Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
W46ssx5gcI.elf

Overview

General Information

Sample name:W46ssx5gcI.elf
renamed because original name is a hash value
Original sample name:22fddffb9d026705c27c5a73a1eb0ff9.elf
Analysis ID:1430429
MD5:22fddffb9d026705c27c5a73a1eb0ff9
SHA1:77c036f3a33cf8019a19aeb5a9038777b39981bd
SHA256:3747e97b4f60e1c0495ab4e0ce8c604d633d553346fa83fc3d8a18058cecacf6
Tags:64elfmirai
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Sample deletes itself
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1430429
Start date and time:2024-04-23 16:46:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 45s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:W46ssx5gcI.elf
renamed because original name is a hash value
Original Sample Name:22fddffb9d026705c27c5a73a1eb0ff9.elf
Detection:MAL
Classification:mal72.evad.linELF@0/0@2/0
  • VT rate limit hit for: W46ssx5gcI.elf
Command:/tmp/W46ssx5gcI.elf
PID:5489
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
about to cum inside a femboy btw
Standard Error:
  • system is lnxubuntu20
  • sh (PID: 5492, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
  • gsd-rfkill (PID: 5492, Parent: 1383, MD5: 88a16a3c0aba1759358c06215ecfb5cc) Arguments: /usr/libexec/gsd-rfkill
  • systemd New Fork (PID: 5497, Parent: 1)
  • systemd-hostnamed (PID: 5497, Parent: 1, MD5: 2cc8a5576629a2d5bd98e49a4b8bef65) Arguments: /lib/systemd/systemd-hostnamed
  • cleanup
SourceRuleDescriptionAuthorStrings
W46ssx5gcI.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0xa084:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
W46ssx5gcI.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0xa873:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
W46ssx5gcI.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x740e:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0xc40c:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
W46ssx5gcI.elfLinux_Trojan_Gafgyt_d996d335unknownunknown
  • 0xe2ba:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
W46ssx5gcI.elfLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0xa433:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
Click to see the 4 entries
SourceRuleDescriptionAuthorStrings
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0xa084:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0xa873:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x740e:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0xc40c:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_d996d335unknownunknown
  • 0xe2ba:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
5489.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0xa433:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
Click to see the 4 entries
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: W46ssx5gcI.elfAvira: detected
Source: W46ssx5gcI.elfReversingLabs: Detection: 44%
Source: W46ssx5gcI.elfJoe Sandbox ML: detected
Source: W46ssx5gcI.elfString: EOF/proc//proc/%s/cmdlinerwgetcurlftpechokillbashrebootshutdownhaltpoweroff/fdsocket/proc/%s/stat/proc/proc/%d/exe/proc/%d/stat%d %s %c %d/proc/%d/maps/var/run/mnt/root/var/tmp/boot/bin/sbin/../(deleted)/homedbgmpslmipselmipsarmarm4arm5arm6arm7sh4m68kx86x586x86_64i586i686ppcspc[locker] killed process: %s ;; pid: %d
Source: global trafficTCP traffic: 192.168.2.14:38994 -> 94.156.79.77:33966
Source: global trafficTCP traffic: 192.168.2.14:57248 -> 89.190.156.145:7733
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownDNS traffic detected: queries for: cnc.voidnet.click

