Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
x86_64.elf

Overview

General Information

Sample name:x86_64.elf
Analysis ID:1538771
MD5:c7b297469d29bc62692d2423d7b377e9
SHA1:07d49bbadd74bd5f9e528d1b16552a3fdb7b91c7
SHA256:a290d831c056125688b9ac4270cc22ef260efae780d6d1397ae51c926f0463eb
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1538771
Start date and time:2024-10-21 18:46:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 24s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:x86_64.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@25/0
  • VT rate limit hit for: x86_64.elf
Command:/tmp/x86_64.elf
PID:5489
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • x86_64.elf (PID: 5489, Parent: 5409, MD5: c7b297469d29bc62692d2423d7b377e9) Arguments: /tmp/x86_64.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
x86_64.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    x86_64.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      x86_64.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xaec8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xaedc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xaef0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xaf04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xaf18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xaf2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xaf40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xaf54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xaf68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xaf7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xaf90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xafa4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xafb8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xafcc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xafe0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xaff4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb008:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb01c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb030:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb044:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb058:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      x86_64.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
      • 0x75d8:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
      x86_64.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
      • 0x7dc7:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
      Click to see the 9 entries
      SourceRuleDescriptionAuthorStrings
      5489.1.0000000000400000.000000000040d000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5489.1.0000000000400000.000000000040d000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5489.1.0000000000400000.000000000040d000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xaec8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xaedc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xaef0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xaf04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xaf18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xaf2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xaf40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xaf54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xaf68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xaf7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xaf90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xafa4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xafb8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xafcc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xafe0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xaff4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb008:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb01c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb030:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb044:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb058:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5489.1.0000000000400000.000000000040d000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
          • 0x75d8:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
          5489.1.0000000000400000.000000000040d000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
          • 0x7dc7:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
          Click to see the 11 entries
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-10-21T18:47:04.360219+020020304911Malware Command and Control Activity Detected192.168.2.1437662107.189.4.20158431TCP
          2024-10-21T18:47:11.793334+020020304911Malware Command and Control Activity Detected192.168.2.1437664107.189.4.20158431TCP
          2024-10-21T18:47:13.437473+020020304911Malware Command and Control Activity Detected192.168.2.1437666107.189.4.20158431TCP
          2024-10-21T18:47:14.873132+020020304911Malware Command and Control Activity Detected192.168.2.1437668107.189.4.20158431TCP
          2024-10-21T18:47:18.308645+020020304911Malware Command and Control Activity Detected192.168.2.1437670107.189.4.20158431TCP
          2024-10-21T18:47:23.741702+020020304911Malware Command and Control Activity Detected192.168.2.1437672107.189.4.20158431TCP
          2024-10-21T18:47:27.199437+020020304911Malware Command and Control Activity Detected192.168.2.1437674107.189.4.20158431TCP
          2024-10-21T18:47:30.617842+020020304911Malware Command and Control Activity Detected192.168.2.1437676107.189.4.20158431TCP
          2024-10-21T18:47:39.050395+020020304911Malware Command and Control Activity Detected192.168.2.1437678107.189.4.20158431TCP
          2024-10-21T18:47:45.484564+020020304911Malware Command and Control Activity Detected192.168.2.1437680107.189.4.20158431TCP
          2024-10-21T18:47:49.932820+020020304911Malware Command and Control Activity Detected192.168.2.1437682107.189.4.20158431TCP
          2024-10-21T18:47:55.363102+020020304911Malware Command and Control Activity Detected192.168.2.1437684107.189.4.20158431TCP
          2024-10-21T18:48:03.794743+020020304911Malware Command and Control Activity Detected192.168.2.1437686107.189.4.20158431TCP
          2024-10-21T18:48:11.230889+020020304911Malware Command and Control Activity Detected192.168.2.1437688107.189.4.20158431TCP
          2024-10-21T18:48:20.669718+020020304911Malware Command and Control Activity Detected192.168.2.1437690107.189.4.20158431TCP
          2024-10-21T18:48:28.106099+020020304911Malware Command and Control Activity Detected192.168.2.1437692107.189.4.20158431TCP
          2024-10-21T18:48:30.545317+020020304911Malware Command and Control Activity Detected192.168.2.1437694107.189.4.20158431TCP
          2024-10-21T18:48:39.097659+020020304911Malware Command and Control Activity Detected192.168.2.1437696107.189.4.20158431TCP
          2024-10-21T18:48:48.529050+020020304911Malware Command and Control Activity Detected192.168.2.1437698107.189.4.20158431TCP
