Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
C1Dd84tB3n.elf

Overview

General Information

Sample name:C1Dd84tB3n.elf
renamed because original name is a hash value
Original sample name:614535d91c815dc05beef2f10224e069.elf
Analysis ID:1430909
MD5:614535d91c815dc05beef2f10224e069
SHA1:de5eb9772e7bf8087fecebb2c74ee998408be61e
SHA256:8495237ddf43196df79fcfb9a5d8a7a5fd5a14e2d9012b5d7bee000dad10da75
Tags:64elfgafgyt
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Reads system files that contain records of logged in users
Sample tries to kill multiple processes (SIGKILL)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Executes commands using a shell command-line interpreter
Executes the "grep" command used to find patterns in files or piped streams
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Analysis Advice

All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1430909
Start date and time:2024-04-24 10:58:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 59s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:C1Dd84tB3n.elf
renamed because original name is a hash value
Original Sample Name:614535d91c815dc05beef2f10224e069.elf
Detection:MAL
Classification:mal72.spre.troj.linELF@0/12@3/0
  • Connection to analysis system has been lost, crash info: Unknown
  • system is lnxubuntu20
  • udisksd New Fork (PID: 5514, Parent: 803)
  • dumpe2fs (PID: 5514, Parent: 803, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • sh (PID: 5551, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-wacom
  • gsd-wacom (PID: 5551, Parent: 1383, MD5: 13778dd1a23a4e94ddc17ac9caa4fcc1) Arguments: /usr/libexec/gsd-wacom
  • udisksd New Fork (PID: 5569, Parent: 803)
  • dumpe2fs (PID: 5569, Parent: 803, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • systemd New Fork (PID: 5574, Parent: 1)
  • upowerd (PID: 5574, Parent: 1, MD5: 1253eea2fe5fe4017069664284e326cd) Arguments: /usr/lib/upower/upowerd
  • wrapper-2.0 (PID: 5585, Parent: 3172, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
  • sh (PID: 5595, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-keyboard
  • gsd-keyboard (PID: 5595, Parent: 1383, MD5: 8e288fd17c80bb0a1148b964b2ac2279) Arguments: /usr/libexec/gsd-keyboard
  • wrapper-2.0 (PID: 5597, Parent: 3172, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
  • wrapper-2.0 (PID: 5614, Parent: 3172, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
  • sh (PID: 5615, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-smartcard
  • gsd-smartcard (PID: 5615, Parent: 1383, MD5: ea1fbd7f62e4cd0331eae2ef754ee605) Arguments: /usr/libexec/gsd-smartcard
  • udisksd New Fork (PID: 5634, Parent: 803)
  • dumpe2fs (PID: 5634, Parent: 803, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • sh (PID: 5639, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-sharing
  • gsd-sharing (PID: 5639, Parent: 1383, MD5: e29d9025d98590fbb69f89fdbd4438b3) Arguments: /usr/libexec/gsd-sharing
  • sh (PID: 5640, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
  • gsd-rfkill (PID: 5640, Parent: 1383, MD5: 88a16a3c0aba1759358c06215ecfb5cc) Arguments: /usr/libexec/gsd-rfkill
  • Default (PID: 5641, Parent: 2946, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PostSession/Default
  • sh (PID: 5642, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-media-keys
  • gsd-media-keys (PID: 5642, Parent: 1383, MD5: a425448c135afb4b8bfd79cc0b6b74da) Arguments: /usr/libexec/gsd-media-keys
  • gdm3 New Fork (PID: 5643, Parent: 1289)
  • Default (PID: 5643, Parent: 1289, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • sh (PID: 5644, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-print-notifications
  • sh (PID: 5646, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-color
  • gsd-color (PID: 5646, Parent: 1383, MD5: ac2861ad93ce047283e8e87cefef9a19) Arguments: /usr/libexec/gsd-color
  • sh (PID: 5647, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-screensaver-proxy
  • gsd-screensaver-proxy (PID: 5647, Parent: 1383, MD5: 77e309450c87dceee43f1a9e50cc0d02) Arguments: /usr/libexec/gsd-screensaver-proxy
  • udisksd New Fork (PID: 5649, Parent: 803)
  • dumpe2fs (PID: 5649, Parent: 803, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • sh (PID: 5650, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-a11y-settings
  • gsd-a11y-settings (PID: 5650, Parent: 1383, MD5: 18e243d2cf30ecee7ea89d1462725c5c) Arguments: /usr/libexec/gsd-a11y-settings
  • sh (PID: 5651, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
  • gsd-housekeeping (PID: 5651, Parent: 1383, MD5: b55f3394a84976ddb92a2915e5d76914) Arguments: /usr/libexec/gsd-housekeeping
  • sh (PID: 5652, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-sound
  • gsd-sound (PID: 5652, Parent: 1383, MD5: 4c7d3fb993463337b4a0eb5c80c760ee) Arguments: /usr/libexec/gsd-sound
  • sh (PID: 5655, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-power
  • gsd-power (PID: 5655, Parent: 1383, MD5: 28b8e1b43c3e7f1db6741ea1ecd978b7) Arguments: /usr/libexec/gsd-power
  • Xorg New Fork (PID: 5658, Parent: 1371)
  • sh (PID: 5658, Parent: 1371, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "\"/usr/bin/xkbcomp\" -w 1 \"-R/usr/share/X11/xkb\" -xkm \"-\" -em1 \"The XKEYBOARD keymap compiler (xkbcomp) reports:\" -emp \"> \" -eml \"Errors from xkbcomp are not fatal to the X server\" \"/tmp/server-0.xkm\""