System Summary

barindex
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/W46ssx5gcI.elf (PID: 5491)SIGKILL sent: pid: 1639, result: successfulJump to behavior
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: W46ssx5gcI.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: 5489.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: classification engineClassification label: mal72.evad.linELF@0/0@2/0
Source: /usr/libexec/gsd-rfkill (PID: 5492)Directory: <invalid fd (9)>/..Jump to behavior
Source: /usr/libexec/gsd-rfkill (PID: 5492)Directory: <invalid fd (8)>/..Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5497)Directory: <invalid fd (10)>/..Jump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/1583/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/1577/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/1593/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/1589/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/806/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/807/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/928/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/135/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/1371/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/262/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/142/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/263/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/264/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/265/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/145/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/266/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/1369/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/267/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/268/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/269/cmdlineJump to behavior
Source: /tmp/W46ssx5gcI.elf (PID: 5491)File opened: /proc/940/cmdlineJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/W46ssx5gcI.elf (PID: 5490)File: /tmp/W46ssx5gcI.elfJump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5497)Queries kernel information via 'uname': Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Hidden Files and Directories
1
OS Credential Dumping
1
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File Deletion
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
W46ssx5gcI.elf45%ReversingLabsLinux.Trojan.Mirai
W46ssx5gcI.elf100%AviraEXP/ELF.Mirai.W
W46ssx5gcI.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
cnc.voidnet.click
94.156.79.77
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    94.156.79.77
    cnc.voidnet.clickBulgaria
    43561NET1-ASBGfalse
    89.190.156.145
    unknownUnited Kingdom
    7489HOSTUS-GLOBAL-ASHostUSHKfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    94.156.79.77BN34UR6QlT.elfGet hashmaliciousUnknownBrowse
      cG1d8L6E2V.elfGet hashmaliciousUnknownBrowse
        Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
          PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
            2NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
              gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
                89.190.156.145BN34UR6QlT.elfGet hashmaliciousUnknownBrowse
                  cG1d8L6E2V.elfGet hashmaliciousUnknownBrowse
                    Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                      PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                        2NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
                          gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
                            EOtMo9xTFK.elfGet hashmaliciousMiraiBrowse
                              epLN92K8RM.elfGet hashmaliciousMiraiBrowse
                                8D6OQ9Q1Cw.elfGet hashmaliciousMiraiBrowse
                                  LJTtnwewUQ.elfGet hashmaliciousMiraiBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    cnc.voidnet.clickTb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                                    • 94.156.79.77
                                    PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                                    • 94.156.79.77
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    HOSTUS-GLOBAL-ASHostUSHKBN34UR6QlT.elfGet hashmaliciousUnknownBrowse
                                    • 89.190.156.145
                                    cG1d8L6E2V.elfGet hashmaliciousUnknownBrowse
                                    • 89.190.156.145
                                    Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                                    • 89.190.156.145
                                    PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                                    • 89.190.156.145
                                    BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                    • 162.245.217.156
                                    2NioKKu5UQ.elfGet hashmaliciousUnknownBrowse
                                    • 89.190.156.145
                                    gBeXcIwzRP.elfGet hashmaliciousMiraiBrowse
                                    • 89.190.156.145
                                    EOtMo9xTFK.elfGet hashmaliciousMiraiBrowse
                                    • 89.190.156.145
                                    epLN92K8RM.elfGet hashmaliciousMiraiBrowse
                                    • 89.190.156.145
                                    NET1-ASBGBN34UR6QlT.elfGet hashmaliciousUnknownBrowse
                                    • 94.156.79.77
                                    cG1d8L6E2V.elfGet hashmaliciousUnknownBrowse
                                    • 94.156.79.77
                                    Tb0uDdOwyO.elfGet hashmaliciousUnknownBrowse
                                    • 94.156.79.77
                                    PCK0Q2Jm8b.elfGet hashmaliciousUnknownBrowse
                                    • 94.156.79.77
                                    NMdpQecbkg.elfGet hashmaliciousMiraiBrowse
                                    • 94.156.8.135
                                    BRUFEN ORDER VAC442_7467247728478134247.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                    • 87.121.105.163
                                    NLgD8SSCOD.elfGet hashmaliciousGafgytBrowse
                                    • 94.156.79.152
                                    http://94.156.79.129/x86_64Get hashmaliciousUnknownBrowse
                                    • 94.156.79.129
                                    http://94.156.79.129/tenda.shGet hashmaliciousUnknownBrowse
                                    • 94.156.79.129
                                    file.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                    • 94.156.79.164
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                                    Entropy (8bit):6.216507172843549
                                    TrID:
                                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                    File name:W46ssx5gcI.elf
                                    File size:71'824 bytes
                                    MD5:22fddffb9d026705c27c5a73a1eb0ff9
                                    SHA1:77c036f3a33cf8019a19aeb5a9038777b39981bd
                                    SHA256:3747e97b4f60e1c0495ab4e0ce8c604d633d553346fa83fc3d8a18058cecacf6
                                    SHA512:264d696bf656a02d221084dc44016448d01a667271d41f30036389d2aedb120005f2f590555db2029920061bb72c91496e2d4d8f1752d0a43ac040033fce1f81
                                    SSDEEP:1536:GBEtqb9a7oY6uHhK0ygRZKbBqA47bLP57atD9kuQTGJ0OGjnV:htYQsYFwERYVqA47PPctD6TGOO+V
                                    TLSH:5E634A13B58190FCC29DC274476BB73AE93375BE1239F2AA37D8FA126D49E211E1E540
                                    File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@.....%.......%.................................Q.......Q............../..............Q.td....................................................H...._........H........