          2024-10-21T18:48:51.962017+020020304911Malware Command and Control Activity Detected192.168.2.1437700107.189.4.20158431TCP
          2024-10-21T18:48:53.396244+020020304911Malware Command and Control Activity Detected192.168.2.1437702107.189.4.20158431TCP
          2024-10-21T18:48:56.835865+020020304911Malware Command and Control Activity Detected192.168.2.1437704107.189.4.20158431TCP
          2024-10-21T18:48:58.273047+020020304911Malware Command and Control Activity Detected192.168.2.1437706107.189.4.20158431TCP
          2024-10-21T18:49:04.709969+020020304911Malware Command and Control Activity Detected192.168.2.1437708107.189.4.20158431TCP
          2024-10-21T18:49:07.141242+020020304911Malware Command and Control Activity Detected192.168.2.1437710107.189.4.20158431TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: x86_64.elfAvira: detected
          Source: x86_64.elfReversingLabs: Detection: 76%
          Source: x86_64.elfJoe Sandbox ML: detected

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37682 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37662 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37666 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37664 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37706 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37688 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37684 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37676 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37698 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37704 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37670 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37692 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37694 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37678 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37710 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37696 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37708 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37672 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37702 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37680 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37686 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37674 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37700 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37668 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:37690 -> 107.189.4.201:58431
          Source: global trafficTCP traffic: 107.189.4.201 ports 58431,1,3,4,5,8
          Source: global trafficTCP traffic: 192.168.2.14:37662 -> 107.189.4.201:58431
          Source: global trafficDNS traffic detected: DNS query: update.byeux.com

          System Summary

          barindex
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
          Source: Process Memory Space: x86_64.elf PID: 5489, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
          Source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
          Source: Process Memory Space: x86_64.elf PID: 5489, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@25/0
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/3760/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/3761/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/1583/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/2672/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/110/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/111/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/112/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/113/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/234/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/1577/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/114/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/235/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/115/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/116/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/117/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/118/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/119/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/10/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/917/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/11/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/12/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/13/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/14/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/15/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/16/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/17/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/18/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/19/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/1593/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/240/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/120/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/3094/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/121/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/242/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/3406/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/1/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/122/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/243/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/2/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/123/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/244/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/1589/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/3/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/124/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/245/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/1588/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/125/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/4/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/246/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/3402/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/126/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/5/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/247/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/127/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/6/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/248/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/128/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/7/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/249/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/8/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/129/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/800/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/3762/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/9/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/801/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/3763/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/803/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/3646/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/20