    • sh New Fork (PID: 5662, Parent: 5658)
    • xkbcomp (PID: 5662, Parent: 5658, MD5: c5f953aec4c00d2a1cc27acb75d62c9b) Arguments: /usr/bin/xkbcomp -w 1 -R/usr/share/X11/xkb -xkm - -em1 "The XKEYBOARD keymap compiler (xkbcomp) reports:" -emp "> " -eml "Errors from xkbcomp are not fatal to the X server" /tmp/server-0.xkm
  • systemd New Fork (PID: 5690, Parent: 1)
  • systemd-hostnamed (PID: 5690, Parent: 1, MD5: 2cc8a5576629a2d5bd98e49a4b8bef65) Arguments: /lib/systemd/systemd-hostnamed
  • systemd New Fork (PID: 5828, Parent: 1)
  • systemd-user-runtime-dir (PID: 5828, Parent: 1, MD5: d55f4b0847f88131dbcfb07435178e54) Arguments: /lib/systemd/systemd-user-runtime-dir stop 1000
  • false (PID: 5830, Parent: 5829, MD5: 3177546c74e4f0062909eae43d948bfc) Arguments: /bin/false
  • Xorg New Fork (PID: 5837, Parent: 1371)
  • sh (PID: 5837, Parent: 1371, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "\"/usr/bin/xkbcomp\" -w 1 \"-R/usr/share/X11/xkb\" -xkm \"-\" -em1 \"The XKEYBOARD keymap compiler (xkbcomp) reports:\" -emp \"> \" -eml \"Errors from xkbcomp are not fatal to the X server\" \"/tmp/server-0.xkm\""
    • sh New Fork (PID: 5838, Parent: 5837)
    • xkbcomp (PID: 5838, Parent: 5837, MD5: c5f953aec4c00d2a1cc27acb75d62c9b) Arguments: /usr/bin/xkbcomp -w 1 -R/usr/share/X11/xkb -xkm - -em1 "The XKEYBOARD keymap compiler (xkbcomp) reports:" -emp "> " -eml "Errors from xkbcomp are not fatal to the X server" /tmp/server-0.xkm
  • systemd New Fork (PID: 5870, Parent: 1)
  • colord (PID: 5870, Parent: 1, MD5: 70861d1b2818c9279cd4a5c9035dac1f) Arguments: /usr/libexec/colord
    • colord New Fork (PID: 5896, Parent: 5870)
    • colord-sane (PID: 5896, Parent: 5870, MD5: 5f98d754a07bf1385c3ff001cde3882e) Arguments: /usr/libexec/colord-sane
  • systemd New Fork (PID: 5872, Parent: 1)
  • accounts-daemon (PID: 5872, Parent: 1, MD5: 01a899e3fb5e7e434bea1290255a1f30) Arguments: /usr/lib/accountsservice/accounts-daemon
    • language-validate (PID: 5885, Parent: 5872, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /usr/share/language-tools/language-validate en_US.UTF-8
      • language-options (PID: 5886, Parent: 5885, MD5: 16a21f464119ea7fad1d3660de963637) Arguments: /usr/share/language-tools/language-options
        • sh (PID: 5887, Parent: 5886, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "locale -a | grep -F .utf8 "
          • sh New Fork (PID: 5888, Parent: 5887)
          • locale (PID: 5888, Parent: 5887, MD5: c72a78792469db86d91369c9057f20d2) Arguments: locale -a
          • sh New Fork (PID: 5889, Parent: 5887)
          • grep (PID: 5889, Parent: 5887, MD5: 1e6ebb9dd094f774478f72727bdba0f5) Arguments: grep -F .utf8
  • systemd New Fork (PID: 5900, Parent: 1)
  • systemd-localed (PID: 5900, Parent: 1, MD5: 1244af9646256d49594f2a8203329aa9) Arguments: /lib/systemd/systemd-localed
  • gdm3 New Fork (PID: 6031, Parent: 1289)
  • Default (PID: 6031, Parent: 1289, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • gdm3 New Fork (PID: 6032, Parent: 1289)
  • Default (PID: 6032, Parent: 1289, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • systemd New Fork (PID: 6039, Parent: 1)
  • systemd-user-runtime-dir (PID: 6039, Parent: 1, MD5: d55f4b0847f88131dbcfb07435178e54) Arguments: /lib/systemd/systemd-user-runtime-dir stop 127
  • cleanup
SourceRuleDescriptionAuthorStrings
C1Dd84tB3n.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0x6d30:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
C1Dd84tB3n.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0x751f:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
C1Dd84tB3n.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x45be:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x46cc:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
C1Dd84tB3n.elfLinux_Trojan_Gafgyt_d996d335unknownunknown
  • 0x9cae:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
C1Dd84tB3n.elfLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0x70df:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
Click to see the 6 entries
SourceRuleDescriptionAuthorStrings
5507.1.0000000000400000.000000000040d000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0x6d30:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
5507.1.0000000000400000.000000000040d000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0x751f:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
5507.1.0000000000400000.000000000040d000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x45be:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x46cc:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
5507.1.0000000000400000.000000000040d000.r-x.sdmpLinux_Trojan_Gafgyt_d996d335unknownunknown
  • 0x9cae:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
5507.1.0000000000400000.000000000040d000.r-x.sdmpLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0x70df:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
Click to see the 28 entries
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C1Dd84tB3n.elfVirustotal: Detection: 53%Perma Link
Source: C1Dd84tB3n.elfJoe Sandbox ML: detected

