Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
x86_64.elf

Overview

General Information

Sample name:x86_64.elf
Analysis ID:1543159
MD5:499f679d03a0ec57447170f11b8d16fb
SHA1:ca43a5fb91c1d54ebe9b1df0710b257a7c9ffb4a
SHA256:061eb3d4a30c834b3f98bbd773c0ac8edbd730d75b51e5bc726d862f8c371c30
Tags:elfMiraiuser-abuse_ch
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads system version information
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1543159
Start date and time:2024-10-27 10:02:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 12s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:x86_64.elf
Detection:MAL
Classification:mal72.evad.linELF@0/0@2/0
  • VT rate limit hit for: x86_64.elf
Command:/tmp/x86_64.elf
PID:5739
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
hello
Standard Error:
  • system is lnxubuntu20
  • x86_64.elf (PID: 5739, Parent: 5547, MD5: 499f679d03a0ec57447170f11b8d16fb) Arguments: /tmp/x86_64.elf
  • systemd New Fork (PID: 5806, Parent: 1)
  • snap-failure (PID: 5806, Parent: 1, MD5: 69136a7d575731ce62349f2e4d3e5c36) Arguments: /usr/lib/snapd/snap-failure snapd
    • systemctl (PID: 5816, Parent: 5806, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl stop snapd.socket
  • cleanup
SourceRuleDescriptionAuthorStrings
x86_64.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0x91dc:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
x86_64.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0x99cb:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
x86_64.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x67ae:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x68e4:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
x86_64.elfLinux_Trojan_Gafgyt_d996d335unknownunknown
  • 0xd476:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
x86_64.elfLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0x958b:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
Click to see the 4 entries
SourceRuleDescriptionAuthorStrings
5739.1.0000000000400000.0000000000410000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0x91dc:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
5739.1.0000000000400000.0000000000410000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0x99cb:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
5739.1.0000000000400000.0000000000410000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x67ae:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x68e4:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
5739.1.0000000000400000.0000000000410000.r-x.sdmpLinux_Trojan_Gafgyt_d996d335unknownunknown
  • 0xd476:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
5739.1.0000000000400000.0000000000410000.r-x.sdmpLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0x958b:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
Click to see the 13 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: x86_64.elfAvira: detected
Source: x86_64.elfReversingLabs: Detection: 31%
Source: x86_64.elfJoe Sandbox ML: detected
Source: global trafficTCP traffic: 192.168.2.13:44964 -> 45.90.97.84:18129
Source: /tmp/x86_64.elf (PID: 5739)Socket: 127.0.0.1:18129Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: unknownTCP traffic detected without corresponding DNS query: 45.90.97.84
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

