Linux
Analysis Report
fonts-util
Overview
General Information
Sample name: | fonts-util |
Analysis ID: | 1413854 |
MD5: | 59d3ad70fb3d22a689fd59a9d3c7767e |
SHA1: | 985a3cba597f00ff9037d93e411e2f3d45b2b1c7 |
SHA256: | 678a67351a8caecb478c9d783bb4dbe666df16c9fca628b2355be0fc6bc348d9 |
Infos: |
Detection
Score: | 88 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Classification
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1413854 |
Start date and time: | 2024-03-22 07:50:52 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 46s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 16.04 x64 (Kernel 4.4.0-116, Firefox 88.0, Document Viewer 3.18.2, LibreOffice 5.1.6.2, OpenJDK 1.8.0_171) |
Analysis Mode: | default |
Sample name: | fonts-util |
Detection: | MAL |
Classification: | mal88.spre.troj.evad.lin@0/8@0/0 |
- Connection to analysis system has been lost, crash info: Unknown
- system is lnxubuntu1
- fonts-util New Fork (PID: 4736, Parent: 4721)
- sh New Fork (PID: 4740, Parent: 4736)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Linux_Trojan_Generic_d8953ca0 | unknown | unknown |
|
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Reads CPU info from /sys: | Jump to behavior |
Source: | HTTPS traffic detected: |
Source: | TCP traffic: |
Source: | Socket: | Jump to behavior | ||
Source: | Socket: | Jump to behavior |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: |
Source: | Program segment: |
Source: | Matched rule: |
Source: | Classification label: |
Data Obfuscation |
---|
Source: | String containing UPX found: | ||
Source: | String containing UPX found: | ||
Source: | String containing UPX found: |
Persistence and Installation Behavior |
---|
Source: | Crontab executable: | Jump to behavior |
Source: | File: | Jump to behavior |
Source: | File: | Jump to behavior |
Source: | File: | Jump to behavior |
Source: | Shell command executed: | Jump to behavior |
Source: | Reads from proc file: | Jump to behavior |
Source: | Writes shell script file to disk with an unusual file extension: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File: | Jump to dropped file |
Source: | Submission file: |
Source: | Reads CPU info from /sys: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | 2 Scheduled Task/Job | 1 Unix Shell Configuration Modification | 1 Unix Shell Configuration Modification | 1 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 2 Scheduled Task/Job | 2 Scheduled Task/Job | 11 Obfuscated Files or Information | LSASS Memory | 2 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 Scripting | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
50% | ReversingLabs | Linux.Trojan.Torat | ||
47% | Virustotal | Browse | ||
100% | Avira | LINUX/AVA.Torat.uqvfp |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
51.254.147.57 | unknown | France | 16276 | OVHFR | false | |
86.59.21.38 | unknown | Austria | 8437 | UTA-ASAT | false | |
178.33.183.251 | unknown | France | 16276 | OVHFR | false | |
154.35.175.225 | unknown | United States | 14987 | RETHEMHOSTINGUS | false | |
185.100.86.182 | unknown | Romania | 200651 | FLOKINETSC | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
51.254.147.57 | Get hash | malicious | Unknown | Browse | ||
86.59.21.38 | Get hash | malicious | Phorpiex | Browse |
