Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
morte.ppc.elf

Overview

General Information

Sample name:morte.ppc.elf
Analysis ID:1729402
Has dependencies:false
MD5:f9c49a7916e6b93716cf9bb7fffc59d1
SHA1:4f8b456e2f4a6c95c0f954c72b50ad31779b6631
SHA256:f837790f6bd7ac57839ddd424748f3b333161e9b92a1781bd95d8e481b4005b0
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Xmrig
Score:100
Range:0 - 100

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Xmrig cryptocurrency miner
Deletes system log files
Drops files in suspicious directories
Drops invisible ELF files
Found strings related to Crypto-Mining
Manipulation of devices in /dev
Sample deletes itself
Sample is packed with UPX
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample tries to kill multiple processes (SIGKILL)
Sample tries to persist itself using System V runlevels
Sample tries to set files in /etc globally writable
Creates hidden files and/or directories
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Sample contains only a LOAD segment without any section mappings
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Writes ELF files to disk
Writes shell script file to disk with an unusual file extension

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1729402
Start date and time:2025-07-06 07:56:32 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 20s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:morte.ppc.elf
Detection:MAL
Classification:mal100.spre.troj.evad.mine.linELF@0/7@0/0
  • Connection to analysis system has been lost, crash info: Unknown
Command:/tmp/morte.ppc.elf
PID:5632
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • morte.ppc.elf (PID: 5632, Parent: 5550, MD5: ae65271c943d3451b7f026d1fadccea6) Arguments: /tmp/morte.ppc.elf
    • morte.ppc.elf New Fork (PID: 5634, Parent: 5632)
      • morte.ppc.elf New Fork (PID: 5636, Parent: 5634)
        • sh (PID: 5642, Parent: 5636, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "cp /tmp/morte.ppc.elf /usr/bin/.sh"
          • sh New Fork (PID: 5644, Parent: 5642)
          • cp (PID: 5644, Parent: 5642, MD5: 40f10ae7ea3e44218d1a8c306f79c83f) Arguments: cp /tmp/morte.ppc.elf /usr/bin/.sh
  • fusermount (PID: 5655, Parent: 3147, MD5: 576a1b135c82bdcbc97a91acea900566) Arguments: fusermount -u -q -z -- /run/user/1000/gvfs
  • Xorg New Fork (PID: 5669, Parent: 1371)
  • sh (PID: 5669, Parent: 1371, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "\"/usr/bin/xkbcomp\" -w 1 \"-R/usr/share/X11/xkb\" -xkm \"-\" -em1 \"The XKEYBOARD keymap compiler (xkbcomp) reports:\" -emp \"> \" -eml \"Errors from xkbcomp are not fatal to the X server\" \"/tmp/server-0.xkm\""
    • sh New Fork (PID: 5670, Parent: 5669)
    • xkbcomp (PID: 5670, Parent: 5669, MD5: c5f953aec4c00d2a1cc27acb75d62c9b) Arguments: /usr/bin/xkbcomp -w 1 -R/usr/share/X11/xkb -xkm - -em1 "The XKEYBOARD keymap compiler (xkbcomp) reports:" -emp "> " -eml "Errors from xkbcomp are not fatal to the X server" /tmp/server-0.xkm
  • Xorg New Fork (PID: 5671, Parent: 1371)
  • sh (PID: 5671, Parent: 1371, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "\"/usr/bin/xkbcomp\" -w 1 \"-R/usr/share/X11/xkb\" -xkm \"-\" -em1 \"The XKEYBOARD keymap compiler (xkbcomp) reports:\" -emp \"> \" -eml \"Errors from xkbcomp are not fatal to the X server\" \"/tmp/server-0.xkm\""
    • sh New Fork (PID: 5672, Parent: 5671)
    • xkbcomp (PID: 5672, Parent: 5671, MD5: c5f953aec4c00d2a1cc27acb75d62c9b) Arguments: /usr/bin/xkbcomp -w 1 -R/usr/share/X11/xkb -xkm - -em1 "The XKEYBOARD keymap compiler (xkbcomp) reports:" -emp "> " -eml "Errors from xkbcomp are not fatal to the X server" /tmp/server-0.xkm
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
XMRIGNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.xmrig
SourceRuleDescriptionAuthorStrings
5649.1.00007f1498013000.00007f1498015000.r-x.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    5632.1.00007f1498013000.00007f1498015000.r-x.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      5645.1.00007f1498013000.00007f1498015000.r-x.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        5636.1.00007f1498013000.00007f1498015000.r-x.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          5634.1.00007f1498013000.00007f1498015000.r-x.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            Click to see the 10 entries
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: morte.ppc.elfAvira: detected
            Source: /usr/bin/.shAvira: detection malicious, Label: EXP/ELF.Agent.F.118
            Source: morte.ppc.elfReversingLabs: Detection: 41%

