Linux
Analysis Report
na.elf
Overview
General Information
Sample name: | na.elf |
Analysis ID: | 1544056 |
MD5: | 8ec928a5e02d8af1d373e34b185cc331 |
SHA1: | 404e9caac5aea11a9d338d12f29bef72d640b063 |
SHA256: | 2b3e64c2cfdd2bce87362e9fed7b8d7074d1e4c08abeb750ea63570d48d73b7d |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1544056 |
Start date and time: | 2024-10-28 19:08:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 36s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | na.elf |
Detection: | MAL |
Classification: | mal72.evad.linELF@0/6@3/0 |
- VT rate limit hit for: na.elf
Command: | /tmp/na.elf |
PID: | 6239 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: |
- system is lnxubuntu20
- na.elf New Fork (PID: 6240, Parent: 6239)
- sh New Fork (PID: 6241, Parent: 6240)
- na.elf New Fork (PID: 6242, Parent: 6239)
- sh New Fork (PID: 6243, Parent: 6242)
- na.elf New Fork (PID: 6244, Parent: 6239)
- sh New Fork (PID: 6245, Parent: 6244)
- na.elf New Fork (PID: 6246, Parent: 6239)
- sh New Fork (PID: 6247, Parent: 6246)
- na.elf New Fork (PID: 6248, Parent: 6239)
- sh New Fork (PID: 6249, Parent: 6248)
- na.elf New Fork (PID: 6250, Parent: 6239)
- sh New Fork (PID: 6251, Parent: 6250)
- na.elf New Fork (PID: 6252, Parent: 6239)
- sh New Fork (PID: 6253, Parent: 6252)
- na.elf New Fork (PID: 6254, Parent: 6239)
- sh New Fork (PID: 6255, Parent: 6254)
- na.elf New Fork (PID: 6256, Parent: 6239)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
CN_disclosed_20180208_lsls | Detects malware from disclosed CN malware set | Florian Roth |
|
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-28T19:08:53.524216+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 58990 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:08:59.364776+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 58992 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:05.323919+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 58994 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:11.031992+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 58996 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:16.741838+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 58998 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:22.428389+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59000 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:28.334723+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59004 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:34.009417+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59006 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:39.750162+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59008 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:45.435384+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59010 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:51.113916+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59012 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:56.804360+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59014 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:02.479604+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59018 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:08.214424+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59020 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:13.903725+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59022 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:19.604198+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59024 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:25.303642+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59026 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:31.276151+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59030 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:36.978634+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59032 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:42.673929+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59034 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:48.357488+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59036 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:54.067284+0100 | 2019172 | 1 | Malware Command and Control Activity Detected | 192.168.2.23 | 59038 | 116.205.177.132 | 10210 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-28T19:09:39.821042+0100 | 2019177 | 1 | A Network Trojan was detected | 192.168.2.23 | 59008 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:48.653568+0100 | 2019177 | 1 | A Network Trojan was detected | 192.168.2.23 | 59036 | 116.205.177.132 | 10210 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Reads CPU info from proc file: | Jump to behavior |
Source: | Reads CPU info from /sys: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | Reads hosts file: | Jump to behavior |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: |
Source: | Program segment: |
Source: | Matched rule: |
Source: | Classification label: |
Data Obfuscation |
---|
Source: | String containing UPX found: | ||
Source: | String containing UPX found: | ||
Source: | String containing UPX found: |
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior |
Source: | Rm executable: | Jump to behavior | ||
Source: | Rm executable: | Jump to behavior |
Source: | Reads from proc file: | Jump to behavior | ||
Source: | Reads from proc file: | Jump to behavior |
Source: | Sed executable: | Jump to behavior | ||
Source: | Sed executable: | Jump to behavior | ||
Source: | Sed executable: | Jump to behavior | ||
Source: | Sed executable: | Jump to behavior | ||
Source: | Sed executable: | Jump to behavior | ||
Source: | Sed executable: | Jump to behavior |
Source: | Submission file: |
Source: | Reads CPU info from proc file: | Jump to behavior |
Source: | Reads CPU info from /sys: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | 1 Command and Scripting Interpreter | 1 Scripting | Path Interception | 11 Obfuscated Files or Information | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 File Deletion | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 3 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 2 Application Layer Protocol | Traffic Duplication | Data Destruction |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
50% | ReversingLabs | Linux.Trojan.Generic | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