| |
Get hash | malicious | SystemBC | Browse |
| ||
Get hash | malicious | SystemBC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | SystemBC | Browse |
| ||
Get hash | malicious | Phorpiex Xmrig | Browse |
| ||
178.33.183.251 | Get hash | malicious | Glupteba, LummaC Stealer, SmokeLoader, Stealc, SystemBC, Xmrig | Browse | ||
Get hash | malicious | Glupteba, SmokeLoader, Socks5Systemz, Stealc, Xmrig | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Glupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5Systemz | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | BitRAT Xmrig | Browse | |||
154.35.175.225 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Kronos | Browse |
| ||
Get hash | malicious | Kronos | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Kronos | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Kronos | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
RETHEMHOSTINGUS | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | LummaC, Glupteba, LummaC Stealer, SmokeLoader, Stealc, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Glupteba, LummaC Stealer, SmokeLoader, Socks5Systemz, Stealc | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Glupteba, LummaC Stealer, SmokeLoader, Stealc | Browse |
| ||
Get hash | malicious | Glupteba, LummaC Stealer, SmokeLoader, Stealc | Browse |
| ||
Get hash | malicious | Glupteba, LummaC Stealer, SmokeLoader, Stealc, Xmrig | Browse |
| ||
UTA-ASAT | Get hash | malicious | Mirai, Gafgyt | Browse |
| |
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | LummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Glupteba, LummaC Stealer, SmokeLoader, Stealc, Xmrig | Browse |
| ||
Get hash | malicious | Glupteba, LummaC Stealer, SmokeLoader, Stealc, Xmrig | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | LummaC, Glupteba, LummaC Stealer, SmokeLoader, Socks5Systemz, Stealc | Browse |
| ||
OVHFR | Get hash | malicious | Babuk, Clipboard Hijacker, Djvu, Glupteba, SmokeLoader, Vidar, Xehook Stealer | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | LummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, Mars Stealer | Browse |
| ||
Get hash | malicious | LummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, Mars Stealer | Browse |
| ||
OVHFR | Get hash | malicious | Babuk, Clipboard Hijacker, Djvu, Glupteba, SmokeLoader, Vidar, Xehook Stealer | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
| ||
Get hash | malicious | LummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, Mars Stealer | Browse |
| ||
Get hash | malicious | LummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, Mars Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
83d60721ecc423892660e275acc4dffd | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Amadey, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Glupteba, LummaC Stealer, Mars Stealer, RedLine, SmokeLoader | Browse |
| ||
Get hash | malicious | Amadey, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Glupteba, LummaC Stealer, SmokeLoader, Stealc, Xmrig | Browse |
| ||
Get hash | malicious | Glupteba, LummaC Stealer, SmokeLoader, Stealc, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Glupteba, LummaC Stealer, SmokeLoader, Socks5Systemz, Stealc, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Stealc, Vidar | Browse |
