Loading ...

Play interactive tourEdit tour

Linux Analysis Report x86

Overview

General Information

Sample Name:x86
Analysis ID:553313
MD5:7a4f14429f8c54d68656cfafc8528a34
SHA1:d892fbd509b99745ee003ed803bc582b9b190ce9
SHA256:146bbed5eaaf63f99842e41f64ac4771c3622ff9f6db8712a89a0731d4ec6a95
Tags:elf
Infos:

Detection

Mirai
Score:76
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Mirai
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Yara signature match
Sample has stripped symbol table
Enumerates processes within the "proc" file system
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Sample tries to kill a process (SIGKILL)

Classification

Analysis Advice

All HTTP servers contacted by the sample do not answer. Likely the sample is an old dropper which does no longer work

General Information

Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:553313
Start date:14.01.2022
Start time:16:48:19
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 5s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:x86
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Detection:MAL
Classification:mal76.troj.lin@0/1@0/0
Warnings:
Show All
  • Report size exceeded maximum capacity and may have missing network information.
  • TCP Packets have been reduced to 100

Process Tree

  • system is lnxubuntu20
  • dash New Fork (PID: 5207, Parent: 4331)
  • cat (PID: 5207, Parent: 4331, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.jjJ0hUD84m
  • dash New Fork (PID: 5208, Parent: 4331)
  • head (PID: 5208, Parent: 4331, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5209, Parent: 4331)
  • tr (PID: 5209, Parent: 4331, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5210, Parent: 4331)
  • cut (PID: 5210, Parent: 4331, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5211, Parent: 4331)
  • cat (PID: 5211, Parent: 4331, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.jjJ0hUD84m
  • dash New Fork (PID: 5212, Parent: 4331)
  • head (PID: 5212, Parent: 4331, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5213, Parent: 4331)
  • tr (PID: 5213, Parent: 4331, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5214, Parent: 4331)
  • cut (PID: 5214, Parent: 4331, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5217, Parent: 4331)
  • rm (PID: 5217, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.jjJ0hUD84m /tmp/tmp.W8UIKPggkC /tmp/tmp.KmcGhooTuj
  • x86 (PID: 5244, Parent: 5129, MD5: 7a4f14429f8c54d68656cfafc8528a34) Arguments: /tmp/x86
    • x86 New Fork (PID: 5245, Parent: 5244)
    • x86 New Fork (PID: 5246, Parent: 5244)
    • x86 New Fork (PID: 5247, Parent: 5244)
      • x86 New Fork (PID: 5248, Parent: 5247)
      • x86 New Fork (PID: 5249, Parent: 5247)
      • x86 New Fork (PID: 5250, Parent: 5247)
  • cleanup

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
x86SUSP_XORed_MozillaDetects suspicious XORed keyword - Mozilla/5.0Florian Roth
  • 0xefc4:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0xf034:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0xf0a4:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0xf114:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0xf184:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0xf3f4:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0xf448:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0xf49c:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0xf4f0:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0xf544:$xo1: oMXKNNC\x0D\x17\x0C\x12
x86Mirai_Botnet_MalwareDetects Mirai Botnet MalwareFlorian Roth
  • 0xe9e0:$x1: POST /cdn-cgi/
  • 0xee2b:$s1: LCOGQGPTGP
x86JoeSecurity_Mirai_9Yara detected MiraiJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    5249.1.00000000df678f20.00000000de9fc6d2.rw-.sdmpSUSP_XORed_MozillaDetects suspicious XORed keyword - Mozilla/5.0Florian Roth
    • 0x598:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x610:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x688:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x700:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x778:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xa08:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xa60:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xab8:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xb10:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xb68:$xo1: oMXKNNC\x0D\x17\x0C\x12
    5245.1.00000000df678f20.00000000de9fc6d2.rw-.sdmpSUSP_XORed_MozillaDetects suspicious XORed keyword - Mozilla/5.0Florian Roth
    • 0x598:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x610:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x688:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x700:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x778:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xa08:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xa60:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xab8:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xb10:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xb68:$xo1: oMXKNNC\x0D\x17\x0C\x12
    5246.1.00000000df678f20.00000000de9fc6d2.rw-.sdmpSUSP_XORed_MozillaDetects suspicious XORed keyword - Mozilla/5.0Florian Roth
    • 0x598:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x610:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x688:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x700:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x778:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xa08:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xa60:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xab8:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xb10:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xb68:$xo1: oMXKNNC\x0D\x17\x0C\x12
    5244.1.00000000df678f20.00000000de9fc6d2.rw-.sdmpSUSP_XORed_MozillaDetects suspicious XORed keyword - Mozilla/5.0Florian Roth
    • 0x598:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x610:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x688:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x700:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x778:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xa08:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xa60:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xab8:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xb10:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xb68:$xo1: oMXKNNC\x0D\x17\x0C\x12
    5244.1.000000001a887bdc.00000000328ec990.r-x.sdmpSUSP_XORed_MozillaDetects suspicious XORed keyword - Mozilla/5.0Florian Roth
    • 0xefc4:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xf034:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xf0a4:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xf114:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xf184:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xf3f4:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xf448:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xf49c:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xf4f0:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0xf544:$xo1: oMXKNNC\x0D\x17\x0C\x12
    Click to see the 11 entries

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: x86Virustotal: Detection: 58%Perma Link
    Source: x86ReversingLabs: Detection: 62%
    Machine Learning detection for sampleShow sources
    Source: x86Joe Sandbox ML: detected