mhacker.cc | unknown | unknown | false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
true |
| unknown | ||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
109.202.202.202 | unknown | Switzerland | 13030 | INIT7CH | false | |
91.189.91.43 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false | |
91.189.91.42 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false | |
116.205.177.132 | unknown | China | 4766 | KIXS-AS-KRKoreaTelecomKR | true |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
109.202.202.202 | Get hash | malicious | Unknown | Browse |
| |
91.189.91.43 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
91.189.91.42 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CANONICAL-ASGB | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
CANONICAL-ASGB | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
KIXS-AS-KRKoreaTelecomKR | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
INIT7CH | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
Process: | /usr/bin/sed |
File Type: | |
Category: | dropped |
Size (bytes): | 66 |
Entropy (8bit): | 4.2170704991443975 |
Encrypted: | false |
SSDEEP: | 3:buwzecKHRssQGTRRt:buo4xfQORt |
MD5: | 805B2915B3527FC1C98E1AE1CE8D85B9 |
SHA1: | 6DF8C78EC5CF1FD52339DBF9AD877B68DEB6DDBF |
SHA-256: | FB6231DF7E135AE9F856579760B4941123D5C71EC03A2E9E61FC047EBABE296B |
SHA-512: | 12DA87E23F45198972FBA9EE9648218457A3E1190F16DFDD7E827028D92D29C010EFE421E60C2252896B6955191373166E8DAAC887CD214CE8CDA331142206F1 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.93655941091709 |
TrID: |
|
File name: | na.elf |
File size: | 826'008 bytes |
MD5: | 8ec928a5e02d8af1d373e34b185cc331 |
SHA1: | 404e9caac5aea11a9d338d12f29bef72d640b063 |
SHA256: | 2b3e64c2cfdd2bce87362e9fed7b8d7074d1e4c08abeb750ea63570d48d73b7d |
SHA512: | 0b5e725d5ac86a0a16ffe449f4ed963c915011ca5333f0d8b3fcbe96436ee40a199fb4add0d8a1999dbb8d735be30b3c6aa4ac70afec52a99e236fedb2a83ce2 |
SSDEEP: | 12288:EuwNR44JOibwv9+rtzxSE9Ov4iOhMK9GyTzOPXs9uCrlrkbhokvRCg5:EPNzJOiE+zxlOg5M2GynduCrlWCg5 |
TLSH: | 6B0533FA204FBBB7E85458BD6213936026DC8553C7DB252BE4DD0603DDB17522EB22E2 |
File Content Preview: | .ELF..............>.......I.....@...................@.8...@.......................@.......@....................... .......................O.......O....................... .....P...UPX!.........('..('..................ELF.......>.....@.w7......''8.......). |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 64 |
Program Header Offset: | 64 |
Program Header Size: | 56 |
Number of Program Headers: | 2 |
Section Header Offset: | 0 |
Section Header Size: | 64 |
Number of Section Headers: | 0 |
Header String Table Index: | 0 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x400000 | 0x400000 | 0x9fa85 | 0x9fa85 | 7.9398 | 0x5 | R E | 0x200000 | ||
LOAD | 0xfe1d8 | 0x14fe1d8 | 0x14fe1d8 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x200000 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-28T19:08:53.524216+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 58990 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:08:59.364776+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 58992 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:05.323919+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 58994 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:11.031992+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 58996 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:16.741838+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 58998 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:22.428389+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59000 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:28.334723+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59004 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:34.009417+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59006 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:39.750162+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59008 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:39.821042+0100 | 2019177 | ET MALWARE Linux/AES.DDoS Sending Real/Fake CPU&BW Info | 1 | 192.168.2.23 | 59008 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:45.435384+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59010 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:51.113916+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59012 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:09:56.804360+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59014 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:02.479604+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59018 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:08.214424+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59020 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:13.903725+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59022 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:19.604198+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59024 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:25.303642+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59026 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:31.276151+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59030 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:36.978634+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59032 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:42.673929+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59034 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:48.357488+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59036 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:48.653568+0100 | 2019177 | ET MALWARE Linux/AES.DDoS Sending Real/Fake CPU&BW Info | 1 | 192.168.2.23 | 59036 | 116.205.177.132 | 10210 | TCP |
