Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
boatnet.x86.elf

Overview

General Information

Sample name:boatnet.x86.elf
Analysis ID:1558966
MD5:c59fbeee0774d04c95351dc2c2462499
SHA1:f3d986ca1811f5a64d6b1c685e50eb29e207e04a
SHA256:d552d3ff41490f9a491fdbb8ebe5a0088e5a7b29f68309acdfc21ec93394b2b6
Tags:elfuser-abuse_ch
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Sample is packed with UPX
Sends malformed DNS queries
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Sample contains only a LOAD segment without any section mappings
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1558966
Start date and time:2024-11-20 01:29:30 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 55s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:boatnet.x86.elf
Detection:MAL
Classification:mal72.troj.evad.linELF@0/0@5/0
  • VT rate limit hit for: chinklabs.dyn. [malformed]
  • VT rate limit hit for: dogeatingchink.parody. [malformed]
Command:/tmp/boatnet.x86.elf
PID:6266
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
The Peoples Bank of China.
Standard Error:
  • system is lnxubuntu20
  • cleanup
SourceRuleDescriptionAuthorStrings
6266.1.0000000008048000.000000000804e000.r-x.sdmpLinux_Trojan_Mirai_88de437funknownunknown
  • 0x2ba2:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
6266.1.0000000008048000.000000000804e000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x3525:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
6266.1.0000000008048000.000000000804e000.r-x.sdmpLinux_Trojan_Mirai_8aa7b5d3unknownunknown
  • 0x2b72:$a: 8B 4C 24 14 8B 74 24 0C 8B 5C 24 10 85 C9 74 0D 31 D2 8A 04 1A 88
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: boatnet.x86.elfReversingLabs: Detection: 23%
Source: boatnet.x86.elfVirustotal: Detection: 26%Perma Link
Source: boatnet.x86.elfJoe Sandbox ML: detected

Networking

barindex
Source: global trafficTCP traffic: 104.237.135.249 ports 38241,1,2,3,4,8
Source: global trafficDNS traffic detected: malformed DNS query: chinklabs.dyn. [malformed]
Source: global trafficDNS traffic detected: malformed DNS query: himrresearcher.dyn. [malformed]
Source: global trafficDNS traffic detected: malformed DNS query: dogeatingchink.parody. [malformed]
Source: global trafficTCP traffic: 192.168.2.23:56474 -> 104.237.135.249:38241
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownUDP traffic detected without corresponding DNS query: 152.53.15.127
Source: unknownUDP traffic detected without corresponding DNS query: 95.216.99.249
Source: unknownUDP traffic detected without corresponding DNS query: 65.21.1.106
Source: unknownUDP traffic detected without corresponding DNS query: 81.169.136.222
Source: unknownUDP traffic detected without corresponding DNS query: 168.235.111.72
Source: unknownUDP traffic detected without corresponding DNS query: 139.84.165.176
Source: global trafficDNS traffic detected: DNS query: himrresearcher.dyn
Source: global trafficDNS traffic detected: DNS query: chinklabs.dyn. [malformed]
Source: global trafficDNS traffic detected: DNS query: himrresearcher.dyn. [malformed]
Source: global trafficDNS traffic detected: DNS query: dogeatingchink.parody. [malformed]
Source: boatnet.x86.elfString found in binary or memory: http://upx.sf.net
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