/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/806/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/21/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/807/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/928/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/22/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/23/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/24/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/25/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/26/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/27/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/28/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/29/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/3420/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/490/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/250/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/130/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/251/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/131/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/252/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/132/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/253/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/254/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/255/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/135/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/256/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/1599/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/257/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/378/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/258/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/3412/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/259/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/30/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/35/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/3670/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/1371/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5491)File opened: /proc/260/cmdlineJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: /tmp/x86_64.elf (PID: 5489)File: /tmp/x86_64.elfJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: x86_64.elf, type: SAMPLE
          Source: Yara matchFile source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: x86_64.elf PID: 5489, type: MEMORYSTR
          Source: Yara matchFile source: x86_64.elf, type: SAMPLE
          Source: Yara matchFile source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: Yara matchFile source: x86_64.elf, type: SAMPLE
          Source: Yara matchFile source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: x86_64.elf PID: 5489, type: MEMORYSTR
          Source: Yara matchFile source: x86_64.elf, type: SAMPLE
          Source: Yara matchFile source: 5489.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          File Deletion
          1
          OS Credential Dumping
          System Service DiscoveryRemote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538771 Sample: x86_64.elf Startdate: 21/10/2024 Architecture: LINUX Score: 100 20 update.byeux.com 107.189.4.201, 37662, 37664, 37666 PONYNETUS United States 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 6 other signatures 2->28 9 x86_64.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 x86_64.elf 9->12         started        process6 process7 14 x86_64.elf 12->14         started        16 x86_64.elf 12->16         started        process8 18 x86_64.elf 14->18         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          x86_64.elf76%ReversingLabsLinux.Backdoor.Mirai
          x86_64.elf100%AviraEXP/ELF.Mirai.Z.A
          x86_64.elf100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          update.byeux.com
          107.189.4.201
          truetrue
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            107.189.4.201
            update.byeux.comUnited States
            53667PONYNETUStrue
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            107.189.4.201JVL2bXW1ch.elfGet hashmaliciousMirai, MoobotBrowse
              arm7.elfGet hashmaliciousMirai, MoobotBrowse
                mips.elfGet hashmaliciousMirai, MoobotBrowse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  update.byeux.comJVL2bXW1ch.elfGet hashmaliciousMirai, MoobotBrowse
                  • 107.189.4.201
                  arm7.elfGet hashmaliciousMirai, MoobotBrowse
                  • 107.189.4.201
                  mips.elfGet hashmaliciousMirai, MoobotBrowse
                  • 107.189.4.201
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  PONYNETUSdss.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 209.141.42.202
                  co.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 209.141.42.202
                  586.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 209.141.42.202
                  __min__c.elfGet hashmaliciousUnknownBrowse
                  • 205.185.117.101
                  co.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 205.185.122.67
                  x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 205.185.122.67
                  https://shoutout.wix.com/so/abP9tNDlV/c?w=3l7661HU1QXfrlxhsiEng39pDUk08HpBaevjMtJB-KM.eyJ1IjoiaHR0cHM6Ly92ZXJpZnlmaWxlcy5naXRodWIuaW8vbWFuLyIsInIiOiI1N2VlOTAzYy01NWI5LTQzMWEtMzQ0Yi1lM2Y2MTY0YTdiNDIiLCJtIjoibWFpbCIsImMiOiIzNjA5ODM5OC0zMzdiLTQyZjUtYTE5MC1iMmU1MTdiZmVkNmMifQGet hashmaliciousHTMLPhisherBrowse
                  • 162.244.94.12
                  QgmKRZO1Yp.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 205.185.122.67
                  zOSCVTuLxE.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 205.185.122.67
                  8t8VJiEGar.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 205.185.122.67
                  No context
                  No context
                  No created / dropped files found
                  File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                  Entropy (8bit):6.13452947468174
                  TrID:
                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                  File name:x86_64.elf
                  File size:55'104 bytes
                  MD5:c7b297469d29bc62692d2423d7b377e9
                  SHA1:07d49bbadd74bd5f9e528d1b16552a3fdb7b91c7
                  SHA256:a290d831c056125688b9ac4270cc22ef260efae780d6d1397ae51c926f0463eb
                  SHA512:800422e27f04982d333bc520213bc5dd797b62f0983a8aa113aae686c2821356d8961b06d412d80aa3493ea4f87da41245a203f05c337226e6f6e5982ab79025
                  SSDEEP:1536:B8AiP6h4wh2tIF9ts/6PJSdZD4+a60mWHMXpOACYf:BZiSh4wh26/ts/6huJLa60dGpOACYf
                  TLSH:4B331917B58180FDC4AAC1744B6BBA3E9D3370ED133DB3A977E4EB222996E614D58C40
                  File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@.....0.......0.................................P.......P.............(...............Q.td....................................................H...._........H........

