Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
zerx86.elf

Overview

General Information

Sample name:zerx86.elf
Analysis ID:1543147
MD5:59789d01154bed5b3eac8d425ddaf0a4
SHA1:971650a52f5b22ec1c9dd88b9587ca93ad4752c0
SHA256:cfd3cc5f0da3ae3711fb9d0d639916952e143019d0e43a28ebb9092ad215e74c
Tags:elfuser-abuse_ch
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Sends malformed DNS queries
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1543147
Start date and time:2024-10-27 09:49:19 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 50s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:zerx86.elf
Detection:MAL
Classification:mal68.troj.linELF@0/0@6/0
  • VT rate limit hit for: zerx86.elf
Command:/tmp/zerx86.elf
PID:5483
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
The Peoples Bank of China.
Standard Error:
  • system is lnxubuntu20
  • zerx86.elf (PID: 5483, Parent: 5404, MD5: 59789d01154bed5b3eac8d425ddaf0a4) Arguments: /tmp/zerx86.elf
  • cleanup
SourceRuleDescriptionAuthorStrings
zerx86.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x4730:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
zerx86.elfLinux_Trojan_Mirai_88de437funknownunknown
  • 0x6e62:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
zerx86.elfLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x77e5:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
zerx86.elfLinux_Trojan_Mirai_8aa7b5d3unknownunknown
  • 0x6e32:$a: 8B 4C 24 14 8B 74 24 0C 8B 5C 24 10 85 C9 74 0D 31 D2 8A 04 1A 88
SourceRuleDescriptionAuthorStrings
5483.1.0000000008048000.0000000008053000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x4730:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
5483.1.0000000008048000.0000000008053000.r-x.sdmpLinux_Trojan_Mirai_88de437funknownunknown
  • 0x6e62:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
5483.1.0000000008048000.0000000008053000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x77e5:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
5483.1.0000000008048000.0000000008053000.r-x.sdmpLinux_Trojan_Mirai_8aa7b5d3unknownunknown
  • 0x6e32:$a: 8B 4C 24 14 8B 74 24 0C 8B 5C 24 10 85 C9 74 0D 31 D2 8A 04 1A 88
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: zerx86.elfReversingLabs: Detection: 52%
Source: zerx86.elfJoe Sandbox ML: detected

Networking

barindex
Source: global trafficTCP traffic: 45.156.86.24 ports 38241,1,2,3,4,8
Source: global trafficDNS traffic detected: malformed DNS query: netfags.geek. [malformed]
Source: global trafficDNS traffic detected: malformed DNS query: chinklabs.dyn. [malformed]
Source: global trafficDNS traffic detected: malformed DNS query: burnthe.libre. [malformed]
Source: global trafficTCP traffic: 192.168.2.13:49420 -> 45.156.86.24:38241
Source: unknownUDP traffic detected without corresponding DNS query: 152.53.15.127
Source: unknownUDP traffic detected without corresponding DNS query: 152.53.15.127
Source: unknownUDP traffic detected without corresponding DNS query: 152.53.15.127
Source: unknownUDP traffic detected without corresponding DNS query: 185.181.61.24
Source: unknownUDP traffic detected without corresponding DNS query: 185.181.61.24
Source: unknownUDP traffic detected without corresponding DNS query: 168.235.111.72
Source: global trafficDNS traffic detected: DNS query: burnthe.libre
Source: global trafficDNS traffic detected: DNS query: yellowchink.pirate
Source: global trafficDNS traffic detected: DNS query: netfags.geek. [malformed]
Source: global trafficDNS traffic detected: DNS query: chinklabs.dyn. [malformed]
Source: global trafficDNS traffic detected: DNS query: burnthe.libre. [malformed]