System Summary

barindex
Source: 6266.1.0000000008048000.000000000804e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 6266.1.0000000008048000.000000000804e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 6266.1.0000000008048000.000000000804e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: LOAD without section mappingsProgram segment: 0xc01000
Source: 6266.1.0000000008048000.000000000804e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 6266.1.0000000008048000.000000000804e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 6266.1.0000000008048000.000000000804e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: classification engineClassification label: mal72.troj.evad.linELF@0/0@5/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
Source: boatnet.x86.elfSubmission file: segment LOAD with 7.8484 entropy (max. 8.0)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Obfuscated Files or Information
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
boatnet.x86.elf24%ReversingLabsLinux.Backdoor.Mirai
boatnet.x86.elf26%VirustotalBrowse
boatnet.x86.elf100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLink
himrresearcher.dyn3%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
himrresearcher.dyn
172.232.34.247
truetrueunknown
himrresearcher.dyn. [malformed]
unknown
unknowntrue
    unknown
    chinklabs.dyn. [malformed]
    unknown
    unknowntrue
      unknown
      dogeatingchink.parody. [malformed]
      unknown
      unknowntrue
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://upx.sf.netboatnet.x86.elffalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          104.237.135.249
          unknownUnited States
          63949LINODE-APLinodeLLCUStrue
          109.202.202.202
          unknownSwitzerland
          13030INIT7CHfalse
          91.189.91.43
          unknownUnited Kingdom
          41231CANONICAL-ASGBfalse
          91.189.91.42
          unknownUnited Kingdom
          41231CANONICAL-ASGBfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
          • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
          91.189.91.43IGxModz.arm6.elfGet hashmaliciousMiraiBrowse
            m68k.elfGet hashmaliciousUnknownBrowse
              .i.elfGet hashmaliciousUnknownBrowse
                kjsusa6.elfGet hashmaliciousUnknownBrowse
                  mmb6.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                    mmb9.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                      ub8ehJSePAfc9FYqZIT6.arc.elfGet hashmaliciousMiraiBrowse
                        mmb1.elfGet hashmaliciousMirai, OkiruBrowse
                          mmb3.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                            mmb4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                              91.189.91.42IGxModz.arm7.elfGet hashmaliciousMiraiBrowse
                                IGxModz.arm6.elfGet hashmaliciousMiraiBrowse
                                  i586.elfGet hashmaliciousUnknownBrowse
                                    sh4.elfGet hashmaliciousUnknownBrowse
                                      m68k.elfGet hashmaliciousUnknownBrowse
                                        .i.elfGet hashmaliciousUnknownBrowse
                                          kjsusa6.elfGet hashmaliciousUnknownBrowse
                                            mmb6.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                              mmb9.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                ub8ehJSePAfc9FYqZIT6.arc.elfGet hashmaliciousMiraiBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  himrresearcher.dynj980HN1yJw.elfGet hashmaliciousUnknownBrowse
                                                  • 5.181.80.130
                                                  buPdHWwrzF.elfGet hashmaliciousUnknownBrowse
                                                  • 204.76.203.63
                                                  VeML3EnAwP.elfGet hashmaliciousUnknownBrowse
                                                  • 5.181.80.61
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  CANONICAL-ASGBIGxModz.arm7.elfGet hashmaliciousMiraiBrowse
                                                  • 91.189.91.42
                                                  IGxModz.arm6.elfGet hashmaliciousMiraiBrowse
                                                  • 91.189.91.42
                                                  i586.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  sh4.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  m68k.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  i686.elfGet hashmaliciousUnknownBrowse
                                                  • 185.125.190.26
                                                  armv5l.elfGet hashmaliciousUnknownBrowse
                                                  • 185.125.190.26
                                                  .i.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  kjsusa6.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  mmb6.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                  • 91.189.91.42
                                                  CANONICAL-ASGBIGxModz.arm7.elfGet hashmaliciousMiraiBrowse
                                                  • 91.189.91.42
                                                  IGxModz.arm6.elfGet hashmaliciousMiraiBrowse