Networking

barindex
Source: global trafficTCP traffic: 185.196.9.5 ports 1,2,3,5,7,51237
Source: global trafficTCP traffic: 192.168.2.14:50164 -> 185.196.9.5:51237
Source: /tmp/C1Dd84tB3n.elf (PID: 5506)Socket: 127.0.0.1::6628Jump to behavior
Source: global trafficTCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownDNS traffic detected: queries for: fdh32fsdfhs.shop
Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443

System Summary

barindex
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 795, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 800, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 803, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1314, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1364, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1369, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1371, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1383, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1394, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1560, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1564, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1567, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1577, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1588, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1593, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1610, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1630, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1633, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1635, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1638, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1639, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1640, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1642, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1647, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1650, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1653, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1655, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1659, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1661, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1683, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1712, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1717, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 2946, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 2997, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 2999, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3120, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3129, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3134, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3142, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3147, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3184, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3187, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3188, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3189, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3190, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3193, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3207, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3215, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3235, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3245, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3246, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3268, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3304, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3319, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3329, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3341, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3353, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3361, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3392, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3398, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3402, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3406, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3412, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3420, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3425, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3690, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 5583, result: successfulJump to behavior
Source: Initial sampleString containing 'busybox' found: /bin/busybox
Source: Initial sampleString containing 'busybox' found: /proc/self/exe/bin/busybox/proc/%d/etc/systmp.d/proc/%s/lib/systemd/usr/lib/systemd/systemd/usr/lib/openssh/sftp-server/sys/system/dvr/main/usr/mnt/mtd/org/userfs/home/process/net_process/var/tmp/sonia/usr/sbin/usr/bin/mnt/gm/bin/var/Sofia/usr/sbin/sshd/usr/sbin/ntpd/usr/sbin/cupsd/usr/lib/apt/methods/http/usr/sbin/crond/usr/sbin/rsyslogd/usr/sbin/inetd/usr/sbin/dnsmasq/usr/bin/DVRServer/usr/bin/DVRShell/usr/bin/DVRControl/usr/bin/DVRRemoteAgent/usr/bin/DVRNetService/usr/libexec/openssh/sftp-server]
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 795, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 800, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 803, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1314, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1364, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1369, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1371, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1383, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1394, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1560, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1564, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1567, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1577, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1588, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1593, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1610, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1630, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1633, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1635, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1638, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1639, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1640, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1642, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1647, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1650, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1653, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1655, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1659, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1661, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1683, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1712, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 1717, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 2946, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 2997, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 2999, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3120, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3129, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3134, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3142, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3147, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3184, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3187, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3188, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3189, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3190, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3193, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3207, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3215, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3235, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3245, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3246, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3268, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3304, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3319, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3329, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3341, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3353, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3361, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3392, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3398, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3402, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3406, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3412, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3420, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3425, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 3690, result: successfulJump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5507)SIGKILL sent: pid: 5583, result: successfulJump to behavior
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: C1Dd84tB3n.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: 5507.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: 5508.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: 5506.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: classification engineClassification label: mal72.spre.troj.linELF@0/12@3/0
Source: /usr/libexec/gsd-wacom (PID: 5551)Directory: /var/lib/gdm3/.XdefaultsJump to behavior
Source: /usr/libexec/gsd-wacom (PID: 5551)Directory: /var/lib/gdm3/.Xdefaults-galassiaJump to behavior
Source: /usr/lib/upower/upowerd (PID: 5574)Directory: <invalid fd (12)>/..Jump to behavior
Source: /usr/lib/upower/upowerd (PID: 5574)Directory: <invalid fd (11)>/..Jump to behavior
Source: /usr/libexec/gsd-keyboard (PID: 5595)Directory: /var/lib/gdm3/.XdefaultsJump to behavior
Source: /usr/libexec/gsd-keyboard (PID: 5595)Directory: /var/lib/gdm3/.Xdefaults-galassiaJump to behavior
Source: /usr/libexec/gsd-rfkill (PID: 5640)Directory: <invalid fd (9)>/..Jump to behavior
Source: /usr/libexec/gsd-rfkill (PID: 5640)Directory: <invalid fd (8)>/..Jump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /var/lib/gdm3/.XdefaultsJump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /var/lib/gdm3/.Xdefaults-galassiaJump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /usr/share/locale/en_US.UTF-8/LC_MESSAGES/.moJump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /usr/share/locale/en_US.utf8/LC_MESSAGES/.moJump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /usr/share/locale/en_US/LC_MESSAGES/.moJump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /usr/share/locale/en.UTF-8/LC_MESSAGES/.moJump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /usr/share/locale/en.utf8/LC_MESSAGES/.moJump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /usr/share/locale/en/LC_MESSAGES/.moJump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /usr/share/locale-langpack/en_US.UTF-8/LC_MESSAGES/.moJump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /usr/share/locale-langpack/en_US.utf8/LC_MESSAGES/.moJump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /usr/share/locale-langpack/en_US/LC_MESSAGES/.moJump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /usr/share/locale-langpack/en.UTF-8/LC_MESSAGES/.moJump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /usr/share/locale-langpack/en.utf8/LC_MESSAGES/.moJump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Directory: /usr/share/locale-langpack/en/LC_MESSAGES/.moJump to behavior
Source: /usr/libexec/gsd-color (PID: 5646)Directory: /var/lib/gdm3/.XdefaultsJump to behavior
Source: /usr/libexec/gsd-color (PID: 5646)Directory: /var/lib/gdm3/.Xdefaults-galassiaJump to behavior
Source: /usr/libexec/gsd-power (PID: 5655)Directory: /var/lib/gdm3/.XdefaultsJump to behavior
Source: /usr/libexec/gsd-power (PID: 5655)Directory: /var/lib/gdm3/.Xdefaults-galassiaJump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5690)Directory: <invalid fd (10)>/..Jump to behavior
Source: /usr/libexec/colord (PID: 5870)Directory: /var/lib/colord/.cacheJump to behavior
Source: /usr/lib/accountsservice/accounts-daemon (PID: 5872)Directory: /var/lib/gdm3/.pam_environmentJump to behavior
Source: /usr/lib/accountsservice/accounts-daemon (PID: 5872)Directory: /root/.cacheJump to behavior
Source: /usr/lib/xorg/Xorg (PID: 5658)Shell command executed: sh -c "\"/usr/bin/xkbcomp\" -w 1 \"-R/usr/share/X11/xkb\" -xkm \"-\" -em1 \"The XKEYBOARD keymap compiler (xkbcomp) reports:\" -emp \"> \" -eml \"Errors from xkbcomp are not fatal to the X server\" \"/tmp/server-0.xkm\""Jump to behavior
Source: /usr/lib/xorg/Xorg (PID: 5837)Shell command executed: sh -c "\"/usr/bin/xkbcomp\" -w 1 \"-R/usr/share/X11/xkb\" -xkm \"-\" -em1 \"The XKEYBOARD keymap compiler (xkbcomp) reports:\" -emp \"> \" -eml \"Errors from xkbcomp are not fatal to the X server\" \"/tmp/server-0.xkm\""Jump to behavior
Source: /usr/share/language-tools/language-options (PID: 5887)Shell command executed: sh -c "locale -a | grep -F .utf8 "Jump to behavior
Source: /bin/sh (PID: 5889)Grep executable: /usr/bin/grep -> grep -F .utf8Jump to behavior
Source: /usr/lib/accountsservice/accounts-daemon (PID: 5872)File: /var/lib/AccountsService/icons (bits: - usr: rx grp: rwx all: rwx)Jump to behavior
Source: /usr/lib/accountsservice/accounts-daemon (PID: 5872)File: /var/lib/AccountsService/users (bits: - usr: - grp: - all: rwx)Jump to behavior
Source: /tmp/C1Dd84tB3n.elf (PID: 5508)Queries kernel information via 'uname': Jump to behavior
Source: /usr/libexec/gsd-wacom (PID: 5551)Queries kernel information via 'uname': Jump to behavior
Source: /usr/libexec/gsd-keyboard (PID: 5595)Queries kernel information via 'uname': Jump to behavior
Source: /usr/libexec/gsd-smartcard (PID: 5615)Queries kernel information via 'uname': Jump to behavior
Source: /usr/libexec/gsd-media-keys (PID: 5642)Queries kernel information via 'uname': Jump to behavior
Source: /usr/libexec/gsd-color (PID: 5646)Queries kernel information via 'uname': Jump to behavior
Source: /usr/libexec/gsd-power (PID: 5655)Queries kernel information via 'uname': Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5690)Queries kernel information via 'uname': Jump to behavior
Source: /usr/libexec/colord-sane (PID: 5896)Queries kernel information via 'uname': Jump to behavior

