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/dash
                                                          Arguments:-
                                                          File size:129816 bytes
                                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/head
                                                          Arguments:head -n 10
                                                          File size:47480 bytes
                                                          MD5 hash:fd96a67145172477dd57131396fc9608

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/dash
                                                          Arguments:-
                                                          File size:129816 bytes
                                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/tr
                                                          Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                                                          File size:51544 bytes
                                                          MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/dash
                                                          Arguments:-
                                                          File size:129816 bytes
                                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/cut
                                                          Arguments:cut -c -80
                                                          File size:47480 bytes
                                                          MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/dash
                                                          Arguments:-
                                                          File size:129816 bytes
                                                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                          Start time (UTC):08:25:26
                                                          Start date (UTC):23/04/2024
                                                          Path:/usr/bin/rm
                                                          Arguments:rm -f /tmp/tmp.ealSxqo2Xg /tmp/tmp.HCC54RocfC /tmp/tmp.03p31RU5X2
                                                          File size:72056 bytes
                                                          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b