Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
PPyJlaRy0K

Overview

General Information

Sample Name:PPyJlaRy0K
Analysis ID:679491
MD5:6e38620768d8b3cd84319f2ee3d4235d
SHA1:64a0eb90426549c47177b6d3f927a6fa7cd19cba
SHA256:0d69d7b91837715976e968862b79a944fe3d074713ce2d80f678af5993df75ed
Tags:32elfmiraimotorola
Infos:

Detection

Mirai
Score:68
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected Mirai
Multi AV Scanner detection for submitted file
Sample deletes itself
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket
Sample tries to kill a process (SIGKILL)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Joe Sandbox Version:35.0.0 Citrine
Analysis ID:679491
Start date and time: 05/08/202221:53:082022-08-05 21:53:08 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 40s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:PPyJlaRy0K
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Detection:MAL
Classification:mal68.troj.evad.lin@0/0@0/0
  • Report size exceeded maximum capacity and may have missing network information.
  • TCP Packets have been reduced to 100
Command:/tmp/PPyJlaRy0K
PID:6234
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
BEASTMODE-BITCHES@@"/proc
Standard Error:
  • system is lnxubuntu20
  • PPyJlaRy0K (PID: 6234, Parent: 6124, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/PPyJlaRy0K
  • cleanup
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Mirai_12Yara detected MiraiJoe Security
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: PPyJlaRy0KAvira: detected
    Source: PPyJlaRy0KVirustotal: Detection: 59%Perma Link
    Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
    Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
    Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
    Source: global trafficTCP traffic: 192.168.2.23:53692 -> 163.123.143.71:34241
    Source: /tmp/PPyJlaRy0K (PID: 6234)Socket: 127.0.0.1::42516
    Source: /tmp/PPyJlaRy0K (PID: 6236)Socket: 0.0.0.0::23
    Source: /tmp/PPyJlaRy0K (PID: 6236)Socket: 0.0.0.0::0
    Source: /tmp/PPyJlaRy0K (PID: 6236)Socket: 0.0.0.0::80
    Source: /tmp/PPyJlaRy0K (PID: 6236)Socket: 0.0.0.0::81
    Source: /tmp/PPyJlaRy0K (PID: 6236)Socket: 0.0.0.0::8443
    Source: /tmp/PPyJlaRy0K (PID: 6236)Socket: 0.0.0.0::9009
    Source: /tmp/PPyJlaRy0K (PID: 6249)Socket: 0.0.0.0::23
    Source: /tmp/PPyJlaRy0K (PID: 6249)Socket: 0.0.0.0::0
    Source: /tmp/PPyJlaRy0K (PID: 6249)Socket: 0.0.0.0::80
    Source: /tmp/PPyJlaRy0K (PID: 6249)Socket: 0.0.0.0::81
    Source: /tmp/PPyJlaRy0K (PID: 6249)Socket: 0.0.0.0::8443
    Source: /tmp/PPyJlaRy0K (PID: 6249)Socket: 0.0.0.0::9009
    Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
    Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
    Source: unknownTCP traffic detected without corresponding DNS query: 100.217.179.67
    Source: unknownTCP traffic detected without corresponding DNS query: 85.89.248.250
    Source: unknownTCP traffic detected without corresponding DNS query: 73.188.248.66
    Source: unknownTCP traffic detected without corresponding DNS query: 37.57.196.67
    Source: unknownTCP traffic detected without corresponding DNS query: 24.226.175.162
    Source: unknownTCP traffic detected without corresponding DNS query: 255.45.201.130
    Source: unknownTCP traffic detected without corresponding DNS query: 118.6.202.2
    Source: unknownTCP traffic detected without corresponding DNS query: 103.23.121.53
    Source: unknownTCP traffic detected without corresponding DNS query: 37.16.119.250
    Source: unknownTCP traffic detected without corresponding DNS query: 72.255.62.167
    Source: unknownTCP traffic detected without corresponding DNS query: 250.44.70.188
    Source: unknownTCP traffic detected without corresponding DNS query: 158.62.134.130
    Source: unknownTCP traffic detected without corresponding DNS query: 69.240.254.252
    Source: unknownTCP traffic detected without corresponding DNS query: 216.52.158.24
    Source: unknownTCP traffic detected without corresponding DNS query: 149.245.247.81
    Source: unknownTCP traffic detected without corresponding DNS query: 221.76.76.236
    Source: unknownTCP traffic detected without corresponding DNS query: 90.119.253.21
    Source: unknownTCP traffic detected without corresponding DNS query: 63.146.227.93
    Source: unknownTCP traffic detected without corresponding DNS query: 20.255.244.64
