Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
ij5Z8oy5e3.elf

Overview

General Information

Sample name:ij5Z8oy5e3.elf
renamed because original name is a hash value
Original sample name:d13b153834dce9ac002fc83652d65fad.elf
Analysis ID:1431629
MD5:d13b153834dce9ac002fc83652d65fad
SHA1:15f285d66a059c498f7abb6a88a8709f7ff355e8
SHA256:da35d9fdeb215fb242d2b803c2faeaa47f8e46f21f8a5955e5dba11c1f2f04a3
Tags:32elfintelmirai
Infos:

Detection

Mirai
Score:96
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Machine Learning detection for sample
Sample tries to kill multiple processes (SIGKILL)
Sends malformed DNS queries
Uses dynamic DNS services
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1431629
Start date and time:2024-04-25 14:47:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 0s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ij5Z8oy5e3.elf
renamed because original name is a hash value
Original Sample Name:d13b153834dce9ac002fc83652d65fad.elf
Detection:MAL
Classification:mal96.spre.troj.linELF@0/0@66/0
Command:/tmp/ij5Z8oy5e3.elf
PID:5514
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
most3
Standard Error:
  • system is lnxubuntu20
  • xfdesktop (PID: 5533, Parent: 2984, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 260d40b3c-9c6a-4cb1-bbe4-3557725aa528
  • xfdesktop (PID: 5534, Parent: 2984, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 260d40b3c-9c6a-4cb1-bbe4-3557725aa528
  • xfdesktop (PID: 5539, Parent: 2984, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 260d40b3c-9c6a-4cb1-bbe4-3557725aa528
  • xfdesktop (PID: 5540, Parent: 2984, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 260d40b3c-9c6a-4cb1-bbe4-3557725aa528
  • xfdesktop (PID: 5543, Parent: 2984, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 260d40b3c-9c6a-4cb1-bbe4-3557725aa528
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
ij5Z8oy5e3.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x105b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x105cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x105e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x105f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10608:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1061c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10630:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10644:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10658:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1066c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10680:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10694:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x106a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x106bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x106d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x106e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x106f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1070c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10720:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10734:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10748:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
ij5Z8oy5e3.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x3ca0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
ij5Z8oy5e3.elfLinux_Trojan_Mirai_5f7b67b8unknownunknown
  • 0x9435:$a: 89 38 83 CF FF 89 F8 5A 59 5F C3 57 56 83 EC 04 8B 7C 24 10 8B 4C
ij5Z8oy5e3.elfLinux_Trojan_Mirai_88de437funknownunknown
  • 0x5d32:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
ij5Z8oy5e3.elfLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0xc5dc:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
Click to see the 2 entries
SourceRuleDescriptionAuthorStrings
5517.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x105b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x105cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x105e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x105f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10608:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1061c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10630:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10644:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10658:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1066c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10680:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10694:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x106a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x106bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x106d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x106e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x106f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1070c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10720:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10734:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10748:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
5517.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x3ca0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
5517.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Mirai_5f7b67b8unknownunknown
  • 0x9435:$a: 89 38 83 CF FF 89 F8 5A 59 5F C3 57 56 83 EC 04 8B 7C 24 10 8B 4C
5517.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Mirai_88de437funknownunknown
  • 0x5d32:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
5517.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0xc5dc:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
Click to see the 11 entries
Timestamp:04/25/24-14:48:21.378144
SID:2030490
Source Port:37334
Destination Port:2023
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-14:48:40.337993
SID:2030490
Source Port:37336
Destination Port:2023
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-14:48:42.940221
SID:2030489
Source Port:2023
Destination Port:37336
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-14:49:01.934782
SID:2030489
Source Port:2023
Destination Port:37338
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-14:48:25.195752
SID:2030489
Source Port:2023
Destination Port:37334
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-14:49:22.834839
SID:2030489
Source Port:2023
Destination Port:37340
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-14:48:58.001649
SID:2030490
Source Port:37338
Destination Port:2023
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-14:49:18.280942
SID:2030490
Source Port:37340
Destination Port:2023
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-14:50:09.248367
SID:2030489
Source Port:2023
Destination Port:37346
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-14:49:51.601829
SID:2030490
Source Port:37346
Destination Port:2023
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ij5Z8oy5e3.elfAvira: detected
Source: ij5Z8oy5e3.elfReversingLabs: Detection: 70%
Source: ij5Z8oy5e3.elfVirustotal: Detection: 44%Perma Link
Source: ij5Z8oy5e3.elfJoe Sandbox ML: detected
Source: ij5Z8oy5e3.elfString: HTTP/1.1 200 OKmost-armmost-arm5most-arm6most-arm7most-mipsmost-mpslmost-x86_64most-sh4./dvr_gui./upnp_server./dvr_app/proc/proc/%s/cmdline./pkillkillallwgetbusyboxtopcurltftppgrepxargsawktoyboxKh