                                                  • 91.189.91.42
                                                  i586.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  sh4.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  m68k.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  i686.elfGet hashmaliciousUnknownBrowse
                                                  • 185.125.190.26
                                                  armv5l.elfGet hashmaliciousUnknownBrowse
                                                  • 185.125.190.26
                                                  .i.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  kjsusa6.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  mmb6.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                  • 91.189.91.42
                                                  LINODE-APLinodeLLCUSboatnet.mpsl.elfGet hashmaliciousUnknownBrowse
                                                  • 104.237.135.234
                                                  boatnet.ppc.elfGet hashmaliciousUnknownBrowse
                                                  • 172.104.165.127
                                                  https://hopp.bio/wchnGet hashmaliciousHTMLPhisherBrowse
                                                  • 173.230.149.18
                                                  fM7fKHA1rf.exeGet hashmaliciousXenoRATBrowse
                                                  • 96.126.118.61
                                                  exe009.exeGet hashmaliciousEmotetBrowse
                                                  • 103.3.63.137
                                                  QWJfaEAROV.exeGet hashmaliciousAsyncRATBrowse
                                                  • 139.162.100.28
                                                  https://stopify.co/BOAZ81Get hashmaliciousUnknownBrowse
                                                  • 172.104.231.58
                                                  HZ1ZzlIpm7.vbeGet hashmaliciousFormBookBrowse
                                                  • 45.33.6.223
                                                  RN# D7521-RN-00353 REV-2.exeGet hashmaliciousFormBookBrowse
                                                  • 45.33.6.223
                                                  http://www2.megawebfind.comGet hashmaliciousUnknownBrowse
                                                  • 45.56.79.23
                                                  INIT7CHIGxModz.arm7.elfGet hashmaliciousMiraiBrowse
                                                  • 109.202.202.202
                                                  IGxModz.arm6.elfGet hashmaliciousMiraiBrowse
                                                  • 109.202.202.202
                                                  i586.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  sh4.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  m68k.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  .i.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  kjsusa6.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  mmb6.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                  • 109.202.202.202
                                                  mmb9.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                  • 109.202.202.202
                                                  ub8ehJSePAfc9FYqZIT6.arc.elfGet hashmaliciousMiraiBrowse
                                                  • 109.202.202.202
                                                  No context
                                                  No context
                                                  No created / dropped files found
                                                  File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
                                                  Entropy (8bit):7.838482395911089
                                                  TrID:
                                                  • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                                  • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                                  File name:boatnet.x86.elf
                                                  File size:15'296 bytes
                                                  MD5:c59fbeee0774d04c95351dc2c2462499
                                                  SHA1:f3d986ca1811f5a64d6b1c685e50eb29e207e04a
                                                  SHA256:d552d3ff41490f9a491fdbb8ebe5a0088e5a7b29f68309acdfc21ec93394b2b6
                                                  SHA512:e8b526357eef6953c37e1a338c3f3591cad2d9135f2d8c3a3c77fcf3193ebcc33fcff57ed0dd059f72337f736901c1cb5a871dc6b1fe352045e16256b1372fa9
                                                  SSDEEP:384:Mslj7EIKl/shzNZ6q5ulqSHTgfviqv9v1R1K:UhSe4J3M
                                                  TLSH:5E62CF21D6BE2C3DD2EACA3A512CD8EF4C516AD423E9C910BE4A876D97950B10974633
                                                  File Content Preview:.ELF.....................B..4...........4. ...(......................:...:..............`...`...`...................Q.td...............................tUPX!........Pb..Pb......[........?d..ELF.......d.......4..`.4. (.......k.-.#..^...........`...........Q