2024-10-28T19:10:54.067284+0100 | 2019172 | ET MALWARE Linux.DDoS Checkin | 1 | 192.168.2.23 | 59038 | 116.205.177.132 | 10210 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 28, 2024 19:08:53.390899897 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Oct 28, 2024 19:08:53.514369011 CET | 58990 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:08:53.519932032 CET | 10210 | 58990 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:08:53.519996881 CET | 58990 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:08:53.524215937 CET | 58990 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:08:53.529700994 CET | 10210 | 58990 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:08:54.194806099 CET | 10210 | 58990 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:08:54.195055008 CET | 58990 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:08:58.766309023 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Oct 28, 2024 19:08:59.199779034 CET | 58992 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:08:59.359292984 CET | 10210 | 58992 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:08:59.359451056 CET | 58992 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:08:59.364775896 CET | 58992 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:08:59.365782976 CET | 58992 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:08:59.370213985 CET | 10210 | 58992 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:08:59.371234894 CET | 10210 | 58992 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:08:59.790137053 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Oct 28, 2024 19:09:00.061217070 CET | 10210 | 58992 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:00.061584949 CET | 58992 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:05.063343048 CET | 58994 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:05.318023920 CET | 10210 | 58994 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:05.318459988 CET | 58994 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:05.323919058 CET | 58994 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:05.329312086 CET | 10210 | 58994 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:05.425379038 CET | 58994 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:05.431025982 CET | 10210 | 58994 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:06.017837048 CET | 10210 | 58994 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:06.018229961 CET | 58994 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:11.020091057 CET | 58996 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:11.025758028 CET | 10210 | 58996 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:11.025857925 CET | 58996 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:11.031991959 CET | 58996 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:11.037650108 CET | 10210 | 58996 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:11.494820118 CET | 58996 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:11.500638008 CET | 10210 | 58996 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:11.728574038 CET | 10210 | 58996 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:11.728940964 CET | 58996 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:15.148318052 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Oct 28, 2024 19:09:16.730766058 CET | 58998 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:16.736212969 CET | 10210 | 58998 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:16.736300945 CET | 58998 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:16.741837978 CET | 58998 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:16.747185946 CET | 10210 | 58998 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:17.412173986 CET | 10210 | 58998 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:17.412874937 CET | 58998 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:22.415122032 CET | 59000 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:22.420902967 CET | 10210 | 59000 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:22.420989990 CET | 59000 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:22.428389072 CET | 59000 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:22.434006929 CET | 10210 | 59000 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:23.319463968 CET | 10210 | 59000 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:23.319696903 CET | 59000 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:23.320967913 CET | 10210 | 59000 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:23.321032047 CET | 59000 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:25.386804104 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Oct 28, 2024 19:09:28.321461916 CET | 59004 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:28.327056885 CET | 10210 | 59004 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:28.327137947 CET | 59004 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:28.334722996 CET | 59004 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:28.340215921 CET | 10210 | 59004 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:28.996299982 CET | 10210 | 59004 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:28.996829987 CET | 59004 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:29.482254028 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Oct 28, 2024 19:09:33.998558998 CET | 59006 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:34.004163980 CET | 10210 | 59006 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:34.004256010 CET | 59006 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:34.009417057 CET | 59006 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:34.014965057 CET | 10210 | 59006 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:34.671709061 CET | 10210 | 59006 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:34.672286034 CET | 59006 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:39.674166918 CET | 59008 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:39.741297960 CET | 10210 | 59008 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:39.741523027 CET | 59008 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:39.750161886 CET | 59008 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:39.755639076 CET | 10210 | 59008 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:39.821042061 CET | 59008 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:39.826572895 CET | 10210 | 59008 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:40.419656992 CET | 10210 | 59008 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:40.420358896 CET | 59008 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:45.423295021 CET | 59010 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:45.429227114 CET | 10210 | 59010 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:45.429330111 