System Summary

barindex
Source: zerx86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: zerx86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: zerx86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: zerx86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5483.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 5483.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 5483.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5483.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: ELF static info symbol of initial sample.symtab present: no
Source: zerx86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: zerx86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: zerx86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: zerx86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5483.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 5483.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 5483.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5483.1.0000000008048000.0000000008053000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: classification engineClassification label: mal68.troj.linELF@0/0@6/0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
zerx86.elf53%ReversingLabsLinux.Backdoor.Mirai
zerx86.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
yellowchink.pirate
45.156.86.24
truetrue
    unknown
    burnthe.libre
    45.156.86.24
    truetrue
      unknown
      chinklabs.dyn. [malformed]
      unknown
      unknowntrue
        unknown
        netfags.geek. [malformed]
        unknown
        unknowntrue
          unknown
          burnthe.libre. [malformed]
          unknown
          unknowntrue
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            45.156.86.24
            yellowchink.pirateGermany
            44592SKYLINKNLtrue
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            45.156.86.24nabppc.elfGet hashmaliciousUnknownBrowse
              nabmips.elfGet hashmaliciousUnknownBrowse
                zermips.elfGet hashmaliciousUnknownBrowse
                  nabarm.elfGet hashmaliciousUnknownBrowse
                    nabx86.elfGet hashmaliciousUnknownBrowse
                      nabarm5.elfGet hashmaliciousUnknownBrowse
                        splsh4.elfGet hashmaliciousUnknownBrowse
                          zerarm7.elfGet hashmaliciousUnknownBrowse
                            ppc.elfGet hashmaliciousUnknownBrowse
                              zersh4.elfGet hashmaliciousUnknownBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                burnthe.librenklm68k.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                nabmips.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                zermips.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                nabarm.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                splspc.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                yellowchink.piratenabmips.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                splm68k.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                zermips.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                nabarm.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                splspc.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                SKYLINKNLnabppc.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                nabmips.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                zermips.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                nabarm.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                nabx86.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                nabarm5.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                splsh4.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                zerarm7.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                ppc.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                zersh4.elfGet hashmaliciousUnknownBrowse
                                • 45.156.86.24
                                No context
                                No context
                                No created / dropped files found
                                File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                Entropy (8bit):6.374618616349342
                                TrID:
                                • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                File name:zerx86.elf
                                File size:43'028 bytes
                                MD5:59789d01154bed5b3eac8d425ddaf0a4
                                SHA1:971650a52f5b22ec1c9dd88b9587ca93ad4752c0
                                SHA256:cfd3cc5f0da3ae3711fb9d0d639916952e143019d0e43a28ebb9092ad215e74c
                                SHA512:e9792843bd9c3a2c34fedd4f0dfea4c23d112c6140e250ec560c98aff036905e25fe430a8e9442e72a2111a470f207b6d0795b11fb24a4bd2077b16232bd90d9
                                SSDEEP:768:1nAx7J7+2hjRpfUj2D4W1AjuTuXTFmcZHRA3UDALUT1D1:hAx7J7+2hjRe611AjuMxA3U0LUZD
                                TLSH:011329CDD813D8F4DC1266B42877F3329A71F0652029FA47E765E677B853B02A60B1AC
                                File Content Preview:.ELF....................d...4...\.......4. ...(..............................................5...5......|...........Q.td............................U..S............h....c...[]...$.............U......= 6...t..5.....5......5......u........t....h.%..........