Networking

barindex
Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:37334 -> 203.145.46.240:2023
Source: TrafficSnort IDS: 2030489 ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response 203.145.46.240:2023 -> 192.168.2.13:37334
Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:37336 -> 203.145.46.240:2023
Source: TrafficSnort IDS: 2030489 ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response 203.145.46.240:2023 -> 192.168.2.13:37336
Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:37338 -> 203.145.46.240:2023
Source: TrafficSnort IDS: 2030489 ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response 203.145.46.240:2023 -> 192.168.2.13:37338
Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:37340 -> 203.145.46.240:2023
Source: TrafficSnort IDS: 2030489 ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response 203.145.46.240:2023 -> 192.168.2.13:37340
Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.13:37346 -> 203.145.46.240:2023
Source: TrafficSnort IDS: 2030489 ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response 203.145.46.240:2023 -> 192.168.2.13:37346
Source: global trafficDNS traffic detected: malformed DNS query: aomacamada.ddns.net. [malformed]
Source: global trafficDNS traffic detected: malformed DNS query: net-killer.ddns.net. [malformed]
Source: global trafficDNS traffic detected: malformed DNS query: Vet-killer.io.v. [malformed]
Source: global trafficDNS traffic detected: malformed DNS query: net-killer.ooguy.com. [malformed]
Source: unknownDNS query: name: net-killer.ddns.net
Source: unknownDNS query: name: aomacamada.ddns.net
Source: unknownDNS query: name: aomacamada.ddns.net. [malformed]
Source: unknownDNS query: name: net-killer.ddns.net. [malformed]
Source: global trafficTCP traffic: 192.168.2.13:37334 -> 203.145.46.240:2023
Source: global trafficTCP traffic: 192.168.2.13:41034 -> 51.79.217.59:2023
Source: global trafficDNS traffic detected: DNS query: net-killer.ooguy.com
Source: global trafficDNS traffic detected: DNS query: aomacamada.ddns.net. [malformed]
Source: global trafficDNS traffic detected: DNS query: net-killer.ddns.net. [malformed]
Source: global trafficDNS traffic detected: DNS query: Vet-killer.io.v. [malformed]
Source: global trafficDNS traffic detected: DNS query: net-killer.ooguy.com. [malformed]
Source: global trafficDNS traffic detected: DNS query: aomacamada.ddns.net
Source: global trafficDNS traffic detected: DNS query: net-killer.ddns.net
Source: global trafficDNS traffic detected: DNS query: domain-botnet.servehttp.com

System Summary

barindex
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: Process Memory Space: ij5Z8oy5e3.elf PID: 5514, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: ij5Z8oy5e3.elf PID: 5517, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 914, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 917, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 936, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 1238, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 1320, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 3158, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 5533, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 5534, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 5539, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 5540, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 5543, result: successfulJump to behavior
Source: Initial sampleString containing 'busybox' found: busybox
Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKmost-armmost-arm5most-arm6most-arm7most-mipsmost-mpslmost-x86_64most-sh4./dvr_gui./upnp_server./dvr_app/proc/proc/%s/cmdline./pkillkillallwgetbusyboxtopcurltftppgrepxargsawktoyboxKh
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 914, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 917, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 936, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 1238, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 1320, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 3158, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 5533, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 5534, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 5539, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 5540, result: successfulJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)SIGKILL sent: pid: 5543, result: successfulJump to behavior
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: ij5Z8oy5e3.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5517.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5514.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: Process Memory Space: ij5Z8oy5e3.elf PID: 5514, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: ij5Z8oy5e3.elf PID: 5517, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: classification engineClassification label: mal96.spre.troj.linELF@0/0@66/0
Source: /usr/bin/xfdesktop (PID: 5534)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /usr/bin/xfdesktop (PID: 5539)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /usr/bin/xfdesktop (PID: 5540)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/238/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/239/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/241/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/1482/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/1480/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/371/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/1238/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/134/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/3413/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/1475/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/936/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/816/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/ij5Z8oy5e3.elf (PID: 5516)File opened: /proc/3310/cmdlineJump to behavior
Source: /usr/bin/xfdesktop (PID: 5534)Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/xfdesktop (PID: 5539)Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/xfdesktop (PID: 5540)Queries kernel information via 'uname': Jump to behavior

Remote Access Functionality

barindex
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
Source: TrafficSnort IDS: ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Hidden Files and Directories
1
OS Credential Dumping
1
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network Medium1
Service Stop
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive11
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1431629 Sample: ij5Z8oy5e3.elf Startdate: 25/04/2024 Architecture: LINUX Score: 96 24 net-killer.ddns.net. [malformed] 2->24 26 aomacamada.ddns.net. [malformed] 2->26 28 6 other IPs or domains 2->28 30 Snort IDS alert for network traffic 2->30 32 Malicious sample detected (through community Yara rule) 2->32 34 Antivirus / Scanner detection for submitted sample 2->34 40 3 other signatures 2->40 9 ij5Z8oy5e3.elf 2->9         started        11 xfce4-session xfdesktop 2->11         started        13 xfce4-session xfdesktop 2->13         started        15 3 other processes 2->15 signatures3 36 Sends malformed DNS queries 26->36 38 Uses dynamic DNS services 26->38 process4 process5 17 ij5Z8oy5e3.elf 9->17         started        process6 19 ij5Z8oy5e3.elf 17->19         started        signatures7 42 Sample tries to kill multiple processes (SIGKILL) 19->42 22 ij5Z8oy5e3.elf 19->22         started        process8