System Summary

barindex
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: Initial sampleString containing 'busybox' found: busybox
Source: Initial sampleString containing 'busybox' found: /proc/cmdlineEOF/proc/%d/exe/proc/%d/statsys_monitor_cnrbusyboxadbddockerdBlink_Cloudsystemdhttpsshdbashmsg_centerlte_mgrmain_mgrarm7arm5arm6mipsx86_32x86_64/tmp/var/mnt/root/boot/sbin/home/dev/media/opt/../(deleted)x86sh4softbot.armsoftbot.mpsl[0clKillerKillerEXE] Killed process: %s, PID: %d
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/x86_64.elf (PID: 5741)SIGKILL sent: pid: 660, result: successfulJump to behavior
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: 5739.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: 5741.1.0000000000400000.0000000000410000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: classification engineClassification label: mal72.evad.linELF@0/0@2/0
Source: /usr/lib/snapd/snap-failure (PID: 5816)Systemctl executable: /usr/bin/systemctl -> systemctl stop snapd.socketJump to behavior
Source: /usr/lib/snapd/snap-failure (PID: 5806)Reads version info: /proc/versionJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/x86_64.elf (PID: 5739)File: /tmp/x86_64.elfJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Systemd Service
1
Systemd Service
1
File Deletion
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543159 Sample: x86_64.elf Startdate: 27/10/2024 Architecture: LINUX Score: 72 23 45.90.97.84, 18129, 44964, 44966 MEER-ASmeerfarbigGmbHCoKGDE Germany 2->23 25 daisy.ubuntu.com 2->25 27 Malicious sample detected (through community Yara rule) 2->27 29 Antivirus / Scanner detection for submitted sample 2->29 31 Multi AV Scanner detection for submitted file 2->31 33 Machine Learning detection for sample 2->33 8 x86_64.elf 2->8         started        11 systemd snap-failure 2->11         started        signatures3 process4 signatures5 35 Sample deletes itself 8->35 13 x86_64.elf 8->13         started        15 snap-failure systemctl 11->15         started        17 snap-failure 11->17         started        process6 process7 19 x86_64.elf 13->19         started        21 x86_64.elf 13->21         started       
SourceDetectionScannerLabelLink
x86_64.elf32%ReversingLabsLinux.Backdoor.Mirai
x86_64.elf100%AviraEXP/ELF.Mirai.W
x86_64.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    45.90.97.84
    unknownGermany
    34549MEER-ASmeerfarbigGmbHCoKGDEfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    45.90.97.84spc.elfGet hashmaliciousUnknownBrowse
      mips.elfGet hashmaliciousUnknownBrowse
        mpsl.elfGet hashmaliciousUnknownBrowse
          ppc.elfGet hashmaliciousUnknownBrowse
            arm.elfGet hashmaliciousUnknownBrowse
              sh4.elfGet hashmaliciousUnknownBrowse
                x86_32.elfGet hashmaliciousUnknownBrowse
                  arm7.elfGet hashmaliciousMiraiBrowse
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    daisy.ubuntu.comarm6.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.25
                    spc.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.24
                    splarm6.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.24
                    ppc.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.24
                    sh4.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.24
                    x86_32.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.25
                    arm5.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.24
                    arm6.elfGet hashmaliciousMiraiBrowse
                    • 162.213.35.24
                    la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.25
                    la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                    • 162.213.35.25
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    MEER-ASmeerfarbigGmbHCoKGDEspc.elfGet hashmaliciousUnknownBrowse
                    • 45.90.97.84
                    mips.elfGet hashmaliciousUnknownBrowse
                    • 45.90.97.84
                    mpsl.elfGet hashmaliciousUnknownBrowse
                    • 45.90.97.84
                    ppc.elfGet hashmaliciousUnknownBrowse
                    • 45.90.97.84
                    arm.elfGet hashmaliciousUnknownBrowse
                    • 45.90.97.84
                    sh4.elfGet hashmaliciousUnknownBrowse
                    • 45.90.97.84
                    x86_32.elfGet hashmaliciousUnknownBrowse
                    • 45.90.97.84
                    arm7.elfGet hashmaliciousMiraiBrowse
                    • 45.90.97.84
                    r1LQ3TmnJT.exeGet hashmaliciousSocks5SystemzBrowse
                    • 45.155.249.117
                    http://nndpdnm.3utilities.com/#bd5on/p8la73b/LoiU9/1oQd1tRDE-SUREIDANt92YuMXZpJHZuV3bmxWYi9GbnBUY5hGZhBHc15Cdp1WYGet hashmaliciousHTMLPhisherBrowse
                    • 45.155.249.33
                    No context
                    No context
                    No created / dropped files found
                    File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                    Entropy (8bit):6.194051217191467
                    TrID:
                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                    File name:x86_64.elf
                    File size:67'776 bytes
                    MD5:499f679d03a0ec57447170f11b8d16fb
                    SHA1:ca43a5fb91c1d54ebe9b1df0710b257a7c9ffb4a
                    SHA256:061eb3d4a30c834b3f98bbd773c0ac8edbd730d75b51e5bc726d862f8c371c30
                    SHA512:f514973de7e9110f39440bb7a4352496cc1e4bce7aa551aa38471caf0ba59f7bfcbf511b3ef284c60c274fbf937433166c78d4c332a78d654d469b4733701bdc
                    SSDEEP:1536:7MVotPFJlw1hfedZp7cLqMLKeKL3NzRpiV9gzVkq02L26yJhkf:ACtnS1hKLiqyKVn+gzVkW26yJqf
                    TLSH:EC634B07B581C0FCC5A9C178076BB63AD933757E0239B2BA37D4FA236D59E215E6E900
                    File Content Preview:.ELF..............>.......@.....@.......@...........@.8...@.......................@.......@.....E.......E.................................Q.......Q............../..............Q.td....................................................H...._........H........