            Bitcoin Miner

            barindex
            Source: Yara matchFile source: 5649.1.00007f1498013000.00007f1498015000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: 5632.1.00007f1498013000.00007f1498015000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: 5645.1.00007f1498013000.00007f1498015000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: 5636.1.00007f1498013000.00007f1498015000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: 5634.1.00007f1498013000.00007f1498015000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5632, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5634, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5636, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5645, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5649, type: MEMORYSTR
            Source: morte.ppc.elf, 5632.1.00007f1498013000.00007f1498015000.r-x.sdmpString found in binary or memory: cryptonight
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:1338Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:1111Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:1213Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:1234Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:333Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:666Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:777Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:9999Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:5656Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:8585Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:6363Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:6969Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:3779Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:3778Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:38273Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:10345Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:23455Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:1991Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:21769Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:42352Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:48101Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:39182Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:47767Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:6667Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:1337Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:4321Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:232Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)Socket: 0.0.0.0:24136Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.14:37516 -> 65.222.202.53:80
            Source: unknownTCP traffic detected without corresponding DNS query: 65.222.202.53
            Source: unknownTCP traffic detected without corresponding DNS query: 65.222.202.53
            Source: unknownTCP traffic detected without corresponding DNS query: 65.222.202.53
            Source: unknownTCP traffic detected without corresponding DNS query: 65.222.202.53
            Source: unknownTCP traffic detected without corresponding DNS query: 65.222.202.53
            Source: unknownTCP traffic detected without corresponding DNS query: 65.222.202.53
            Source: morte.ppc.elf, .sh.18.drString found in binary or memory: http://upx.sf.net

            System Summary

            barindex
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 1399, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 1399, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 2991, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5707, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5707, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5708, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5708, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5709, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5709, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5710, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5710, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5711, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5711, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5712, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5712, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5713, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5713, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5714, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5714, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5715, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5715, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5716, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5716, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5717, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5717, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5718, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5718, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5719, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5719, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5720, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5720, result: no such processJump to behavior
            Source: LOAD without section mappingsProgram segment: 0x100000
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 1399, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 1399, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 2991, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5707, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5707, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5708, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5708, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5709, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5709, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5710, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5710, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5711, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5711, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5712, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5712, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5713, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5713, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5714, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5714, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5715, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5715, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5716, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5716, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5717, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5717, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5718, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5718, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5719, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5719, result: no such processJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5720, result: successfulJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)SIGKILL sent: pid: 5720, result: no such processJump to behavior
            Source: classification engineClassification label: mal100.spre.troj.evad.mine.linELF@0/7@0/0

            Data Obfuscation

            barindex
            Source: /tmp/morte.ppc.elf (PID: 5649)Deleted: /dev/nullJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5649)Deleted: /dev/kmsgJump to behavior
            Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
            Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
            Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $

            Persistence and Installation Behavior

            barindex
            Source: /bin/fusermount (PID: 5655)File: /proc/5655/mountsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5636)File: /etc/rc2.d/S99sysd -> /etc/init.d/sysdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5636)File: /etc/init.d/sysd (bits: - usr: rx grp: rx all: rwx)Jump to behavior
            Source: /usr/bin/cp (PID: 5644)File: /usr/bin/.shJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/3760/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/3760/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/3760/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/3760/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/3761/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/3761/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/3761/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/3761/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/1583/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/1583/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/1583/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/1583/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/2672/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/2672/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/2672/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/2672/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/110/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/110/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/110/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/110/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/3759/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/3759/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/3759/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/3759/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/111/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/111/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/111/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/111/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/112/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/112/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/112/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/112/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/113/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/113/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/113/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/113/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/234/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/234/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/234/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/234/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/1577/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/1577/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/1577/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/1577/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/114/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/114/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/114/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/114/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/235/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/235/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/235/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/235/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/115/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/115/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/115/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/115/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/116/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/116/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/116/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/116/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/117/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/117/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/117/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/117/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/118/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/118/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/118/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/118/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/119/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/119/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/119/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/119/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/10/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/10/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/10/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/10/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/917/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/917/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/917/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/917/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/11/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/11/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/11/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/11/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/12/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/12/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/12/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/12/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/13/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/13/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/13/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/13/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/14/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/14/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/14/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/14/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/15/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/15/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/15/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/15/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/16/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/16/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/16/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/16/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/17/commJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/17/cmdlineJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/17/mapsJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5645)File opened: /proc/17/fdJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5642)Shell command executed: sh -c "cp /tmp/morte.ppc.elf /usr/bin/.sh"Jump to behavior
            Source: /usr/lib/xorg/Xorg (PID: 5669)Shell command executed: sh -c "\"/usr/bin/xkbcomp\" -w 1 \"-R/usr/share/X11/xkb\" -xkm \"-\" -em1 \"The XKEYBOARD keymap compiler (xkbcomp) reports:\" -emp \"> \" -eml \"Errors from xkbcomp are not fatal to the X server\" \"/tmp/server-0.xkm\""Jump to behavior
            Source: /usr/lib/xorg/Xorg (PID: 5671)Shell command executed: sh -c "\"/usr/bin/xkbcomp\" -w 1 \"-R/usr/share/X11/xkb\" -xkm \"-\" -em1 \"The XKEYBOARD keymap compiler (xkbcomp) reports:\" -emp \"> \" -eml \"Errors from xkbcomp are not fatal to the X server\" \"/tmp/server-0.xkm\""Jump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5636)File: /etc/init.d/sysd (bits: - usr: rx grp: rx all: rwx)Jump to behavior
            Source: /usr/bin/cp (PID: 5644)File written: /usr/bin/.shJump to dropped file
            Source: /tmp/morte.ppc.elf (PID: 5636)Writes shell script file to disk with an unusual file extension: /etc/init.d/sysdJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: /tmp/morte.ppc.elf (PID: 5649)Log files deleted: /var/log/Xorg.1.logJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5649)Log files deleted: /var/log/auth.logJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5649)Log files deleted: /var/log/kern.logJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5649)Log files deleted: /var/log/Xorg.0.logJump to behavior
            Source: /tmp/morte.ppc.elf (PID: 5636)File: /etc/init.d/sysdJump to dropped file
            Source: /usr/bin/cp (PID: 5644)File: /usr/bin/.shJump to dropped file
            Source: /usr/bin/cp (PID: 5644)ELF file: /usr/bin/.shJump to dropped file
            Source: /tmp/morte.ppc.elf (PID: 5645)File: /tmp/morte.ppc.elfJump to behavior
            Source: morte.ppc.elfSubmission file: segment LOAD with 7.9691 entropy (max. 8.0)
            Source: .sh.18.drDropped file: segment LOAD with 7.9691 entropy (max. 8.0)
            Source: /tmp/morte.ppc.elf (PID: 5632)Queries kernel information via 'uname': Jump to behavior
            Source: morte.ppc.elf, 5636.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmp, morte.ppc.elf, 5645.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmp, morte.ppc.elf, 5649.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmpBinary or memory string: /tmp/qemu-open.r8n8dl
            Source: morte.ppc.elf, 5649.1.00007f1498035000.00007f1498241000.rw-.sdmpBinary or memory string: :$</var/lib/vmware/VGAuth/aliasStoreu
            Source: morte.ppc.elf, 5649.1.000056539df33000.000056539df54000.rw-.sdmpBinary or memory string: !/var/lib/fwupd/pki!/proc/3353/cmdlineQ/var/lib/snapd/assertions/asserts-v0/modelP!/proc/3361/cmdlineQ/var/lib/snapd/assertions/asserts-v0/snap-declarationP!/proc/3392/cmdlineQ/var/lib/snapd/assertions/asserts-v0/snap-revisionP!/proc/3398/cmdline1/var/lib/vmware/VGAuth/aliasStore*
            Source: morte.ppc.elf, 5649.1.00007f1498035000.00007f1498241000.rw-.sdmpBinary or memory string: /var/lib/vmware4/var/lib/PackageKit
            Source: morte.ppc.elf, 5632.1.000056539de83000.000056539df33000.rw-.sdmp, morte.ppc.elf, 5634.1.000056539de83000.000056539df33000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc11!hotpluggableq
            Source: morte.ppc.elf, 5632.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmp, morte.ppc.elf, 5634.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmp, morte.ppc.elf, 5636.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmp, morte.ppc.elf, 5645.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmp, morte.ppc.elf, 5649.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmpBinary or memory string: +x86_64/usr/bin/qemu-ppc/tmp/morte.ppc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/morte.ppc.elf
            Source: morte.ppc.elf, 5649.1.000056539de83000.000056539df33000.rw-.sdmpBinary or memory string: /tmp/vmware-root_726-2957583432
            Source: morte.ppc.elf, 5649.1.000056539de83000.000056539df33000.rw-.sdmpBinary or memory string: SV!/proc/3/exe1/tmp/vmware-root_726-2957583432!/proc/4/exe1/proc/286/exe/ppc/roc/4/exe0!/proc/5/exe1/proc/110/exe/ppc/proc/5/exe0!/proc/6/exe!/proc/252/exe/ppc/proa/tmp/systemd-private-aa7ef13c7a2d44d8a04d54e61953176a-fwupd.service-f23Ekj
            Source: morte.ppc.elf, 5636.1.000056539de83000.000056539df33000.rw-.sdmp, morte.ppc.elf, 5645.1.000056539de83000.000056539df33000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc1
            Source: morte.ppc.elf, 5649.1.000056539de83000.000056539df33000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc1/var/lib/systemd/coredump1/proc/1564/exe/ppc/7
            Source: morte.ppc.elf, 5649.1.000056539de83000.000056539df33000.rw-.sdmpBinary or memory string: SV1/var/lib/cloud/scripts/vendor0!/var/lib/vmware0!/proc/1659/cmdline
            Source: morte.ppc.elf, 5649.1.00007f1498035000.00007f1498241000.rw-.sdmpBinary or memory string: (/var/lib/vmware/VGAuth/aliasStore
            Source: morte.ppc.elf, 5632.1.000056539de83000.000056539df33000.rw-.sdmp, morte.ppc.elf, 5634.1.000056539de83000.000056539df33000.rw-.sdmp, morte.ppc.elf, 5636.1.000056539de83000.000056539df33000.rw-.sdmp, morte.ppc.elf, 5645.1.000056539de83000.000056539df33000.rw-.sdmp, morte.ppc.elf, 5649.1.000056539de83000.000056539df33000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
            Source: morte.ppc.elf, 5632.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmp, morte.ppc.elf, 5634.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmp, morte.ppc.elf, 5636.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmp, morte.ppc.elf, 5645.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmp, morte.ppc.elf, 5649.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
            Source: morte.ppc.elf, 5649.1.000056539df33000.000056539df54000.rw-.sdmpBinary or memory string: /var/lib/snapd/assertions/asserts-v0/account-key/wrfougkz3Huq2T_KklfnufCC0HzG7bJ9wP99GV0FF-D3QH3eJtuSRlQc2JhrAoh132EF2dQ/var/lib/systemd/deb-systemd-user-helper-enabled/default.target.wants!/var/lib/vmware/VGAuth9
            Source: morte.ppc.elf, 5649.1.00007f1498035000.00007f1498241000.rw-.sdmpBinary or memory string: /var/lib/vmware
            Source: morte.ppc.elf, 5649.1.00007f1498032000.00007f1498035000.rw-.sdmpBinary or memory string: $/tmp/vmware-root_726-2957583432
            Source: morte.ppc.elf, 5649.1.00007f1498035000.00007f1498241000.rw-.sdmpBinary or memory string: </var/lib/vmware/VGAuth/aliasStore
            Source: morte.ppc.elf, 5649.1.00007f1498035000.00007f1498241000.rw-.sdmpBinary or memory string: /var/lib/vmware/VGAuth
            Source: morte.ppc.elf, 5636.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmp, morte.ppc.elf, 5645.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmp, morte.ppc.elf, 5649.1.00007fff0b94b000.00007fff0b96c000.rw-.sdmpBinary or memory string: SV/tmp/qemu-open.r8n8dl
            Source: morte.ppc.elf, 5649.1.000056539df33000.000056539df54000.rw-.sdmpBinary or memory string: /var/lib/vmware/VGAuth/aliasStore
            Source: morte.ppc.elf, 5649.1.000056539df33000.000056539df54000.rw-.sdmpBinary or memory string: /ppc/var/lib/vmware/VGAuth/aliasStore