                  ELF header

                  Class:ELF64
                  Data:2's complement, little endian
                  Version:1 (current)
                  Machine:Advanced Micro Devices X86-64
                  Version Number:0x1
                  Type:EXEC (Executable file)
                  OS/ABI:UNIX - System V
                  ABI Version:0
                  Entry Point Address:0x400194
                  Flags:0x0
                  ELF Header Size:64
                  Program Header Offset:64
                  Program Header Size:56
                  Number of Program Headers:3
                  Section Header Offset:54464
                  Section Header Size:64
                  Number of Section Headers:10
                  Header String Table Index:9
                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                  NULL0x00x00x00x00x0000
                  .initPROGBITS0x4000e80xe80x130x00x6AX001
                  .textPROGBITS0x4001000x1000xa8d60x00x6AX0016
                  .finiPROGBITS0x40a9d60xa9d60xe0x00x6AX001
                  .rodataPROGBITS0x40aa000xaa000x1f300x00x2A0032
                  .ctorsPROGBITS0x50d0000xd0000x100x00x3WA008
                  .dtorsPROGBITS0x50d0100xd0100x100x00x3WA008
                  .dataPROGBITS0x50d0400xd0400x4400x00x3WA0032
                  .bssNOBITS0x50d4800xd4800x29a80x00x3WA0032
                  .shstrtabSTRTAB0x00xd4800x3e0x00x0001
                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                  LOAD0x00x4000000x4000000xc9300xc9306.35400x5R E0x100000.init .text .fini .rodata
                  LOAD0xd0000x50d0000x50d0000x4800x2e282.13220x6RW 0x100000.ctors .dtors .data .bss
                  GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-10-21T18:47:04.360219+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437662107.189.4.20158431TCP
                  2024-10-21T18:47:11.793334+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437664107.189.4.20158431TCP
                  2024-10-21T18:47:13.437473+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437666107.189.4.20158431TCP
                  2024-10-21T18:47:14.873132+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437668107.189.4.20158431TCP
                  2024-10-21T18:47:18.308645+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437670107.189.4.20158431TCP
                  2024-10-21T18:47:23.741702+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437672107.189.4.20158431TCP
                  2024-10-21T18:47:27.199437+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437674107.189.4.20158431TCP
                  2024-10-21T18:47:30.617842+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437676107.189.4.20158431TCP
                  2024-10-21T18:47:39.050395+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437678107.189.4.20158431TCP
                  2024-10-21T18:47:45.484564+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437680107.189.4.20158431TCP
                  2024-10-21T18:47:49.932820+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437682107.189.4.20158431TCP
                  2024-10-21T18:47:55.363102+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437684107.189.4.20158431TCP
                  2024-10-21T18:48:03.794743+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437686107.189.4.20158431TCP
                  2024-10-21T18:48:11.230889+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437688107.189.4.20158431TCP
                  2024-10-21T18:48:20.669718+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437690107.189.4.20158431TCP
                  2024-10-21T18:48:28.106099+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437692107.189.4.20158431TCP
                  2024-10-21T18:48:30.545317+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437694107.189.4.20158431TCP
                  2024-10-21T18:48:39.097659+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437696107.189.4.20158431TCP
                  2024-10-21T18:48:48.529050+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437698107.189.4.20158431TCP
                  2024-10-21T18:48:51.962017+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437700107.189.4.20158431TCP
                  2024-10-21T18:48:53.396244+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437702107.189.4.20158431TCP
                  2024-10-21T18:48:56.835865+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437704107.189.4.20158431TCP
                  2024-10-21T18:48:58.273047+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437706107.189.4.20158431TCP
                  2024-10-21T18:49:04.709969+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437708107.189.4.20158431TCP
                  2024-10-21T18:49:07.141242+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1437710107.189.4.20158431TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 21, 2024 18:47:04.347996950 CEST3766258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:04.355528116 CEST5843137662107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:04.355607986 CEST3766258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:04.360219002 CEST3766258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:04.365566015 CEST5843137662107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:04.772844076 CEST5843137662107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:04.772943974 CEST3766258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:04.778633118 CEST5843137662107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:11.785005093 CEST3766458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:11.792660952 CEST5843137664107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:11.792762041 CEST3766458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:11.793334007 CEST3766458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:11.801103115 CEST5843137664107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:12.216372013 CEST5843137664107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:12.216770887 CEST3766458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:12.222196102 CEST5843137664107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:13.430962086 CEST3766658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:13.436923027 