|
Process: | /tmp/fonts-util |
File Type: | |
Category: | dropped |
Size (bytes): | 42 |
Entropy (8bit): | 3.7486135551678705 |
Encrypted: | false |
SSDEEP: | 3:TKH4vLUE94EL/dN:h5940P |
MD5: | 02A905C33A02337544FA06A9A148FE9C |
SHA1: | BAE92D6C54494D38F73F334F882F653928410A3B |
SHA-256: | F9D374F7B98F60666577073CAF76BF78B408FDC8D5B9DB4D912511C2DF8EA539 |
SHA-512: | 5334360FAD9F5EF2E9BD73CB597C4C4660173753AC806041875575AE695454D68B32BCD39C906AFDFC254AAD758F1758C9428810710264FA8F841848A7574570 |
Malicious: | true |
Joe Sandbox View: |
|
Reputation: | low |
Preview: |
Process: | /tmp/fonts-util |
File Type: | |
Category: | dropped |
Size (bytes): | 32 |
Entropy (8bit): | 3.500807235905091 |
Encrypted: | false |
SSDEEP: | 3:N9UE94EL/dN:N3940P |
MD5: | E06AF2AA42E96A4D1DCBE3A055507CFB |
SHA1: | E7C695B141891A705A6BE0CC28766B5D5F590550 |
SHA-256: | 328EF7EBF754D78F8BDB46F9F0C92CDF1B432E6EB7F9BF026D70468FF01A05E7 |
SHA-512: | 7E3EDACBA4AD6A15A0B7687D3D00CB69E2F590FF5F5DEE401D6075F3602E3C53F731315EF72705CF24FAFFD0BCB229C419AEEA23CC3AD5811B22280AC984843D |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | /tmp/fonts-util |
File Type: | |
Category: | dropped |
Size (bytes): | 113 |
Entropy (8bit): | 5.110014698271632 |
Encrypted: | false |
SSDEEP: | 3:agfERMQ/VhLPVYjN7E94EL/dMYODM:agfm9YO940dsM |
MD5: | 5AC7FA551A93382D8DAD848ADE2227A3 |
SHA1: | 2263C7A78E1191AB78AF563AD22FDBE8A2DCB6E0 |
SHA-256: | 19C839163062BCF5E02DBF63F1FDBC1BF5CDE7BE9EF694E09CA94B8F44AE7EBB |
SHA-512: | 7FBA0FCC87CA5B57E23813C33F74D4405DA1A5E09EF0AF33533020375D88BF00DAD7885F0735B56A98D002E760C6BB812544FB276ED6C68E14D586D421F507DF |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | /tmp/fonts-util |
File Type: | |
Category: | dropped |
Size (bytes): | 42 |
Entropy (8bit): | 3.6537567082870006 |
Encrypted: | false |
SSDEEP: | 3:n8Yf8Yv:nfv |
MD5: | 4E67DCA64C06C6D6B4C93D259BACFF8D |
SHA1: | 2CAF4DAC2AEB842FD554FC59E6BBA1611907054E |
SHA-256: | 9690356FB7942076F8AA3E8CD4E237D567FA6455ABE58AF2A295E3A2F639E9D4 |
SHA-512: | 6C16EC063C5F5C09E430716EF3513BA10E94D84449F66EEAC2977BA97E9410A1D54B03654B03D39EB12EE686F8723D2A704370B0F5EA4E5CD076B63D4A156690 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/fonts-util |
File Type: | |
Category: | dropped |
Size (bytes): | 32 |
Entropy (8bit): | 4.875 |
Encrypted: | false |
SSDEEP: | 3:hLTVyg:hLTVyg |
MD5: | 88671B02FAB2F6D90C7878B84E982C4E |
SHA1: | E8F76BEB8C978A29AD91BB264654E848F758DC16 |
SHA-256: | 5CA79A8776F5BCA858EF7FF815206150C28175670F5D72F3D43B8477C53B355D |
SHA-512: | F75918642BF9BCE0C7F016EBD3102887A0704D998337BBE398F3CF8151174DA37B90A99F9BED129DE89264353BC790947342FA2D0F13E08402137C28D8640C05 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/fonts-util |
File Type: | |
Category: | dropped |
Size (bytes): | 215 |
Entropy (8bit): | 4.85275225991053 |
Encrypted: | false |
SSDEEP: | 6:SbdWwxXjDmDnXr87+QkvwR/c0debWa8k4At:bwxXjDmTr87HkvwNdwN |
MD5: | CC41C7FE024D9E80A1D9D22713335AB1 |
SHA1: | 0B97E7C89DF33ADB15D54BF339394E4B2B4CE0F7 |
SHA-256: | D8F886D22292CCFE5FAC6325B43AE1194FB85273BC162AA757FC1611D57C1B4B |
SHA-512: | 31354DCA7547A26B24503CFF8D1C8F5BC4F0554DD1D16941D2D1CBFBEDACA581476E931AD398FA254286560C24C60C6C6ADC710018C662866F1D08D49DD3008B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/fonts-util |