    Networking:

    barindex
    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
    Source: TrafficSnort IDS: 716 INFO TELNET access 185.190.45.22:23 -> 192.168.2.23:38984
    Source: TrafficSnort IDS: 716 INFO TELNET access 116.214.36.17:23 -> 192.168.2.23:56264
    Source: TrafficSnort IDS: 716 INFO TELNET access 116.214.36.17:23 -> 192.168.2.23:56288
    Source: TrafficSnort IDS: 716 INFO TELNET access 116.214.36.17:23 -> 192.168.2.23:56338
    Source: TrafficSnort IDS: 716 INFO TELNET access 185.190.45.22:23 -> 192.168.2.23:39066
    Source: TrafficSnort IDS: 716 INFO TELNET access 116.214.36.17:23 -> 192.168.2.23:56352
    Source: TrafficSnort IDS: 716 INFO TELNET access 116.214.36.17:23 -> 192.168.2.23:56368
    Source: TrafficSnort IDS: 716 INFO TELNET access 116.214.36.17:23 -> 192.168.2.23:56388
    Source: TrafficSnort IDS: 716 INFO TELNET access 185.190.45.22:23 -> 192.168.2.23:39116
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 74.84.112.153:23 -> 192.168.2.23:35498
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 74.84.112.153:23 -> 192.168.2.23:35498
    Source: TrafficSnort IDS: 716 INFO TELNET access 116.214.36.17:23 -> 192.168.2.23:56402
    Source: TrafficSnort IDS: 716 INFO TELNET access 116.214.36.17:23 -> 192.168.2.23:56408
    Source: TrafficSnort IDS: 716 INFO TELNET access 116.214.36.17:23 -> 192.168.2.23:56448
    Source: TrafficSnort IDS: 716 INFO TELNET access 185.190.45.22:23 -> 192.168.2.23:39188
    Source: TrafficSnort IDS: 716 INFO TELNET access 116.214.36.17:23 -> 192.168.2.23:56472
    Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
    Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
    Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
    Source: global trafficTCP traffic: 192.168.2.23:45900 -> 107.189.12.189:1791
    Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
    Source: unknownTCP traffic detected without corresponding DNS query: 107.189.12.189
    Source: unknownTCP traffic detected without corresponding DNS query: 243.37.169.55
    Source: unknownTCP traffic detected without corresponding DNS query: 35.136.197.55
    Source: unknownTCP traffic detected without corresponding DNS query: 89.212.117.85
    Source: unknownTCP traffic detected without corresponding DNS query: 251.241.205.121
    Source: unknownTCP traffic detected without corresponding DNS query: 250.157.118.1
    Source: unknownTCP traffic detected without corresponding DNS query: 98.122.69.132
    Source: unknownTCP traffic detected without corresponding DNS query: 24.87.252.192
    Source: unknownTCP traffic detected without corresponding DNS query: 198.219.62.200
    Source: unknownTCP traffic detected without corresponding DNS query: 202.222.25.214
    Source: unknownTCP traffic detected without corresponding DNS query: 183.23.73.201
    Source: unknownTCP traffic detected without corresponding DNS query: 165.207.214.42
    Source: unknownTCP traffic detected without corresponding DNS query: 119.79.202.102
    Source: unknownTCP traffic detected without corresponding DNS query: 48.75.93.136
    Source: unknownTCP traffic detected without corresponding DNS query: 197.34.228.50
    Source: unknownTCP traffic detected without corresponding DNS query: 191.20.42.9
    Source: unknownTCP traffic detected without corresponding DNS query: 161.87.247.228
    Source: unknownTCP traffic detected without corresponding DNS query: 107.227.7.215
    Source: unknownTCP traffic detected without corresponding DNS query: 203.114.238.6
    Source: unknownTCP traffic detected without corresponding DNS query: 164.142.229.195
    Source: unknownTCP traffic detected without corresponding DNS query: 119.162.103.213
    Source: unknownTCP traffic detected without corresponding DNS query: 191.8.159.234
    Source: unknownTCP traffic detected without corresponding DNS query: 109.22.115.235
    Source: unknownTCP traffic detected without corresponding DNS query: 135.138.75.14
    Source: unknownTCP traffic detected without corresponding DNS query: 60.232.21.233
    Source: unknownTCP traffic detected without corresponding DNS query: 254.170.80.221
    Source: unknownTCP traffic detected without corresponding DNS query: 4.135.61.101
    Source: unknownTCP traffic detected without corresponding DNS query: 174.126.40.176
    Source: unknownTCP traffic detected without corresponding DNS query: 42.24.90.226
    Source: unknownTCP traffic detected without corresponding DNS query: 81.165.92.42
    Source: unknownTCP traffic detected without corresponding DNS query: 78.222.25.18
    Source: unknownTCP traffic detected without corresponding DNS query: 184.201.199.67
    Source: unknownTCP traffic detected without corresponding DNS query: 69.251.93.46
    Source: unknownTCP traffic detected without corresponding DNS query: 142.122.144.133
    Source: unknownTCP traffic detected without corresponding DNS query: 182.178.24.227
    Source: unknownTCP traffic detected without corresponding DNS query: 88.24.163.118
    Source: unknownTCP traffic detected without corresponding DNS query: 150.170.142.115
    Source: unknownTCP traffic detected without corresponding DNS query: 101.247.37.89
    Source: unknownTCP traffic detected without corresponding DNS query: 84.234.37.29
    Source: unknownTCP traffic detected without corresponding DNS query: 190.146.146.14
    Source: unknownTCP traffic detected without corresponding DNS query: 144.3.114.9
    Source: unknownTCP traffic detected without corresponding DNS query: 90.16.177.238
    Source: unknownTCP traffic detected without corresponding DNS query: 196.82.139.146
    Source: unknownTCP traffic detected without corresponding DNS query: 27.181.160.181
    Source: unknownTCP traffic detected without corresponding DNS query: 165.201.208.107
    Source: unknownTCP traffic detected without corresponding DNS query: 126.20.91.40
    Source: unknownTCP traffic detected without corresponding DNS query: 213.76.55.61
    Source: unknownTCP traffic detected without corresponding DNS query: 106.165.195.45
    Source: unknownTCP traffic detected without corresponding DNS query: 45.209.44.157
    Source: unknownTCP traffic detected without corresponding DNS query: 31.252.239.67
    Source: motd-news.17.drString found in binary or memory: https://ubuntu.com/blog/microk8s-memory-optimisation

