Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
logrotate

Overview

General Information

Sample name:logrotate
Analysis ID:1628361
MD5:e70e9d3525f36a9ccbf2a37f8a773015
SHA1:815bc1a79440cdc4a7e1d876ff2dc7bc4f53d25e
SHA256:3eb47033cd5399aee33048d6ded163105158882b2483884bc949697f3bfd0d95
Infos:

Detection

Xmrig
Score:80
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
Detected Stratum mining protocol
Found strings related to Crypto-Mining
Tries to load the MSR kernel module used for reading/writing to CPUs model specific register
Writes to CPU model specific registers (MSR) (e.g. miners improve performance by disabling HW prefetcher)
Creates hidden files and/or directories
Executes commands using a shell command-line interpreter
Executes the "modprobe" command used for loading kernel modules
Reads CPU information from /proc indicative of miner or evasive malware
Reads CPU information from /sys indicative of miner or evasive malware
Reads system information from the proc file system
Sample has stripped symbol table
Suricata IDS alerts with low severity for network traffic
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1628361
Start date and time:2025-03-03 19:18:16 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 12s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 16.04 x64 (Kernel 4.4.0-116, Firefox 88.0, Document Viewer 3.18.2, LibreOffice 5.1.6.2, OpenJDK 1.8.0_171)
Analysis Mode:default
Sample name:logrotate
Detection:MAL
Classification:mal80.mine.lin@0/1@0/0
  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Command:/tmp/logrotate
PID:4710
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu1
  • logrotate (PID: 4710, Parent: 4612, MD5: e70e9d3525f36a9ccbf2a37f8a773015) Arguments: /tmp/logrotate
    • logrotate New Fork (PID: 4717, Parent: 4710)
      • sh (PID: 4725, Parent: 4717, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: sh -c "/sbin/modprobe msr allow_writes=on > /dev/null 2>&1"
        • sh New Fork (PID: 4726, Parent: 4725)
        • modprobe (PID: 4726, Parent: 4725, MD5: unknown) Arguments: /sbin/modprobe msr allow_writes=on
  • cleanup
SourceRuleDescriptionAuthorStrings
logrotateJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    logrotateLinux_Trojan_Pornoasset_927f314funknownunknown
    • 0x13c518:$a: C3 D3 CB D3 C3 48 31 C3 48 0F AF F0 48 0F AF F0 48 0F AF F0 48
    logrotateminer_lin_xmrig_stringsDetects XMRig ELFSekoia.io
    • 0x537fcc:$: XMRig
    • 0x538702:$: IP Address currently banned
    • 0x538733:$: rigid
    • 0x53905c:$: pool address
    • 0x539069:$: ping time
    • 0x539073:$: connection time
    • 0x5a3906:$: connection time
    • 0x539558:$: socks5://
    • 0x539568:$: stratum+ssl://
    • 0x54366d:$: stratum+ssl://
    • 0x539578:$: stratum+tcp://
    SourceRuleDescriptionAuthorStrings
    sslproxydump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      SourceRuleDescriptionAuthorStrings
      4710.1.0000000000401000.0000000000935000.r-x.sdmpLinux_Trojan_Pornoasset_927f314funknownunknown
      • 0x13b518:$a: C3 D3 CB D3 C3 48 31 C3 48 0F AF F0 48 0F AF F0 48 0F AF F0 48
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-03-03T19:18:54.135750+010028269302Crypto Currency Mining Activity Detected192.168.2.2041548185.196.8.41443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: logrotateVirustotal: Detection: 45%Perma Link