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ij5Z8oy5e3.elf70%ReversingLabsLinux.Trojan.Mirai
ij5Z8oy5e3.elf45%VirustotalBrowse
ij5Z8oy5e3.elf100%AviraEXP/ELF.Mirai.Z.A
ij5Z8oy5e3.elf100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLink
aomacamada.ddns.net8%VirustotalBrowse
net-killer.ddns.net18%VirustotalBrowse
net-killer.ooguy.com4%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
aomacamada.ddns.net
203.145.46.240
truetrueunknown
net-killer.ddns.net
203.145.46.240
truetrueunknown
net-killer.ooguy.com
203.145.46.240
truetrueunknown
domain-botnet.servehttp.com
51.79.217.59
truefalse
    unknown
    aomacamada.ddns.net. [malformed]
    unknown
    unknowntrue
      unknown
      net-killer.ooguy.com. [malformed]
      unknown
      unknowntrue
        unknown
        net-killer.ddns.net. [malformed]
        unknown
        unknowntrue
          unknown
          Vet-killer.io.v. [malformed]
          unknown
          unknowntrue
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            51.79.217.59
            domain-botnet.servehttp.comCanada
            16276OVHFRfalse
            203.145.46.240
            aomacamada.ddns.netunknown
            9313ONTHENET-ASNetworkTechnologyAUSTPLAUtrue
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            51.79.217.59iuMawBi6yU.elfGet hashmaliciousMiraiBrowse
              aMTecZscrq.elfGet hashmaliciousUnknownBrowse
                v2cDqXmZtv.elfGet hashmaliciousMiraiBrowse
                  Wd2T9v9ZMT.elfGet hashmaliciousMiraiBrowse
                    7T1vOaCJto.elfGet hashmaliciousMiraiBrowse
                      203.145.46.240iuMawBi6yU.elfGet hashmaliciousMiraiBrowse
                        aMTecZscrq.elfGet hashmaliciousUnknownBrowse
                          wvg9YxoOiG.elfGet hashmaliciousMiraiBrowse
                            v2cDqXmZtv.elfGet hashmaliciousMiraiBrowse
                              EV66ROvDut.elfGet hashmaliciousMiraiBrowse
                                Wd2T9v9ZMT.elfGet hashmaliciousMiraiBrowse
                                  7T1vOaCJto.elfGet hashmaliciousMiraiBrowse
                                    sGQ61OAVck.elfGet hashmaliciousMiraiBrowse
                                      0oJ784pwEP.elfGet hashmaliciousMiraiBrowse
                                        7oIrVgpQFQ.elfGet hashmaliciousMiraiBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          net-killer.ooguy.comsGQ61OAVck.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          0oJ784pwEP.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          domain-botnet.servehttp.comiuMawBi6yU.elfGet hashmaliciousMiraiBrowse
                                          • 51.79.217.59
                                          aMTecZscrq.elfGet hashmaliciousUnknownBrowse
                                          • 51.79.217.59
                                          v2cDqXmZtv.elfGet hashmaliciousMiraiBrowse
                                          • 51.79.217.59
                                          Wd2T9v9ZMT.elfGet hashmaliciousMiraiBrowse
                                          • 51.79.217.59
                                          7T1vOaCJto.elfGet hashmaliciousMiraiBrowse
                                          • 51.79.217.59
                                          n4J9NMfLTM.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          4wngRroxli.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          igIKGnfg87.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ONTHENET-ASNetworkTechnologyAUSTPLAUiuMawBi6yU.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          aMTecZscrq.elfGet hashmaliciousUnknownBrowse
                                          • 203.145.46.240
                                          wvg9YxoOiG.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          v2cDqXmZtv.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          EV66ROvDut.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          Wd2T9v9ZMT.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          7T1vOaCJto.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          sGQ61OAVck.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          0oJ784pwEP.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          7oIrVgpQFQ.elfGet hashmaliciousMiraiBrowse
                                          • 203.145.46.240
                                          OVHFRiuMawBi6yU.elfGet hashmaliciousMiraiBrowse
                                          • 51.79.217.59
                                          aMTecZscrq.elfGet hashmaliciousUnknownBrowse
                                          • 51.79.217.59
                                          http://rapnews.plGet hashmaliciousUnknownBrowse
                                          • 213.186.33.5
                                          https://ortelia.com/download-ortelia-curator/Get hashmaliciousHavocBrowse
                                          • 139.99.130.163
                                          https://clicks.aweber.com/y/ct/?l=irQzWw&m=hE2OWd5T.UYPuTr&b=hqint4ojZ0QPjD7.f4mxDg#Ym5hbmRlcnNvbkBwcmVzaWRpby5jb20=Get hashmaliciousHTMLPhisherBrowse
                                          • 51.210.113.194
                                          SecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                                          • 51.38.43.18
                                          lmg1_Mlakaifa443456.vbsGet hashmaliciousAsyncRAT, DcRat, RemcosBrowse
                                          • 139.99.133.66
                                          https://campaign-statistics.com/link_click/PJygYHTMZ2_OXDfP/30633247af9f78d20f1e067eab9a8276Get hashmaliciousHTMLPhisherBrowse
                                          • 91.134.146.191
                                          https://i.imgur.com/VlAllek.pngGet hashmaliciousUnknownBrowse
                                          • 51.79.152.81
                                          BM-FM_NR.24040718PDF.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                          • 51.77.215.151
                                          No context
                                          No context
                                          No created / dropped files found
                                          File type:
                                          Entropy (8bit):5.594582981184022
                                          TrID:
                                          • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                          • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                          File name:ij5Z8oy5e3.elf
                                          File size:96'388 bytes
                                          MD5:d13b153834dce9ac002fc83652d65fad
                                          SHA1:15f285d66a059c498f7abb6a88a8709f7ff355e8
                                          SHA256:da35d9fdeb215fb242d2b803c2faeaa47f8e46f21f8a5955e5dba11c1f2f04a3
                                          SHA512:4a82c6905910a736620a266d95a336216e02cba25cb3dad8790ce02b82dc06cdbae886f2db58f001a97885e0d9fbbe6bf9cbb9094860ab494eda3dea5d804d51
                                          SSDEEP:1536:bZxGp9fzWp6y0HP3SwuKXzWNc9ponbXU94uSfcRVL4:VE/fztxvSnmU0p6bE+3uL