    Source: unknownTCP traffic detected without corresponding DNS query: 108.95.111.113
    Source: unknownTCP traffic detected without corresponding DNS query: 24.7.228.58
    Source: unknownTCP traffic detected without corresponding DNS query: 182.40.146.73
    Source: unknownTCP traffic detected without corresponding DNS query: 101.168.167.150
    Source: unknownTCP traffic detected without corresponding DNS query: 190.188.150.35
    Source: unknownTCP traffic detected without corresponding DNS query: 67.164.195.154
    Source: unknownTCP traffic detected without corresponding DNS query: 246.92.76.37
    Source: unknownTCP traffic detected without corresponding DNS query: 14.138.46.56
    Source: unknownTCP traffic detected without corresponding DNS query: 248.87.218.6
    Source: unknownTCP traffic detected without corresponding DNS query: 62.64.250.35
    Source: unknownTCP traffic detected without corresponding DNS query: 220.236.59.178
    Source: unknownTCP traffic detected without corresponding DNS query: 222.97.96.168
    Source: unknownTCP traffic detected without corresponding DNS query: 45.255.238.141
    Source: unknownTCP traffic detected without corresponding DNS query: 68.21.122.98
    Source: unknownTCP traffic detected without corresponding DNS query: 219.235.198.222
    Source: unknownTCP traffic detected without corresponding DNS query: 71.61.180.90
    Source: unknownTCP traffic detected without corresponding DNS query: 254.136.234.105
    Source: unknownTCP traffic detected without corresponding DNS query: 87.239.133.13
    Source: unknownTCP traffic detected without corresponding DNS query: 216.14.185.220
    Source: unknownTCP traffic detected without corresponding DNS query: 94.142.216.192
    Source: unknownTCP traffic detected without corresponding DNS query: 149.105.76.88
    Source: unknownTCP traffic detected without corresponding DNS query: 157.45.195.215
    Source: unknownTCP traffic detected without corresponding DNS query: 53.99.102.21
    Source: unknownTCP traffic detected without corresponding DNS query: 5.75.255.80
    Source: unknownTCP traffic detected without corresponding DNS query: 216.205.196.93
    Source: unknownTCP traffic detected without corresponding DNS query: 158.76.172.152
    Source: unknownTCP traffic detected without corresponding DNS query: 39.154.236.34
    Source: unknownTCP traffic detected without corresponding DNS query: 213.170.199.110
    Source: unknownTCP traffic detected without corresponding DNS query: 133.57.200.77
    Source: ELF static info symbol of initial sample.symtab present: no
    Source: /tmp/PPyJlaRy0K (PID: 6236)SIGKILL sent: pid: 936, result: successful
    Source: /tmp/PPyJlaRy0K (PID: 6249)SIGKILL sent: pid: 6236, result: successful
    Source: /tmp/PPyJlaRy0K (PID: 6249)SIGKILL sent: pid: 936, result: successful
    Source: /tmp/PPyJlaRy0K (PID: 6249)SIGKILL sent: pid: 759, result: successful
    Source: /tmp/PPyJlaRy0K (PID: 6249)SIGKILL sent: pid: 6239, result: successful
    Source: /tmp/PPyJlaRy0K (PID: 6249)SIGKILL sent: pid: 6253, result: successful
    Source: classification engineClassification label: mal68.troj.evad.lin@0/0@0/0
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/491/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/793/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/772/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/796/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/774/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/797/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/777/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/799/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/658/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/912/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/759/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/936/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/918/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/1/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/761/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/785/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/884/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/720/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/721/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/788/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/789/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/800/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/801/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/847/fd