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5632, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5634, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5636, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5645, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5649, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5632, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5634, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5636, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5645, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: morte.ppc.elf PID: 5649, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information1
            Scripting
            Valid AccountsWindows Management Instrumentation1
            Scripting
            Path Interception1
            Masquerading
            1
            OS Credential Dumping
            11
            Security Software Discovery
            Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network Medium1
            Data Manipulation
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            File and Directory Permissions Modification
            LSASS Memory1
            File and Directory Discovery
            Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over Bluetooth1
            Service Stop
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
            Hidden Files and Directories
            Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Indicator Removal
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Obfuscated Files or Information
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            File Deletion
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            No configs have been found
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Number of created Files
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1729402 Sample: morte.ppc.elf Startdate: 06/07/2025 Architecture: LINUX Score: 100 46 65.222.202.53, 80 CAPEREGIONALHEALTHSYSTEMUS United States 2->46 48 Antivirus detection for dropped file 2->48 50 Antivirus / Scanner detection for submitted sample 2->50 52 Multi AV Scanner detection for submitted file 2->52 54 3 other signatures 2->54 10 morte.ppc.elf 2->10         started        13 gvfsd-fuse fusermount 2->13         started        15 Xorg sh 2->15         started        17 Xorg sh 2->17         started        signatures3 process4 signatures5 64 Found strings related to Crypto-Mining 10->64 19 morte.ppc.elf 10->19         started        66 Sample reads /proc/mounts (often used for finding a writable filesystem) 13->66 21 sh xkbcomp 15->21         started        23 sh xkbcomp 17->23         started        process6 process7 25 morte.ppc.elf 19->25         started        file8 44 /etc/init.d/sysd, POSIX 25->44 dropped 68 Sample tries to set files in /etc globally writable 25->68 70 Drops files in suspicious directories 25->70 72 Sample tries to persist itself using System V runlevels 25->72 29 morte.ppc.elf sh 25->29         started        31 morte.ppc.elf 25->31         started        signatures9 process10 signatures11 34 sh cp 29->34         started        74 Sample tries to kill multiple processes (SIGKILL) 31->74 76 Sample deletes itself 31->76 38 morte.ppc.elf 31->38         started        40 morte.ppc.elf 31->40         started        process12 file13 42 /usr/bin/.sh, ELF 34->42 dropped 56 Drops invisible ELF files 34->56 58 Drops files in suspicious directories 34->58 60 Manipulation of devices in /dev 38->60 62 Deletes system log files 38->62 signatures14
            SourceDetectionScannerLabelLink
            morte.ppc.elf42%ReversingLabsLinux.Worm.Mirai
            morte.ppc.elf100%AviraEXP/ELF.Agent.F.118
            SourceDetectionScannerLabelLink
            /usr/bin/.sh100%AviraEXP/ELF.Agent.F.118
            /etc/init.d/sysd0%VirustotalBrowse
            /usr/bin/.sh42%ReversingLabsLinux.Worm.Mirai
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://upx.sf.netmorte.ppc.elf, .sh.18.drfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              65.222.202.53
              unknownUnited States394096CAPEREGIONALHEALTHSYSTEMUSfalse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              65.222.202.53morte.sh4.elfGet hashmaliciousMirai, XmrigBrowse
                debug.elfGet hashmaliciousMirai, XmrigBrowse
                  morte.arm7.elfGet hashmaliciousMirai, XmrigBrowse
                    morte.arm.elfGet hashmaliciousMirai, XmrigBrowse
                      morte.arm.elfGet hashmaliciousMirai, XmrigBrowse
                        morte.sh4.elfGet hashmaliciousMirai, XmrigBrowse
                          morte.mips.elfGet hashmaliciousMirai, XmrigBrowse
                            morte.mips.elfGet hashmaliciousMirai, XmrigBrowse
                              morte.spc.elfGet hashmaliciousMirai, XmrigBrowse
                                morte.arm.elfGet hashmaliciousMirai, XmrigBrowse
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CAPEREGIONALHEALTHSYSTEMUSmorte.sh4.elfGet hashmaliciousMirai, XmrigBrowse
                                  • 65.222.202.53
                                  debug.elfGet hashmaliciousMirai, XmrigBrowse
                                  • 65.222.202.53
                                  morte.arm7.elfGet hashmaliciousMirai, XmrigBrowse
                                  • 65.222.202.53
                                  morte.arm.elfGet hashmaliciousMirai, XmrigBrowse
                                  • 65.222.202.53
                                  morte.arm.elfGet hashmaliciousMirai, XmrigBrowse
                                  • 65.222.202.53
                                  morte.sh4.elfGet hashmaliciousMirai, XmrigBrowse
                                  • 65.222.202.53
                                  morte.mips.elfGet hashmaliciousMirai, XmrigBrowse
                                  • 65.222.202.53
                                  morte.mips.elfGet hashmaliciousMirai, XmrigBrowse
                                  • 65.222.202.53
                                  morte.spc.elfGet hashmaliciousMirai, XmrigBrowse
                                  • 65.222.202.53
                                  morte.arm.elfGet hashmaliciousMirai, XmrigBrowse
                                  • 65.222.202.53