                                                  ELF header

                                                  Class:ELF32
                                                  Data:2's complement, little endian
                                                  Version:1 (current)
                                                  Machine:Intel 80386
                                                  Version Number:0x1
                                                  Type:EXEC (Executable file)
                                                  OS/ABI:UNIX - Linux
                                                  ABI Version:0
                                                  Entry Point Address:0xc042c0
                                                  Flags:0x0
                                                  ELF Header Size:52
                                                  Program Header Offset:52
                                                  Program Header Size:32
                                                  Number of Program Headers:3
                                                  Section Header Offset:0
                                                  Section Header Size:40
                                                  Number of Section Headers:0
                                                  Header String Table Index:0
                                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                  LOAD0x00xc010000xc010000x3abb0x3abb7.84840x5R E0x1000
                                                  LOAD0x5600x804e5600x804e5600x00x00.00000x6RW 0x1000
                                                  GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Nov 20, 2024 01:30:33.924704075 CET43928443192.168.2.2391.189.91.42
                                                  Nov 20, 2024 01:30:36.926265001 CET5647438241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:30:36.932671070 CET3824156474104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:30:36.932837009 CET5647438241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:30:36.932934999 CET5647438241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:30:36.939197063 CET3824156474104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:30:36.939295053 CET5647438241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:30:36.944118977 CET3824156474104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:30:39.555891991 CET42836443192.168.2.2391.189.91.43
                                                  Nov 20, 2024 01:30:46.941616058 CET5647438241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:30:46.946594000 CET3824156474104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:30:53.889866114 CET43928443192.168.2.2391.189.91.42
                                                  Nov 20, 2024 01:30:58.299046040 CET3824156474104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:30:58.299578905 CET5647438241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:30:58.305766106 CET3824156474104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:31:02.080775976 CET4251680192.168.2.23109.202.202.202
                                                  Nov 20, 2024 01:31:04.304579020 CET5647638241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:04.309835911 CET3824156476104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:31:04.310023069 CET5647638241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:04.310107946 CET5647638241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:04.315332890 CET3824156476104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:31:04.315399885 CET5647638241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:04.320337057 CET3824156476104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:31:06.176235914 CET42836443192.168.2.2391.189.91.43
                                                  Nov 20, 2024 01:31:25.709562063 CET3824156476104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:31:25.709990025 CET5647638241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:25.714814901 CET3824156476104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:31:31.717375994 CET5647838241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:31.722445965 CET3824156478104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:31:31.722616911 CET5647838241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:31.722636938 CET5647838241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:31.727458954 CET3824156478104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:31:31.727598906 CET5647838241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:31.732445002 CET3824156478104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:31:34.844290972 CET43928443192.168.2.2391.189.91.42
                                                  Nov 20, 2024 01:31:53.094981909 CET3824156478104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:31:53.095609903 CET5647838241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:53.100769043 CET3824156478104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:31:54.128134966 CET5648038241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:54.133080959 CET3824156480104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:31:54.133228064 CET5648038241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:54.133280993 CET5648038241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:54.138206005 CET3824156480104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:31:54.138279915 CET5648038241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:31:54.143099070 CET3824156480104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:32:04.142077923 CET5648038241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:32:04.147114992 CET3824156480104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:32:15.505651951 CET3824156480104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:32:15.505875111 CET5648038241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:32:15.510890961 CET3824156480104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:32:16.601377010 CET5648238241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:32:16.606621981 CET3824156482104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:32:16.606730938 CET5648238241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:32:16.606810093 CET5648238241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:32:16.611882925 CET3824156482104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:32:16.611958027 CET5648238241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:32:16.617412090 CET3824156482104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:32:37.970954895 CET3824156482104.237.135.249192.168.2.23
                                                  Nov 20, 2024 01:32:37.971158981 CET5648238241192.168.2.23104.237.135.249
                                                  Nov 20, 2024 01:32:37.976032019 CET3824156482104.237.135.249192.168.2.23
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Nov 20, 2024 01:30:35.793579102 CET4949753192.168.2.23152.53.15.127
                                                  Nov 20, 2024 01:30:36.925853968 CET5349497152.53.15.127192.168.2.23
                                                  Nov 20, 2024 01:30:59.301613092 CET5900053192.168.2.2395.216.99.249
                                                  Nov 20, 2024 01:31:26.713036060 CET5288753192.168.2.2365.21.1.106
                                                  Nov 20, 2024 01:31:54.099862099 CET5807653192.168.2.2381.169.136.222
                                                  Nov 20, 2024 01:31:54.127650023 CET535807681.169.136.222192.168.2.23
                                                  Nov 20, 2024 01:32:16.507900000 CET4768553192.168.2.23168.235.111.72
                                                  Nov 20, 2024 01:32:16.601064920 CET5347685168.235.111.72192.168.2.23
                                                  Nov 20, 2024 01:32:38.973577976 CET6032553192.168.2.23139.84.165.176
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Nov 20, 2024 01:30:35.793579102 CET192.168.2.23152.53.15.1270x793dStandard query (0)himrresearcher.dynA (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:59.301613092 CET192.168.2.2395.216.99.2490xc5fdStandard query (0)himrresearcher.dynA (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:31:26.713036060 CET192.168.2.2365.21.1.1060x1342Standard query (0)chinklabs.dyn. [malformed]256483false
                                                  Nov 20, 2024 01:31:54.099862099 CET192.168.2.2381.169.136.2220x4d37Standard query (0)himrresearcher.dyn. [malformed]256506false
                                                  Nov 20, 2024 01:32:16.507900000 CET192.168.2.23168.235.111.720x8b0aStandard query (0)dogeatingchink.parody. [malformed]256272false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn172.232.34.247A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn74.207.230.91A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn172.105.120.101A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn192.46.236.113A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn172.234.20.31A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn170.187.181.188A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn45.79.236.13A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn172.233.66.46A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn104.237.135.249A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn172.104.165.127A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn104.237.135.234A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn172.236.11.132A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn172.105.109.175A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn172.236.61.194A (IP address)IN (0x0001)false
                                                  Nov 20, 2024 01:30:36.925853968 CET152.53.15.127192.168.2.230x793dNo error (0)himrresearcher.dyn172.236.28.137A (IP address)IN (0x0001)false

                                                  System Behavior

                                                  Start time (UTC):00:30:34
                                                  Start date (UTC):20/11/2024
                                                  Path:/tmp/boatnet.x86.elf
                                                  Arguments:/tmp/boatnet.x86.elf
                                                  File size:15296 bytes
                                                  MD5 hash:c59fbeee0774d04c95351dc2c2462499

                                                  Start time (UTC):00:30:34
                                                  Start date (UTC):20/11/2024
                                                  Path:/tmp/boatnet.x86.elf
                                                  Arguments:-
                                                  File size:15296 bytes
                                                  MD5 hash:c59fbeee0774d04c95351dc2c2462499

                                                  Start time (UTC):00:30:34
                                                  Start date (UTC):20/11/2024
                                                  Path:/tmp/boatnet.x86.elf
                                                  Arguments:-
                                                  File size:15296 bytes
                                                  MD5 hash:c59fbeee0774d04c95351dc2c2462499