    Source: /tmp/PPyJlaRy0K (PID: 6236)File opened: /proc/904/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/6236/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2033/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2033/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1582/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1582/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2275/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2275/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/3088/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1612/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1612/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1579/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1579/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1699/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1699/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1335/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1335/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1698/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1698/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2028/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2028/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1334/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1334/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1576/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1576/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2302/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2302/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/3236/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/3236/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2025/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2025/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2146/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2146/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/910/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/912/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/912/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/912/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/759/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/759/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/759/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/517/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2307/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2307/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/918/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/918/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/918/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1594/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1594/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2285/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2285/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2281/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2281/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1349/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1349/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1623/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1623/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/761/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/761/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/761/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1622/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1622/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/884/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/884/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/884/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1983/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1983/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2038/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2038/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1586/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1586/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1465/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1465/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1344/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1344/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1860/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1860/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1463/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/1463/exe
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2156/fd
    Source: /tmp/PPyJlaRy0K (PID: 6249)File opened: /proc/2156/exe

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: /tmp/PPyJlaRy0K (PID: 6234)File: /tmp/PPyJlaRy0KJump to behavior
    Source: /tmp/PPyJlaRy0K (PID: 6234)Queries kernel information via 'uname':
    Source: PPyJlaRy0K, 6234.1.000055c62598f000.000055c625a14000.rw-.sdmp, PPyJlaRy0K, 6236.1.000055c62598f000.000055c625a14000.rw-.sdmp, PPyJlaRy0K, 6238.1.000055c62598f000.000055c625a14000.rw-.sdmp, PPyJlaRy0K, 6239.1.000055c62598f000.000055c625a14000.rw-.sdmp, PPyJlaRy0K, 6251.1.000055c62598f000.000055c625a14000.rw-.sdmp, PPyJlaRy0K, 6253.1.000055c62598f000.000055c625a14000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/m68k
    Source: PPyJlaRy0K, 6234.1.00007ffdba0a2000.00007ffdba0c3000.rw-.sdmp, PPyJlaRy0K, 6236.1.00007ffdba0a2000.00007ffdba0c3000.rw-.sdmp, PPyJlaRy0K, 6238.1.00007ffdba0a2000.00007ffdba0c3000.rw-.sdmp, PPyJlaRy0K, 6239.1.00007ffdba0a2000.00007ffdba0c3000.rw-.sdmp, PPyJlaRy0K, 6251.1.00007ffdba0a2000.00007ffdba0c3000.rw-.sdmp, PPyJlaRy0K, 6253.1.00007ffdba0a2000.00007ffdba0c3000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
    Source: PPyJlaRy0K, 6234.1.000055c62598f000.000055c625a14000.rw-.sdmp, PPyJlaRy0K, 6236.1.000055c62598f000.000055c625a14000.rw-.sdmp, PPyJlaRy0K, 6238.1.000055c62598f000.000055c625a14000.rw-.sdmp, PPyJlaRy0K, 6239.1.000055c62598f000.000055c625a14000.rw-.sdmp, PPyJlaRy0K, 6251.1.000055c62598f000.000055c625a14000.rw-.sdmp, PPyJlaRy0K, 6253.1.000055c62598f000.000055c625a14000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
    Source: PPyJlaRy0K, 6234.1.00007ffdba0a2000.00007ffdba0c3000.rw-.sdmp, PPyJlaRy0K, 6236.1.00007ffdba0a2000.00007ffdba0c3000.rw-.sdmp, PPyJlaRy0K, 6238.1.00007ffdba0a2000.00007ffdba0c3000.rw-.sdmp, PPyJlaRy0K, 6239.1.00007ffdba0a2000.00007ffdba0c3000.rw-.sdmp, PPyJlaRy0K, 6251.1.00007ffdba0a2000.00007ffdba0c3000.rw-.sdmp, PPyJlaRy0K, 6253.1.00007ffdba0a2000.00007ffdba0c3000.rw-.sdmpBinary or memory string: 1?%/x86_64/usr/bin/qemu-m68k/tmp/PPyJlaRy0KSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/PPyJlaRy0K

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: dump.pcap, type: PCAP

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: dump.pcap, type: PCAP
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
    File Deletion
    1
    OS Credential Dumping
    11
    Security Software Discovery
    Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    No configs have been found
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 679491 Sample: PPyJlaRy0K Startdate: 05/08/2022 Architecture: LINUX Score: 68 25 156.92.39.26, 23 WAL-MARTUS United States 2->25 27 77.229.193.239 VODAFONE_ESES Spain 2->27 29 98 other IPs or domains 2->29 31 Antivirus / Scanner detection for submitted sample 2->31 33 Multi AV Scanner detection for submitted file 2->33 35 Yara detected Mirai 2->35 8 PPyJlaRy0K 2->8         started        signatures3 process4 signatures5 37 Sample deletes itself 8->37 11 PPyJlaRy0K 8->11         started        13 PPyJlaRy0K 8->13         started        15 PPyJlaRy0K 8->15         started        17 PPyJlaRy0K 8->17         started        process6 process7 19 PPyJlaRy0K 11->19         started        21 PPyJlaRy0K 11->21         started        23 PPyJlaRy0K 11->23         started       
    SourceDetectionScannerLabelLink
    PPyJlaRy0K60%VirustotalBrowse
    PPyJlaRy0K100%AviraLINUX/Mirai.bonb
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    62.140.95.229
    unknownEgypt
    36992ETISALAT-MISREGfalse
    144.44.131.254
    unknownEuropean Union
    21286KPN-CORPORATE-MARKETNLfalse
    48.239.135.196
    unknownUnited States
    2686ATGS-MMD-ASUSfalse
    63.140.123.191
    unknownUnited States
    7782ALSK-7782USfalse
    206.50.86.49
    unknownUnited States
    2914NTT-COMMUNICATIONS-2914USfalse
    35.198.197.229
    unknownUnited States
    15169GOOGLEUSfalse
    206.49.61.98
    unknownUnited States
    5511OPENTRANSITFRfalse
    211.1.137.125
    unknownJapan7670CTNETEnergiaCommunicationsIncJPfalse
    77.229.193.239
    unknownSpain
    12430VODAFONE_ESESfalse
    110.167.255.14
    unknownChina
    4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