      Bitcoin Miner

      barindex
      Source: Yara matchFile source: logrotate, type: SAMPLE
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: global trafficTCP traffic: 192.168.2.20:41548 -> 185.196.8.41:443 payload: data raw: 7b 22 69 64 22 3a 31 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6c 6f 67 69 6e 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 6c 6f 67 69 6e 22 3a 22 78 22 2c 22 70 61 73 73 22 3a 22 78 22 2c 22 61 67 65 6e 74 22 3a 22 58 4d 52 69 67 2f 36 2e 32 32 2e 32 20 28 4c 69 6e 75 78 20 78 38 36 5f 36 34 29 20 6c 69 62 75 76 2f 31 2e 34 39 2e 32 20 67 63 63 2f 31 30 2e 32 2e 31 22 2c 22 61 6c 67 6f 22 3a 5b 22 63 6e 2f 31 22 2c 22 63 6e 2f 32 22 2c 22 63 6e 2f 72 22 2c 22 63 6e 2f 66 61 73 74 22 2c 22 63 6e 2f 68 61 6c 66 22 2c 22 63 6e 2f 78 61 6f 22 2c 22 63 6e 2f 72 74 6f 22 2c 22 63 6e 2f 72 77 7a 22 2c 22 63 6e 2f 7a 6c 73 22 2c 22 63 6e 2f 64 6f 75 62 6c 65 22 2c 22 63 6e 2f 63 63 78 22 2c 22 72 78 2f 30 22 2c 22 72 78 2f 77 6f data ascii: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"x","pass":"x","agent":"xmrig/6.22.2 (linux x86_64) libuv/1.49.2 gcc/10.2.1","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","rx/0","rx/wo
      Source: logrotateString found in binary or memory: stratum+ssl://
      Source: logrotateString found in binary or memory: cryptonight/0
      Source: logrotateString found in binary or memory: stratum+tcp://
      Source: logrotateString found in binary or memory: XMRig 6.22.2
      Source: /bin/sh (PID: 4726)Modprobe: /sbin/modprobe -> /sbin/modprobe msr allow_writes=onJump to behavior
      Source: /tmp/logrotate (PID: 4717)MSR open for writing: /dev/cpu/0/msrJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from proc file: /proc/cpuinfoJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/topology/thread_siblingsJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/topology/core_idJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/topology/core_siblingsJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/topology/physical_package_idJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/shared_cpu_mapJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/levelJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/typeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/sizeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/coherency_line_sizeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/number_of_setsJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/physical_line_partitionJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index1/shared_cpu_mapJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index1/levelJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index1/typeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/shared_cpu_mapJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/levelJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/typeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/sizeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/coherency_line_sizeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/number_of_setsJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/physical_line_partitionJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/shared_cpu_mapJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/levelJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/typeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/sizeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/coherency_line_sizeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/number_of_setsJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/physical_line_partitionJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/possibleJump to behavior
      Source: Network trafficSuricata IDS: 2826930 - Severity 2 - ETPRO COINMINER XMR CoinMiner Usage : 192.168.2.20:41548 -> 185.196.8.41:443
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: unknownTCP traffic detected without corresponding DNS query: 185.196.8.41
      Source: logrotateString found in binary or memory: http://www.debian.org/Bugs/
      Source: logrotateString found in binary or memory: https://gcc.gnu.org/bugsNSt7__cxx1115basic_stringbufIcSt11char_traitsIcESaIcEEE
      Source: logrotateString found in binary or memory: https://gcc.gnu.org/bugsNSt7__cxx1115basic_stringbufIcSt11char_traitsIcESaIcEEENSt7__cxx1119basic_is
      Source: unknownNetwork traffic detected: HTTP traffic on port 41548 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 41548