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  /etc/init.d/sysdmorte.sh4.elfGet hashmaliciousMirai, XmrigBrowse
                                    debug.elfGet hashmaliciousMirai, XmrigBrowse
                                      morte.arm7.elfGet hashmaliciousMirai, XmrigBrowse
                                        morte.arm7.elfGet hashmaliciousMirai, XmrigBrowse
                                          morte.x86_64.elfGet hashmaliciousMirai, XmrigBrowse
                                            morte.arm.elfGet hashmaliciousMirai, XmrigBrowse
                                              morte.arm.elfGet hashmaliciousMirai, XmrigBrowse
                                                morte.sh4.elfGet hashmaliciousMirai, XmrigBrowse
                                                  morte.mips.elfGet hashmaliciousMirai, XmrigBrowse
                                                    morte.mips.elfGet hashmaliciousMirai, XmrigBrowse
                                                      Process:/tmp/morte.ppc.elf
                                                      File Type:POSIX shell script, ASCII text executable
                                                      Category:dropped
                                                      Size (bytes):25
                                                      Entropy (8bit):3.5892750707107135
                                                      Encrypted:false
                                                      SSDEEP:3:TKH4v09vzn:hw
                                                      MD5:997CB34FF6E6CDED70B841C0D16C0938
                                                      SHA1:CC85C16E2FB441D86AA668F376CA7FB4B181F1AB
                                                      SHA-256:BA1D50D125344F273C249426CCD744D5A12E560ACE41CCA4BC55BD2D4A718D8F
                                                      SHA-512:1E775CA8513F2841B6A8E369071B28C48489AB6462D06525F9B6B2BF97E9C043562BD7E0217307ED64A95217A76A94A08189616831C9D3127C6B91B7544570C8
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                      Joe Sandbox View:
                                                      • Filename: morte.sh4.elf, Detection: malicious, Browse
                                                      • Filename: debug.elf, Detection: malicious, Browse
                                                      • Filename: morte.arm7.elf, Detection: malicious, Browse
                                                      • Filename: morte.arm7.elf, Detection: malicious, Browse
                                                      • Filename: morte.x86_64.elf, Detection: malicious, Browse
                                                      • Filename: morte.arm.elf, Detection: malicious, Browse
                                                      • Filename: morte.arm.elf, Detection: malicious, Browse
                                                      • Filename: morte.sh4.elf, Detection: malicious, Browse
                                                      • Filename: morte.mips.elf, Detection: malicious, Browse
                                                      • Filename: morte.mips.elf, Detection: malicious, Browse
                                                      Reputation:moderate, very likely benign file
                                                      Preview:#!/bin/sh./usr/bin/.sh &.
                                                      Process:/tmp/morte.ppc.elf
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):19
                                                      Entropy (8bit):3.47135448701393
                                                      Encrypted:false
                                                      SSDEEP:3:TgnRAlJ5:TgnRAl3
                                                      MD5:B4B0FDB668732DD29134D956721FA359
                                                      SHA1:7F0493F6F63DED1CC4937F792391787A8E646C3A
                                                      SHA-256:ACCBC4FDFBCEC88EC115ADD331EFAF2B2DDD17633F80CC9E17FCD7E5ABEF54AE
                                                      SHA-512:301E19A06EF9969F3DF38F7D2948EF723A6996915F1B12C2395C51A1A0B40800B83E7E9006656FE1A7B5CD1D7024589C5AD42C89B661629A3698A2CA7C3EC54C
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:/tmp/morte.ppc.elf.
                                                      Process:/usr/bin/xkbcomp
                                                      File Type:Compiled XKB Keymap: lsb, version 15
                                                      Category:dropped
                                                      Size (bytes):4096
                                                      Entropy (8bit):5.111453573529468
                                                      Encrypted:false
                                                      SSDEEP:96:5/DyE212zg/Jm3XEIr8llE4CwRvFhJvEXJRgsmEFaTa:tDyb2zOmnECQmww
                                                      MD5:E25C5715C17078F7367E65D54CD5AE7F
                                                      SHA1:D9E95B061E7C20FE56E2B2BC4A4FA904596E1BC1
                                                      SHA-256:390E9784127FC99C105C6E04B41378F582238780716B04895D3216959701A7AF
                                                      SHA-512:0FB4F11247D99B296E72DDB46D063B0DAABF8CEC75FF04364617362B3468CCC022B146E396EBAF494CC6A0E7F1FB011FCA9DBE52F83B29D1F6703C098298A54D
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:.mkx..............D.......................h.......<.....P.@%.......&......D.......NumLock.....Alt.....LevelThree..LAlt....RAlt....RControl....LControl....ScrollLock..LevelFive...AltGr...Meta....Super...Hyper...........evdev+aliases(qwerty)...!.....ESC.AE01AE02AE03AE04AE05AE06AE07AE08AE09AE10AE11AE12BKSPTAB.AD01AD02AD03AD04AD05AD06AD07AD08AD09AD10AD11AD12RTRNLCTLAC01AC02AC03AC04AC05AC06AC07AC08AC09AC10AC11TLDELFSHBKSLAB01AB02AB03AB04AB05AB06AB07AB08AB09AB10RTSHKPMULALTSPCECAPSFK01FK02FK03FK04FK05FK06FK07FK08FK09FK10NMLKSCLKKP7.KP8.KP9.KPSUKP4.KP5.KP6.KPADKP1.KP2.KP3.KP0.KPDLLVL3....LSGTFK11FK12AB11KATAHIRAHENKHKTGMUHEJPCMKPENRCTLKPDVPRSCRALTLNFDHOMEUP..PGUPLEFTRGHTEND.DOWNPGDNINS.DELEI120MUTEVOL-VOL+POWRKPEQI126PAUSI128I129HNGLHJCVAE13LWINRWINCOMPSTOPAGAIPROPUNDOFRNTCOPYOPENPASTFINDCUT.HELPI147I148I149I150I151I152I153I154I155I156I157I158I159I160I161I162I163I164I165I166I167I168I169I170I171I172I173I174I175I176I177I178I179I180I181I182I183I184I185I186I187I188I189I190FK13FK14FK15FK16FK17FK18