Language, Device and Operating System Detection

barindex
Source: /usr/lib/accountsservice/accounts-daemon (PID: 5872)Logged in records file read: /var/log/wtmpJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
File and Directory Permissions Modification
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network Medium1
Service Stop
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Hidden Files and Directories
LSASS Memory1
System Owner/User Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1430909 Sample: C1Dd84tB3n.elf Startdate: 24/04/2024 Architecture: LINUX Score: 72 44 fdh32fsdfhs.shop 185.196.9.5, 50164, 51237 SIMPLECARRIERCH Switzerland 2->44 46 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->46 48 daisy.ubuntu.com 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Multi AV Scanner detection for submitted file 2->52 54 Machine Learning detection for sample 2->54 56 Connects to many ports of the same IP (likely port scanning) 2->56 10 systemd accounts-daemon 2->10         started        13 C1Dd84tB3n.elf 2->13         started        15 gnome-session-binary sh gsd-print-notifications 2->15         started        17 33 other processes 2->17 signatures3 process4 signatures5 60 Reads system files that contain records of logged in users 10->60 19 accounts-daemon language-validate 10->19         started        21 C1Dd84tB3n.elf 13->21         started        24 C1Dd84tB3n.elf 13->24         started        26 gsd-print-notifications 15->26         started        28 colord colord-sane 17->28         started        30 sh xkbcomp 17->30         started        32 sh xkbcomp 17->32         started        process6 signatures7 34 language-validate language-options 19->34         started        58 Sample tries to kill multiple processes (SIGKILL) 21->58 36 gsd-print-notifications gsd-printer 26->36         started        process8 process9 38 language-options sh 34->38         started        process10 40 sh locale 38->40         started        42 sh grep 38->42         started       
SourceDetectionScannerLabelLink
C1Dd84tB3n.elf54%VirustotalBrowse
C1Dd84tB3n.elf100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLink
fdh32fsdfhs.shop14%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    fdh32fsdfhs.shop
    185.196.9.5
    truetrueunknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    185.125.190.26
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    185.196.9.5
    fdh32fsdfhs.shopSwitzerland
    42624SIMPLECARRIERCHtrue
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    185.125.190.2673wSOh7A9P.elfGet hashmaliciousUnknownBrowse
      az9a0rNKvy.elfGet hashmaliciousMirai, OkiruBrowse
        SecuriteInfo.com.Linux.Mirai.8362.8829.19078.elfGet hashmaliciousMiraiBrowse
          SecuriteInfo.com.Linux.Siggen.7228.11695.14684.elfGet hashmaliciousUnknownBrowse
            jdsfl.arm7.elfGet hashmaliciousUnknownBrowse
              .Sx86.elfGet hashmaliciousUnknownBrowse
                t8WeXq3mvS.elfGet hashmaliciousGafgytBrowse
                  HfcQmQis2J.elfGet hashmaliciousUnknownBrowse
                    OO1vDl4L4r.elfGet hashmaliciousUnknownBrowse
                      tajma.mips-20240422-0536.elfGet hashmaliciousMirai, OkiruBrowse
                        185.196.9.5C6CM5vjm9f.elfGet hashmaliciousUnknownBrowse
                          tGUvOmucT1.elfGet hashmaliciousMiraiBrowse
                            HuQOCdLGIt.elfGet hashmaliciousMiraiBrowse
                              5KlVl7Ufq8.elfGet hashmaliciousMiraiBrowse
                                AK8vX17uEL.elfGet hashmaliciousMiraiBrowse
                                  CroOWhXyZW.elfGet hashmaliciousMiraiBrowse
                                    MuYUVx7f12.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      pr8MgL5lZ7.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        H9zfx95Tb5.elfGet hashmaliciousGafgyt, MiraiBrowse
                                          PqyrXWg453.elfGet hashmaliciousGafgyt, MiraiBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            daisy.ubuntu.com73wSOh7A9P.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            74GlZU5V6w.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.24
                                            MXkNrG1YOu.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            Q6UPC68I9N.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.24
                                            KwFkwV5uzG.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            ygshcdTGkk.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.24
                                            SRBrxtK5ge.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.25
                                            az9a0rNKvy.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 162.213.35.25
                                            2QufQlF1Rv.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            1mHUcsxKG6.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.25
                                            fdh32fsdfhs.shopC6CM5vjm9f.elfGet hashmaliciousUnknownBrowse
                                            • 185.196.9.5
                                            tGUvOmucT1.elfGet hashmaliciousMiraiBrowse
                                            • 185.196.9.5
                                            HuQOCdLGIt.elfGet hashmaliciousMiraiBrowse
                                            • 185.196.9.5
                                            5KlVl7Ufq8.elfGet hashmaliciousMiraiBrowse
                                            • 185.196.9.5
                                            AK8vX17uEL.elfGet hashmaliciousMiraiBrowse
                                            • 185.196.9.5
                                            CroOWhXyZW.elfGet hashmaliciousMiraiBrowse
                                            • 185.196.9.5
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            SIMPLECARRIERCHzlONcFaXkc.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
                                            • 185.196.10.233
                                            KxgGGaiW3E.exeGet hashmaliciousQuasarBrowse
                                            • 185.196.10.233
                                            23xCOZerXg.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
                                            • 185.196.10.233
                                            KPn7VgIWQj.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
                                            • 185.196.10.233
                                            YZPS3Bfyza.exeGet hashmaliciousQuasarBrowse
                                            • 185.196.10.233
                                            YZPS3Bfyza.exeGet hashmaliciousQuasarBrowse
                                            • 185.196.10.233
                                            SecuriteInfo.com.Trojan.PackedNET.2147.11643.5777.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
                                            • 185.196.10.233