                                          TLSH:DC936EC5F743D5F1FC4301B11077AB365F32E0B9212ADA42C769BA32EC92952DA1AB5C
                                          File Content Preview:.ELF....................d...4....v......4. ...(.....................0#..0#...............0...........F..,...........Q.td............................U..S.......{/...h........[]...$.............U......=.....t..5....D......D.......u........t....h0...........
                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          04/25/24-14:48:21.378144TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)373342023192.168.2.13203.145.46.240
                                          04/25/24-14:48:40.337993TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)373362023192.168.2.13203.145.46.240
                                          04/25/24-14:48:42.940221TCP2030489ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response202337336203.145.46.240192.168.2.13
                                          04/25/24-14:49:01.934782TCP2030489ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response202337338203.145.46.240192.168.2.13
                                          04/25/24-14:48:25.195752TCP2030489ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response202337334203.145.46.240192.168.2.13
                                          04/25/24-14:49:22.834839TCP2030489ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response202337340203.145.46.240192.168.2.13
                                          04/25/24-14:48:58.001649TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)373382023192.168.2.13203.145.46.240
                                          04/25/24-14:49:18.280942TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)373402023192.168.2.13203.145.46.240
                                          04/25/24-14:50:09.248367TCP2030489ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response202337346203.145.46.240192.168.2.13
                                          04/25/24-14:49:51.601829TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)373462023192.168.2.13203.145.46.240
                                          TimestampSource PortDest PortSource IPDest IP
                                          Apr 25, 2024 14:48:20.008480072 CEST373342023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:48:21.009941101 CEST373342023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:48:21.377975941 CEST202337334203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:48:21.378084898 CEST373342023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:48:21.378144026 CEST373342023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:48:21.728471994 CEST202337334203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:48:25.195751905 CEST202337334203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:48:25.195852041 CEST373342023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:48:34.230196953 CEST202337334203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:48:39.986394882 CEST373362023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:48:40.337876081 CEST202337336203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:48:40.337954044 CEST373362023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:48:40.337992907 CEST373362023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:48:40.689296961 CEST202337336203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:48:42.940221071 CEST202337336203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:48:42.940275908 CEST373362023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:48:50.530213118 CEST202337336203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:48:57.655833006 CEST373382023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:48:58.001491070 CEST202337338203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:48:58.001576900 CEST373382023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:48:58.001648903 CEST373382023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:48:58.346434116 CEST202337338203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:49:01.934782028 CEST202337338203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:49:01.934843063 CEST373382023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:07.816807032 CEST202337338203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:49:17.927994967 CEST373402023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:18.280812025 CEST202337340203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:49:18.280877113 CEST373402023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:18.280941963 CEST373402023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:18.630024910 CEST202337340203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:49:22.109016895 CEST202337340203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:49:22.109081984 CEST373402023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:22.834839106 CEST202337340203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:49:22.834914923 CEST373402023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:27.372447968 CEST202337340203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:49:27.372565985 CEST373402023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:27.721062899 CEST202337340203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:49:32.498447895 CEST410342023192.168.2.1351.79.217.59
                                          Apr 25, 2024 14:49:32.823250055 CEST20234103451.79.217.59192.168.2.13
                                          Apr 25, 2024 14:49:44.169743061 CEST410362023192.168.2.1351.79.217.59
                                          Apr 25, 2024 14:49:44.492706060 CEST20234103651.79.217.59192.168.2.13
                                          Apr 25, 2024 14:49:49.272300005 CEST373462023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:49.622369051 CEST202337346203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:49:49.622457981 CEST373462023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:49.622556925 CEST373462023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:50.549803972 CEST373462023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:51.029120922 CEST202337346203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:49:51.029192924 CEST373462023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:51.432621002 CEST202337346203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:49:51.432734013 CEST373462023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:51.601829052 CEST373462023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:49:51.974392891 CEST202337346203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:50:01.442039013 CEST373462023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:50:01.837162018 CEST202337346203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:50:06.102408886 CEST202337346203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:50:06.102529049 CEST373462023192.168.2.13203.145.46.240
                                          Apr 25, 2024 14:50:09.248367071 CEST202337346203.145.46.240192.168.2.13
                                          Apr 25, 2024 14:50:09.248452902 CEST373462023192.168.2.13203.145.46.240
                                          TimestampSource PortDest PortSource IPDest IP