    System Summary:

    barindex
    Malicious sample detected (through community Yara rule)Show sources
    Source: x86, type: SAMPLEMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
    Source: 5244.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
    Source: 5246.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
    Source: 5245.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
    Source: 5249.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
    Source: x86, type: SAMPLEMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
    Source: x86, type: SAMPLEMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
    Source: 5249.1.00000000df678f20.00000000de9fc6d2.rw-.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
    Source: 5245.1.00000000df678f20.00000000de9fc6d2.rw-.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
    Source: 5246.1.00000000df678f20.00000000de9fc6d2.rw-.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
    Source: 5244.1.00000000df678f20.00000000de9fc6d2.rw-.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
    Source: 5244.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
    Source: 5244.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
    Source: 5246.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
    Source: 5246.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
    Source: 5245.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
    Source: 5245.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
    Source: 5249.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
    Source: 5249.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
    Source: ELF static info symbol of initial sample.symtab present: no
    Source: /tmp/x86 (PID: 5245)SIGKILL sent: pid: 936, result: successful
    Source: /tmp/x86 (PID: 5248)SIGKILL sent: pid: 936, result: successful
    Source: /tmp/x86 (PID: 5248)SIGKILL sent: pid: 5245, result: successful
    Source: /tmp/x86 (PID: 5248)SIGKILL sent: pid: 759, result: successful
    Source: classification engineClassification label: mal76.troj.lin@0/1@0/0
    Source: /tmp/x86 (PID: 5245)File opened: /proc/491/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/793/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/772/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/796/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/774/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/797/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/777/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/799/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/658/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/912/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/759/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/936/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/918/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/1/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/761/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/785/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/884/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/720/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/721/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/788/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/789/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/800/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/801/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/847/fd
    Source: /tmp/x86 (PID: 5245)File opened: /proc/904/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2033/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2033/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1582/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1582/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2275/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1612/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1612/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1579/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1579/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1699/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1699/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1335/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1335/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1698/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1698/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2028/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2028/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1334/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1334/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1576/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1576/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2302/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/3236/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2025/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2025/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2146/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2146/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/910/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/912/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/912/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/912/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/759/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/759/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/759/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/517/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2307/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/918/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/918/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/918/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1594/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1594/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2285/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2281/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1349/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1349/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1623/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1623/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/761/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/761/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/761/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1622/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1622/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/884/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/884/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/884/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1983/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1983/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2038/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2038/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1586/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1586/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1465/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1465/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1344/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1344/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1860/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1860/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1463/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1463/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/2156/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/800/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/800/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/800/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/801/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/801/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/801/exe
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1629/fd
    Source: /tmp/x86 (PID: 5248)File opened: /proc/1629/exe
    Source: /usr/bin/dash (PID: 5217)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.jjJ0hUD84m /tmp/tmp.W8UIKPggkC /tmp/tmp.KmcGhooTuj

    Stealing of Sensitive Information:

    barindex
    Yara detected MiraiShow sources
    Source: Yara matchFile source: x86, type: SAMPLE
    Source: Yara matchFile source: 5244.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5246.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5245.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5249.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORY

    Remote Access Functionality:

    barindex
    Yara detected MiraiShow sources
    Source: Yara matchFile source: x86, type: SAMPLE
    Source: Yara matchFile source: 5244.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5246.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5245.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5249.1.000000001a887bdc.00000000328ec990.r-x.sdmp, type: MEMORY

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionFile Deletion1OS Credential Dumping1System Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

    Malware Configuration

    No configs have been found

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 553313 Sample: x86 Startdate: 14/01/2022 Architecture: LINUX Score: 76 28 155.132.163.192, 23 ZAMRENZM France 2->28 30 64.1.145.57, 23 XO-AS15US United States 2->30 32 98 other IPs or domains 2->32 34 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 Multi AV Scanner detection for submitted file 2->38 40 2 other signatures 2->40 8 dash rm x86 2->8         started        10 dash cat 2->10         started        12 dash tr 2->12         started        14 6 other processes 2->14 signatures3 process4 process5 16 x86 8->16         started        18 x86 8->18         started        20 x86 8->20         started        process6 22 x86 16->22         started        24 x86 16->24         started        26 x86 16->26         started       

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    x8658%VirustotalBrowse
    x8663%ReversingLabsLinux.Trojan.Mirai
    x86100%Joe Sandbox ML

    Dropped Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    No Antivirus matches

    Domains and IPs

    Contacted Domains

    No contacted domains info

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    https://ubuntu.com/blog/microk8s-memory-optimisationmotd-news.17.drfalse
      high