                                    ELF header

                                    Class:ELF64
                                    Data:2's complement, little endian
                                    Version:1 (current)
                                    Machine:Advanced Micro Devices X86-64
                                    Version Number:0x1
                                    Type:EXEC (Executable file)
                                    OS/ABI:UNIX - System V
                                    ABI Version:0
                                    Entry Point Address:0x400194
                                    Flags:0x0
                                    ELF Header Size:64
                                    Program Header Offset:64
                                    Program Header Size:56
                                    Number of Program Headers:3
                                    Section Header Offset:71184
                                    Section Header Size:64
                                    Number of Section Headers:10
                                    Header String Table Index:9
                                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                    NULL0x00x00x00x00x0000
                                    .initPROGBITS0x4000e80xe80x130x00x6AX001
                                    .textPROGBITS0x4001000x1000xeb460x00x6AX0016
                                    .finiPROGBITS0x40ec460xec460xe0x00x6AX001
                                    .rodataPROGBITS0x40ec600xec600x1dc50x00x2A0032
                                    .ctorsPROGBITS0x5110000x110000x100x00x3WA008
                                    .dtorsPROGBITS0x5110100x110100x100x00x3WA008
                                    .dataPROGBITS0x5110400x110400x5900x00x3WA0032
                                    .bssNOBITS0x5115e00x115d00x29c80x00x3WA0032
                                    .shstrtabSTRTAB0x00x115d00x3e0x00x0001
                                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                    LOAD0x00x4000000x4000000x10a250x10a256.37230x5R E0x100000.init .text .fini .rodata
                                    LOAD0x110000x5110000x5110000x5d00x2fa82.72360x6RW 0x100000.ctors .dtors .data .bss
                                    GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                                    TimestampSource PortDest PortSource IPDest IP
                                    Apr 23, 2024 16:46:58.723407030 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:46:58.953938961 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:46:58.954052925 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:46:59.227536917 CEST572487733192.168.2.1489.190.156.145
                                    Apr 23, 2024 16:46:59.731466055 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:46:59.961846113 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:46:59.962723970 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:46:59.962846041 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:47:00.193075895 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:47:00.193170071 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:47:00.242835999 CEST572487733192.168.2.1489.190.156.145
                                    Apr 23, 2024 16:47:00.423538923 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:47:02.258829117 CEST572487733192.168.2.1489.190.156.145
                                    Apr 23, 2024 16:47:06.418688059 CEST572487733192.168.2.1489.190.156.145
                                    Apr 23, 2024 16:47:14.610429049 CEST572487733192.168.2.1489.190.156.145
                                    Apr 23, 2024 16:47:15.425295115 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:47:15.425440073 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:47:30.657309055 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:47:30.657526016 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:47:30.737652063 CEST572487733192.168.2.1489.190.156.145
                                    Apr 23, 2024 16:47:45.889313936 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:47:45.889508963 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:48:01.121339083 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:48:01.121463060 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:48:04.784275055 CEST572487733192.168.2.1489.190.156.145
                                    Apr 23, 2024 16:48:10.020646095 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:48:10.251432896 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:48:10.251499891 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:48:10.251789093 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:48:20.261677027 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:48:20.491044044 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:48:20.491100073 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:48:20.491331100 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:48:35.847735882 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:48:35.848110914 CEST3899433966192.168.2.1494.156.79.77
                                    Apr 23, 2024 16:48:51.080563068 CEST339663899494.156.79.77192.168.2.14
                                    Apr 23, 2024 16:48:51.081033945 CEST3899433966192.168.2.1494.156.79.77
                                    TimestampSource PortDest PortSource IPDest IP
                                    Apr 23, 2024 16:46:58.503137112 CEST4983053192.168.2.148.8.8.8
                                    Apr 23, 2024 16:46:58.610023022 CEST53498308.8.8.8192.168.2.14
                                    Apr 23, 2024 16:46:58.610148907 CEST4215553192.168.2.148.8.8.8
                                    Apr 23, 2024 16:46:58.723295927 CEST53421558.8.8.8192.168.2.14
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Apr 23, 2024 16:46:58.503137112 CEST192.168.2.148.8.8.80x95e6Standard query (0)cnc.voidnet.clickA (IP address)IN (0x0001)false
                                    Apr 23, 2024 16:46:58.610148907 CEST192.168.2.148.8.8.80x3b14Standard query (0)cnc.voidnet.clickA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Apr 23, 2024 16:46:58.610023022 CEST8.8.8.8192.168.2.140x95e6No error (0)cnc.voidnet.click94.156.79.77A (IP address)IN (0x0001)false
                                    Apr 23, 2024 16:46:58.723295927 CEST8.8.8.8192.168.2.140x3b14No error (0)cnc.voidnet.click94.156.79.77A (IP address)IN (0x0001)false