    85.36.243.95
    unknownItaly
    3269ASN-IBSNAZITfalse
    38.198.245.85
    unknownUnited States
    174COGENT-174USfalse
    112.24.113.121
    unknownChina
    56046CMNET-JIANGSU-APChinaMobilecommunicationscorporationCNfalse
    107.157.252.28
    unknownUnited States
    7065SONOMAUSfalse
    20.41.197.186
    unknownUnited States
    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
    115.27.36.214
    unknownChina
    24349CNGI-BJ-IX3-AS-APCERNET2IXatPekingUniversityCNfalse
    18.158.195.5
    unknownUnited States
    16509AMAZON-02USfalse
    164.179.118.105
    unknownUnited States
    37717EL-KhawarizmiTNfalse
    19.88.233.149
    unknownUnited States
    3MIT-GATEWAYSUSfalse
    53.95.225.43
    unknownGermany
    31399DAIMLER-ASITIGNGlobalNetworkDEfalse
    156.92.39.26
    unknownUnited States
    10695WAL-MARTUSfalse
    108.69.103.251
    unknownUnited States
    7018ATT-INTERNET4USfalse
    48.188.11.242
    unknownUnited States
    2686ATGS-MMD-ASUSfalse
    141.61.172.159
    unknownGermany
    680DFNVereinzurFoerderungeinesDeutschenForschungsnetzesefalse
    249.224.32.81
    unknownReserved
    unknownunknownfalse
    89.191.53.233
    unknownIreland
    34912IFN-ASIEfalse
    203.175.15.185
    unknownHong Kong
    132422TELECOM-HKHongKongTelecomGlobalDataCentreHKfalse
    70.53.164.81
    unknownCanada
    577BACOMCAfalse
    185.93.212.192
    unknownAustria
    5405CSO_NETATfalse
    80.129.10.249
    unknownGermany
    3320DTAGInternetserviceprovideroperationsDEfalse
    48.188.58.235
    unknownUnited States
    2686ATGS-MMD-ASUSfalse
    101.128.154.220
    unknownJapan2497IIJInternetInitiativeJapanIncJPfalse
    212.200.150.44
    unknownSerbia
    8400TELEKOM-ASRSfalse
    101.25.171.135
    unknownChina
    4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
    252.233.82.244
    unknownReserved
    unknownunknownfalse
    195.240.221.173
    unknownNetherlands
    1136KPNKPNNationalEUfalse
    90.229.219.156
    unknownSweden
    3301TELIANET-SWEDENTeliaCompanySEfalse
    217.204.215.106
    unknownUnited Kingdom
    4589EASYNETEasynetGlobalServicesEUfalse
    53.175.161.109
    unknownGermany
    31399DAIMLER-ASITIGNGlobalNetworkDEfalse
    109.145.152.50
    unknownUnited Kingdom
    2856BT-UK-ASBTnetUKRegionalnetworkGBfalse
    192.197.244.49
    unknownCanada
    40119NAITCAfalse
    187.245.174.172
    unknownMexico
    13999MegaCableSAdeCVMXfalse
    122.132.163.153
    unknownJapan2518BIGLOBEBIGLOBEIncJPfalse
    140.251.58.29
    unknownUnited States
    20252JSIWMCUSfalse
    93.2.49.28
    unknownFrance
    15557LDCOMNETFRfalse
    123.26.120.242
    unknownViet Nam
    45899VNPT-AS-VNVNPTCorpVNfalse
    136.236.253.143
    unknownUnited States
    55836RELIANCEJIO-INRelianceJioInfocommLimitedINfalse
    105.34.73.29
    unknownEgypt
    37069MOBINILEGfalse
    117.124.229.145
    unknownChina
    7641CHINABTNChinaBroadcastingTVNetCNfalse
    170.80.238.157
    unknownBrazil
    264900RJNETTelecomunicacoesLtdaMEBRfalse
    79.206.197.157
    unknownGermany
    3320DTAGInternetserviceprovideroperationsDEfalse
    83.216.89.97
    unknownUnited Kingdom
    29009UKBROADBAND-ASGBfalse
    47.148.154.31
    unknownUnited States
    5650FRONTIER-FRTRUSfalse
    145.184.172.234
    unknownNetherlands
    59524KPN-IAASNLfalse
    202.39.18.22
    unknownTaiwan; Republic of China (ROC)
    3462HINETDataCommunicationBusinessGroupTWfalse
    9.58.225.2
    unknownUnited States
    3356LEVEL3USfalse
    118.140.192.89
    unknownHong Kong
    9304HUTCHISON-AS-APHGCGlobalCommunicationsLimitedHKfalse
    58.249.118.249
    unknownChina
    17622CNCGROUP-GZChinaUnicomGuangzhounetworkCNfalse
    80.157.211.142
    unknownGermany
    3320DTAGInternetserviceprovideroperationsDEfalse
    157.176.156.215
    unknownUnited States
    22192SSHENETUSfalse
    34.139.83.202
    unknownUnited States
    2686ATGS-MMD-ASUSfalse
    106.83.177.81
    unknownChina
    4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
    38.89.199.238
    unknownUnited States
    174COGENT-174USfalse
    205.162.26.114
    unknownUnited States
    1239SPRINTLINKUSfalse
    85.135.185.167
    unknownSlovakia (SLOVAK Republic)
    8257SLOVANET-BROADBANDhttpwwwslovanetnetSKfalse
    5.195.158.253
    unknownUnited Arab Emirates
    5384EMIRATES-INTERNETEmiratesInternetAEfalse
    70.177.73.27
    unknownUnited States