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      158.73.164.6
      unknownUnited States
      19050TIC-DHHS-INTERIORUSfalse
      183.213.103.251
      unknownChina
      56046CMNET-JIANGSU-APChinaMobilecommunicationscorporationCNfalse
      159.121.22.30
      unknownUnited States
      1798OREGONUSfalse
      155.132.163.192
      unknownFrance
      37532ZAMRENZMfalse
      97.199.8.160
      unknownUnited States
      6167CELLCO-PARTUSfalse
      180.224.232.196
      unknownKorea Republic of
      17858POWERVIS-AS-KRLGPOWERCOMMKRfalse
      12.61.219.1
      unknownUnited States
      7018ATT-INTERNET4USfalse
      255.159.244.48
      unknownReserved
      unknownunknownfalse
      206.223.243.42
      unknownUnited States
      32204KPUNETUSfalse
      14.183.60.165
      unknownViet Nam
      45899VNPT-AS-VNVNPTCorpVNfalse
      82.22.24.220
      unknownUnited Kingdom
      5089NTLGBfalse
      88.86.153.238
      unknownFinland
      1759TSF-IP-CORETeliaFinlandOyjEUfalse
      125.166.6.7
      unknownIndonesia
      7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDfalse
      44.211.207.114
      unknownUnited States
      14618AMAZON-AESUSfalse
      202.132.246.96
      unknownTaiwan; Republic of China (ROC)
      9924TFN-TWTaiwanFixedNetworkTelcoandNetworkServiceProvifalse
      184.136.53.234
      unknownUnited States
      5778CENTURYLINK-LEGACY-EMBARQ-RCMTUSfalse
      76.35.148.229
      unknownUnited States
      18494CENTURYLINK-LEGACY-EMBARQ-WRBGUSfalse
      117.57.68.245
      unknownChina
      4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
      198.153.190.22
      unknownUnited States
      55221NPG-ASUSfalse
      88.236.99.235
      unknownTurkey
      9121TTNETTRfalse
      158.38.7.66
      unknownNorway
      224UNINETTUNINETTTheNorwegianUniversityResearchNetworkfalse
      133.152.175.194
      unknownJapan17819ASN-EQUINIX-APEquinixAsiaPacificSGfalse
      17.20.86.44
      unknownUnited States
      714APPLE-ENGINEERINGUSfalse
      217.249.44.246
      unknownGermany
      3320DTAGInternetserviceprovideroperationsDEfalse
      152.255.176.33
      unknownBrazil
      26599TELEFONICABRASILSABRfalse
      77.37.107.97
      unknownGermany
      8893ARTFILES-ASZirkusweg1DEfalse
      138.226.98.73
      unknownSwitzerland
      12980EMEAHostingAutonomousSystemEUfalse
      147.166.88.168
      unknownUnited States
      1452DNIC-ASBLK-01451-01456USfalse
      27.151.37.23
      unknownChina
      133774CHINATELECOM-FUJIAN-FUZHOU-IDC1FuzhouCNfalse
      12.164.149.163
      unknownUnited States
      7018ATT-INTERNET4USfalse
      76.225.145.21
      unknownUnited States
      7018ATT-INTERNET4USfalse
      172.245.6.39
      unknownUnited States
      55286SERVER-MANIACAfalse
      220.6.222.134
      unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
      67.58.76.64
      unknownUnited States
      27221ARDMORE-TELUSfalse
      80.222.97.33
      unknownFinland
      1759TSF-IP-CORETeliaFinlandOyjEUfalse
      216.218.72.80
      unknownUnited States
      20257FTC-INETUSfalse
      191.196.35.86
      unknownBrazil
      26599TELEFONICABRASILSABRfalse
      81.162.191.193
      unknownMoldova Republic of
      57598FIBERHOP-ASNMDfalse
      195.71.65.187
      unknownGermany
      6805TDDE-ASN1DEfalse
      106.94.251.255
      unknownChina
      4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
      195.64.154.153
      unknownUkraine
      197726UKRNAMES-ASUAfalse
      77.156.42.5
      unknownFrance
      15557LDCOMNETFRfalse
      152.196.192.223
      unknownUnited States
      701UUNETUSfalse
      93.161.25.227
      unknownDenmark
      3292TDCTDCASDKfalse
      159.37.110.25
      unknownUnited States
      30449AZSTATEUSfalse
      87.15.59.112
      unknownItaly
      3269ASN-IBSNAZITfalse
      64.1.145.57
      unknownUnited States
      2828XO-AS15USfalse
      108.22.97.108
      unknownUnited States
      701UUNETUSfalse
      62.35.61.113
      unknownFrance
      5410BOUYGTEL-ISPFRfalse
      240.55.97.156
      unknownReserved
      unknownunknownfalse
      147.171.34.38
      unknownFrance
      1942FR-TIGREToileInformatiqueGREnobloiseEUfalse
      104.15.73.28
      unknownUnited States
      7018ATT-INTERNET4USfalse
      83.97.13.148
      unknownNetherlands
      30879RAI-ASNLfalse
      18.41.244.81
      unknownUnited States
      3MIT-GATEWAYSUSfalse
      75.230.2.147
      unknownUnited States
      22394CELLCOUSfalse
      213.30.159.24
      unknownFrance
      12670AS-COMPLETELFRfalse
      89.189.111.208
      unknownRussian Federation
      41349MVMTECH-ASRUfalse
      35.129.6.125
      unknownUnited States
      20115CHARTER-20115USfalse
      241.213.38.46
      unknownReserved
      unknownunknownfalse
      160.217.211.17
      unknownCzech Republic
      2852CESNET2CZfalse
      220.229.198.13
      unknownTaiwan; Republic of China (ROC)
      9919NCIC-TWNewCenturyInfoCommTechCoLtdTWfalse
      147.200.14.160
      unknownAustralia
      55542RMSNET-AS-APRoadsandMaritimeServicesAUfalse
      150.170.142.115
      unknownUnited States
      26438MONROE-COMMUNITY-COLLEGEUSfalse
      76.2.64.79
      unknownUnited States
      14921CENTURYLINK-LEGACY-EMBARQ-HDRVUSfalse
      81.126.248.41
      unknownItaly
      3269ASN-IBSNAZITfalse
      253.211.173.107
      unknownReserved
      unknownunknownfalse
      31.119.40.0
      unknownUnited Kingdom
      12576EELtdGBfalse
      180.241.233.157
      unknownIndonesia
      7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDfalse
      20.82.204.32
      unknownUnited States
      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      1.3.127.53
      unknownChina
      13335CLOUDFLARENETUSfalse
      95.76.74.187
      unknownRomania
      6830LIBERTYGLOBALLibertyGlobalformerlyUPCBroadbandHoldingfalse
      252.59.166.227
      unknownReserved
      unknownunknownfalse
      86.35.76.176
      unknownRomania
      9050RTDBucharestRomaniaROfalse
      63.59.220.25
      unknownUnited States
      701UUNETUSfalse
      39.162.123.35
      unknownChina
      24445CMNET-V4HENAN-AS-APHenanMobileCommunicationsCoLtdCNfalse
      147.100.61.19
      unknownFrance
      2200FR-RENATERReseauNationaldetelecommunicationspourlaTecfalse
      248.163.189.243
      unknownReserved
      unknownunknownfalse
      187.139.246.120
      unknownMexico
      8151UninetSAdeCVMXfalse
      195.113.110.44
      unknownCzech Republic
      2852CESNET2CZfalse
      177.249.48.53
      unknownMexico
      16960CablevisionRedSAdeCVMXfalse
      202.165.86.173
      unknownAustralia
      10113EFTEL-AS-APEftelLimitedAUfalse
      207.40.248.96
      unknownUnited States
      1239SPRINTLINKUSfalse
      206.230.26.182
      unknownUnited States
      1239SPRINTLINKUSfalse
      174.98.153.220
      unknownUnited States
      10796TWC-10796-MIDWESTUSfalse
      164.28.9.155
      unknownGermany
      29355KCELL-ASKZfalse
      175.8.178.190
      unknownChina
      4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
      73.11.175.211
      unknownUnited States
      7922COMCAST-7922USfalse
      117.7.194.187
      unknownViet Nam
      7552VIETEL-AS-APViettelGroupVNfalse
      77.247.70.31
      unknownDenmark
      31590RACKHOSTING-ASDKfalse
      2.78.150.211
      unknownKazakhstan
      29355KCELL-ASKZfalse
      104.156.200.250
      unknownUnited States
      21743ANL-36USfalse
      174.102.8.48
      unknownUnited States
      10796TWC-10796-MIDWESTUSfalse
      164.4.87.160
      unknownSweden
      44013SANDVIK-ASSEfalse
      197.50.232.231
      unknownEgypt
      8452TE-ASTE-ASEGfalse
      195.66.140.144
      unknownUkraine
      39027BATYEVKA-NET-ASUAfalse
      244.54.225.33
      unknownReserved
      unknownunknownfalse
      32.108.138.1
      unknownUnited States
      2688ATGS-MMD-ASUSfalse
      201.60.59.246
      unknownBrazil
      27699TELEFONICABRASILSABRfalse
      67.34.85.77
      unknownUnited States
      6389BELLSOUTH-NET-BLKUSfalse
      193.252.238.252
      unknownFrance
      3215FranceTelecom-OrangeFRfalse