                                    System Behavior

                                    Start time (UTC):14:46:57
                                    Start date (UTC):23/04/2024
                                    Path:/tmp/W46ssx5gcI.elf
                                    Arguments:/tmp/W46ssx5gcI.elf
                                    File size:71824 bytes
                                    MD5 hash:22fddffb9d026705c27c5a73a1eb0ff9

                                    Start time (UTC):14:46:57
                                    Start date (UTC):23/04/2024
                                    Path:/tmp/W46ssx5gcI.elf
                                    Arguments:-
                                    File size:71824 bytes
                                    MD5 hash:22fddffb9d026705c27c5a73a1eb0ff9

                                    Start time (UTC):14:46:57
                                    Start date (UTC):23/04/2024
                                    Path:/tmp/W46ssx5gcI.elf
                                    Arguments:-
                                    File size:71824 bytes
                                    MD5 hash:22fddffb9d026705c27c5a73a1eb0ff9

                                    Start time (UTC):14:46:58
                                    Start date (UTC):23/04/2024
                                    Path:/usr/libexec/gnome-session-binary
                                    Arguments:-
                                    File size:334664 bytes
                                    MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                    Start time (UTC):14:46:58
                                    Start date (UTC):23/04/2024
                                    Path:/bin/sh
                                    Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
                                    File size:129816 bytes
                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                    Start time (UTC):14:46:58
                                    Start date (UTC):23/04/2024
                                    Path:/usr/libexec/gsd-rfkill
                                    Arguments:/usr/libexec/gsd-rfkill
                                    File size:51808 bytes
                                    MD5 hash:88a16a3c0aba1759358c06215ecfb5cc

                                    Start time (UTC):14:46:59
                                    Start date (UTC):23/04/2024
                                    Path:/usr/lib/systemd/systemd
                                    Arguments:-
                                    File size:1620224 bytes
                                    MD5 hash:9b2bec7092a40488108543f9334aab75

                                    Start time (UTC):14:46:59
                                    Start date (UTC):23/04/2024
                                    Path:/lib/systemd/systemd-hostnamed
                                    Arguments:/lib/systemd/systemd-hostnamed
                                    File size:35040 bytes
                                    MD5 hash:2cc8a5576629a2d5bd98e49a4b8bef65