CEST5843137666107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:13.436973095 CEST3766658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:13.437473059 CEST3766658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:13.442898989 CEST5843137666107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:13.855510950 CEST5843137666107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:13.855762959 CEST3766658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:13.861202002 CEST5843137666107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:14.866919994 CEST3766858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:14.872520924 CEST5843137668107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:14.872620106 CEST3766858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:14.873131990 CEST3766858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:14.878616095 CEST5843137668107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:15.288722038 CEST5843137668107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:15.288800955 CEST3766858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:15.295000076 CEST5843137668107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:18.301033974 CEST3767058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:18.307774067 CEST5843137670107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:18.307836056 CEST3767058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:18.308645010 CEST3767058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:18.315198898 CEST5843137670107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:18.724301100 CEST5843137670107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:18.724462986 CEST3767058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:18.729949951 CEST5843137670107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:23.734649897 CEST3767258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:23.740101099 CEST5843137672107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:23.740216970 CEST3767258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:23.741702080 CEST3767258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:23.747096062 CEST5843137672107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:24.160397053 CEST5843137672107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:24.160599947 CEST3767258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:24.166039944 CEST5843137672107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:27.181647062 CEST3767458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:27.187148094 CEST5843137674107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:27.187292099 CEST3767458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:27.199436903 CEST3767458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:27.204937935 CEST5843137674107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:27.601461887 CEST5843137674107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:27.601725101 CEST3767458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:27.607218027 CEST5843137674107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:30.611690998 CEST3767658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:30.617089033 CEST5843137676107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:30.617208004 CEST3767658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:30.617841959 CEST3767658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:30.623080969 CEST5843137676107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:31.031858921 CEST5843137676107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:31.032233000 CEST3767658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:31.038391113 CEST5843137676107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:39.043031931 CEST3767858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:39.049566031 CEST5843137678107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:39.049623013 CEST3767858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:39.050395012 CEST3767858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:39.056802988 CEST5843137678107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:39.464375019 CEST5843137678107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:39.464622021 CEST3767858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:39.470601082 CEST5843137678107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:45.477488995 CEST3768058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:45.483338118 CEST5843137680107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:45.483465910 CEST3768058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:45.484564066 CEST3768058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:45.489986897 CEST5843137680107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:45.915723085 CEST5843137680107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:45.916168928 CEST3768058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:45.921633005 CEST5843137680107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:49.926475048 CEST3768258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:49.931813002 CEST5843137682107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:49.931905031 CEST3768258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:49.932820082 CEST3768258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:49.938143969 CEST5843137682107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:50.346693039 CEST5843137682107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:50.347018957 CEST3768258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:50.352654934 CEST5843137682107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:55.357000113 CEST3768458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:55.362415075 CEST5843137684107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:55.362469912 CEST3768458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:55.363101959 CEST3768458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:55.368452072 CEST5843137684107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:55.776278019 CEST5843137684107.189.4.201192.168.2.14