                                ELF header

                                Class:ELF32
                                Data:2's complement, little endian
                                Version:1 (current)
                                Machine:Intel 80386
                                Version Number:0x1
                                Type:EXEC (Executable file)
                                OS/ABI:UNIX - System V
                                ABI Version:0
                                Entry Point Address:0x8048164
                                Flags:0x0
                                ELF Header Size:52
                                Program Header Offset:52
                                Program Header Size:32
                                Number of Program Headers:3
                                Section Header Offset:42588
                                Section Header Size:40
                                Number of Section Headers:11
                                Header String Table Index:10
                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                NULL0x00x00x00x00x0000
                                .initPROGBITS0x80480940x940x1c0x00x6AX001
                                .textPROGBITS0x80480b00xb00x99860x00x6AX0016
                                .finiPROGBITS0x8051a360x9a360x170x00x6AX001
                                .rodataPROGBITS0x8051a600x9a600xb200x00x2A0032
                                .ctorsPROGBITS0x80535840xa5840x80x00x3WA004
                                .dtorsPROGBITS0x805358c0xa58c0x80x00x3WA004
                                .jcrPROGBITS0x80535940xa5940x40x00x3WA004
                                .dataPROGBITS0x80535a40xa5a40x740x00x3WA004
                                .bssNOBITS0x80536200xa6180x4e00x00x3WA0032
                                .shstrtabSTRTAB0x00xa6180x430x00x0001
                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                LOAD0x00x80480000x80480000xa5800xa5806.40740x5R E0x1000.init .text .fini .rodata
                                LOAD0xa5840x80535840x80535840x940x57c1.68320x6RW 0x1000.ctors .dtors .jcr .data .bss
                                GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 27, 2024 09:50:31.480128050 CET4942038241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:31.486011028 CET382414942045.156.86.24192.168.2.13
                                Oct 27, 2024 09:50:31.486195087 CET4942038241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:31.486407995 CET4942038241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:31.492259979 CET382414942045.156.86.24192.168.2.13
                                Oct 27, 2024 09:50:31.492326021 CET4942038241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:31.498075962 CET382414942045.156.86.24192.168.2.13
                                Oct 27, 2024 09:50:41.496289968 CET4942038241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:41.502414942 CET382414942045.156.86.24192.168.2.13
                                Oct 27, 2024 09:50:41.855875969 CET382414942045.156.86.24192.168.2.13
                                Oct 27, 2024 09:50:41.856234074 CET4942038241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:41.862138033 CET382414942045.156.86.24192.168.2.13
                                Oct 27, 2024 09:50:42.869628906 CET4942238241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:42.875839949 CET382414942245.156.86.24192.168.2.13
                                Oct 27, 2024 09:50:42.876003027 CET4942238241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:42.876126051 CET4942238241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:42.881840944 CET382414942245.156.86.24192.168.2.13
                                Oct 27, 2024 09:50:42.881915092 CET4942238241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:42.887923956 CET382414942245.156.86.24192.168.2.13
                                Oct 27, 2024 09:50:53.702475071 CET382414942245.156.86.24192.168.2.13
                                Oct 27, 2024 09:50:53.702608109 CET4942238241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:53.708781004 CET382414942245.156.86.24192.168.2.13
                                Oct 27, 2024 09:50:54.715207100 CET4942438241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:54.723299026 CET382414942445.156.86.24192.168.2.13
                                Oct 27, 2024 09:50:54.723469019 CET4942438241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:54.723469019 CET4942438241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:54.729644060 CET382414942445.156.86.24192.168.2.13
                                Oct 27, 2024 09:50:54.729773998 CET4942438241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:50:54.735896111 CET382414942445.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:05.561429024 CET382414942445.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:05.561711073 CET4942438241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:05.567826986 CET382414942445.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:06.597385883 CET4942638241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:06.603169918 CET382414942645.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:06.603393078 CET4942638241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:06.603394032 CET4942638241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:06.609483957 CET382414942645.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:06.609627008 CET4942638241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:06.615478992 CET382414942645.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:17.443504095 CET382414942645.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:17.444120884 CET4942638241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:17.449861050 CET382414942645.