CET | 59010 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:45.435384035 CET | 59010 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:45.441138029 CET | 10210 | 59010 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:45.895104885 CET | 59010 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:45.900976896 CET | 10210 | 59010 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:46.098191977 CET | 10210 | 59010 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:46.098618984 CET | 59010 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:51.100936890 CET | 59012 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:51.106465101 CET | 10210 | 59012 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:51.106570005 CET | 59012 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:51.113915920 CET | 59012 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:51.119378090 CET | 10210 | 59012 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:51.786164999 CET | 10210 | 59012 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:51.786794901 CET | 59012 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:56.102807999 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Oct 28, 2024 19:09:56.790134907 CET | 59014 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:56.795950890 CET | 10210 | 59014 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:56.796195030 CET | 59014 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:56.804359913 CET | 59014 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:09:56.810017109 CET | 10210 | 59014 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:57.465198994 CET | 10210 | 59014 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:09:57.465786934 CET | 59014 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:02.468507051 CET | 59018 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:02.474096060 CET | 10210 | 59018 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:02.474159956 CET | 59018 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:02.479604006 CET | 59018 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:02.485055923 CET | 10210 | 59018 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:03.196517944 CET | 10210 | 59018 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:03.197071075 CET | 59018 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:08.200294971 CET | 59020 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:08.206274986 CET | 10210 | 59020 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:08.206620932 CET | 59020 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:08.214423895 CET | 59020 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:08.220417976 CET | 10210 | 59020 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:08.883922100 CET | 10210 | 59020 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:08.884491920 CET | 59020 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:13.889028072 CET | 59022 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:13.894695044 CET | 10210 | 59022 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:13.894975901 CET | 59022 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:13.903724909 CET | 59022 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:13.909456015 CET | 10210 | 59022 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:14.249600887 CET | 59022 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:14.256397009 CET | 10210 | 59022 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:14.579232931 CET | 10210 | 59022 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:14.579773903 CET | 59022 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:19.583674908 CET | 59024 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:19.593811989 CET | 10210 | 59024 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:19.593993902 CET | 59024 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:19.604197979 CET | 59024 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:19.610368967 CET | 10210 | 59024 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:20.285211086 CET | 10210 | 59024 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:20.285731077 CET | 59024 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:25.290224075 CET | 59026 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:25.296160936 CET | 10210 | 59026 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:25.296508074 CET | 59026 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:25.303642035 CET | 59026 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:25.309339046 CET | 10210 | 59026 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:25.964582920 CET | 10210 | 59026 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:25.964837074 CET | 59026 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:31.264045000 CET | 59030 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:31.269602060 CET | 10210 | 59030 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:31.269722939 CET | 59030 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:31.276150942 CET | 59030 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:31.282026052 CET | 10210 | 59030 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:31.965311050 CET | 10210 | 59030 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:31.965795040 CET | 59030 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:36.967328072 CET | 59032 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:36.972882032 CET | 10210 | 59032 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:36.973027945 CET | 59032 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:36.978634119 CET | 59032 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:36.984055042 CET | 10210 | 59032 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:37.660682917 CET | 10210 | 59032 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:37.660877943 CET | 59032 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:42.661947966 CET | 59034 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:42.667562962 CET | 10210 | 59034 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:42.667619944 CET | 59034 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:42.673928976 CET | 59034 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:42.679420948 CET | 10210 | 59034 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:43.340625048 