                                          Apr 25, 2024 14:48:19.897732973 CEST3870253192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:20.008330107 CEST53387028.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:37.230370045 CEST5873953192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:37.340781927 CEST53587398.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:37.340881109 CEST4010853192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:37.451145887 CEST53401088.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:37.451289892 CEST4916953192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:37.561424017 CEST53491698.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:37.561492920 CEST3996753192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:37.671416044 CEST53399678.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:37.671489000 CEST6078753192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:37.781801939 CEST53607878.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:37.781925917 CEST3785153192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:37.891931057 CEST53378518.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:37.891993046 CEST5470153192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:38.002003908 CEST53547018.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:38.002068996 CEST4235153192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:38.112210989 CEST53423518.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:38.112309933 CEST4949853192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:38.222312927 CEST53494988.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:38.222393990 CEST3632253192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:38.332401991 CEST53363228.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:38.332483053 CEST4954853192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:38.442437887 CEST53495488.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:38.442504883 CEST5705253192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:38.552382946 CEST53570528.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:38.552447081 CEST3840853192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:38.662502050 CEST53384088.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:38.662574053 CEST4186853192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:38.772665024 CEST53418688.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:38.772736073 CEST4657053192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:38.884816885 CEST53465708.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:38.884895086 CEST4988653192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:38.994837999 CEST53498868.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:38.994910002 CEST4907553192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:39.104892969 CEST53490758.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:39.104979038 CEST5681653192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:39.215142012 CEST53568168.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:39.215223074 CEST4337153192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:39.325453043 CEST53433718.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:39.325556040 CEST4286053192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:39.435708046 CEST53428608.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:39.435825109 CEST3543453192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:39.545864105 CEST53354348.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:39.545973063 CEST3430153192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:39.655985117 CEST53343018.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:39.656083107 CEST3822953192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:39.766124010 CEST53382298.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:39.766222954 CEST5766253192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:39.876190901 CEST53576628.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:39.876306057 CEST4649953192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:39.986301899 CEST53464998.8.8.8192.168.2.13
                                          Apr 25, 2024 14:48:57.530447006 CEST5372853192.168.2.138.8.8.8
                                          Apr 25, 2024 14:48:57.655659914 CEST53537288.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:17.817089081 CEST5702653192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:17.927840948 CEST53570268.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:32.372761965 CEST3878953192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:32.498311043 CEST53387898.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:41.823612928 CEST4090853192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:41.933867931 CEST53409088.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:41.934022903 CEST3570753192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:42.044028044 CEST53357078.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:42.044174910 CEST4794653192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:42.154282093 CEST53479468.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:42.154390097 CEST3947553192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:42.264548063 CEST53394758.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:42.264720917 CEST5236553192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:42.374731064 CEST53523658.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:42.374862909 CEST4081453192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:42.484844923 CEST53408148.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:42.485014915 CEST5384953192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:42.595024109 CEST53538498.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:42.595180035 CEST4180453192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:42.721218109 CEST53418048.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:42.721337080 CEST5775553192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:42.831470966 CEST53577558.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:42.831593990 CEST4349053192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:42.942405939 CEST53434908.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:42.942603111 CEST3986853192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:43.052593946 CEST53398688.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:43.052715063 CEST4690353192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:43.162760019 CEST53469038.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:43.162923098 CEST4173453192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:43.273040056 CEST53417348.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:43.273161888 CEST5951853192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:43.383236885 CEST53595188.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:43.383352041 CEST4110953192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:43.493411064 CEST53411098.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:43.493532896 CEST3330653192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:43.603461027 CEST53333068.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:43.603599072 CEST4762353192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:43.713640928 CEST53476238.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:43.713994980 CEST5568753192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:43.824032068 CEST53556878.