      System Summary

      barindex
      Source: logrotate, type: SAMPLEMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
      Source: logrotate, type: SAMPLEMatched rule: Detects XMRig ELF Author: Sekoia.io
      Source: 4710.1.0000000000401000.0000000000935000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: logrotate, type: SAMPLEMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
      Source: logrotate, type: SAMPLEMatched rule: miner_lin_xmrig_strings author = Sekoia.io, description = Detects XMRig ELF, creation_date = 2022-09-08, classification = TLP:CLEAR, version = 1.0, modification_date = 2024-01-04, id = 2f99020b-424c-4433-860c-5e9ab4e1f1de
      Source: 4710.1.0000000000401000.0000000000935000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
      Source: classification engineClassification label: mal80.mine.lin@0/1@0/0
      Source: /tmp/logrotate (PID: 4710)Directory: /home/james/.xmrig.jsonJump to behavior
      Source: /tmp/logrotate (PID: 4725)Shell command executed: sh -c "/sbin/modprobe msr allow_writes=on > /dev/null 2>&1"Jump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads from proc file: /proc/cpuinfoJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads from proc file: /proc/meminfoJump to behavior
      Source: /tmp/logrotate (PID: 4717)Reads from proc file: /proc/meminfoJump to behavior
      Source: /bin/sh (PID: 4726)Modprobe: /sbin/modprobe -> /sbin/modprobe msr allow_writes=onJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from proc file: /proc/cpuinfoJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/topology/thread_siblingsJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/topology/core_idJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/topology/core_siblingsJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/topology/physical_package_idJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/shared_cpu_mapJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/levelJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/typeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/sizeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/coherency_line_sizeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/number_of_setsJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index0/physical_line_partitionJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index1/shared_cpu_mapJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index1/levelJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index1/typeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/shared_cpu_mapJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/levelJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/typeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/sizeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/coherency_line_sizeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/number_of_setsJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index2/physical_line_partitionJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/shared_cpu_mapJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/levelJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/typeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/sizeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/coherency_line_sizeJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/number_of_setsJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/cpu0/cache/index3/physical_line_partitionJump to behavior
      Source: /tmp/logrotate (PID: 4710)Reads CPU info from /sys: /sys/devices/system/cpu/possibleJump to behavior
      Source: /tmp/logrotate (PID: 4710)Queries kernel information via 'uname': Jump to behavior
      Source: /sbin/modprobe (PID: 4726)Queries kernel information via 'uname': Jump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information1
      Scripting
      Valid AccountsWindows Management Instrumentation1
      Kernel Modules and Extensions
      1
      Kernel Modules and Extensions
      1
      Hidden Files and Directories
      OS Credential Dumping1
      Security Software Discovery
      Remote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      Scripting
      Boot or Logon Initialization ScriptsRootkitLSASS Memory23
      System Information Discovery
      Remote Desktop ProtocolData from Removable Media1
      Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      SourceDetectionScannerLabelLink
      logrotate45%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.debian.org/Bugs/logrotatefalse
        high
        https://gcc.gnu.org/bugsNSt7__cxx1115basic_stringbufIcSt11char_traitsIcESaIcEEENSt7__cxx1119basic_islogrotatefalse
          high
          https://gcc.gnu.org/bugsNSt7__cxx1115basic_stringbufIcSt11char_traitsIcESaIcEEElogrotatefalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            185.196.8.41
            unknownSwitzerland
            34888SIMPLECARRER2ITtrue
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            185.196.8.41logrotate_malware.elfGet hashmaliciousXmrigBrowse
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              SIMPLECARRER2IThttp://analysiscache.comGet hashmaliciousUnknownBrowse
              • 185.208.158.121
              cred.dllGet hashmaliciousAmadeyBrowse
              • 185.196.8.37
              clip64.dllGet hashmaliciousAmadeyBrowse
              • 185.196.8.37
              cred64.dll.dllGet hashmaliciousAmadeyBrowse
              • 185.196.8.37
              cpainject.txt.ps1Get hashmaliciousPureLog Stealer, RHADAMANTHYS, zgRATBrowse
              • 185.208.159.170
              Th2M2e7ZfY.exeGet hashmaliciousQuasarBrowse
              • 185.208.159.150
              https://steamescommnunity.com/s/10429109537Get hashmaliciousUnknownBrowse
              • 185.208.158.242
              https://steamecomrmunity.com/s/10423910953Get hashmaliciousUnknownBrowse
              • 185.208.158.242
              http://account.turnkeycashsite.com/Get hashmaliciousUnknownBrowse
              • 185.208.159.7
              BUDDA.exeGet hashmaliciousUnknownBrowse
              • 185.196.8.253
              No context
              No context
              Process:/tmp/logrotate
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):3
              Entropy (8bit):1.584962500721156
              Encrypted:false
              SSDEEP:3:Odn:Od
              MD5:76DC611D6EBAAFC66CC0879C71B5DB5C
              SHA1:B4182BFF4B3CF75F9E54F4990F9BD153C0C2973C
              SHA-256:2747B7C718564BA5F066F0523B03E17F6A496B06851333D2D59AB6D863225848
              SHA-512:E2BC8CA53E630757EF4A3E8F3D0FC48AAC10A66DBE6D14D759D00C21263F4C0623F6841DC3995081F97EFF9641EA9BE42C9219F66E6C5B9EA9EFFA1C8450C3FB
              Malicious:false
              Reputation:low
              Preview:128
              File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=f6bc02717be53be95e2a8de774c3dd0fafa1f4a5, for GNU/Linux 3.2.0, stripped
              Entropy (8bit):6.351905474305259
              TrID:
              • ELF Executable and Linkable format (Linux) (4029/14) 49.77%
              • ELF Executable and Linkable format (generic) (4004/1) 49.46%
              • Lumena CEL bitmap (63/63) 0.78%
              File name:logrotate
              File size:7'447'240 bytes
              MD5:e70e9d3525f36a9ccbf2a37f8a773015
              SHA1:815bc1a79440cdc4a7e1d876ff2dc7bc4f53d25e
              SHA256:3eb47033cd5399aee33048d6ded163105158882b2483884bc949697f3bfd0d95
              SHA512:7ca6d1c0045292f4c50dc66bf62ffc111525cd36897c1448caea079e9b4922418f2dda30d42588868f7889fd69f11db1a8265d492626a1a6cc288fe93578bb02
              SSDEEP:196608:uJy1VOJo4/kKCPvH4zzzzzzzzzzz/zzzzzzzzzzzwzz6/zzz3HLSW:OY4/khP/4zzzzzzzzzzz/zzzzzzzzzzF
              TLSH:BB764B1AB6A358BDC1A6C430876FD663AD34B85542217D7B3184EA302F67E305B1EF72
              File Content Preview:.ELF..............>.....p.@.....@.......H.q.........@.8...@.......................@.......@.....P.......P.................................@.......@......?S......?S......................PS......P.......P.......Y.......Y........................j............