                                                      Process:/usr/bin/xkbcomp
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):7964
                                                      Entropy (8bit):4.445134545753843
                                                      Encrypted:false
                                                      SSDEEP:192:eVFfLaSLus4UVcqLkjoqdD//HJeCQ1+JdDx0s2T:8Ff+S6tUzmp7/1MJ
                                                      MD5:F56EFBEDAF34ED68117AC764FE0F9883
                                                      SHA1:922926245BECBB231692B58C71E63C91FD798E72
                                                      SHA-256:F7B27416182331623CD2773CABCB8B25E91D31D4243F16AE09F9C9E63869DE55
                                                      SHA-512:F364C5F688BEA7D07291813186311DCF65BC5C3F7600D286BF553E6955EE418A1D8884B5B71E550DFB282FA9B3BF71E3B0A009E1DD41C983612AB4D4676E1062
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..Shift Alt...Ctrl+Alt..................................".SEPARATE_CAPS_AND_SHIFT_ALPHABETIC..........................Base....Shift...AltGr Base..Shift AltGr.........................................FOUR_LEVEL_PLUS_LOCK....Base....Shift...Alt Base....Shift Alt...Lock....................................FOUR_LEVEL_KEYPAD...Base....Number..Alt Base....Alt Number......h...complete..{...................................................................................................................................................................................................................................................................................................~.......................................................................................................................................................................................................................................................................................................................................
                                                      Process:/usr/bin/cp
                                                      File Type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (GNU/Linux), statically linked, no section header
                                                      Category:dropped
                                                      Size (bytes):41216
                                                      Entropy (8bit):7.9668914030292255
                                                      Encrypted:false
                                                      SSDEEP:768:9cWyiippNPrE0T7VGz8FlGrp4ue/BtQZf0PDADUFcs6xIeRKiE4uVcqgw09r:S/pvrE27E0lGrpLCBeZfmtcsynjE4u+1
                                                      MD5:F9C49A7916E6B93716CF9BB7FFFC59D1
                                                      SHA1:4F8B456E2F4A6C95C0F954C72B50AD31779B6631
                                                      SHA-256:F837790F6BD7AC57839DDD424748F3B333161E9B92A1781BD95D8E481B4005B0
                                                      SHA-512:3E1C384A2DB5C34E50C09D5842D2BF246E38A2724A053146DFC3E456B698BABA11B706AF8F9B3F9C680203ACB5B8EB19F3BE3514599E8BCE4260F61FB6E3D8F0
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 42%
                                                      Reputation:low
                                                      Preview:.ELF...........................4.........4. ...(....................................................................dt.Q................................UPX!..........m...m........U.......?.E.h4...@b............uJ..;Zu,.Zs.h..........>...tfM..$d.[..b........}.......e....f.......J.[...(..v........$...m..p......h..z.Y.Z.N.&..d.).]..W..iU...{0..'[.W......jT..~.c...Y?..6.(.w.\6".Xs...&.9.}.".^Nc....K..l.]F1.^}....d.G...*.C.3...~.......#@..i..O`x.h\;50.`.2..$!t>.^.d.t..|T..<....N.d._......\I.!..d..=6..5.`'.........G....u^F..)o.....f['.G$..2b..k..%..!9.&@-Se.6..X.c..B..[.W...+.1k.~....()1-...#...F..UL1=.p.F.G....#.]...j]..I.....C....Vy...pw$).J. 1......},.g.e...1..rt..AbhN.0..p..\...1.Y..u#.."t+...X:._..D....9O.kq.~.k.....q...<.....cs..(.B...q..L...e.HLt..=.8D.....\...R[...d..mQ.C.......c.....RdYTe...J..5l.A...... .UI....+..I..B....h..$.w.O.cI.h].fs..r..wb..&..mN.f_g\.4..Hr......2.h....4...g....\}>7.'y.(".a.......Z. ....?...g)B....GE#.b...v..
                                                      File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (GNU/Linux), statically linked, no section header
                                                      Entropy (8bit):7.9668914030292255
                                                      TrID:
                                                      • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                                      • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                                      File name:morte.ppc.elf
                                                      File size:41'216 bytes
                                                      MD5:f9c49a7916e6b93716cf9bb7fffc59d1
                                                      SHA1:4f8b456e2f4a6c95c0f954c72b50ad31779b6631
                                                      SHA256:f837790f6bd7ac57839ddd424748f3b333161e9b92a1781bd95d8e481b4005b0
                                                      SHA512:3e1c384a2db5c34e50c09d5842d2bf246e38a2724a053146dfc3e456b698baba11b706af8f9b3f9c680203acb5b8eb19f3be3514599e8bce4260f61fb6e3d8f0
                                                      SSDEEP:768:9cWyiippNPrE0T7VGz8FlGrp4ue/BtQZf0PDADUFcs6xIeRKiE4uVcqgw09r:S/pvrE27E0lGrpLCBeZfmtcsynjE4u+1
                                                      TLSH:D803F069C9CA3C56EEFA79689EB54281BB748F1877165CD9224CDF4303323B123687C8
                                                      File Content Preview:.ELF...........................4.........4. ...(....................................................................dt.Q................................UPX!..........m...m........U.......?.E.h4...@b..............uJ..;Zu,.Zs.h...........>...tfM..$d.[..b...