File Type: | |
Category: | dropped |
Size (bytes): | 120 |
Entropy (8bit): | 4.548423184917586 |
Encrypted: | false |
SSDEEP: | 3:SH3HSE94EL/dyE2+hkk3ilp6:SH3X940VZ5ilp6 |
MD5: | 6F49519FC54A458360AB8F269B5F8FF4 |
SHA1: | 52651EBAEEF13DB78F454B06E77CC80D64AA2844 |
SHA-256: | 19F4486E0D10A987B47135F118827A2B2E2B9E7ED3BCA2A4AB3604E347442A93 |
SHA-512: | A25284C6465FB4BD3DA7231394D147033647EABF1A58859CE45EA253AD2E724F9C94C00EF37A64BDE29A8CCD1931D66888FD620102962EF7814012C36D1A5C9F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /usr/bin/crontab |
File Type: | |
Category: | dropped |
Size (bytes): | 217 |
Entropy (8bit): | 5.147330687790285 |
Encrypted: | false |
SSDEEP: | 6:SUrpqoqQjEOP1KUSDJOBFQZ0DV4r6vZHGMQ5UYLtCFt3HYX940P:8Qjnt8ZgEMeHLUHYXG0P |
MD5: | 8FD7D34F5C52BE0230ED3B240E4F74E3 |
SHA1: | EE8B0D89022B324B246892965A3BB111A3BDA72F |
SHA-256: | FE8C13103FE322E9DD8B7235374E50217B5D901DBA6502DFA8125C270BD4F9B6 |
SHA-512: | FA440541B09F8F289C0B903C3079358E65940838BD0ABF5D2EC0909734813A316A2C3EB194FAEB7DF91EEA5230B8D4995DC0D957120D058B057A714E9D899522 |
Malicious: | true |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.899424338699907 |
TrID: |
|
File name: | fonts-util |
File size: | 7'405'548 bytes |
MD5: | 59d3ad70fb3d22a689fd59a9d3c7767e |
SHA1: | 985a3cba597f00ff9037d93e411e2f3d45b2b1c7 |
SHA256: | 678a67351a8caecb478c9d783bb4dbe666df16c9fca628b2355be0fc6bc348d9 |
SHA512: | 87764dcb36d1f69bf6eb62ae6be34566b5f89af040a78bdfb4a3d8225468968d3f75b65aaf40d6399488378f9920e251846e01a03a2bb6329361ce39ba0a3b80 |
SSDEEP: | 196608:fHvjsWNIJXSSBBuvKZu4+c5OdyTeymKxjtJr:fH4WNyXfREwiKxj/ |
TLSH: | C77633E54A0127DBEDCE293DDF6A6DA453145415C8F8E08F3F0A1A5593BBFD2B082E12 |
File Content Preview: | .ELF..............>.............@...................@.8...@.......................@.......@.....".p.....".p.....................................................................Q.td....................................................(%@CUPX!<........t/..t/ |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 64 |
Program Header Offset: | 64 |
Program Header Size: | 56 |
Number of Program Headers: | 3 |
Section Header Offset: | 0 |
Section Header Size: | 64 |
Number of Section Headers: | 0 |
Header String Table Index: | 0 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x400000 | 0x400000 | 0x70fc22 | 0x70fc22 | 7.8994 | 0x5 | R E | 0x1000 | ||
LOAD | 0x0 | 0xb10000 | 0xb10000 | 0x0 | 0xc2f010 | 0.0000 | 0x6 | RW | 0x1000 | ||
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x10 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 22, 2024 07:51:29.187438965 CET | 43828 | 443 | 192.168.2.20 | 51.254.147.57 |
Mar 22, 2024 07:51:29.187500954 CET | 443 | 43828 | 51.254.147.57 | 192.168.2.20 |
Mar 22, 2024 07:51:29.187696934 CET | 43828 | 443 | 192.168.2.20 | 51.254.147.57 |
Mar 22, 2024 07:51:29.188503981 CET | 43828 | 443 | 192.168.2.20 | 51.254.147.57 |
Mar 22, 2024 07:51:29.188517094 CET | 443 | 43828 | 51.254.147.57 | 192.168.2.20 |
Mar 22, 2024 07:51:30.188112020 CET | 39214 | 443 | 192.168.2.20 | 178.33.183.251 |
Mar 22, 2024 07:51:30.188157082 CET | 443 | 39214 | 178.33.183.251 | 192.168.2.20 |