              ELF header

              Class:ELF64
              Data:2's complement, little endian
              Version:1 (current)
              Machine:Advanced Micro Devices X86-64
              Version Number:0x1
              Type:EXEC (Executable file)
              OS/ABI:UNIX - System V
              ABI Version:0
              Entry Point Address:0x409870
              Flags:0x0
              ELF Header Size:64
              Program Header Offset:64
              Program Header Size:56
              Number of Program Headers:8
              Section Header Offset:7445320
              Section Header Size:64
              Number of Section Headers:30
              Header String Table Index:29
              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
              NULL0x00x00x00x00x0000
              .note.gnu.build-idNOTE0x4002000x2000x240x00x2A004
              .note.ABI-tagNOTE0x4002240x2240x200x00x2A004
              .rela.pltRELA0x4002480x2480x4080x180x42AI0208
              .initPROGBITS0x4010000x10000x170x00x6AX004
              .pltPROGBITS0x4010180x10180x1580x00x6AX008
              .textPROGBITS0x4011800x11800x5330120x00x6AX0064
              __libc_freeres_fnPROGBITS0x9341a00x5341a00xdf80x00x6AX0016
              .finiPROGBITS0x934f980x534f980x90x00x6AX004
              .rodataPROGBITS0x9350000x5350000xa0d3c0x00x2A0064
              .stapsdt.basePROGBITS0x9d5d3c0x5d5d3c0x10x00x2A001
              .eh_framePROGBITS0x9d5d400x5d5d400xcc0d00x00x2A008
              .gcc_except_tablePROGBITS0xaa1e100x6a1e100x8bc40x00x2A004
              .tdataPROGBITS0xaabff00x6aaff00x700x00x403WAT0016
              .tbssNOBITS0xaac0600x6ab0600x700x00x403WAT0016
              .preinit_arrayPREINIT_ARRAY0xaac0600x6ab0600x80x80x3WA008
              .init_arrayINIT_ARRAY0xaac0680x6ab0680x1400x80x3WA008
              .fini_arrayFINI_ARRAY0xaac1a80x6ab1a80x180x80x3WA008
              .data.rel.roPROGBITS0xaac1c00x6ab1c00x64c240x00x3WA0032
              .gotPROGBITS0xb10de80x70fde80x2080x00x3WA008
              .got.pltPROGBITS0xb110000x7100000x1700x80x3WA008
              .dataPROGBITS0xb111800x7101800x8dcc0x00x3WA0032
              __libc_subfreeresPROGBITS0xb19f500x718f500xa80x00x3WA008
              __libc_IO_vtablesPROGBITS0xb1a0000x7190000x8e80x00x3WA0032
              __libc_atexitPROGBITS0xb1a8e80x7198e80x80x00x3WA008
              .bssNOBITS0xb1a9000x7198f00x9c2800x00x3WA0064
              __libc_freeres_ptrsNOBITS0xbb6b800x7198f00x480x00x3WA008
              .commentPROGBITS0x00x7198f00x270x10x30MS001
              .note.stapsdtNOTE0x00x7199180xe80x00x0004
              .shstrtabSTRTAB0x00x719a000x1430x00x0001
              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
              LOAD0x00x4000000x4000000x6500x6502.44880x4R 0x1000.note.gnu.build-id .note.ABI-tag .rela.plt
              LOAD0x10000x4010000x4010000x533fa10x533fa16.40180x5R E0x1000.init .plt .text __libc_freeres_fn .fini
              LOAD0x5350000x9350000x9350000x1759d40x1759d46.09480x4R 0x1000.rodata .stapsdt.base .eh_frame .gcc_except_table
              LOAD0x6aaff00xaabff00xaabff00x6e9000x10abd82.46750x6RW 0x1000.tdata .tbss .preinit_array .init_array .fini_array .data.rel.ro .got .got.plt .data __libc_subfreeres __libc_IO_vtables __libc_atexit .bss __libc_freeres_ptrs
              NOTE0x2000x4002000x4002000x440x443.36730x4R 0x4.note.gnu.build-id .note.ABI-tag
              TLS0x6aaff00xaabff00xaabff00x700xe02.12570x4R 0x10.tdata .tbss
              GNU_STACK0x00x00x00x00x00.00000x6RW 0x10
              GNU_RELRO0x6aaff00xaabff00xaabff00x650100x650102.41170x4R 0x1.tdata .tbss .preinit_array .init_array .fini_array .data.rel.ro .got
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2025-03-03T19:18:54.135750+01002826930ETPRO COINMINER XMR CoinMiner Usage2192.168.2.2041548185.196.8.41443TCP
              TimestampSource PortDest PortSource IPDest IP