                                                      ELF header

                                                      Class:ELF32
                                                      Data:2's complement, big endian
                                                      Version:1 (current)
                                                      Machine:PowerPC
                                                      Version Number:0x1
                                                      Type:EXEC (Executable file)
                                                      OS/ABI:UNIX - Linux
                                                      ABI Version:0
                                                      Entry Point Address:0x108e18
                                                      Flags:0x0
                                                      ELF Header Size:52
                                                      Program Header Offset:52
                                                      Program Header Size:32
                                                      Number of Program Headers:3
                                                      Section Header Offset:0
                                                      Section Header Size:40
                                                      Number of Section Headers:0
                                                      Header String Table Index:0
                                                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                      LOAD0x00x1000000x1000000xa0000xa0007.96910x5R E0x10000
                                                      LOAD0xdf00x10030df00x10030df00x00x00.00000x6RW 0x10000
                                                      GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jul 6, 2025 07:57:41.408463955 CEST3751680192.168.2.1465.222.202.53
                                                      Jul 6, 2025 07:57:42.411488056 CEST3751680192.168.2.1465.222.202.53
                                                      Jul 6, 2025 07:57:44.427345037 CEST3751680192.168.2.1465.222.202.53
                                                      Jul 6, 2025 07:57:48.587248087 CEST3751680192.168.2.1465.222.202.53
                                                      Jul 6, 2025 07:57:53.341835022 CEST3751880192.168.2.1465.222.202.53
                                                      Jul 6, 2025 07:57:54.346921921 CEST3751880192.168.2.1465.222.202.53
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jul 6, 2025 07:57:40.973711014 CEST4229353192.168.2.148.8.8.8
                                                      Jul 6, 2025 07:57:41.059534073 CEST53422938.8.8.8192.168.2.14
                                                      Jul 6, 2025 07:57:41.061482906 CEST5466953192.168.2.148.8.8.8
                                                      Jul 6, 2025 07:57:41.147077084 CEST53546698.8.8.8192.168.2.14
                                                      Jul 6, 2025 07:57:41.148312092 CEST3519253192.168.2.148.8.8.8
                                                      Jul 6, 2025 07:57:41.233814955 CEST53351928.8.8.8192.168.2.14
                                                      Jul 6, 2025 07:57:41.234934092 CEST3899753192.168.2.148.8.8.8
                                                      Jul 6, 2025 07:57:41.320650101 CEST53389978.8.8.8192.168.2.14
                                                      Jul 6, 2025 07:57:41.321671009 CEST3980453192.168.2.148.8.8.8
                                                      Jul 6, 2025 07:57:41.407691002 CEST53398048.8.8.8192.168.2.14
                                                      Jul 6, 2025 07:57:52.910197973 CEST4017153192.168.2.148.8.8.8
                                                      Jul 6, 2025 07:57:52.996035099 CEST53401718.8.8.8192.168.2.14
                                                      Jul 6, 2025 07:57:52.996718884 CEST4132653192.168.2.148.8.8.8
                                                      Jul 6, 2025 07:57:53.082129955 CEST53413268.8.8.8192.168.2.14
                                                      Jul 6, 2025 07:57:53.082875967 CEST4482053192.168.2.148.8.8.8
                                                      Jul 6, 2025 07:57:53.168356895 CEST53448208.8.8.8192.168.2.14
                                                      Jul 6, 2025 07:57:53.169048071 CEST3904453192.168.2.148.8.8.8
                                                      Jul 6, 2025 07:57:53.254743099 CEST53390448.8.8.8192.168.2.14
                                                      Jul 6, 2025 07:57:53.255423069 CEST6096153192.168.2.148.8.8.8
                                                      Jul 6, 2025 07:57:53.341399908 CEST53609618.8.8.8192.168.2.14
                                                      TimestampSource IPDest IPChecksumCodeType
                                                      Jul 6, 2025 07:57:41.109348059 CEST192.168.2.14192.168.2.1827a(Port unreachable)Destination Unreachable
                                                      Jul 6, 2025 07:59:01.120095968 CEST192.168.2.14192.168.2.1827a(Port unreachable)Destination Unreachable