    22773ASN-CXA-ALL-CCI-22773-RDCUSfalse
    183.9.56.234
    unknownChina
    4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
    245.20.165.139
    unknownReserved
    unknownunknownfalse
    2.135.247.76
    unknownKazakhstan
    9198KAZTELECOM-ASKZfalse
    116.151.71.20
    unknownChina
    4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
    80.15.108.19
    unknownFrance
    3215FranceTelecom-OrangeFRfalse
    175.201.107.84
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    146.24.16.91
    unknownUnited States
    197938TRAVIANGAMESDEfalse
    16.229.63.233
    unknownUnited States
    unknownunknownfalse
    242.240.230.159
    unknownReserved
    unknownunknownfalse
    141.1.99.63
    unknownGermany
    1273CWVodafoneGroupPLCEUfalse
    212.189.34.190
    unknownNetherlands
    286KPNNLfalse
    250.203.44.27
    unknownReserved
    unknownunknownfalse
    87.135.183.102
    unknownGermany
    3320DTAGInternetserviceprovideroperationsDEfalse
    98.103.113.20
    unknownUnited States
    10796TWC-10796-MIDWESTUSfalse
    135.1.189.43
    unknownUnited States
    10455LUCENT-CIOUSfalse
    175.252.70.19
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    73.252.98.90
    unknownUnited States
    7922COMCAST-7922USfalse
    12.155.145.176
    unknownUnited States
    7018ATT-INTERNET4USfalse
    151.193.122.24
    unknownUnited States
    13945PRISMTECHNOLOGIESABQUSfalse
    145.235.141.99
    unknownSweden
    1257TELE2EUfalse
    250.6.231.16
    unknownReserved
    unknownunknownfalse
    46.191.173.29
    unknownRussian Federation
    24955UBN-ASRUfalse
    197.251.50.171
    unknownSudan
    37197SUDRENSDfalse
    161.211.117.223
    unknownUnited States
    14513DMACCUSfalse
    152.0.229.102
    unknownDominican Republic
    6400CompaniaDominicanadeTelefonosSADOfalse
    66.43.252.243
    unknownUnited States
    5056AUREON-5056USfalse
    37.96.237.17
    unknownDenmark
    9158TELENOR_DANMARK_ASDKfalse
    23.1.146.48
    unknownUnited States
    6762SEABONE-NETTELECOMITALIASPARKLESpAITfalse
    205.143.2.90
    unknownUnited States
    30404BSCL-11USfalse
    169.11.240.130
    unknownUnited States
    203CENTURYLINK-LEGACY-LVLT-203USfalse
    145.161.131.111
    unknownNetherlands
    59524KPN-IAASNLfalse
    115.120.47.40
    unknownChina
    4847CNIX-APChinaNetworksInter-ExchangeCNfalse
    18.247.1.132
    unknownUnited States
    16509AMAZON-02USfalse
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
    Entropy (8bit):6.3139750011225555
    TrID:
    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
    File name:PPyJlaRy0K
    File size:61576
    MD5:6e38620768d8b3cd84319f2ee3d4235d
    SHA1:64a0eb90426549c47177b6d3f927a6fa7cd19cba
    SHA256:0d69d7b91837715976e968862b79a944fe3d074713ce2d80f678af5993df75ed
    SHA512:aed43619bb54c0c9a61f25166820e0ea99756fb427faa96958af0a4ae26e7ee4d8af86eadf87441cd2d9c3649707329873262307d171577197cb26093687d38e
    SSDEEP:1536:soBAmWmHv11dPBEMURJA87HONbg1pr8QOEawj0GKLUKQf8V:s0wMqeuprJFjsVQG
    TLSH:DE535CD9B8019E7DF58BEABE40224E0BF532761154921B377733FD83BD32169A816D0A
    File Content Preview:.ELF.......................D...4.........4. ...(.................................. ....................(.......... .dt.Q............................NV..a....da.....N^NuNV..J9....f>"y.... QJ.g.X.#.....N."y.... QJ.f.A.....J.g.Hy....N.X.........N^NuNV..N^NuN

    ELF header

    Class:ELF32
    Data:2's complement, big endian
    Version:1 (current)
    Machine:MC68000
    Version Number:0x1
    Type:EXEC (Executable file)
    OS/ABI:UNIX - System V
    ABI Version:0
    Entry Point Address:0x80000144
    Flags:0x0
    ELF Header Size:52
    Program Header Offset:52
    Program Header Size:32
    Number of Program Headers:3
    Section Header Offset:61176
    Section Header Size:40
    Number of Section Headers:10
    Header String Table Index:9
    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
    NULL0x00x00x00x00x0000
    .initPROGBITS0x800000940x940x140x00x6AX002
    .textPROGBITS0x800000a80xa80xe22a0x00x6AX004
    .finiPROGBITS0x8000e2d20xe2d20xe0x00x6AX002
    .rodataPROGBITS0x8000e2e00xe2e00x9aa0x00x2A002
    .ctorsPROGBITS0x80010c900xec900x80x00x3WA004
    .dtorsPROGBITS0x80010c980xec980x80x00x3WA004
    .dataPROGBITS0x80010ca40xeca40x2140x00x3WA004
    .bssNOBITS0x80010eb80xeeb80x4740x00x3WA004
    .shstrtabSTRTAB0x00xeeb80x3e0x00x0001
    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