              Mar 3, 2025 19:18:53.434576035 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:18:53.434623003 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:18:53.434674025 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:18:53.435019016 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:18:53.435034990 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:18:54.129514933 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:18:54.129740000 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:18:54.130919933 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:18:54.130929947 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:18:54.133104086 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:18:54.135514021 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:18:54.135623932 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:18:54.174026012 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:18:54.174040079 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:18:54.174092054 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:18:54.449481010 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:18:54.449569941 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:19:00.186218977 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:19:00.186388016 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:19:07.907812119 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:19:07.907897949 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:20:07.950009108 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:20:07.950028896 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:20:08.397638083 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:20:08.439374924 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:20:08.605133057 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:20:08.605331898 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:21:08.685856104 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:21:08.685883999 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:21:09.407331944 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:21:09.407361984 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:21:09.609901905 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:21:09.609956026 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:21:25.341289043 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:21:25.341485977 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:21:35.598195076 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:21:35.598381996 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:21:45.722121000 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:21:45.722313881 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:21:55.942827940 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:21:55.943028927 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:22:06.044003963 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:22:06.044209003 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:22:16.158124924 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:22:16.158191919 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:22:26.130011082 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:22:26.130105019 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:22:36.197283030 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:22:36.197518110 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:22:46.219875097 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:22:46.220004082 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:22:56.277545929 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:22:56.277654886 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:23:12.538456917 CET44341548185.196.8.41192.168.2.20
              Mar 3, 2025 19:23:12.538849115 CET41548443192.168.2.20185.196.8.41
              Mar 3, 2025 19:23:12.538880110 CET44341548185.196.8.41192.168.2.20