                                            4KwjQMqbmm.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
                                            • 185.196.10.233
                                            dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 185.196.11.12
                                            U8fPEL1Gwi.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
                                            • 185.196.10.233
                                            CANONICAL-ASGBjssKanl7bD.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 91.189.91.42
                                            eI5fTcq2no.elfGet hashmaliciousUnknownBrowse
                                            • 91.189.91.42
                                            73wSOh7A9P.elfGet hashmaliciousUnknownBrowse
                                            • 185.125.190.26
                                            e9NxPUbA9r.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 91.189.91.42
                                            F17oc0pNHk.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 91.189.91.42
                                            1HoxbBh9mb.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 91.189.91.42
                                            V06ANR64H4.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 91.189.91.42
                                            DI3Zukrm4Y.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 91.189.91.42
                                            WINSx8yLsb.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 91.189.91.42
                                            Rubify.arm.elfGet hashmaliciousMiraiBrowse
                                            • 91.189.91.42
                                            No context
                                            No context
                                            Process:/usr/libexec/gsd-power
                                            File Type:very short file (no magic)
                                            Category:dropped
                                            Size (bytes):1
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:93B885ADFE0DA089CDF634904FD59F71
                                            SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                            SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                            SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:.
                                            Process:/usr/bin/xkbcomp
                                            File Type:Compiled XKB Keymap: lsb, version 15
                                            Category:dropped
                                            Size (bytes):12060
                                            Entropy (8bit):4.8492493153178975
                                            Encrypted:false
                                            SSDEEP:192:tDyb2zOmnECQmwTVFfLaSLus4UVcqLkjoqdD//HJeCQ1+JdDx0s2T:tDyAxvYhFf+S6tUzmp7/1MJ
                                            MD5:B4E3EB0B8B6B0FC1F46740C573E18D86
                                            SHA1:7D35426357695EBA77850757E8939A62DCEFF2D1
                                            SHA-256:7951135CC89A6E89493E3A9997C3D9054439459F8BFCE3DDEC76B943DA79FA91
                                            SHA-512:8196A23E2B5E525A5581562A2D7F2EE4FF5B694FEF3E218206D52EA9BFE80600BB0C6AA8968CA58E93E1AAD478FA05E157D08DB6D4D1224DDEA6754E377BE001
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview:.mkx..............D.......................h.......<.....P.@%.......&......D.......NumLock.....Alt.....LevelThree..LAlt....RAlt....RControl....LControl....ScrollLock..LevelFive...AltGr...Meta....Super...Hyper...........evdev+aliases(qwerty)...!.....ESC.AE01AE02AE03AE04AE05AE06AE07AE08AE09AE10AE11AE12BKSPTAB.AD01AD02AD03AD04AD05AD06AD07AD08AD09AD10AD11AD12RTRNLCTLAC01AC02AC03AC04AC05AC06AC07AC08AC09AC10AC11TLDELFSHBKSLAB01AB02AB03AB04AB05AB06AB07AB08AB09AB10RTSHKPMULALTSPCECAPSFK01FK02FK03FK04FK05FK06FK07FK08FK09FK10NMLKSCLKKP7.KP8.KP9.KPSUKP4.KP5.KP6.KPADKP1.KP2.KP3.KP0.KPDLLVL3....LSGTFK11FK12AB11KATAHIRAHENKHKTGMUHEJPCMKPENRCTLKPDVPRSCRALTLNFDHOMEUP..PGUPLEFTRGHTEND.DOWNPGDNINS.DELEI120MUTEVOL-VOL+POWRKPEQI126PAUSI128I129HNGLHJCVAE13LWINRWINCOMPSTOPAGAIPROPUNDOFRNTCOPYOPENPASTFINDCUT.HELPI147I148I149I150I151I152I153I154I155I156I157I158I159I160I161I162I163I164I165I166I167I168I169I170I171I172I173I174I175I176I177I178I179I180I181I182I183I184I185I186I187I188I189I190FK13FK14FK15FK16FK17FK18
                                            Process:/usr/lib/accountsservice/accounts-daemon
                                            File Type:ASCII text
                                            Category:dropped
                                            Size (bytes):51
                                            Entropy (8bit):4.647628037922664
                                            Encrypted:false
                                            SSDEEP:3:urCLnT+PzKLrAan4R8AKn:gI+zKLrAa4M
                                            MD5:071DABFEAD25B35D415780C2CFA55287
                                            SHA1:ED08D2B2FC77EF256FF9196934A55CFE4AE1B8E3
                                            SHA-256:E778170EDFD4C9871EFF24F592FF7A23D2A08A86479A6B14E42AF5FC1094416C
                                            SHA-512:8FBC64B76E1916570726BE87A2E9FBF7BDD1B07AB64A4A007EF20846273D416C04B32F8D2B923F1FDAA82BA729F2668A402DF608F4852E7676F67247A2666668
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview:[User].Icon=/var/lib/gdm3/.face.SystemAccount=true.
                                            File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                                            Entropy (8bit):6.257903473191838
                                            TrID:
                                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                            File name:C1Dd84tB3n.elf
                                            File size:51'264 bytes
                                            MD5:614535d91c815dc05beef2f10224e069
                                            SHA1:de5eb9772e7bf8087fecebb2c74ee998408be61e
                                            SHA256:8495237ddf43196df79fcfb9a5d8a7a5fd5a14e2d9012b5d7bee000dad10da75
                                            SHA512:89ad7001d59fb28a1b46279ef489a6d302f0f18e11b3b5575b65790d045f48bbf3bb6602894f176e94e41ad2dc32bee1b088687f0e6b503edcbfcba6f9d56463
                                            SSDEEP:768:nHHqmdDSodln8muwq4roeuZ7YvK3VfoRYjGbWnaWUohyye43egkE6I2jvk:HKmdDSodl8mqnZsvIfurWnaEyyOr
                                            TLSH:67334A07B96280FDC5ADC17847BAB639CD3374BE027976AA33D4FA3A6D49D211E5D800
                                            File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@...............................................P.......P..............1..............Q.td....................................................H...._........H........