    LOAD0x00x800000000x800000000xec8a0xec8a6.34600x5R E0x2000.init .text .fini .rodata
    LOAD0xec900x80010c900x80010c900x2280x69c3.00610x6RW 0x2000.ctors .dtors .data .bss
    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
    TimestampSource PortDest PortSource IPDest IP
    Aug 5, 2022 21:53:54.976671934 CEST42836443192.168.2.2391.189.91.43
    Aug 5, 2022 21:53:55.744803905 CEST4251680192.168.2.23109.202.202.202
    Aug 5, 2022 21:53:56.542227030 CEST2233623192.168.2.2387.210.246.66
    Aug 5, 2022 21:53:56.542334080 CEST2233623192.168.2.23100.217.179.67
    Aug 5, 2022 21:53:56.542356014 CEST2233623192.168.2.2385.89.248.250
    Aug 5, 2022 21:53:56.542360067 CEST2233623192.168.2.2373.188.248.66
    Aug 5, 2022 21:53:56.542397022 CEST2233623192.168.2.2337.57.196.67
    Aug 5, 2022 21:53:56.542418957 CEST2233623192.168.2.2324.226.175.162
    Aug 5, 2022 21:53:56.542423964 CEST2233623192.168.2.23255.45.201.130
    Aug 5, 2022 21:53:56.542480946 CEST2233623192.168.2.23118.6.202.2
    Aug 5, 2022 21:53:56.542495966 CEST2233623192.168.2.23103.23.121.53
    Aug 5, 2022 21:53:56.542499065 CEST2233623192.168.2.2337.16.119.250
    Aug 5, 2022 21:53:56.542509079 CEST2233623192.168.2.2372.255.62.167
    Aug 5, 2022 21:53:56.542521954 CEST2233623192.168.2.23250.44.70.188
    Aug 5, 2022 21:53:56.542536974 CEST2233623192.168.2.23158.62.134.130
    Aug 5, 2022 21:53:56.542555094 CEST2233623192.168.2.2369.240.254.252
    Aug 5, 2022 21:53:56.542558908 CEST2233623192.168.2.23216.52.158.24
    Aug 5, 2022 21:53:56.542565107 CEST2233623192.168.2.23149.245.247.81
    Aug 5, 2022 21:53:56.542568922 CEST2233623192.168.2.23221.76.76.236
    Aug 5, 2022 21:53:56.542577028 CEST2233623192.168.2.2390.119.253.21
    Aug 5, 2022 21:53:56.542578936 CEST2233623192.168.2.2363.146.227.93
    Aug 5, 2022 21:53:56.542613029 CEST2233623192.168.2.2320.255.244.64
    Aug 5, 2022 21:53:56.542624950 CEST2233623192.168.2.23108.95.111.113
    Aug 5, 2022 21:53:56.542644024 CEST2233623192.168.2.2324.7.228.58
    Aug 5, 2022 21:53:56.542659998 CEST2233623192.168.2.23182.40.146.73
    Aug 5, 2022 21:53:56.542670965 CEST2233623192.168.2.23101.168.167.150
    Aug 5, 2022 21:53:56.542727947 CEST2233623192.168.2.23190.188.150.35
    Aug 5, 2022 21:53:56.542731047 CEST2233623192.168.2.23110.181.146.188
    Aug 5, 2022 21:53:56.542742014 CEST2233623192.168.2.23165.210.218.182
    Aug 5, 2022 21:53:56.542768002 CEST2233623192.168.2.2367.164.195.154
    Aug 5, 2022 21:53:56.542787075 CEST2233623192.168.2.23246.92.76.37
    Aug 5, 2022 21:53:56.542800903 CEST2233623192.168.2.2314.138.46.56
    Aug 5, 2022 21:53:56.542809963 CEST2233623192.168.2.23248.87.218.6
    Aug 5, 2022 21:53:56.542810917 CEST2233623192.168.2.2362.64.250.35
    Aug 5, 2022 21:53:56.542839050 CEST2233623192.168.2.23220.236.59.178
    Aug 5, 2022 21:53:56.542862892 CEST2233623192.168.2.23222.97.96.168
    Aug 5, 2022 21:53:56.542890072 CEST2233623192.168.2.2345.255.238.141
    Aug 5, 2022 21:53:56.542903900 CEST2233623192.168.2.2368.21.122.98
    Aug 5, 2022 21:53:56.542951107 CEST2233623192.168.2.23219.235.198.222
    Aug 5, 2022 21:53:56.542958021 CEST2233623192.168.2.2371.61.180.90
    Aug 5, 2022 21:53:56.542984962 CEST2233623192.168.2.23254.136.234.105
    Aug 5, 2022 21:53:56.542985916 CEST2233623192.168.2.2387.239.133.13
    Aug 5, 2022 21:53:56.542998075 CEST2233623192.168.2.23216.14.185.220
    Aug 5, 2022 21:53:56.543014050 CEST2233623192.168.2.2394.142.216.192
    Aug 5, 2022 21:53:56.543025017 CEST2233623192.168.2.23149.105.76.88
    Aug 5, 2022 21:53:56.543087006 CEST2233623192.168.2.23157.45.195.215
    Aug 5, 2022 21:53:56.543097019 CEST2233623192.168.2.2353.99.102.21
    Aug 5, 2022 21:53:56.543113947 CEST2233623192.168.2.235.75.255.80
    Aug 5, 2022 21:53:56.543145895 CEST2233623192.168.2.23216.205.196.93
    Aug 5, 2022 21:53:56.543154001 CEST2233623192.168.2.23158.76.172.152
    Aug 5, 2022 21:53:56.543198109 CEST2233623192.168.2.2339.154.236.34
    Aug 5, 2022 21:53:56.543207884 CEST2233623192.168.2.23213.170.199.110
    Aug 5, 2022 21:53:56.543210030 CEST2233623192.168.2.23133.57.200.77
    Aug 5, 2022 21:53:56.543302059 CEST2233623192.168.2.23150.165.136.126
    Aug 5, 2022 21:53:56.543319941 CEST2233623192.168.2.2348.25.189.228
    Aug 5, 2022 21:53:56.543324947 CEST2233623192.168.2.2340.93.139.239
    Aug 5, 2022 21:53:56.543330908 CEST2233623192.168.2.2347.250.39.168
    Aug 5, 2022 21:53:56.543338060 CEST2233623192.168.2.23251.212.205.41