      Runtime Messages

      Command:/tmp/x86
      Exit Code:0
      Exit Code Info:
      Killed:False
      Standard Output:
      lzrd cock fest'/proc/'/exe
      Standard Error:

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      No context

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      /var/cache/motd-news
      Process:/usr/bin/cut
      File Type:ASCII text
      Category:dropped
      Size (bytes):191
      Entropy (8bit):4.515771857099866
      Encrypted:false
      SSDEEP:3:P2lnI+5MsqqzNLz+FRNScHUBfRau95++sZzR5woLB1Fh0VTGTl/X5kURn:OZ8uNLzDc0pR75+9Zz/woFmIT52URn
      MD5:DD514F892B5F93ED615D366E58AC58AF
      SHA1:BA75EDB3C2232CC260BC187F604DC8F25AA72C11
      SHA-256:F40D0DCE6E83DF74109FEF5E68E51CC255727783EEAE04C3E34677E23F7552CF
      SHA-512:9150BDE63F6C4850C5340D8877892B4D9BBF9EBDC98CDCF557A93FA304C1222CEE446418F5BE2ACCDBF38393778AFA5D4F3EDCB37A47BF57D3A4B2DEAD42A2D0
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: * Super-optimized for small spaces - read how we shrank the memory. footprint of MicroK8s to make it the smallest full K8s around... https://ubuntu.com/blog/microk8s-memory-optimisation.

      Static File Info

      General

      File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
      Entropy (8bit):6.4083584263947255
      TrID:
      • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
      • ELF Executable and Linkable format (generic) (4004/1) 49.84%
      File name:x86
      File size:66136
      MD5:7a4f14429f8c54d68656cfafc8528a34
      SHA1:d892fbd509b99745ee003ed803bc582b9b190ce9
      SHA256:146bbed5eaaf63f99842e41f64ac4771c3622ff9f6db8712a89a0731d4ec6a95
      SHA512:590fdae2eb9c336f5485ab46d7e50b7c5ac0363f293ccdb4c8d7ecc3a8adef67af54d606d33beb319904a1e4553f4944cfc0dd61c575d291e44bba5114b94d1e
      SSDEEP:1536:IoRC9170vwHbQXZ5+qXDEuXi90dSW7V/DjObeFt6PuQ4Zx:PC917iwHbQXZ5+qXA594SWZ/XObeb6G7
      File Content Preview:.ELF....................d...4...........4. ...(..................... ... ...........................................Q.td............................U..S.......w....h........[]...$.............U......=.....t..5....$......$.......u........t....h {..........