                                            ELF header

                                            Class:ELF64
                                            Data:2's complement, little endian
                                            Version:1 (current)
                                            Machine:Advanced Micro Devices X86-64
                                            Version Number:0x1
                                            Type:EXEC (Executable file)
                                            OS/ABI:UNIX - System V
                                            ABI Version:0
                                            Entry Point Address:0x400194
                                            Flags:0x0
                                            ELF Header Size:64
                                            Program Header Offset:64
                                            Program Header Size:56
                                            Number of Program Headers:3
                                            Section Header Offset:50624
                                            Section Header Size:64
                                            Number of Section Headers:10
                                            Header String Table Index:9
                                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                            NULL0x00x00x00x00x0000
                                            .initPROGBITS0x4000e80xe80x130x00x6AX001
                                            .textPROGBITS0x4001000x1000xa0060x00x6AX0016
                                            .finiPROGBITS0x40a1060xa1060xe0x00x6AX001
                                            .rodataPROGBITS0x40a1200xa1200x1f700x00x2A0032
                                            .ctorsPROGBITS0x50c0980xc0980x100x00x3WA008
                                            .dtorsPROGBITS0x50c0a80xc0a80x100x00x3WA008
                                            .dataPROGBITS0x50c0c00xc0c00x4c00x00x3WA0032
                                            .bssNOBITS0x50c5800xc5800x2ce80x00x3WA0032
                                            .shstrtabSTRTAB0x00xc5800x3e0x00x0001
                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                            LOAD0x00x4000000x4000000xc0900xc0906.35860x5R E0x100000.init .text .fini .rodata
                                            LOAD0xc0980x50c0980x50c0980x4e80x31d02.32230x6RW 0x100000.ctors .dtors .data .bss
                                            GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 24, 2024 10:58:47.803306103 CEST5016451237192.168.2.14185.196.9.5
                                            Apr 24, 2024 10:58:48.109540939 CEST5123750164185.196.9.5192.168.2.14
                                            Apr 24, 2024 10:58:48.109625101 CEST5016451237192.168.2.14185.196.9.5
                                            Apr 24, 2024 10:58:56.763092041 CEST46540443192.168.2.14185.125.190.26
                                            Apr 24, 2024 10:59:27.226093054 CEST46540443192.168.2.14185.125.190.26
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 24, 2024 10:58:47.483983994 CEST5157653192.168.2.148.8.8.8
                                            Apr 24, 2024 10:58:47.803009033 CEST53515768.8.8.8192.168.2.14
                                            Apr 24, 2024 10:58:54.759167910 CEST4752253192.168.2.148.8.8.8
                                            Apr 24, 2024 10:58:54.759259939 CEST4292953192.168.2.148.8.8.8
                                            Apr 24, 2024 10:58:54.929150105 CEST53475228.8.8.8192.168.2.14
                                            Apr 24, 2024 10:58:54.930186987 CEST53429298.8.8.8192.168.2.14
                                            TimestampSource IPDest IPChecksumCodeType
                                            Apr 24, 2024 10:58:54.898296118 CEST192.168.2.14192.168.2.1827a(Port unreachable)Destination Unreachable
                                            Apr 24, 2024 11:00:14.924045086 CEST192.168.2.14192.168.2.1827a(Port unreachable)Destination Unreachable
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Apr 24, 2024 10:58:47.483983994 CEST192.168.2.148.8.8.80xded8Standard query (0)fdh32fsdfhs.shopA (IP address)IN (0x0001)false
                                            Apr 24, 2024 10:58:54.759167910 CEST192.168.2.148.8.8.80xf481Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                            Apr 24, 2024 10:58:54.759259939 CEST192.168.2.148.8.8.80x45c0Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Apr 24, 2024 10:58:47.803009033 CEST8.8.8.8192.168.2.140xded8No error (0)fdh32fsdfhs.shop185.196.9.5A (IP address)IN (0x0001)false
                                            Apr 24, 2024 10:58:54.929150105 CEST8.8.8.8192.168.2.140xf481No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                                            Apr 24, 2024 10:58:54.929150105 CEST8.8.8.8192.168.2.140xf481No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                                            System Behavior

                                            Start time (UTC):08:58:46
                                            Start date (UTC):24/04/2024
                                            Path:/tmp/C1Dd84tB3n.elf
                                            Arguments:/tmp/C1Dd84tB3n.elf
                                            File size:51264 bytes
                                            MD5 hash:614535d91c815dc05beef2f10224e069

                                            Start time (UTC):08:58:46
                                            Start date (UTC):24/04/2024
                                            Path:/tmp/C1Dd84tB3n.elf
                                            Arguments:-
                                            File size:51264 bytes
                                            MD5 hash:614535d91c815dc05beef2f10224e069

                                            Start time (UTC):08:58:46
                                            Start date (UTC):24/04/2024
                                            Path:/tmp/C1Dd84tB3n.elf
                                            Arguments:-
                                            File size:51264 bytes
                                            MD5 hash:614535d91c815dc05beef2f10224e069

                                            Start time (UTC):08:58:46
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/udisks2/udisksd
                                            Arguments:-
                                            File size:483056 bytes
                                            MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                            Start time (UTC):08:58:46
                                            Start date (UTC):24/04/2024
                                            Path:/usr/sbin/dumpe2fs
                                            Arguments:dumpe2fs -h /dev/dm-0
                                            File size:31112 bytes
                                            MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                            Start time (UTC):08:58:46
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gnome-session-binary
                                            Arguments:-
                                            File size:334664 bytes
                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                            Start time (UTC):08:58:46
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-wacom
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-wacom
                                            Arguments:/usr/libexec/gsd-wacom
                                            File size:39520 bytes
                                            MD5 hash:13778dd1a23a4e94ddc17ac9caa4fcc1

                                            Start time (UTC):08:58:46
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/udisks2/udisksd
                                            Arguments:-
                                            File size:483056 bytes
                                            MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                            Start time (UTC):08:58:46
                                            Start date (UTC):24/04/2024
                                            Path:/usr/sbin/dumpe2fs
                                            Arguments:dumpe2fs -h /dev/dm-0
                                            File size:31112 bytes
                                            MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/systemd/systemd
                                            Arguments:-
                                            File size:1620224 bytes
                                            MD5 hash:9b2bec7092a40488108543f9334aab75

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/upower/upowerd
                                            Arguments:/usr/lib/upower/upowerd
                                            File size:260328 bytes
                                            MD5 hash:1253eea2fe5fe4017069664284e326cd

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/bin/xfce4-panel
                                            Arguments:-
                                            File size:375768 bytes
                                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
                                            File size:35136 bytes
                                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gnome-session-binary
                                            Arguments:-
                                            File size:334664 bytes
                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-keyboard
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-keyboard
                                            Arguments:/usr/libexec/gsd-keyboard
                                            File size:39760 bytes
                                            MD5 hash:8e288fd17c80bb0a1148b964b2ac2279

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/bin/xfce4-panel
                                            Arguments:-
                                            File size:375768 bytes
                                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
                                            File size:35136 bytes
                                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/bin/xfce4-panel
                                            Arguments:-
                                            File size:375768 bytes
                                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
                                            File size:35136 bytes
                                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gnome-session-binary
                                            Arguments:-
                                            File size:334664 bytes
                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-smartcard
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-smartcard
                                            Arguments:/usr/libexec/gsd-smartcard
                                            File size:109152 bytes
                                            MD5 hash:ea1fbd7f62e4cd0331eae2ef754ee605

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/bin/xfce4-panel
                                            Arguments:-
                                            File size:375768 bytes
                                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/udisks2/udisksd
                                            Arguments:-
                                            File size:483056 bytes
                                            MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/sbin/dumpe2fs
                                            Arguments:dumpe2fs -h /dev/dm-0
                                            File size:31112 bytes
                                            MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gnome-session-binary
                                            Arguments:-
                                            File size:334664 bytes
                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-sharing
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-sharing
                                            Arguments:/usr/libexec/gsd-sharing
                                            File size:35424 bytes
                                            MD5 hash:e29d9025d98590fbb69f89fdbd4438b3