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:43.824151993 CEST3407753192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:43.934072018 CEST53340778.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:43.934154034 CEST4608253192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:44.044171095 CEST53460828.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:44.044287920 CEST3780353192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:44.169606924 CEST53378038.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:47.492974043 CEST5021953192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:47.603120089 CEST53502198.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:47.603286028 CEST3383953192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:47.713320017 CEST53338398.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:47.713427067 CEST3391653192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:47.823337078 CEST53339168.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:47.823442936 CEST3929553192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:47.933446884 CEST53392958.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:47.933547974 CEST5020953192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:48.043741941 CEST53502098.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:48.043901920 CEST3485453192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:48.154164076 CEST53348548.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:48.154294968 CEST3457053192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:48.264379025 CEST53345708.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:48.264499903 CEST6026453192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:48.374677896 CEST53602648.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:48.374778032 CEST5233053192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:48.486161947 CEST53523308.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:48.486269951 CEST4413153192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:48.596366882 CEST53441318.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:48.596483946 CEST5999553192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:48.706646919 CEST53599958.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:48.706765890 CEST4911353192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:48.816706896 CEST53491138.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:48.816787958 CEST4310753192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:48.926770926 CEST53431078.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:48.926873922 CEST6041953192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:49.037139893 CEST53604198.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:49.037230015 CEST4629853192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:49.147176027 CEST53462988.8.8.8192.168.2.13
                                          Apr 25, 2024 14:49:49.147345066 CEST4043553192.168.2.138.8.8.8
                                          Apr 25, 2024 14:49:49.272175074 CEST53404358.8.8.8192.168.2.13
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Apr 25, 2024 14:48:19.897732973 CEST192.168.2.138.8.8.80xa0Standard query (0)net-killer.ooguy.comA (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:48:37.230370045 CEST192.168.2.138.8.8.80x8ea2Standard query (0)aomacamada.ddns.net. [malformed]256293false
                                          Apr 25, 2024 14:48:37.340881109 CEST192.168.2.138.8.8.80x8ea2Standard query (0)aomacamada.ddns.net. [malformed]256293false
                                          Apr 25, 2024 14:48:37.451289892 CEST192.168.2.138.8.8.80x8ea2Standard query (0)aomacamada.ddns.net. [malformed]256293false
                                          Apr 25, 2024 14:48:37.561492920 CEST192.168.2.138.8.8.80x8ea2Standard query (0)aomacamada.ddns.net. [malformed]256293false
                                          Apr 25, 2024 14:48:37.671489000 CEST192.168.2.138.8.8.80x8ea2Standard query (0)aomacamada.ddns.net. [malformed]256293false
                                          Apr 25, 2024 14:48:37.781925917 CEST192.168.2.138.8.8.80x1851Standard query (0)net-killer.ddns.net. [malformed]256293false
                                          Apr 25, 2024 14:48:37.891993046 CEST192.168.2.138.8.8.80x1851Standard query (0)net-killer.ddns.net. [malformed]256294false
                                          Apr 25, 2024 14:48:38.002068996 CEST192.168.2.138.8.8.80x1851Standard query (0)net-killer.ddns.net. [malformed]256294false
                                          Apr 25, 2024 14:48:38.112309933 CEST192.168.2.138.8.8.80x1851Standard query (0)net-killer.ddns.net. [malformed]256294false
                                          Apr 25, 2024 14:48:38.222393990 CEST192.168.2.138.8.8.80x1851Standard query (0)net-killer.ddns.net. [malformed]256294false
                                          Apr 25, 2024 14:48:38.332483053 CEST192.168.2.138.8.8.80xc30eStandard query (0)Vet-killer.io.v. [malformed]256294false
                                          Apr 25, 2024 14:48:38.442504883 CEST192.168.2.138.8.8.80xc30eStandard query (0)Vet-killer.io.v. [malformed]256294false
                                          Apr 25, 2024 14:48:38.552447081 CEST192.168.2.138.8.8.80xc30eStandard query (0)Vet-killer.io.v. [malformed]256294false
                                          Apr 25, 2024 14:48:38.662574053 CEST192.168.2.138.8.8.80xc30eStandard query (0)Vet-killer.io.v. [malformed]256294false
                                          Apr 25, 2024 14:48:38.772736073 CEST192.168.2.138.8.8.80xc30eStandard query (0)Vet-killer.io.v. [malformed]256294false
                                          Apr 25, 2024 14:48:38.884895086 CEST192.168.2.138.8.8.80x38deStandard query (0)net-killer.ooguy.com. [malformed]256294false
                                          Apr 25, 2024 14:48:38.994910002 CEST192.168.2.138.8.8.80x38deStandard query (0)net-killer.ooguy.com. [malformed]256295false
                                          Apr 25, 2024 14:48:39.104979038 CEST192.168.2.138.8.8.80x38deStandard query (0)net-killer.ooguy.com. [malformed]256295false
                                          Apr 25, 2024 14:48:39.215223074 CEST192.168.2.138.8.8.80x38deStandard query (0)net-killer.ooguy.com. [malformed]256295false
                                          Apr 25, 2024 14:48:39.325556040 CEST192.168.2.138.8.8.80x38deStandard query (0)net-killer.ooguy.com. [malformed]256295false
                                          Apr 25, 2024 14:48:39.435825109 CEST192.168.2.138.8.8.80xe9dStandard query (0)Vet-killer.io.v. [malformed]256295false
                                          Apr 25, 2024 14:48:39.545973063 CEST192.168.2.138.8.8.80xe9dStandard query (0)Vet-killer.io.v. [malformed]256295false
                                          Apr 25, 2024 14:48:39.656083107 CEST192.168.2.138.8.8.80xe9dStandard query (0)Vet-killer.io.v. [malformed]256295false
                                          Apr 25, 2024 14:48:39.766222954 CEST192.168.2.138.8.8.80xe9dStandard query (0)Vet-killer.io.v. [malformed]256295false
                                          Apr 25, 2024 14:48:39.876306057 CEST192.168.2.138.8.8.80xe9dStandard query (0)Vet-killer.io.v. [malformed]256295false