                  Oct 21, 2024 18:47:55.776727915 CEST3768458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:47:55.782075882 CEST5843137684107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:03.787496090 CEST3768658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:03.793627024 CEST5843137686107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:03.793735981 CEST3768658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:03.794743061 CEST3768658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:03.800240993 CEST5843137686107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:04.212723017 CEST5843137686107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:04.212949991 CEST3768658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:04.218426943 CEST5843137686107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:11.224673986 CEST3768858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:11.230134964 CEST5843137688107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:11.230196953 CEST3768858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:11.230889082 CEST3768858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:11.236326933 CEST5843137688107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:11.646724939 CEST5843137688107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:11.646851063 CEST3768858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:11.652456999 CEST5843137688107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:20.660274029 CEST3769058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:20.668668032 CEST5843137690107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:20.668792009 CEST3769058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:20.669718027 CEST3769058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:20.675225973 CEST5843137690107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:21.085891962 CEST5843137690107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:21.086216927 CEST3769058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:21.091557026 CEST5843137690107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:28.097780943 CEST3769258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:28.104835033 CEST5843137692107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:28.104893923 CEST3769258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:28.106098890 CEST3769258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:28.111588955 CEST5843137692107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:28.523214102 CEST5843137692107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:28.523561954 CEST3769258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:28.529289961 CEST5843137692107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:30.536993027 CEST3769458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:30.544111013 CEST5843137694107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:30.544177055 CEST3769458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:30.545316935 CEST3769458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:30.552767992 CEST5843137694107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:30.961900949 CEST5843137694107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:30.962182045 CEST3769458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:30.967998028 CEST5843137694107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:39.090730906 CEST3769658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:39.096391916 CEST5843137696107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:39.096465111 CEST3769658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:39.097659111 CEST3769658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:39.103306055 CEST5843137696107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:39.510577917 CEST5843137696107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:39.510957956 CEST3769658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:39.516468048 CEST5843137696107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:48.521894932 CEST3769858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:48.528014898 CEST5843137698107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:48.528094053 CEST3769858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:48.529050112 CEST3769858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:48.534380913 CEST5843137698107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:48.942765951 CEST5843137698107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:48.943059921 CEST3769858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:48.948427916 CEST5843137698107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:51.955148935 CEST3770058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:51.960606098 CEST5843137700107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:51.960733891 CEST3770058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:51.962017059 CEST3770058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:51.967427015 CEST5843137700107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:52.377182961 CEST5843137700107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:52.377641916 CEST3770058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:52.383605957 CEST5843137700107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:53.389556885 CEST3770258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:53.395144939 CEST5843137702107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:53.395232916 CEST3770258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:53.396244049 CEST3770258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:53.401856899 CEST5843137702107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:53.814384937 CEST5843137702107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:53.814627886 CEST3770258431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:53.821445942 CEST5843137702107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:56.827902079 CEST3770458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:56.834619999 CEST5843137704107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:56.834724903 CEST3770458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:56.835865021 CEST3770458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:56.842120886 CEST5843137704107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:57.255507946 CEST5843137704107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:57.256069899 CEST3770458431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:57.262490988 CEST5843137704107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:58.266824961 CEST3770658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:58.272279024 CEST5843137706107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:58.272362947 CEST3770658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:58.273046970 CEST3770658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:58.278403997 CEST5843137706107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:58.691680908 CEST5843137706107.189.4.201192.168.2.14