CET | 10210 | 59034 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:43.341028929 CET | 59034 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:48.342981100 CET | 59036 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:48.348933935 CET | 10210 | 59036 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:48.349037886 CET | 59036 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:48.357487917 CET | 59036 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:48.363123894 CET | 10210 | 59036 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:48.653568029 CET | 59036 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:48.659395933 CET | 10210 | 59036 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:49.052956104 CET | 10210 | 59036 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:49.053232908 CET | 59036 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:54.054936886 CET | 59038 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:54.061269045 CET | 10210 | 59038 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:54.061387062 CET | 59038 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:54.067284107 CET | 59038 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:54.072906017 CET | 10210 | 59038 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:54.726291895 CET | 59038 | 10210 | 192.168.2.23 | 116.205.177.132 |
Oct 28, 2024 19:10:54.731914997 CET | 10210 | 59038 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:54.770272017 CET | 10210 | 59038 | 116.205.177.132 | 192.168.2.23 |
Oct 28, 2024 19:10:54.770452976 CET | 59038 | 10210 | 192.168.2.23 | 116.205.177.132 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 28, 2024 19:09:23.294143915 CET | 43591 | 53 | 192.168.2.23 | 1.1.1.1 |
Oct 28, 2024 19:09:24.111072063 CET | 53 | 43591 | 1.1.1.1 | 192.168.2.23 |
Oct 28, 2024 19:09:57.117311001 CET | 43183 | 53 | 192.168.2.23 | 1.1.1.1 |
Oct 28, 2024 19:09:57.563766003 CET | 53 | 43183 | 1.1.1.1 | 192.168.2.23 |
Oct 28, 2024 19:10:30.568907022 CET | 37284 | 53 | 192.168.2.23 | 1.1.1.1 |
Oct 28, 2024 19:10:31.262249947 CET | 53 | 37284 | 1.1.1.1 | 192.168.2.23 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Oct 28, 2024 19:09:23.294143915 CET | 192.168.2.23 | 1.1.1.1 | 0x82c0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 28, 2024 19:09:57.117311001 CET | 192.168.2.23 | 1.1.1.1 | 0x5e6d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 28, 2024 19:10:30.568907022 CET | 192.168.2.23 | 1.1.1.1 | 0xcbb2 | Standard query (0) | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 18:08:51 |
Start date (UTC): | 28/10/2024 |
Path: | /tmp/na.elf |
Arguments: | /tmp/na.elf |
File size: | 826008 bytes |
MD5 hash: | 8ec928a5e02d8af1d373e34b185cc331 |
Start time (UTC): | 18:08:51 |
Start date (UTC): | 28/10/2024 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 826008 bytes |
MD5 hash: | 8ec928a5e02d8af1d373e34b185cc331 |
Start time (UTC): | 18:08:51 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | sh -c "sed -i -e '/exit/d' /etc/rc.local>nul 2>nul" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:51 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /usr/bin/sed |
Arguments: | sed -i -e /exit/d /etc/rc.local |
File size: | 121288 bytes |
MD5 hash: | 885062561f66aa1d4af4c54b9e7cc81a |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 826008 bytes |
MD5 hash: | 8ec928a5e02d8af1d373e34b185cc331 |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | sh -c "sed -i -e '/^\r\n|\r|\n$/d' /etc/rc.local>nul 2>nul" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /usr/bin/sed |
Arguments: | sed -i -e /^||$/d /etc/rc.local |
File size: | 121288 bytes |
MD5 hash: | 885062561f66aa1d4af4c54b9e7cc81a |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 826008 bytes |
MD5 hash: | 8ec928a5e02d8af1d373e34b185cc331 |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | sh -c "sed -i -e '/na.elf reboot/d' /etc/rc.local>nul 2>nul" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /usr/bin/sed |
Arguments: | sed -i -e "/na.elf reboot/d" /etc/rc.local |
File size: | 121288 bytes |
MD5 hash: | 885062561f66aa1d4af4c54b9e7cc81a |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 826008 bytes |
MD5 hash: | 8ec928a5e02d8af1d373e34b185cc331 |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | sh -c "sed -i -e '2 i/tmp/na.elf reboot' /etc/rc.local>nul 2>nul" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /usr/bin/sed |
Arguments: | sed -i -e "2 i/tmp/na.elf reboot" /etc/rc.local |
File size: | 121288 bytes |
MD5 hash: | 885062561f66aa1d4af4c54b9e7cc81a |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 826008 bytes |
MD5 hash: | 8ec928a5e02d8af1d373e34b185cc331 |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | sh -c "sed -i -e '2 i/tmp/na.elf reboot start' /etc/rc.d/rc.local>nul 2>nul" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /usr/bin/sed |
Arguments: | sed -i -e "2 i/tmp/na.elf reboot start" /etc/rc.d/rc.local |
File size: | 121288 bytes |
MD5 hash: | 885062561f66aa1d4af4c54b9e7cc81a |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 826008 bytes |
MD5 hash: | 8ec928a5e02d8af1d373e34b185cc331 |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | sh -c "sed -i -e '2 i/tmp/na.elf reboot start' /etc/init.d/boot.local>nul 2>nul" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /usr/bin/sed |
Arguments: | sed -i -e "2 i/tmp/na.elf reboot start" /etc/init.d/boot.local |
File size: | 121288 bytes |
MD5 hash: | 885062561f66aa1d4af4c54b9e7cc81a |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 826008 bytes |
MD5 hash: | 8ec928a5e02d8af1d373e34b185cc331 |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | sh -c "rm -rf nul" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /usr/bin/rm |
Arguments: | rm -rf nul |
File size: | 72056 bytes |
MD5 hash: | aa2b5496fdbfd88e38791ab81f90b95b |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 826008 bytes |
MD5 hash: | 8ec928a5e02d8af1d373e34b185cc331 |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | sh -c "rm -rf nul 2" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /usr/bin/rm |
Arguments: | rm -rf nul 2 |
File size: | 72056 bytes |
MD5 hash: | aa2b5496fdbfd88e38791ab81f90b95b |
Start time (UTC): | 18:08:52 |
Start date (UTC): | 28/10/2024 |
Path: | /tmp/na.elf |
Arguments: | - |
File size: | 826008 bytes |
MD5 hash: | 8ec928a5e02d8af1d373e34b185cc331 |