                                          Apr 25, 2024 14:48:57.530447006 CEST192.168.2.138.8.8.80x2564Standard query (0)aomacamada.ddns.netA (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:49:17.817089081 CEST192.168.2.138.8.8.80x7d13Standard query (0)net-killer.ddns.netA (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:49:32.372761965 CEST192.168.2.138.8.8.80xbf00Standard query (0)domain-botnet.servehttp.comA (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:49:41.823612928 CEST192.168.2.138.8.8.80x8e40Standard query (0)aomacamada.ddns.net. [malformed]256357false
                                          Apr 25, 2024 14:49:41.934022903 CEST192.168.2.138.8.8.80x8e40Standard query (0)aomacamada.ddns.net. [malformed]256358false
                                          Apr 25, 2024 14:49:42.044174910 CEST192.168.2.138.8.8.80x8e40Standard query (0)aomacamada.ddns.net. [malformed]256358false
                                          Apr 25, 2024 14:49:42.154390097 CEST192.168.2.138.8.8.80x8e40Standard query (0)aomacamada.ddns.net. [malformed]256358false
                                          Apr 25, 2024 14:49:42.264720917 CEST192.168.2.138.8.8.80x8e40Standard query (0)aomacamada.ddns.net. [malformed]256358false
                                          Apr 25, 2024 14:49:42.374862909 CEST192.168.2.138.8.8.80x82f1Standard query (0)net-killer.ddns.net. [malformed]256358false
                                          Apr 25, 2024 14:49:42.485014915 CEST192.168.2.138.8.8.80x82f1Standard query (0)net-killer.ddns.net. [malformed]256358false
                                          Apr 25, 2024 14:49:42.595180035 CEST192.168.2.138.8.8.80x82f1Standard query (0)net-killer.ddns.net. [malformed]256358false
                                          Apr 25, 2024 14:49:42.721337080 CEST192.168.2.138.8.8.80x82f1Standard query (0)net-killer.ddns.net. [malformed]256358false
                                          Apr 25, 2024 14:49:42.831593990 CEST192.168.2.138.8.8.80x82f1Standard query (0)net-killer.ddns.net. [malformed]256358false
                                          Apr 25, 2024 14:49:42.942603111 CEST192.168.2.138.8.8.80x9d62Standard query (0)net-killer.ddns.net. [malformed]256359false
                                          Apr 25, 2024 14:49:43.052715063 CEST192.168.2.138.8.8.80x9d62Standard query (0)net-killer.ddns.net. [malformed]256359false
                                          Apr 25, 2024 14:49:43.162923098 CEST192.168.2.138.8.8.80x9d62Standard query (0)net-killer.ddns.net. [malformed]256359false
                                          Apr 25, 2024 14:49:43.273161888 CEST192.168.2.138.8.8.80x9d62Standard query (0)net-killer.ddns.net. [malformed]256359false
                                          Apr 25, 2024 14:49:43.383352041 CEST192.168.2.138.8.8.80x9d62Standard query (0)net-killer.ddns.net. [malformed]256359false
                                          Apr 25, 2024 14:49:43.493532896 CEST192.168.2.138.8.8.80xf572Standard query (0)Vet-killer.io.v. [malformed]256359false
                                          Apr 25, 2024 14:49:43.603599072 CEST192.168.2.138.8.8.80xf572Standard query (0)Vet-killer.io.v. [malformed]256359false
                                          Apr 25, 2024 14:49:43.713994980 CEST192.168.2.138.8.8.80xf572Standard query (0)Vet-killer.io.v. [malformed]256359false
                                          Apr 25, 2024 14:49:43.824151993 CEST192.168.2.138.8.8.80xf572Standard query (0)Vet-killer.io.v. [malformed]256359false
                                          Apr 25, 2024 14:49:43.934154034 CEST192.168.2.138.8.8.80xf572Standard query (0)Vet-killer.io.v. [malformed]256360false
                                          Apr 25, 2024 14:49:44.044287920 CEST192.168.2.138.8.8.80xada6Standard query (0)domain-botnet.servehttp.comA (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:49:47.492974043 CEST192.168.2.138.8.8.80xa18Standard query (0)net-killer.ooguy.com. [malformed]256363false
                                          Apr 25, 2024 14:49:47.603286028 CEST192.168.2.138.8.8.80xa18Standard query (0)net-killer.ooguy.com. [malformed]256363false
                                          Apr 25, 2024 14:49:47.713427067 CEST192.168.2.138.8.8.80xa18Standard query (0)net-killer.ooguy.com. [malformed]256363false
                                          Apr 25, 2024 14:49:47.823442936 CEST192.168.2.138.8.8.80xa18Standard query (0)net-killer.ooguy.com. [malformed]256363false
                                          Apr 25, 2024 14:49:47.933547974 CEST192.168.2.138.8.8.80xa18Standard query (0)net-killer.ooguy.com. [malformed]256364false
                                          Apr 25, 2024 14:49:48.043901920 CEST192.168.2.138.8.8.80x4722Standard query (0)aomacamada.ddns.net. [malformed]256364false
                                          Apr 25, 2024 14:49:48.154294968 CEST192.168.2.138.8.8.80x4722Standard query (0)aomacamada.ddns.net. [malformed]256364false
                                          Apr 25, 2024 14:49:48.264499903 CEST192.168.2.138.8.8.80x4722Standard query (0)aomacamada.ddns.net. [malformed]256364false
                                          Apr 25, 2024 14:49:48.374778032 CEST192.168.2.138.8.8.80x4722Standard query (0)aomacamada.ddns.net. [malformed]256364false
                                          Apr 25, 2024 14:49:48.486269951 CEST192.168.2.138.8.8.80x4722Standard query (0)aomacamada.ddns.net. [malformed]256364false
                                          Apr 25, 2024 14:49:48.596483946 CEST192.168.2.138.8.8.80x5299Standard query (0)Vet-killer.io.v. [malformed]256364false
                                          Apr 25, 2024 14:49:48.706765890 CEST192.168.2.138.8.8.80x5299Standard query (0)Vet-killer.io.v. [malformed]256364false
                                          Apr 25, 2024 14:49:48.816787958 CEST192.168.2.138.8.8.80x5299Standard query (0)Vet-killer.io.v. [malformed]256364false
                                          Apr 25, 2024 14:49:48.926873922 CEST192.168.2.138.8.8.80x5299Standard query (0)Vet-killer.io.v. [malformed]256365false
                                          Apr 25, 2024 14:49:49.037230015 CEST192.168.2.138.8.8.80x5299Standard query (0)Vet-killer.io.v. [malformed]256365false
                                          Apr 25, 2024 14:49:49.147345066 CEST192.168.2.138.8.8.80xac80Standard query (0)aomacamada.ddns.netA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Apr 25, 2024 14:48:20.008330107 CEST8.8.8.8192.168.2.130xa0No error (0)net-killer.ooguy.com203.145.46.240A (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:48:57.655659914 CEST8.8.8.8192.168.2.130x2564No error (0)aomacamada.ddns.net203.145.46.240A (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:49:17.927840948 CEST8.8.8.8192.168.2.130x7d13No error (0)net-killer.ddns.net203.145.46.240A (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:49:32.498311043 CEST8.8.8.8192.168.2.130xbf00No error (0)domain-botnet.servehttp.com51.79.217.59A (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:49:44.169606924 CEST8.8.8.8192.168.2.130xada6No error (0)domain-botnet.servehttp.com51.79.217.59A (IP address)IN (0x0001)false
                                          Apr 25, 2024 14:49:49.272175074 CEST8.8.8.8192.168.2.130xac80No error (0)aomacamada.ddns.net203.145.46.240A (IP address)IN (0x0001)false