                  Oct 21, 2024 18:48:58.691858053 CEST3770658431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:48:58.698657036 CEST5843137706107.189.4.201192.168.2.14
                  Oct 21, 2024 18:49:04.703385115 CEST3770858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:49:04.708822966 CEST5843137708107.189.4.201192.168.2.14
                  Oct 21, 2024 18:49:04.708945990 CEST3770858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:49:04.709969044 CEST3770858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:49:04.715351105 CEST5843137708107.189.4.201192.168.2.14
                  Oct 21, 2024 18:49:05.122664928 CEST5843137708107.189.4.201192.168.2.14
                  Oct 21, 2024 18:49:05.122926950 CEST3770858431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:49:05.128303051 CEST5843137708107.189.4.201192.168.2.14
                  Oct 21, 2024 18:49:07.134835958 CEST3771058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:49:07.140238047 CEST5843137710107.189.4.201192.168.2.14
                  Oct 21, 2024 18:49:07.140372038 CEST3771058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:49:07.141242027 CEST3771058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:49:07.146516085 CEST5843137710107.189.4.201192.168.2.14
                  Oct 21, 2024 18:49:07.555782080 CEST5843137710107.189.4.201192.168.2.14
                  Oct 21, 2024 18:49:07.555905104 CEST3771058431192.168.2.14107.189.4.201
                  Oct 21, 2024 18:49:07.561306000 CEST5843137710107.189.4.201192.168.2.14
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 21, 2024 18:47:04.337990046 CEST4426953192.168.2.148.8.8.8
                  Oct 21, 2024 18:47:04.347050905 CEST53442698.8.8.8192.168.2.14
                  Oct 21, 2024 18:47:11.774347067 CEST4307253192.168.2.148.8.8.8
                  Oct 21, 2024 18:47:11.784454107 CEST53430728.8.8.8192.168.2.14
                  Oct 21, 2024 18:47:13.218734026 CEST4199953192.168.2.148.8.8.8
                  Oct 21, 2024 18:47:13.430387974 CEST53419998.8.8.8192.168.2.14
                  Oct 21, 2024 18:47:14.858477116 CEST5681553192.168.2.148.8.8.8
                  Oct 21, 2024 18:47:14.866364956 CEST53568158.8.8.8192.168.2.14
                  Oct 21, 2024 18:47:18.290730953 CEST3595253192.168.2.148.8.8.8
                  Oct 21, 2024 18:47:18.300499916 CEST53359528.8.8.8192.168.2.14
                  Oct 21, 2024 18:47:23.726589918 CEST4797753192.168.2.148.8.8.8
                  Oct 21, 2024 18:47:23.733978033 CEST53479778.8.8.8192.168.2.14
                  Oct 21, 2024 18:47:27.171207905 CEST5124053192.168.2.148.8.8.8
                  Oct 21, 2024 18:47:27.178611040 CEST53512408.8.8.8192.168.2.14
                  Oct 21, 2024 18:47:30.603653908 CEST5568753192.168.2.148.8.8.8
                  Oct 21, 2024 18:47:30.611285925 CEST53556878.8.8.8192.168.2.14
                  Oct 21, 2024 18:47:39.034801960 CEST4118253192.168.2.148.8.8.8
                  Oct 21, 2024 18:47:39.042567015 CEST53411828.8.8.8192.168.2.14
                  Oct 21, 2024 18:47:45.467354059 CEST3979853192.168.2.148.8.8.8
                  Oct 21, 2024 18:47:45.476759911 CEST53397988.8.8.8192.168.2.14
                  Oct 21, 2024 18:47:49.918323994 CEST5262353192.168.2.148.8.8.8
                  Oct 21, 2024 18:47:49.925772905 CEST53526238.8.8.8192.168.2.14
                  Oct 21, 2024 18:47:55.348773003 CEST4327553192.168.2.148.8.8.8
                  Oct 21, 2024 18:47:55.356595993 CEST53432758.8.8.8192.168.2.14
                  Oct 21, 2024 18:48:03.778595924 CEST4463153192.168.2.148.8.8.8
                  Oct 21, 2024 18:48:03.786804914 CEST53446318.8.8.8192.168.2.14
                  Oct 21, 2024 18:48:11.217314959 CEST3453853192.168.2.148.8.8.8
                  Oct 21, 2024 18:48:11.224280119 CEST53345388.8.8.8192.168.2.14
                  Oct 21, 2024 18:48:20.649082899 CEST3854153192.168.2.148.8.8.8
                  Oct 21, 2024 18:48:20.659655094 CEST53385418.8.8.8192.168.2.14
                  Oct 21, 2024 18:48:28.089411974 CEST5731653192.168.2.148.8.8.8
                  Oct 21, 2024 18:48:28.097253084 CEST53573168.8.8.8192.168.2.14
                  Oct 21, 2024 18:48:30.526423931 CEST3684553192.168.2.148.8.8.8
                  Oct 21, 2024 18:48:30.536199093 CEST53368458.8.8.8192.168.2.14
                  Oct 21, 2024 18:48:38.965153933 CEST4096053192.168.2.148.8.8.8
                  Oct 21, 2024 18:48:39.089667082 CEST53409608.8.8.8192.168.2.14
                  Oct 21, 2024 18:48:48.513185978 CEST5244453192.168.2.148.8.8.8
                  Oct 21, 2024 18:48:48.521327019 CEST53524448.8.8.8192.168.2.14
                  Oct 21, 2024 18:48:51.946275949 CEST5604853192.168.2.148.8.8.8
                  Oct 21, 2024 18:48:51.954360962 CEST53560488.8.8.8192.168.2.14
                  Oct 21, 2024 18:48:53.380623102 CEST3789553192.168.2.148.8.8.8
                  Oct 21, 2024 18:48:53.388928890 CEST53378958.8.8.8192.168.2.14
                  Oct 21, 2024 18:48:56.817687988 CEST3327253192.168.2.148.8.8.8
                  Oct 21, 2024 18:48:56.827258110 CEST53332728.8.8.8192.168.2.14
                  Oct 21, 2024 18:48:58.258464098 CEST4060053192.168.2.148.8.8.8
                  Oct 21, 2024 18:48:58.266382933 CEST53406008.8.8.8192.168.2.14
                  Oct 21, 2024 18:49:04.694426060 CEST6008753192.168.2.148.8.8.8
                  Oct 21, 2024 18:49:04.702728033 CEST53600878.8.8.8192.168.2.14
                  Oct 21, 2024 18:49:07.126101017 CEST5567753192.168.2.148.8.8.8
                  Oct 21, 2024 18:49:07.133949995 CEST53556778.8.8.8192.168.2.14