      Static ELF Info

      ELF header

      Class:ELF32
      Data:2's complement, little endian
      Version:1 (current)
      Machine:Intel 80386
      Version Number:0x1
      Type:EXEC (Executable file)
      OS/ABI:UNIX - System V
      ABI Version:0
      Entry Point Address:0x8048164
      Flags:0x0
      ELF Header Size:52
      Program Header Offset:52
      Program Header Size:32
      Number of Program Headers:3
      Section Header Offset:65736
      Section Header Size:40
      Number of Section Headers:10
      Header String Table Index:9

      Sections

      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
      NULL0x00x00x00x00x0000
      .initPROGBITS0x80480940x940x1c0x00x6AX001
      .textPROGBITS0x80480b00xb00xe9060x00x6AX0016
      .finiPROGBITS0x80569b60xe9b60x170x00x6AX001
      .rodataPROGBITS0x80569e00xe9e00x11400x00x2A0032
      .ctorsPROGBITS0x80580000x100000x80x00x3WA004
      .dtorsPROGBITS0x80580080x100080x80x00x3WA004
      .dataPROGBITS0x80580200x100200x680x00x3WA004
      .bssNOBITS0x80580a00x100880x8600x00x3WA0032
      .shstrtabSTRTAB0x00x100880x3e0x00x0001

      Program Segments

      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
      LOAD0x00x80480000x80480000xfb200xfb203.85660x5R E0x1000.init .text .fini .rodata
      LOAD0x100000x80580000x80580000x880x9001.08110x6RW 0x1000.ctors .dtors .data .bss
      GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