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gnome-session-binary
                                            Arguments:-
                                            File size:334664 bytes
                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-rfkill
                                            Arguments:/usr/libexec/gsd-rfkill
                                            File size:51808 bytes
                                            MD5 hash:88a16a3c0aba1759358c06215ecfb5cc

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/gdm3/gdm-session-worker
                                            Arguments:-
                                            File size:293360 bytes
                                            MD5 hash:692243754bd9f38fe9bd7e230b5c060a

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/etc/gdm3/PostSession/Default
                                            Arguments:/etc/gdm3/PostSession/Default
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gnome-session-binary
                                            Arguments:-
                                            File size:334664 bytes
                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-media-keys
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-media-keys
                                            Arguments:/usr/libexec/gsd-media-keys
                                            File size:232936 bytes
                                            MD5 hash:a425448c135afb4b8bfd79cc0b6b74da

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/sbin/gdm3
                                            Arguments:-
                                            File size:453296 bytes
                                            MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/etc/gdm3/PrimeOff/Default
                                            Arguments:/etc/gdm3/PrimeOff/Default
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gnome-session-binary
                                            Arguments:-
                                            File size:334664 bytes
                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-print-notifications
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-print-notifications
                                            Arguments:/usr/libexec/gsd-print-notifications
                                            File size:51840 bytes
                                            MD5 hash:71539698aa691718cee775d6b9450ae2

                                            Start time (UTC):08:58:52
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-print-notifications
                                            Arguments:-
                                            File size:51840 bytes
                                            MD5 hash:71539698aa691718cee775d6b9450ae2

                                            Start time (UTC):08:58:52
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-print-notifications
                                            Arguments:-
                                            File size:51840 bytes
                                            MD5 hash:71539698aa691718cee775d6b9450ae2

                                            Start time (UTC):08:58:53
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-printer
                                            Arguments:/usr/libexec/gsd-printer
                                            File size:31120 bytes
                                            MD5 hash:7995828cf98c315fd55f2ffb3b22384d

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gnome-session-binary
                                            Arguments:-
                                            File size:334664 bytes
                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-color
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-color
                                            Arguments:/usr/libexec/gsd-color
                                            File size:92832 bytes
                                            MD5 hash:ac2861ad93ce047283e8e87cefef9a19

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gnome-session-binary
                                            Arguments:-
                                            File size:334664 bytes
                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-screensaver-proxy
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-screensaver-proxy
                                            Arguments:/usr/libexec/gsd-screensaver-proxy
                                            File size:27232 bytes
                                            MD5 hash:77e309450c87dceee43f1a9e50cc0d02

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/udisks2/udisksd
                                            Arguments:-
                                            File size:483056 bytes
                                            MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/sbin/dumpe2fs
                                            Arguments:dumpe2fs -h /dev/dm-0
                                            File size:31112 bytes
                                            MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gnome-session-binary
                                            Arguments:-
                                            File size:334664 bytes
                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-a11y-settings
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:48
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-a11y-settings
                                            Arguments:/usr/libexec/gsd-a11y-settings
                                            File size:23056 bytes
                                            MD5 hash:18e243d2cf30ecee7ea89d1462725c5c

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gnome-session-binary
                                            Arguments:-
                                            File size:334664 bytes
                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                            Start time (UTC):08:58:47
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:48
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-housekeeping
                                            Arguments:/usr/libexec/gsd-housekeeping
                                            File size:51840 bytes
                                            MD5 hash:b55f3394a84976ddb92a2915e5d76914

                                            Start time (UTC):08:58:48
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gnome-session-binary
                                            Arguments:-
                                            File size:334664 bytes
                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                            Start time (UTC):08:58:48
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-sound
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:48
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-sound
                                            Arguments:/usr/libexec/gsd-sound
                                            File size:31248 bytes
                                            MD5 hash:4c7d3fb993463337b4a0eb5c80c760ee

                                            Start time (UTC):08:58:48
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gnome-session-binary
                                            Arguments:-
                                            File size:334664 bytes
                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                            Start time (UTC):08:58:48
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-power
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:49
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/gsd-power
                                            Arguments:/usr/libexec/gsd-power
                                            File size:88672 bytes
                                            MD5 hash:28b8e1b43c3e7f1db6741ea1ecd978b7

                                            Start time (UTC):08:58:48
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/xorg/Xorg
                                            Arguments:-
                                            File size:2448840 bytes
                                            MD5 hash:730cf4c45a7ee8bea88abf165463b7f8

                                            Start time (UTC):08:58:48
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:sh -c "\"/usr/bin/xkbcomp\" -w 1 \"-R/usr/share/X11/xkb\" -xkm \"-\" -em1 \"The XKEYBOARD keymap compiler (xkbcomp) reports:\" -emp \"> \" -eml \"Errors from xkbcomp are not fatal to the X server\" \"/tmp/server-0.xkm\""
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:49
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:49
                                            Start date (UTC):24/04/2024
                                            Path:/usr/bin/xkbcomp
                                            Arguments:/usr/bin/xkbcomp -w 1 -R/usr/share/X11/xkb -xkm - -em1 "The XKEYBOARD keymap compiler (xkbcomp) reports:" -emp "> " -eml "Errors from xkbcomp are not fatal to the X server" /tmp/server-0.xkm
                                            File size:217184 bytes
                                            MD5 hash:c5f953aec4c00d2a1cc27acb75d62c9b

                                            Start time (UTC):08:58:52
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/systemd/systemd
                                            Arguments:-
                                            File size:1620224 bytes
                                            MD5 hash:9b2bec7092a40488108543f9334aab75

                                            Start time (UTC):08:58:52
                                            Start date (UTC):24/04/2024
                                            Path:/lib/systemd/systemd-hostnamed
                                            Arguments:/lib/systemd/systemd-hostnamed
                                            File size:35040 bytes
                                            MD5 hash:2cc8a5576629a2d5bd98e49a4b8bef65

                                            Start time (UTC):08:58:53
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/systemd/systemd
                                            Arguments:-
                                            File size:1620224 bytes
                                            MD5 hash:9b2bec7092a40488108543f9334aab75

                                            Start time (UTC):08:58:53
                                            Start date (UTC):24/04/2024
                                            Path:/lib/systemd/systemd-user-runtime-dir
                                            Arguments:/lib/systemd/systemd-user-runtime-dir stop 1000
                                            File size:22672 bytes
                                            MD5 hash:d55f4b0847f88131dbcfb07435178e54

                                            Start time (UTC):08:58:54
                                            Start date (UTC):24/04/2024
                                            Path:/usr/bin/dbus-daemon
                                            Arguments:-
                                            File size:249032 bytes
                                            MD5 hash:3089d47e3f3ab84cd81c48fd406d7a8c