              Session IDSource IPSource PortDestination IPDestination Port
              0192.168.2.2041548185.196.8.41443
              TimestampBytes transferredDirectionData
              2025-03-03 18:18:54 UTC350OUTData Raw: 7b 22 69 64 22 3a 31 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6c 6f 67 69 6e 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 6c 6f 67 69 6e 22 3a 22 78 22 2c 22 70 61 73 73 22 3a 22 78 22 2c 22 61 67 65 6e 74 22 3a 22 58 4d 52 69 67 2f 36 2e 32 32 2e 32 20 28 4c 69 6e 75 78 20 78 38 36 5f 36 34 29 20 6c 69 62 75 76 2f 31 2e 34 39 2e 32 20 67 63 63 2f 31 30 2e 32 2e 31 22 2c 22 61 6c 67 6f 22 3a 5b 22 63 6e 2f 31 22 2c 22 63 6e 2f 32 22 2c 22 63 6e 2f 72 22 2c 22 63 6e 2f 66 61 73 74 22 2c 22 63 6e 2f 68 61 6c 66 22 2c 22 63 6e 2f 78 61 6f 22 2c 22 63 6e 2f 72 74 6f 22 2c 22 63 6e 2f 72 77 7a 22 2c 22 63 6e 2f 7a 6c 73 22 2c 22 63 6e 2f 64 6f 75 62 6c 65 22 2c 22 63 6e 2f 63 63 78 22 2c 22 72 78 2f 30 22 2c 22 72 78 2f 77 6f
              Data Ascii: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"x","pass":"x","agent":"XMRig/6.22.2 (Linux x86_64) libuv/1.49.2 gcc/10.2.1","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","rx/0","rx/wo
              2025-03-03 18:18:54 UTC491INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 69 64 22 3a 31 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 69 64 22 3a 22 61 34 38 39 38 31 38 64 31 61 65 65 64 34 39 31 22 2c 22 6a 6f 62 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 38 39 65 35 39 37 62 65 30 36 64 61 64 30 63 33 65 33 64 32 38 62 31 65 61 61 63 31 62 38 37 63 39 36 64 33 66 31 64 35 66 62 34 35 65 64 37 33 38 38 39 64 35 32 34 66 32 64 33 31 65 33 35 32 30 66 62 65 39 32 64 36 63 62 30 30 30 30 30 30 37 66 32 39 30 33 39 31 32 63 39 38 64 62 32 36 36 62 38 64 61 38 34 31 64 62 66 37 32 61 33 62 61 38 31 62 61 30 38 65 62 65 64 32 33 66 39 36 39 32 35 33 35 66 63 65 33 37 32 30 61 61 34 37 34 31 38 65 30 31 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 41 61 46
              Data Ascii: {"jsonrpc":"2.0","id":1,"error":null,"result":{"id":"a489818d1aeed491","job":{"blob":"101089e597be06dad0c3e3d28b1eaac1b87c96d3f1d5fb45ed73889d524f2d31e3520fbe92d6cb0000007f2903912c98db266b8da841dbf72a3ba81ba08ebed23f9692535fce3720aa47418e01","job_id":"AaF
              2025-03-03 18:19:00 UTC378INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 39 34 65 35 39 37 62 65 30 36 64 61 64 30 63 33 65 33 64 32 38 62 31 65 61 61 63 31 62 38 37 63 39 36 64 33 66 31 64 35 66 62 34 35 65 64 37 33 38 38 39 64 35 32 34 66 32 64 33 31 65 33 35 32 30 66 62 65 39 32 64 36 63 62 30 30 30 30 30 30 37 66 65 38 36 35 61 65 61 62 39 36 63 32 31 33 34 65 63 38 63 37 64 34 35 37 61 62 62 30 35 30 38 32 35 38 63 61 32 62 36 63 35 36 64 32 32 65 34 31 65 38 39 38 62 62 34 37 65 39 65 34 30 62 36 39 38 66 30 31 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 48 41 36 77 75 69 74 68 64 4f 34 55 68 62 63 33 4e 76 36 61 78 6d 4b 57 73 5a 35 4b 22 2c 22 74 61 72 67 65 74 22 3a
              Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"101094e597be06dad0c3e3d28b1eaac1b87c96d3f1d5fb45ed73889d524f2d31e3520fbe92d6cb0000007fe865aeab96c2134ec8c7d457abb0508258ca2b6c56d22e41e898bb47e9e40b698f01","job_id":"HA6wuithdO4Uhbc3Nv6axmKWsZ5K","target":
              2025-03-03 18:19:07 UTC378INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 39 34 65 35 39 37 62 65 30 36 64 61 64 30 63 33 65 33 64 32 38 62 31 65 61 61 63 31 62 38 37 63 39 36 64 33 66 31 64 35 66 62 34 35 65 64 37 33 38 38 39 64 35 32 34 66 32 64 33 31 65 33 35 32 30 66 62 65 39 32 64 36 63 62 30 30 30 30 30 30 37 66 32 34 35 65 66 63 65 33 38 64 39 31 39 62 63 61 31 33 64 39 37 37 61 63 30 38 32 31 32 62 36 65 31 66 38 38 30 32 35 34 33 61 62 35 32 62 37 32 34 61 31 37 61 39 37 31 36 35 63 66 35 63 30 66 38 66 30 31 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 52 58 4f 34 52 6e 6f 4f 2f 34 7a 4f 62 4c 45 62 77 48 61 5a 61 36 45 34 61 59 76 48 22 2c 22 74 61 72 67 65 74 22 3a
              Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"101094e597be06dad0c3e3d28b1eaac1b87c96d3f1d5fb45ed73889d524f2d31e3520fbe92d6cb0000007f245efce38d919bca13d977ac08212b6e1f8802543ab52b724a17a97165cf5c0f8f01","job_id":"RXO4RnoO/4zObLEbwHaZa6E4aYvH","target":
              2025-03-03 18:20:08 UTC83OUTData Raw: 7b 22 69 64 22 3a 32 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6b 65 65 70 61 6c 69 76 65 64 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 69 64 22 3a 22 61 34 38 39 38 31 38 64 31 61 65 65 64 34 39 31 22 7d 7d 0d 0a
              Data Ascii: {"id":2,"jsonrpc":"2.0","method":"keepalived","params":{"id":"a489818d1aeed491"}}
              2025-03-03 18:20:08 UTC71INData Raw: 7b 22 69 64 22 3a 32 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 73 74 61 74 75 73 22 3a 22 4b 45 45 50 41 4c 49 56 45 44 22 7d 7d 0a
              Data Ascii: {"id":2,"jsonrpc":"2.0","error":null,"result":{"status":"KEEPALIVED"}}
              2025-03-03 18:21:09 UTC83OUTData Raw: 7b 22 69 64 22 3a 33 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6b 65 65 70 61 6c 69 76 65 64 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 69 64 22 3a 22 61 34 38 39 38 31 38 64 31 61 65 65 64 34 39 31 22 7d 7d 0d 0a
              Data Ascii: {"id":3,"jsonrpc":"2.0","method":"keepalived","params":{"id":"a489818d1aeed491"}}
              2025-03-03 18:21:09 UTC71INData Raw: 7b 22 69 64 22 3a 33 2c 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 65 72 72 6f 72 22 3a 6e 75 6c 6c 2c 22 72 65 73 75 6c 74 22 3a 7b 22 73 74 61 74 75 73 22 3a 22 4b 45 45 50 41 4c 49 56 45 44 22 7d 7d 0a
              Data Ascii: {"id":3,"jsonrpc":"2.0","error":null,"result":{"status":"KEEPALIVED"}}
              2025-03-03 18:21:25 UTC376INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 61 35 65 36 39 37 62 65 30 36 63 36 66 39 64 38 35 33 32 65 34 61 61 34 38 63 65 38 36 39 36 32 32 63 66 64 34 37 62 36 64 30 39 37 33 32 33 61 33 34 35 66 36 38 36 32 31 66 37 62 31 32 61 62 39 64 36 66 66 36 63 65 38 32 30 30 30 30 30 30 37 66 65 31 39 62 30 34 37 34 31 33 37 30 38 65 36 66 61 37 37 65 32 62 39 34 65 33 30 66 63 63 66 36 64 34 66 39 34 63 35 33 64 64 35 33 66 37 65 39 34 34 61 61 30 34 30 61 32 64 30 62 64 36 64 30 34 35 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 6e 52 77 58 62 67 48 6f 46 52 6d 50 6f 33 61 58 67 77 50 54 4a 6c 4e 36 4c 7a 51 35 22 2c 22 74 61 72 67 65 74 22 3a 22 63
              Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"1010a5e697be06c6f9d8532e4aa48ce869622cfd47b6d097323a345f68621f7b12ab9d6ff6ce820000007fe19b047413708e6fa77e2b94e30fccf6d4f94c53dd53f7e944aa040a2d0bd6d045","job_id":"nRwXbgHoFRmPo3aXgwPTJlN6LzQ5","target":"c
              2025-03-03 18:21:35 UTC376INData Raw: 7b 22 6a 73 6f 6e 72 70 63 22 3a 22 32 2e 30 22 2c 22 6d 65 74 68 6f 64 22 3a 22 6a 6f 62 22 2c 22 70 61 72 61 6d 73 22 3a 7b 22 62 6c 6f 62 22 3a 22 31 30 31 30 61 66 65 36 39 37 62 65 30 36 63 36 66 39 64 38 35 33 32 65 34 61 61 34 38 63 65 38 36 39 36 32 32 63 66 64 34 37 62 36 64 30 39 37 33 32 33 61 33 34 35 66 36 38 36 32 31 66 37 62 31 32 61 62 39 64 36 66 66 36 63 65 38 32 30 30 30 30 30 30 37 66 36 35 37 31 32 34 36 35 63 37 37 35 31 66 32 32 36 64 30 31 33 37 33 39 35 65 62 33 38 63 36 65 31 31 36 35 34 61 30 34 31 62 62 38 61 32 38 61 34 64 34 36 36 36 33 63 33 62 31 62 65 33 64 64 34 36 22 2c 22 6a 6f 62 5f 69 64 22 3a 22 48 65 6c 5a 56 4c 4d 6f 38 45 43 64 6c 71 63 79 48 61 4b 72 6d 45 39 61 34 69 51 7a 22 2c 22 74 61 72 67 65 74 22 3a 22 63
              Data Ascii: {"jsonrpc":"2.0","method":"job","params":{"blob":"1010afe697be06c6f9d8532e4aa48ce869622cfd47b6d097323a345f68621f7b12ab9d6ff6ce820000007f65712465c7751f226d0137395eb38c6e11654a041bb8a28a4d46663c3b1be3dd46","job_id":"HelZVLMo8ECdlqcyHaKrmE9a4iQz","target":"c