                                                      System Behavior

                                                      Start time (UTC):05:57:31
                                                      Start date (UTC):06/07/2025
                                                      Path:/tmp/morte.ppc.elf
                                                      Arguments:/tmp/morte.ppc.elf
                                                      File size:5388968 bytes
                                                      MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                      Start time (UTC):05:57:31
                                                      Start date (UTC):06/07/2025
                                                      Path:/tmp/morte.ppc.elf
                                                      Arguments:-
                                                      File size:5388968 bytes
                                                      MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                      Start time (UTC):05:57:31
                                                      Start date (UTC):06/07/2025
                                                      Path:/tmp/morte.ppc.elf
                                                      Arguments:-
                                                      File size:5388968 bytes
                                                      MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                      Start time (UTC):05:57:31
                                                      Start date (UTC):06/07/2025
                                                      Path:/tmp/morte.ppc.elf
                                                      Arguments:-
                                                      File size:5388968 bytes
                                                      MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                      Start time (UTC):05:57:31
                                                      Start date (UTC):06/07/2025
                                                      Path:/bin/sh
                                                      Arguments:sh -c "cp /tmp/morte.ppc.elf /usr/bin/.sh"
                                                      File size:129816 bytes
                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                      Start time (UTC):05:57:31
                                                      Start date (UTC):06/07/2025
                                                      Path:/bin/sh
                                                      Arguments:-
                                                      File size:129816 bytes
                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                      Start time (UTC):05:57:31
                                                      Start date (UTC):06/07/2025
                                                      Path:/usr/bin/cp
                                                      Arguments:cp /tmp/morte.ppc.elf /usr/bin/.sh
                                                      File size:153976 bytes
                                                      MD5 hash:40f10ae7ea3e44218d1a8c306f79c83f

                                                      Start time (UTC):05:57:32
                                                      Start date (UTC):06/07/2025
                                                      Path:/tmp/morte.ppc.elf
                                                      Arguments:-
                                                      File size:5388968 bytes
                                                      MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                      Start time (UTC):05:57:32
                                                      Start date (UTC):06/07/2025
                                                      Path:/tmp/morte.ppc.elf
                                                      Arguments:-
                                                      File size:5388968 bytes
                                                      MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                      Start time (UTC):05:57:32
                                                      Start date (UTC):06/07/2025
                                                      Path:/tmp/morte.ppc.elf
                                                      Arguments:-
                                                      File size:5388968 bytes
                                                      MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                      Start time (UTC):05:57:36
                                                      Start date (UTC):06/07/2025
                                                      Path:/usr/libexec/gvfsd-fuse
                                                      Arguments:-
                                                      File size:47632 bytes
                                                      MD5 hash:d18fbf1cbf8eb57b17fac48b7b4be933

                                                      Start time (UTC):05:57:36
                                                      Start date (UTC):06/07/2025
                                                      Path:/bin/fusermount
                                                      Arguments:fusermount -u -q -z -- /run/user/1000/gvfs
                                                      File size:39144 bytes
                                                      MD5 hash:576a1b135c82bdcbc97a91acea900566

                                                      Start time (UTC):05:57:36
                                                      Start date (UTC):06/07/2025
                                                      Path:/usr/lib/xorg/Xorg
                                                      Arguments:-
                                                      File size:2448840 bytes
                                                      MD5 hash:730cf4c45a7ee8bea88abf165463b7f8

                                                      Start time (UTC):05:57:36
                                                      Start date (UTC):06/07/2025
                                                      Path:/bin/sh
                                                      Arguments:sh -c "\"/usr/bin/xkbcomp\" -w 1 \"-R/usr/share/X11/xkb\" -xkm \"-\" -em1 \"The XKEYBOARD keymap compiler (xkbcomp) reports:\" -emp \"> \" -eml \"Errors from xkbcomp are not fatal to the X server\" \"/tmp/server-0.xkm\""
                                                      File size:129816 bytes
                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                      Start time (UTC):05:57:36
                                                      Start date (UTC):06/07/2025
                                                      Path:/bin/sh
                                                      Arguments:-
                                                      File size:129816 bytes
                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                      Start time (UTC):05:57:36
                                                      Start date (UTC):06/07/2025
                                                      Path:/usr/bin/xkbcomp
                                                      Arguments:/usr/bin/xkbcomp -w 1 -R/usr/share/X11/xkb -xkm - -em1 "The XKEYBOARD keymap compiler (xkbcomp) reports:" -emp "> " -eml "Errors from xkbcomp are not fatal to the X server" /tmp/server-0.xkm
                                                      File size:217184 bytes
                                                      MD5 hash:c5f953aec4c00d2a1cc27acb75d62c9b

                                                      Start time (UTC):05:57:37
                                                      Start date (UTC):06/07/2025
                                                      Path:/usr/lib/xorg/Xorg
                                                      Arguments:-
                                                      File size:2448840 bytes
                                                      MD5 hash:730cf4c45a7ee8bea88abf165463b7f8

                                                      Start time (UTC):05:57:37
                                                      Start date (UTC):06/07/2025
                                                      Path:/bin/sh
                                                      Arguments:sh -c "\"/usr/bin/xkbcomp\" -w 1 \"-R/usr/share/X11/xkb\" -xkm \"-\" -em1 \"The XKEYBOARD keymap compiler (xkbcomp) reports:\" -emp \"> \" -eml \"Errors from xkbcomp are not fatal to the X server\" \"/tmp/server-0.xkm\""
                                                      File size:129816 bytes
                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                      Start time (UTC):05:57:37
                                                      Start date (UTC):06/07/2025
                                                      Path:/bin/sh
                                                      Arguments:-
                                                      File size:129816 bytes
                                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                      Start time (UTC):05:57:37
                                                      Start date (UTC):06/07/2025
                                                      Path:/usr/bin/xkbcomp
                                                      Arguments:/usr/bin/xkbcomp -w 1 -R/usr/share/X11/xkb -xkm - -em1 "The XKEYBOARD keymap compiler (xkbcomp) reports:" -emp "> " -eml "Errors from xkbcomp are not fatal to the X server" /tmp/server-0.xkm
                                                      File size:217184 bytes
                                                      MD5 hash:c5f953aec4c00d2a1cc27acb75d62c9b