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:18.482003927 CET4942838241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:18.487946987 CET382414942845.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:18.488099098 CET4942838241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:18.488338947 CET4942838241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:18.494292021 CET382414942845.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:18.494720936 CET4942838241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:18.500597000 CET382414942845.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:29.441010952 CET382414942845.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:29.441565990 CET4942838241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:29.448561907 CET382414942845.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:30.535729885 CET4943038241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:30.541845083 CET382414943045.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:30.541984081 CET4943038241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:30.542150974 CET4943038241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:30.548263073 CET382414943045.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:30.548439980 CET4943038241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:30.554678917 CET382414943045.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:50.559458971 CET4943038241192.168.2.1345.156.86.24
                                Oct 27, 2024 09:51:50.565349102 CET382414943045.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:50.795063019 CET382414943045.156.86.24192.168.2.13
                                Oct 27, 2024 09:51:50.795418978 CET4943038241192.168.2.1345.156.86.24
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 27, 2024 09:50:31.468141079 CET5447453192.168.2.13152.53.15.127
                                Oct 27, 2024 09:50:31.479832888 CET5354474152.53.15.127192.168.2.13
                                Oct 27, 2024 09:50:42.857956886 CET4990353192.168.2.13152.53.15.127
                                Oct 27, 2024 09:50:42.869438887 CET5349903152.53.15.127192.168.2.13
                                Oct 27, 2024 09:50:54.703843117 CET4351453192.168.2.13152.53.15.127
                                Oct 27, 2024 09:50:54.714952946 CET5343514152.53.15.127192.168.2.13
                                Oct 27, 2024 09:51:06.562777996 CET4948453192.168.2.13185.181.61.24
                                Oct 27, 2024 09:51:06.597043991 CET5349484185.181.61.24192.168.2.13
                                Oct 27, 2024 09:51:18.447170019 CET6077453192.168.2.13185.181.61.24
                                Oct 27, 2024 09:51:18.481627941 CET5360774185.181.61.24192.168.2.13
                                Oct 27, 2024 09:51:30.444520950 CET3309353192.168.2.13168.235.111.72
                                Oct 27, 2024 09:51:30.535248041 CET5333093168.235.111.72192.168.2.13
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Oct 27, 2024 09:50:31.468141079 CET192.168.2.13152.53.15.1270x8c97Standard query (0)burnthe.libreA (IP address)IN (0x0001)false
                                Oct 27, 2024 09:50:42.857956886 CET192.168.2.13152.53.15.1270x54d6Standard query (0)yellowchink.pirateA (IP address)IN (0x0001)false
                                Oct 27, 2024 09:50:54.703843117 CET192.168.2.13152.53.15.1270x3ed1Standard query (0)netfags.geek. [malformed]256494false
                                Oct 27, 2024 09:51:06.562777996 CET192.168.2.13185.181.61.240x7886Standard query (0)yellowchink.pirateA (IP address)IN (0x0001)false
                                Oct 27, 2024 09:51:18.447170019 CET192.168.2.13185.181.61.240x4387Standard query (0)chinklabs.dyn. [malformed]256262false
                                Oct 27, 2024 09:51:30.444520950 CET192.168.2.13168.235.111.720xb3faStandard query (0)burnthe.libre. [malformed]256274false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Oct 27, 2024 09:50:31.479832888 CET152.53.15.127192.168.2.130x8c97No error (0)burnthe.libre45.156.86.24A (IP address)IN (0x0001)false
                                Oct 27, 2024 09:50:42.869438887 CET152.53.15.127192.168.2.130x54d6No error (0)yellowchink.pirate45.156.86.24A (IP address)IN (0x0001)false
                                Oct 27, 2024 09:50:54.714952946 CET152.53.15.127192.168.2.130x3ed1Format error (1)netfags.geek. [malformed]nonenone256494false
                                Oct 27, 2024 09:51:06.597043991 CET185.181.61.24192.168.2.130x7886No error (0)yellowchink.pirate45.156.86.24A (IP address)IN (0x0001)false

                                System Behavior

                                Start time (UTC):08:50:30
                                Start date (UTC):27/10/2024
                                Path:/tmp/zerx86.elf
                                Arguments:/tmp/zerx86.elf
                                File size:43028 bytes
                                MD5 hash:59789d01154bed5b3eac8d425ddaf0a4

                                Start time (UTC):08:50:30
                                Start date (UTC):27/10/2024
                                Path:/tmp/zerx86.elf
                                Arguments:-
                                File size:43028 bytes
                                MD5 hash:59789d01154bed5b3eac8d425ddaf0a4

                                Start time (UTC):08:50:30
                                Start date (UTC):27/10/2024
                                Path:/tmp/zerx86.elf
                                Arguments:-
                                File size:43028 bytes
                                MD5 hash:59789d01154bed5b3eac8d425ddaf0a4