                    ELF header

                    Class:ELF64
                    Data:2's complement, little endian
                    Version:1 (current)
                    Machine:Advanced Micro Devices X86-64
                    Version Number:0x1
                    Type:EXEC (Executable file)
                    OS/ABI:UNIX - System V
                    ABI Version:0
                    Entry Point Address:0x400194
                    Flags:0x0
                    ELF Header Size:64
                    Program Header Offset:64
                    Program Header Size:56
                    Number of Program Headers:3
                    Section Header Offset:67136
                    Section Header Size:64
                    Number of Section Headers:10
                    Header String Table Index:9
                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                    NULL0x00x00x00x00x0000
                    .initPROGBITS0x4000e80xe80x130x00x6AX001
                    .textPROGBITS0x4001000x1000xdd060x00x6AX0016
                    .finiPROGBITS0x40de060xde060xe0x00x6AX001
                    .rodataPROGBITS0x40de200xde200x1c250x00x2A0032
                    .ctorsPROGBITS0x5100000x100000x100x00x3WA008
                    .dtorsPROGBITS0x5100100x100100x100x00x3WA008
                    .dataPROGBITS0x5100400x100400x5c00x00x3WA0032
                    .bssNOBITS0x5106000x106000x29e80x00x3WA0032
                    .shstrtabSTRTAB0x00x106000x3e0x00x0001
                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                    LOAD0x00x4000000x4000000xfa450xfa456.36630x5R E0x100000.init .text .fini .rodata
                    LOAD0x100000x5100000x5100000x6000x2fe82.32530x6RW 0x100000.ctors .dtors .data .bss
                    GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 27, 2024 10:03:44.429785967 CET4496418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:03:44.435532093 CET181294496445.90.97.84192.168.2.13
                    Oct 27, 2024 10:03:44.435601950 CET4496418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:03:44.437344074 CET4496418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:03:44.443367958 CET181294496445.90.97.84192.168.2.13
                    Oct 27, 2024 10:03:44.443438053 CET4496418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:03:44.449105024 CET181294496445.90.97.84192.168.2.13
                    Oct 27, 2024 10:03:52.911844015 CET181294496445.90.97.84192.168.2.13
                    Oct 27, 2024 10:03:52.912179947 CET4496418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:03:52.917892933 CET181294496445.90.97.84192.168.2.13
                    Oct 27, 2024 10:03:53.957868099 CET4496618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:03:53.963202000 CET181294496645.90.97.84192.168.2.13
                    Oct 27, 2024 10:03:53.963279009 CET4496618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:03:53.964019060 CET4496618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:03:53.969435930 CET181294496645.90.97.84192.168.2.13
                    Oct 27, 2024 10:03:53.969482899 CET4496618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:03:53.974929094 CET181294496645.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:02.459517002 CET181294496645.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:02.459655046 CET4496618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:02.466074944 CET181294496645.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:03.461513996 CET4496818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:03.467355013 CET181294496845.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:03.467442036 CET4496818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:03.468199968 CET4496818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:03.473803997 CET181294496845.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:03.473891973 CET4496818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:03.479501009 CET181294496845.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:11.949592113 CET181294496845.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:11.949862957 CET4496818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:11.955419064 CET181294496845.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:12.953571081 CET4497018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:13.434900999 CET181294497045.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:13.434977055 CET4497018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:13.436546087 CET4497018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:13.441859961 CET181294497045.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:13.441896915 CET4497018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:13.447205067 CET181294497045.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:21.922070026 CET181294497045.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:21.922606945 CET4497018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:21.928046942 CET181294497045.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:22.925021887 CET4497218129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:22.931303978 CET181294497245.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:22.931478977 CET4497218129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:22.932377100 CET4497218129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:22.937966108 CET181294497245.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:22.938600063 CET4497218129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:22.944253922 CET181294497245.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:31.412717104 CET181294497245.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:31.413218021 CET4497218129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:31.418842077 CET181294497245.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:32.417130947 CET4497418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:32.422837973 CET181294497445.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:32.422945976 CET4497418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:32.424649954 CET4497418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:32.430039883 CET181294497445.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:32.430160046 CET4497418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:32.435661077 CET181294497445.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:40.922504902 CET181294497445.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:40.922904015 CET4497418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:40.928527117 CET181294497445.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:41.928111076 CET4497618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:41.933729887 CET181294497645.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:41.933801889 CET4497618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:41.935484886 CET4497618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:41.940875053 CET181294497645.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:41.940973997 CET4497618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:41.946997881 CET181294497645.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:50.411689043 CET181294497645.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:50.412169933 CET4497618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:50.417808056 CET181294497645.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:51.415829897 CET4497818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:51.421621084 CET181294497845.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:51.421860933 CET4497818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:51.423399925 CET4497818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:51.429128885 CET181294497845.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:51.429225922 CET4497818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:51.434737921 CET181294497845.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:59.917093992 CET181294497845.90.97.84192.168.2.13
                    Oct 27, 2024 10:04:59.917373896 CET4497818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:04:59.925542116 CET181294497845.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:00.920229912 CET4498018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:00.925864935 CET181294498045.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:00.925940990 CET4498018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:00.927247047 CET4498018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:00.932632923 CET181294498045.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:00.932688951 CET4498018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:00.938086987 CET181294498045.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:10.450841904 CET181294498045.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:10.451210022 CET4498018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:10.451302052 CET4498018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:10.451644897 CET181294498045.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:10.451699018 CET4498018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:10.451961040 CET181294498045.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:10.452006102 CET4498018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:10.452898979 CET181294498045.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:10.452948093 CET4498018129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:10.456949949 CET181294498045.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:11.453990936 CET4498218129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:11.865350008 CET181294498245.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:11.865613937 CET4498218129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:11.866997004 CET4498218129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:11.874741077 CET181294498245.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:11.874855995 CET4498218129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:11.883766890 CET181294498245.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:20.346971035 CET181294498245.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:20.347242117 CET4498218129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:20.353414059 CET181294498245.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:21.350368977 CET4498418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:21.356292009 CET181294498445.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:21.356385946 CET4498418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:21.357533932 CET4498418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:21.362888098 CET181294498445.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:21.362998009 CET4498418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:21.368382931 CET181294498445.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:30.012772083 CET181294498445.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:30.013058901 CET4498418129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:30.018497944 CET181294498445.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:31.015588045 CET4498618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:31.023755074 CET181294498645.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:31.023849010 CET4498618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:31.025369883 CET4498618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:31.030730963 CET181294498645.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:31.030812025 CET4498618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:31.037532091 CET181294498645.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:39.512164116 CET181294498645.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:39.512341976 CET4498618129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:39.517673969 CET181294498645.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:40.513782024 CET4498818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:40.519335985 CET181294498845.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:40.519416094 CET4498818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:40.520019054 CET4498818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:40.525474072 CET181294498845.90.97.84192.168.2.13
                    Oct 27, 2024 10:05:40.525528908 CET4498818129192.168.2.1345.90.97.84
                    Oct 27, 2024 10:05:40.530972004 CET181294498845.90.97.84192.168.2.13
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 27, 2024 10:03:46.019269943 CET3878053192.168.2.131.1.1.1
                    Oct 27, 2024 10:03:46.019306898 CET5162253192.168.2.131.1.1.1
                    Oct 27, 2024 10:03:46.027055025 CET53516221.1.1.1192.168.2.13
                    Oct 27, 2024 10:03:46.111793995 CET53387801.1.1.1192.168.2.13
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Oct 27, 2024 10:03:46.019269943 CET192.168.2.131.1.1.10xb971Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                    Oct 27, 2024 10:03:46.019306898 CET192.168.2.131.1.1.10x29c6Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Oct 27, 2024 10:03:46.111793995 CET1.1.1.1192.168.2.130xb971No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                    Oct 27, 2024 10:03:46.111793995 CET1.1.1.1192.168.2.130xb971No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                    System Behavior