                                          System Behavior

                                          Start time (UTC):12:48:19
                                          Start date (UTC):25/04/2024
                                          Path:/tmp/ij5Z8oy5e3.elf
                                          Arguments:/tmp/ij5Z8oy5e3.elf
                                          File size:96388 bytes
                                          MD5 hash:d13b153834dce9ac002fc83652d65fad

                                          Start time (UTC):12:48:19
                                          Start date (UTC):25/04/2024
                                          Path:/tmp/ij5Z8oy5e3.elf
                                          Arguments:-
                                          File size:96388 bytes
                                          MD5 hash:d13b153834dce9ac002fc83652d65fad

                                          Start time (UTC):12:48:19
                                          Start date (UTC):25/04/2024
                                          Path:/tmp/ij5Z8oy5e3.elf
                                          Arguments:-
                                          File size:96388 bytes
                                          MD5 hash:d13b153834dce9ac002fc83652d65fad

                                          Start time (UTC):12:48:19
                                          Start date (UTC):25/04/2024
                                          Path:/tmp/ij5Z8oy5e3.elf
                                          Arguments:-
                                          File size:96388 bytes
                                          MD5 hash:d13b153834dce9ac002fc83652d65fad
                                          Start time (UTC):12:48:20
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfce4-session
                                          Arguments:-
                                          File size:264752 bytes
                                          MD5 hash:648919f03ad356720c8c27f5aaaf75d1

                                          Start time (UTC):12:48:20
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfdesktop
                                          Arguments:xfdesktop --display :1.0 --sm-client-id 260d40b3c-9c6a-4cb1-bbe4-3557725aa528
                                          File size:473520 bytes
                                          MD5 hash:dfb13e1581f80065dcea16f2476f16f2

                                          Start time (UTC):12:48:20
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfce4-session
                                          Arguments:-
                                          File size:264752 bytes
                                          MD5 hash:648919f03ad356720c8c27f5aaaf75d1

                                          Start time (UTC):12:48:20
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfdesktop
                                          Arguments:xfdesktop --display :1.0 --sm-client-id 260d40b3c-9c6a-4cb1-bbe4-3557725aa528
                                          File size:473520 bytes
                                          MD5 hash:dfb13e1581f80065dcea16f2476f16f2

                                          Start time (UTC):12:48:23
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfce4-session
                                          Arguments:-
                                          File size:264752 bytes
                                          MD5 hash:648919f03ad356720c8c27f5aaaf75d1

                                          Start time (UTC):12:48:23
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfdesktop
                                          Arguments:xfdesktop --display :1.0 --sm-client-id 260d40b3c-9c6a-4cb1-bbe4-3557725aa528
                                          File size:473520 bytes
                                          MD5 hash:dfb13e1581f80065dcea16f2476f16f2

                                          Start time (UTC):12:48:24
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfce4-session
                                          Arguments:-
                                          File size:264752 bytes
                                          MD5 hash:648919f03ad356720c8c27f5aaaf75d1

                                          Start time (UTC):12:48:24
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfdesktop
                                          Arguments:xfdesktop --display :1.0 --sm-client-id 260d40b3c-9c6a-4cb1-bbe4-3557725aa528
                                          File size:473520 bytes
                                          MD5 hash:dfb13e1581f80065dcea16f2476f16f2

                                          Start time (UTC):12:48:25
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfce4-session
                                          Arguments:-
                                          File size:264752 bytes
                                          MD5 hash:648919f03ad356720c8c27f5aaaf75d1

                                          Start time (UTC):12:48:25
                                          Start date (UTC):25/04/2024
                                          Path:/usr/bin/xfdesktop
                                          Arguments:xfdesktop --display :1.0 --sm-client-id 260d40b3c-9c6a-4cb1-bbe4-3557725aa528
                                          File size:473520 bytes
                                          MD5 hash:dfb13e1581f80065dcea16f2476f16f2