      Network Behavior

      Network Port Distribution

      TCP Packets

      TimestampSource PortDest PortSource IPDest IP
      Jan 14, 2022 16:49:03.493927002 CET459001791192.168.2.23107.189.12.189
      Jan 14, 2022 16:49:03.494188070 CET5605123192.168.2.23243.37.169.55
      Jan 14, 2022 16:49:03.494209051 CET5605123192.168.2.2335.136.197.55
      Jan 14, 2022 16:49:03.494227886 CET5605123192.168.2.2389.212.117.85
      Jan 14, 2022 16:49:03.494226933 CET5605123192.168.2.23251.241.205.121
      Jan 14, 2022 16:49:03.494237900 CET5605123192.168.2.23250.157.118.1
      Jan 14, 2022 16:49:03.494230986 CET5605123192.168.2.2398.122.69.132
      Jan 14, 2022 16:49:03.494237900 CET5605123192.168.2.2324.87.252.192
      Jan 14, 2022 16:49:03.494266987 CET5605123192.168.2.23198.219.62.200
      Jan 14, 2022 16:49:03.494275093 CET5605123192.168.2.23202.222.25.214
      Jan 14, 2022 16:49:03.494282007 CET5605123192.168.2.23183.23.73.201
      Jan 14, 2022 16:49:03.494287014 CET5605123192.168.2.23165.207.214.42
      Jan 14, 2022 16:49:03.494297981 CET5605123192.168.2.23119.79.202.102
      Jan 14, 2022 16:49:03.494297981 CET5605123192.168.2.2348.75.93.136
      Jan 14, 2022 16:49:03.494313955 CET5605123192.168.2.23197.34.228.50
      Jan 14, 2022 16:49:03.494311094 CET5605123192.168.2.23191.20.42.9
      Jan 14, 2022 16:49:03.494314909 CET5605123192.168.2.23161.87.247.228
      Jan 14, 2022 16:49:03.494322062 CET5605123192.168.2.23107.227.7.215
      Jan 14, 2022 16:49:03.494343996 CET5605123192.168.2.23203.114.238.6
      Jan 14, 2022 16:49:03.494353056 CET5605123192.168.2.23164.142.229.195
      Jan 14, 2022 16:49:03.494359016 CET5605123192.168.2.23119.162.103.213
      Jan 14, 2022 16:49:03.494362116 CET5605123192.168.2.23191.8.159.234
      Jan 14, 2022 16:49:03.495537043 CET5605123192.168.2.23109.22.115.235
      Jan 14, 2022 16:49:03.495554924 CET5605123192.168.2.23135.138.75.14
      Jan 14, 2022 16:49:03.495565891 CET5605123192.168.2.2360.232.21.233
      Jan 14, 2022 16:49:03.495565891 CET5605123192.168.2.23254.170.80.221
      Jan 14, 2022 16:49:03.495569944 CET5605123192.168.2.234.135.61.101
      Jan 14, 2022 16:49:03.495570898 CET5605123192.168.2.23174.126.40.176
      Jan 14, 2022 16:49:03.495578051 CET5605123192.168.2.2342.24.90.226
      Jan 14, 2022 16:49:03.495579004 CET5605123192.168.2.2381.165.92.42
      Jan 14, 2022 16:49:03.495587111 CET5605123192.168.2.2378.222.25.18
      Jan 14, 2022 16:49:03.495589018 CET5605123192.168.2.23184.201.199.67
      Jan 14, 2022 16:49:03.495594978 CET5605123192.168.2.2369.251.93.46
      Jan 14, 2022 16:49:03.495599031 CET5605123192.168.2.23142.122.144.133
      Jan 14, 2022 16:49:03.495600939 CET5605123192.168.2.23182.178.24.227
      Jan 14, 2022 16:49:03.495601892 CET5605123192.168.2.2388.24.163.118
      Jan 14, 2022 16:49:03.495610952 CET5605123192.168.2.23150.170.142.115
      Jan 14, 2022 16:49:03.495614052 CET5605123192.168.2.23101.247.37.89
      Jan 14, 2022 16:49:03.495635033 CET5605123192.168.2.2384.234.37.29
      Jan 14, 2022 16:49:03.495647907 CET5605123192.168.2.23190.146.146.14
      Jan 14, 2022 16:49:03.495659113 CET5605123192.168.2.23144.3.114.9
      Jan 14, 2022 16:49:03.495672941 CET5605123192.168.2.2390.16.177.238
      Jan 14, 2022 16:49:03.495675087 CET5605123192.168.2.23196.82.139.146
      Jan 14, 2022 16:49:03.495678902 CET5605123192.168.2.2327.181.160.181
      Jan 14, 2022 16:49:03.495682001 CET5605123192.168.2.23165.201.208.107
      Jan 14, 2022 16:49:03.495703936 CET5605123192.168.2.23126.20.91.40
      Jan 14, 2022 16:49:03.495708942 CET5605123192.168.2.23213.76.55.61
      Jan 14, 2022 16:49:03.495743036 CET5605123192.168.2.23106.165.195.45
      Jan 14, 2022 16:49:03.495752096 CET5605123192.168.2.2345.209.44.157
      Jan 14, 2022 16:49:03.495757103 CET5605123192.168.2.2331.252.239.67
      Jan 14, 2022 16:49:03.495769978 CET5605123192.168.2.23218.112.34.13
      Jan 14, 2022 16:49:03.495771885 CET5605123192.168.2.23133.109.206.58
      Jan 14, 2022 16:49:03.495773077 CET5605123192.168.2.23171.32.251.240
      Jan 14, 2022 16:49:03.495776892 CET5605123192.168.2.23169.130.138.123
      Jan 14, 2022 16:49:03.495810032 CET5605123192.168.2.23218.152.45.181
      Jan 14, 2022 16:49:03.495811939 CET5605123192.168.2.23115.205.230.231
      Jan 14, 2022 16:49:03.495822906 CET5605123192.168.2.2360.77.211.199
      Jan 14, 2022 16:49:03.495832920 CET5605123192.168.2.2378.104.112.106
      Jan 14, 2022 16:49:03.495839119 CET5605123192.168.2.23113.169.201.101
      Jan 14, 2022 16:49:03.495846987 CET5605123192.168.2.23172.227.121.106
      Jan 14, 2022 16:49:03.495855093 CET5605123192.168.2.23211.41.137.85
      Jan 14, 2022 16:49:03.495862007 CET5605123192.168.2.23110.13.0.233
      Jan 14, 2022 16:49:03.495862007 CET5605123192.168.2.23179.68.169.85
      Jan 14, 2022 16:49:03.495862961 CET5605123192.168.2.23157.44.38.200
      Jan 14, 2022 16:49:03.495863914 CET5605123192.168.2.23101.218.97.48
      Jan 14, 2022 16:49:03.495865107 CET5605123192.168.2.23101.150.163.235
      Jan 14, 2022 16:49:03.495867014 CET5605123192.168.2.23118.134.88.107
      Jan 14, 2022 16:49:03.495868921 CET5605123192.168.2.23204.24.236.48
      Jan 14, 2022 16:49:03.495882034 CET5605123192.168.2.23241.203.59.238
      Jan 14, 2022 16:49:03.495893955 CET5605123192.168.2.2377.249.181.147
      Jan 14, 2022 16:49:03.495902061 CET5605123192.168.2.23156.108.68.118
      Jan 14, 2022 16:49:03.495909929 CET5605123192.168.2.23119.24.8.255
      Jan 14, 2022 16:49:03.495917082 CET5605123192.168.2.23181.30.138.216
      Jan 14, 2022 16:49:03.495927095 CET5605123192.168.2.23177.254.1.206
      Jan 14, 2022 16:49:03.495932102 CET5605123192.168.2.23161.229.43.226
      Jan 14, 2022 16:49:03.495932102 CET5605123192.168.2.23218.242.245.21
      Jan 14, 2022 16:49:03.495933056 CET5605123192.168.2.23192.135.34.33
      Jan 14, 2022 16:49:03.495934010 CET5605123192.168.2.2378.151.203.223
      Jan 14, 2022 16:49:03.495932102 CET5605123192.168.2.23196.229.26.247
      Jan 14, 2022 16:49:03.495939970 CET5605123192.168.2.23179.26.100.88
      Jan 14, 2022 16:49:03.495944977 CET5605123192.168.2.2338.151.184.175
      Jan 14, 2022 16:49:03.495949030 CET5605123192.168.2.2353.124.0.146
      Jan 14, 2022 16:49:03.496011019 CET5605123192.168.2.23147.51.19.153
      Jan 14, 2022 16:49:03.496015072 CET5605123192.168.2.23155.251.203.58
      Jan 14, 2022 16:49:03.496020079 CET5605123192.168.2.23189.128.193.232
      Jan 14, 2022 16:49:03.496021032 CET5605123192.168.2.23164.39.119.160
      Jan 14, 2022 16:49:03.496023893 CET5605123192.168.2.23121.111.152.8
      Jan 14, 2022 16:49:03.496025085 CET5605123192.168.2.2345.132.3.167
      Jan 14, 2022 16:49:03.496023893 CET5605123192.168.2.2372.228.47.33
      Jan 14, 2022 16:49:03.496025085 CET5605123192.168.2.23208.80.104.231
      Jan 14, 2022 16:49:03.496031046 CET5605123192.168.2.2399.228.146.144
      Jan 14, 2022 16:49:03.496031046 CET5605123192.168.2.2371.244.230.226
      Jan 14, 2022 16:49:03.496033907 CET5605123192.168.2.23217.253.22.107
      Jan 14, 2022 16:49:03.496037960 CET5605123192.168.2.2362.160.128.68
      Jan 14, 2022 16:49:03.496048927 CET5605123192.168.2.2375.253.223.171
      Jan 14, 2022 16:49:03.496053934 CET5605123192.168.2.239.207.193.194
      Jan 14, 2022 16:49:03.496056080 CET5605123192.168.2.23116.230.228.53
      Jan 14, 2022 16:49:03.496062994 CET5605123192.168.2.23124.165.104.193
      Jan 14, 2022 16:49:03.496067047 CET5605123192.168.2.23196.19.177.106
      Jan 14, 2022 16:49:03.496071100 CET5605123192.168.2.23118.60.99.50