                    Start time (UTC):09:03:43
                    Start date (UTC):27/10/2024
                    Path:/tmp/x86_64.elf
                    Arguments:/tmp/x86_64.elf
                    File size:67776 bytes
                    MD5 hash:499f679d03a0ec57447170f11b8d16fb

                    Start time (UTC):09:03:43
                    Start date (UTC):27/10/2024
                    Path:/tmp/x86_64.elf
                    Arguments:-
                    File size:67776 bytes
                    MD5 hash:499f679d03a0ec57447170f11b8d16fb

                    Start time (UTC):09:03:43
                    Start date (UTC):27/10/2024
                    Path:/tmp/x86_64.elf
                    Arguments:-
                    File size:67776 bytes
                    MD5 hash:499f679d03a0ec57447170f11b8d16fb

                    Start time (UTC):09:03:43
                    Start date (UTC):27/10/2024
                    Path:/tmp/x86_64.elf
                    Arguments:-
                    File size:67776 bytes
                    MD5 hash:499f679d03a0ec57447170f11b8d16fb

                    Start time (UTC):09:04:21
                    Start date (UTC):27/10/2024
                    Path:/usr/lib/systemd/systemd
                    Arguments:-
                    File size:1620224 bytes
                    MD5 hash:9b2bec7092a40488108543f9334aab75

                    Start time (UTC):09:04:21
                    Start date (UTC):27/10/2024
                    Path:/usr/lib/snapd/snap-failure
                    Arguments:/usr/lib/snapd/snap-failure snapd
                    File size:4764904 bytes
                    MD5 hash:69136a7d575731ce62349f2e4d3e5c36

                    Start time (UTC):09:04:21
                    Start date (UTC):27/10/2024
                    Path:/usr/lib/snapd/snap-failure
                    Arguments:-
                    File size:4764904 bytes
                    MD5 hash:69136a7d575731ce62349f2e4d3e5c36

                    Start time (UTC):09:04:21
                    Start date (UTC):27/10/2024
                    Path:/usr/bin/systemctl
                    Arguments:systemctl stop snapd.socket
                    File size:996584 bytes
                    MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                    Start time (UTC):09:04:22
                    Start date (UTC):27/10/2024
                    Path:/usr/lib/snapd/snap-failure
                    Arguments:-
                    File size:4764904 bytes
                    MD5 hash:69136a7d575731ce62349f2e4d3e5c36