                                            Start time (UTC):08:58:54
                                            Start date (UTC):24/04/2024
                                            Path:/bin/false
                                            Arguments:/bin/false
                                            File size:39256 bytes
                                            MD5 hash:3177546c74e4f0062909eae43d948bfc

                                            Start time (UTC):08:58:56
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/xorg/Xorg
                                            Arguments:-
                                            File size:2448840 bytes
                                            MD5 hash:730cf4c45a7ee8bea88abf165463b7f8

                                            Start time (UTC):08:58:56
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:sh -c "\"/usr/bin/xkbcomp\" -w 1 \"-R/usr/share/X11/xkb\" -xkm \"-\" -em1 \"The XKEYBOARD keymap compiler (xkbcomp) reports:\" -emp \"> \" -eml \"Errors from xkbcomp are not fatal to the X server\" \"/tmp/server-0.xkm\""
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:56
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:58:56
                                            Start date (UTC):24/04/2024
                                            Path:/usr/bin/xkbcomp
                                            Arguments:/usr/bin/xkbcomp -w 1 -R/usr/share/X11/xkb -xkm - -em1 "The XKEYBOARD keymap compiler (xkbcomp) reports:" -emp "> " -eml "Errors from xkbcomp are not fatal to the X server" /tmp/server-0.xkm
                                            File size:217184 bytes
                                            MD5 hash:c5f953aec4c00d2a1cc27acb75d62c9b

                                            Start time (UTC):08:59:01
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/systemd/systemd
                                            Arguments:-
                                            File size:1620224 bytes
                                            MD5 hash:9b2bec7092a40488108543f9334aab75

                                            Start time (UTC):08:59:01
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/colord
                                            Arguments:/usr/libexec/colord
                                            File size:346632 bytes
                                            MD5 hash:70861d1b2818c9279cd4a5c9035dac1f

                                            Start time (UTC):08:59:09
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/colord
                                            Arguments:-
                                            File size:346632 bytes
                                            MD5 hash:70861d1b2818c9279cd4a5c9035dac1f

                                            Start time (UTC):08:59:09
                                            Start date (UTC):24/04/2024
                                            Path:/usr/libexec/colord-sane
                                            Arguments:/usr/libexec/colord-sane
                                            File size:18736 bytes
                                            MD5 hash:5f98d754a07bf1385c3ff001cde3882e

                                            Start time (UTC):08:59:02
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/systemd/systemd
                                            Arguments:-
                                            File size:1620224 bytes
                                            MD5 hash:9b2bec7092a40488108543f9334aab75

                                            Start time (UTC):08:59:02
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/accountsservice/accounts-daemon
                                            Arguments:/usr/lib/accountsservice/accounts-daemon
                                            File size:203192 bytes
                                            MD5 hash:01a899e3fb5e7e434bea1290255a1f30

                                            Start time (UTC):08:59:04
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/accountsservice/accounts-daemon
                                            Arguments:-
                                            File size:203192 bytes
                                            MD5 hash:01a899e3fb5e7e434bea1290255a1f30

                                            Start time (UTC):08:59:04
                                            Start date (UTC):24/04/2024
                                            Path:/usr/share/language-tools/language-validate
                                            Arguments:/usr/share/language-tools/language-validate en_US.UTF-8
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:59:04
                                            Start date (UTC):24/04/2024
                                            Path:/usr/share/language-tools/language-validate
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:59:04
                                            Start date (UTC):24/04/2024
                                            Path:/usr/share/language-tools/language-options
                                            Arguments:/usr/share/language-tools/language-options
                                            File size:3478464 bytes
                                            MD5 hash:16a21f464119ea7fad1d3660de963637

                                            Start time (UTC):08:59:04
                                            Start date (UTC):24/04/2024
                                            Path:/usr/share/language-tools/language-options
                                            Arguments:-
                                            File size:3478464 bytes
                                            MD5 hash:16a21f464119ea7fad1d3660de963637

                                            Start time (UTC):08:59:04
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:sh -c "locale -a | grep -F .utf8 "
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:59:04
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:59:04
                                            Start date (UTC):24/04/2024
                                            Path:/usr/bin/locale
                                            Arguments:locale -a
                                            File size:58944 bytes
                                            MD5 hash:c72a78792469db86d91369c9057f20d2

                                            Start time (UTC):08:59:04
                                            Start date (UTC):24/04/2024
                                            Path:/bin/sh
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:59:04
                                            Start date (UTC):24/04/2024
                                            Path:/usr/bin/grep
                                            Arguments:grep -F .utf8
                                            File size:199136 bytes
                                            MD5 hash:1e6ebb9dd094f774478f72727bdba0f5

                                            Start time (UTC):08:59:09
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/systemd/systemd
                                            Arguments:-
                                            File size:1620224 bytes
                                            MD5 hash:9b2bec7092a40488108543f9334aab75

                                            Start time (UTC):08:59:09
                                            Start date (UTC):24/04/2024
                                            Path:/lib/systemd/systemd-localed
                                            Arguments:/lib/systemd/systemd-localed
                                            File size:43232 bytes
                                            MD5 hash:1244af9646256d49594f2a8203329aa9

                                            Start time (UTC):08:59:10
                                            Start date (UTC):24/04/2024
                                            Path:/usr/sbin/gdm3
                                            Arguments:-
                                            File size:453296 bytes
                                            MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                            Start time (UTC):08:59:10
                                            Start date (UTC):24/04/2024
                                            Path:/etc/gdm3/PrimeOff/Default
                                            Arguments:/etc/gdm3/PrimeOff/Default
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:59:11
                                            Start date (UTC):24/04/2024
                                            Path:/usr/sbin/gdm3
                                            Arguments:-
                                            File size:453296 bytes
                                            MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                            Start time (UTC):08:59:11
                                            Start date (UTC):24/04/2024
                                            Path:/etc/gdm3/PrimeOff/Default
                                            Arguments:/etc/gdm3/PrimeOff/Default
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):08:59:20
                                            Start date (UTC):24/04/2024
                                            Path:/usr/lib/systemd/systemd
                                            Arguments:-
                                            File size:1620224 bytes
                                            MD5 hash:9b2bec7092a40488108543f9334aab75

                                            Start time (UTC):08:59:20
                                            Start date (UTC):24/04/2024
                                            Path:/lib/systemd/systemd-user-runtime-dir
                                            Arguments:/lib/systemd/systemd-user-runtime-dir stop 127
                                            File size:22672 bytes
                                            MD5 hash:d55f4b0847f88131dbcfb07435178e54