      System Behavior

      General

      Start time:16:48:52
      Start date:14/01/2022
      Path:/usr/bin/dash
      Arguments:n/a
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      General

      Start time:16:48:52
      Start date:14/01/2022
      Path:/usr/bin/cat
      Arguments:cat /tmp/tmp.jjJ0hUD84m
      File size:43416 bytes
      MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

      General

      Start time:16:48:52
      Start date:14/01/2022
      Path:/usr/bin/dash
      Arguments:n/a
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      General

      Start time:16:48:52
      Start date:14/01/2022
      Path:/usr/bin/head
      Arguments:head -n 10
      File size:47480 bytes
      MD5 hash:fd96a67145172477dd57131396fc9608

      General

      Start time:16:48:52
      Start date:14/01/2022
      Path:/usr/bin/dash
      Arguments:n/a
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      General

      Start time:16:48:52
      Start date:14/01/2022
      Path:/usr/bin/tr
      Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
      File size:51544 bytes
      MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

      General

      Start time:16:48:52
      Start date:14/01/2022
      Path:/usr/bin/dash
      Arguments:n/a
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      General

      Start time:16:48:52
      Start date:14/01/2022
      Path:/usr/bin/cut
      Arguments:cut -c -80
      File size:47480 bytes
      MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

      General

      Start time:16:48:53
      Start date:14/01/2022
      Path:/usr/bin/dash
      Arguments:n/a
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      General

      Start time:16:48:53
      Start date:14/01/2022
      Path:/usr/bin/cat
      Arguments:cat /tmp/tmp.jjJ0hUD84m
      File size:43416 bytes
      MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

      General

      Start time:16:48:53
      Start date:14/01/2022
      Path:/usr/bin/dash
      Arguments:n/a
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      General

      Start time:16:48:53
      Start date:14/01/2022
      Path:/usr/bin/head
      Arguments:head -n 10
      File size:47480 bytes
      MD5 hash:fd96a67145172477dd57131396fc9608

      General

      Start time:16:48:53
      Start date:14/01/2022
      Path:/usr/bin/dash
      Arguments:n/a
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      General

      Start time:16:48:53
      Start date:14/01/2022
      Path:/usr/bin/tr
      Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
      File size:51544 bytes
      MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

      General

      Start time:16:48:53
      Start date:14/01/2022
      Path:/usr/bin/dash
      Arguments:n/a
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      General

      Start time:16:48:53
      Start date:14/01/2022
      Path:/usr/bin/cut
      Arguments:cut -c -80
      File size:47480 bytes
      MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

      General

      Start time:16:48:53
      Start date:14/01/2022
      Path:/usr/bin/dash
      Arguments:n/a
      File size:129816 bytes
      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

      General

      Start time:16:48:53
      Start date:14/01/2022
      Path:/usr/bin/rm
      Arguments:rm -f /tmp/tmp.jjJ0hUD84m /tmp/tmp.W8UIKPggkC /tmp/tmp.KmcGhooTuj
      File size:72056 bytes
      MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

      General

      Start time:16:49:02
      Start date:14/01/2022
      Path:/tmp/x86
      Arguments:/tmp/x86
      File size:66136 bytes
      MD5 hash:7a4f14429f8c54d68656cfafc8528a34

      General

      Start time:16:49:02
      Start date:14/01/2022
      Path:/tmp/x86
      Arguments:n/a
      File size:66136 bytes
      MD5 hash:7a4f14429f8c54d68656cfafc8528a34

      General

      Start time:16:49:02
      Start date:14/01/2022
      Path:/tmp/x86
      Arguments:n/a
      File size:66136 bytes
      MD5 hash:7a4f14429f8c54d68656cfafc8528a34

      General

      Start time:16:49:02
      Start date:14/01/2022
      Path:/tmp/x86
      Arguments:n/a
      File size:66136 bytes
      MD5 hash:7a4f14429f8c54d68656cfafc8528a34

      General

      Start time:16:49:02
      Start date:14/01/2022
      Path:/tmp/x86
      Arguments:n/a
      File size:66136 bytes
      MD5 hash:7a4f14429f8c54d68656cfafc8528a34

      General

      Start time:16:49:02
      Start date:14/01/2022
      Path:/tmp/x86
      Arguments:n/a
      File size:66136 bytes
      MD5 hash:7a4f14429f8c54d68656cfafc8528a34

      General

      Start time:16:49:02
      Start date:14/01/2022
      Path:/tmp/x86
      Arguments:n/a
      File size:66136 bytes
      MD5 hash:7a4f14429f8c54d68656cfafc8528a34