              System Behavior

              Start time (UTC):18:18:52
              Start date (UTC):03/03/2025
              Path:/tmp/logrotate
              Arguments:/tmp/logrotate
              File size:7447240 bytes
              MD5 hash:e70e9d3525f36a9ccbf2a37f8a773015

              Start time (UTC):18:18:52
              Start date (UTC):03/03/2025
              Path:/tmp/logrotate
              Arguments:-
              File size:7447240 bytes
              MD5 hash:e70e9d3525f36a9ccbf2a37f8a773015

              Start time (UTC):18:18:53
              Start date (UTC):03/03/2025
              Path:/tmp/logrotate
              Arguments:-
              File size:7447240 bytes
              MD5 hash:e70e9d3525f36a9ccbf2a37f8a773015

              Start time (UTC):18:18:53
              Start date (UTC):03/03/2025
              Path:/bin/sh
              Arguments:sh -c "/sbin/modprobe msr allow_writes=on > /dev/null 2>&1"
              File size:4 bytes
              MD5 hash:e02ea3c3450d44126c46d658fa9e654c

              Start time (UTC):18:18:53
              Start date (UTC):03/03/2025
              Path:/bin/sh
              Arguments:-
              File size:4 bytes
              MD5 hash:e02ea3c3450d44126c46d658fa9e654c

              Start time (UTC):18:18:53
              Start date (UTC):03/03/2025
              Path:/sbin/modprobe
              Arguments:/sbin/modprobe msr allow_writes=on
              File size:0 bytes
              MD5 hash:unknown