    Aug 5, 2022 21:53:56.543354988 CEST2233623192.168.2.23184.100.240.226
    Aug 5, 2022 21:53:56.543411016 CEST2233623192.168.2.23122.212.231.231
    Aug 5, 2022 21:53:56.543416977 CEST2233623192.168.2.23159.179.131.151
    Aug 5, 2022 21:53:56.543422937 CEST2233623192.168.2.2319.207.20.20
    Aug 5, 2022 21:53:56.543447971 CEST2233623192.168.2.23254.133.68.230
    Aug 5, 2022 21:53:56.543452978 CEST2233623192.168.2.23111.149.242.55
    Aug 5, 2022 21:53:56.543473959 CEST2233623192.168.2.2364.36.195.58
    Aug 5, 2022 21:53:56.543488979 CEST2233623192.168.2.23101.67.146.21
    Aug 5, 2022 21:53:56.543519020 CEST2233623192.168.2.23101.237.74.31
    Aug 5, 2022 21:53:56.543536901 CEST2233623192.168.2.23194.193.212.105
    Aug 5, 2022 21:53:56.543570995 CEST2233623192.168.2.23140.209.52.172
    Aug 5, 2022 21:53:56.543586969 CEST2233623192.168.2.23109.180.34.204
    Aug 5, 2022 21:53:56.543592930 CEST2233623192.168.2.23125.150.191.22
    Aug 5, 2022 21:53:56.543606997 CEST2233623192.168.2.23213.180.96.90
    Aug 5, 2022 21:53:56.543617964 CEST2233623192.168.2.2398.2.123.225
    Aug 5, 2022 21:53:56.543648005 CEST2233623192.168.2.23133.119.228.244
    Aug 5, 2022 21:53:56.543663025 CEST2233623192.168.2.23191.234.217.75
    Aug 5, 2022 21:53:56.543665886 CEST2233623192.168.2.2357.249.172.218
    Aug 5, 2022 21:53:56.543670893 CEST2233623192.168.2.23173.115.238.104
    Aug 5, 2022 21:53:56.543690920 CEST2233623192.168.2.23124.59.253.199
    Aug 5, 2022 21:53:56.543699980 CEST2233623192.168.2.234.254.89.86
    Aug 5, 2022 21:53:56.543708086 CEST2233623192.168.2.2368.227.163.70
    Aug 5, 2022 21:53:56.543730974 CEST2233623192.168.2.23206.215.8.185
    Aug 5, 2022 21:53:56.543735027 CEST2233623192.168.2.23117.224.2.16
    Aug 5, 2022 21:53:56.543740988 CEST2233623192.168.2.23247.87.151.87
    Aug 5, 2022 21:53:56.543755054 CEST2233623192.168.2.23102.197.87.91
    Aug 5, 2022 21:53:56.543770075 CEST2233623192.168.2.23211.70.212.10
    Aug 5, 2022 21:53:56.543776989 CEST2233623192.168.2.23177.48.165.55
    Aug 5, 2022 21:53:56.543803930 CEST2233623192.168.2.2383.158.108.195
    Aug 5, 2022 21:53:56.543812037 CEST2233623192.168.2.23247.61.85.49
    Aug 5, 2022 21:53:56.543824911 CEST2233623192.168.2.23141.6.100.131
    Aug 5, 2022 21:53:56.543829918 CEST2233623192.168.2.23105.159.28.61
    Aug 5, 2022 21:53:56.543833017 CEST2233623192.168.2.23211.53.168.86
    Aug 5, 2022 21:53:56.543843985 CEST2233623192.168.2.2337.165.130.180
    Aug 5, 2022 21:53:56.543855906 CEST2233623192.168.2.23181.254.34.142
    Aug 5, 2022 21:53:56.543858051 CEST2233623192.168.2.239.207.81.20
    Aug 5, 2022 21:53:56.543859959 CEST2233623192.168.2.23183.231.149.60
    Aug 5, 2022 21:53:56.543878078 CEST2233623192.168.2.23197.72.239.204
    Aug 5, 2022 21:53:56.543899059 CEST2233623192.168.2.2314.246.230.33
    Aug 5, 2022 21:53:56.543935061 CEST2233623192.168.2.23246.253.112.38
    Aug 5, 2022 21:53:56.543947935 CEST2233623192.168.2.23126.253.128.34
    Aug 5, 2022 21:53:56.543961048 CEST2233623192.168.2.23123.185.10.106

    System Behavior

    Start time:21:53:52
    Start date:05/08/2022
    Path:/tmp/PPyJlaRy0K
    Arguments:/tmp/PPyJlaRy0K
    File size:4463432 bytes
    MD5 hash:cd177594338c77b895ae27c33f8f86cc
    Start time:21:53:56
    Start date:05/08/2022
    Path:/tmp/PPyJlaRy0K
    Arguments:n/a
    File size:4463432 bytes
    MD5 hash:cd177594338c77b895ae27c33f8f86cc
    Start time:21:53:56
    Start date:05/08/2022
    Path:/tmp/PPyJlaRy0K
    Arguments:n/a
    File size:4463432 bytes
    MD5 hash:cd177594338c77b895ae27c33f8f86cc
    Start time:21:53:56
    Start date:05/08/2022
    Path:/tmp/PPyJlaRy0K
    Arguments:n/a
    File size:4463432 bytes
    MD5 hash:cd177594338c77b895ae27c33f8f86cc
    Start time:21:53:56
    Start date:05/08/2022
    Path:/tmp/PPyJlaRy0K
    Arguments:n/a
    File size:4463432 bytes
    MD5 hash:cd177594338c77b895ae27c33f8f86cc
    Start time:21:54:02
    Start date:05/08/2022
    Path:/tmp/PPyJlaRy0K
    Arguments:n/a
    File size:4463432 bytes
    MD5 hash:cd177594338c77b895ae27c33f8f86cc
    Start time:21:54:02
    Start date:05/08/2022
    Path:/tmp/PPyJlaRy0K
    Arguments:n/a
    File size:4463432 bytes
    MD5 hash:cd177594338c77b895ae27c33f8f86cc
    Start time:21:54:02
    Start date:05/08/2022
    Path:/tmp/PPyJlaRy0K
    Arguments:n/a
    File size:4463432 bytes
    MD5 hash:cd177594338c77b895ae27c33f8f86cc