Mar 22, 2024 07:51:30.188246965 CET | 39214 | 443 | 192.168.2.20 | 178.33.183.251 |
Mar 22, 2024 07:51:30.188744068 CET | 39214 | 443 | 192.168.2.20 | 178.33.183.251 |
Mar 22, 2024 07:51:30.188757896 CET | 443 | 39214 | 178.33.183.251 | 192.168.2.20 |
Mar 22, 2024 07:51:32.195544004 CET | 48932 | 443 | 192.168.2.20 | 154.35.175.225 |
Mar 22, 2024 07:51:32.195595026 CET | 443 | 48932 | 154.35.175.225 | 192.168.2.20 |
Mar 22, 2024 07:51:32.195689917 CET | 48932 | 443 | 192.168.2.20 | 154.35.175.225 |
Mar 22, 2024 07:51:32.195993900 CET | 48932 | 443 | 192.168.2.20 | 154.35.175.225 |
Mar 22, 2024 07:51:32.196007967 CET | 443 | 48932 | 154.35.175.225 | 192.168.2.20 |
Mar 22, 2024 07:51:47.731770039 CET | 443 | 48932 | 154.35.175.225 | 192.168.2.20 |
Mar 22, 2024 07:51:47.732642889 CET | 47180 | 443 | 192.168.2.20 | 86.59.21.38 |
Mar 22, 2024 07:51:47.732649088 CET | 39498 | 8080 | 192.168.2.20 | 185.100.86.182 |
Mar 22, 2024 07:51:47.732676029 CET | 443 | 47180 | 86.59.21.38 | 192.168.2.20 |
Mar 22, 2024 07:51:47.732865095 CET | 47180 | 443 | 192.168.2.20 | 86.59.21.38 |
Mar 22, 2024 07:51:47.733432055 CET | 47180 | 443 | 192.168.2.20 | 86.59.21.38 |
Mar 22, 2024 07:51:47.733444929 CET | 443 | 47180 | 86.59.21.38 | 192.168.2.20 |
Mar 22, 2024 07:51:48.730884075 CET | 39498 | 8080 | 192.168.2.20 | 185.100.86.182 |
Mar 22, 2024 07:51:48.866251945 CET | 443 | 47180 | 86.59.21.38 | 192.168.2.20 |
Mar 22, 2024 07:51:48.866486073 CET | 47180 | 443 | 192.168.2.20 | 86.59.21.38 |
Mar 22, 2024 07:51:48.869275093 CET | 47180 | 443 | 192.168.2.20 | 86.59.21.38 |
Mar 22, 2024 07:51:48.869283915 CET | 443 | 47180 | 86.59.21.38 | 192.168.2.20 |
Mar 22, 2024 07:51:48.869671106 CET | 443 | 47180 | 86.59.21.38 | 192.168.2.20 |
Mar 22, 2024 07:51:48.871006012 CET | 47180 | 443 | 192.168.2.20 | 86.59.21.38 |
Mar 22, 2024 07:51:48.916229963 CET | 443 | 47180 | 86.59.21.38 | 192.168.2.20 |
Mar 22, 2024 07:53:40.288450956 CET | 443 | 39214 | 178.33.183.251 | 192.168.2.20 |
Mar 22, 2024 07:53:40.288470030 CET | 443 | 43828 | 51.254.147.57 | 192.168.2.20 |
Timestamp | Source IP | Dest IP | Checksum | Code | Type |
---|---|---|---|---|---|
Mar 22, 2024 07:51:48.956561089 CET | 176.222.126.51 | 192.168.2.20 | d004 | (Host unreachable) | Destination Unreachable |
Mar 22, 2024 07:51:48.956583023 CET | 176.222.126.51 | 192.168.2.20 | d004 | (Host unreachable) | Destination Unreachable |
System Behavior
Start time (UTC): | 06:51:28 |
Start date (UTC): | 22/03/2024 |
Path: | /tmp/fonts-util |
Arguments: | /tmp/fonts-util |
File size: | 7405548 bytes |
MD5 hash: | 59d3ad70fb3d22a689fd59a9d3c7767e |
Start time (UTC): | 06:51:28 |
Start date (UTC): | 22/03/2024 |
Path: | /tmp/fonts-util |
Arguments: | - |
File size: | 7405548 bytes |
MD5 hash: | 59d3ad70fb3d22a689fd59a9d3c7767e |
Start time (UTC): | 06:51:28 |
Start date (UTC): | 22/03/2024 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "crontab tmp" |
File size: | 0 bytes |
MD5 hash: | unknown |
Start time (UTC): | 06:51:28 |
Start date (UTC): | 22/03/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 0 bytes |
MD5 hash: | unknown |
Start time (UTC): | 06:51:28 |
Start date (UTC): | 22/03/2024 |
Path: | /usr/bin/crontab |
Arguments: | crontab tmp |
File size: | 36080 bytes |
MD5 hash: | ff68fd30f0037fd7e9c1fdf5a035f739 |