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Oct 21, 2024 18:47:04.337990046 CEST192.168.2.148.8.8.80x5d7cStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:11.774347067 CEST192.168.2.148.8.8.80x1386Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:13.218734026 CEST192.168.2.148.8.8.80x5c61Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:14.858477116 CEST192.168.2.148.8.8.80xc7d2Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:18.290730953 CEST192.168.2.148.8.8.80x3c71Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:23.726589918 CEST192.168.2.148.8.8.80x495fStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:27.171207905 CEST192.168.2.148.8.8.80x1cdeStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:30.603653908 CEST192.168.2.148.8.8.80x6f39Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:39.034801960 CEST192.168.2.148.8.8.80xcd99Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:45.467354059 CEST192.168.2.148.8.8.80x6ac2Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:49.918323994 CEST192.168.2.148.8.8.80xaee6Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:55.348773003 CEST192.168.2.148.8.8.80xd96bStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:03.778595924 CEST192.168.2.148.8.8.80xbc61Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:11.217314959 CEST192.168.2.148.8.8.80x6874Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:20.649082899 CEST192.168.2.148.8.8.80xb195Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:28.089411974 CEST192.168.2.148.8.8.80x24e1Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:30.526423931 CEST192.168.2.148.8.8.80x21efStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:38.965153933 CEST192.168.2.148.8.8.80x830cStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:48.513185978 CEST192.168.2.148.8.8.80x2d55Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:51.946275949 CEST192.168.2.148.8.8.80xf6e6Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:53.380623102 CEST192.168.2.148.8.8.80x3122Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:56.817687988 CEST192.168.2.148.8.8.80x1641Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:58.258464098 CEST192.168.2.148.8.8.80x1285Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:49:04.694426060 CEST192.168.2.148.8.8.80x7f4Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  Oct 21, 2024 18:49:07.126101017 CEST192.168.2.148.8.8.80xc224Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 21, 2024 18:47:04.347050905 CEST8.8.8.8192.168.2.140x5d7cNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:11.784454107 CEST8.8.8.8192.168.2.140x1386No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:13.430387974 CEST8.8.8.8192.168.2.140x5c61No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:14.866364956 CEST8.8.8.8192.168.2.140xc7d2No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:18.300499916 CEST8.8.8.8192.168.2.140x3c71No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:23.733978033 CEST8.8.8.8192.168.2.140x495fNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:27.178611040 CEST8.8.8.8192.168.2.140x1cdeNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:30.611285925 CEST8.8.8.8192.168.2.140x6f39No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:39.042567015 CEST8.8.8.8192.168.2.140xcd99No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:45.476759911 CEST8.8.8.8192.168.2.140x6ac2No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:49.925772905 CEST8.8.8.8192.168.2.140xaee6No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:47:55.356595993 CEST8.8.8.8192.168.2.140xd96bNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:03.786804914 CEST8.8.8.8192.168.2.140xbc61No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:11.224280119 CEST8.8.8.8192.168.2.140x6874No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:20.659655094 CEST8.8.8.8192.168.2.140xb195No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:28.097253084 CEST8.8.8.8192.168.2.140x24e1No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:30.536199093 CEST8.8.8.8192.168.2.140x21efNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:39.089667082 CEST8.8.8.8192.168.2.140x830cNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:48.521327019 CEST8.8.8.8192.168.2.140x2d55No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:51.954360962 CEST8.8.8.8192.168.2.140xf6e6No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:53.388928890 CEST8.8.8.8192.168.2.140x3122No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:56.827258110 CEST8.8.8.8192.168.2.140x1641No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:48:58.266382933 CEST8.8.8.8192.168.2.140x1285No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:49:04.702728033 CEST8.8.8.8192.168.2.140x7f4No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                  Oct 21, 2024 18:49:07.133949995 CEST8.8.8.8192.168.2.140xc224No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false

                  System Behavior

                  Start time (UTC):16:47:02
                  Start date (UTC):21/10/2024
                  Path:/tmp/x86_64.elf
                  Arguments:/tmp/x86_64.elf
                  File size:55104 bytes
                  MD5 hash:c7b297469d29bc62692d2423d7b377e9

                  Start time (UTC):16:47:03
                  Start date (UTC):21/10/2024
                  Path:/tmp/x86_64.elf
                  Arguments:-
                  File size:55104 bytes
                  MD5 hash:c7b297469d29bc62692d2423d7b377e9

                  Start time (UTC):16:47:03
                  Start date (UTC):21/10/2024
                  Path:/tmp/x86_64.elf
                  Arguments:-
                  File size:55104 bytes
                  MD5 hash:c7b297469d29bc62692d2423d7b377e9

                  Start time (UTC):16:47:03
                  Start date (UTC):21/10/2024
                  Path:/tmp/x86_64.elf
                  Arguments:-
                  File size:55104 bytes
                  MD5 hash:c7b297469d29bc62692d2423d7b377e9

                  Start time (UTC):16:47:03
                  Start date (UTC):21/10/2024
                  Path:/tmp/x86_64.elf
                  Arguments:-
                  File size:55104 bytes
                  MD5 hash:c7b297469d29bc62692d2423d7b377e9