Edit tour
Linux
Analysis Report
boatnet.x86.elf
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Sample is packed with UPX
Sends malformed DNS queries
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Sample contains only a LOAD segment without any section mappings
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1558966 |
Start date and time: | 2024-11-20 01:29:30 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 55s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | boatnet.x86.elf |
Detection: | MAL |
Classification: | mal72.troj.evad.linELF@0/0@5/0 |
- VT rate limit hit for: chinklabs.dyn. [malformed]
- VT rate limit hit for: dogeatingchink.parody. [malformed]
Command: | /tmp/boatnet.x86.elf |
PID: | 6266 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | The Peoples Bank of China. |
Standard Error: |
- system is lnxubuntu20
- boatnet.x86.elf New Fork (PID: 6267, Parent: 6266)
- boatnet.x86.elf New Fork (PID: 6268, Parent: 6267)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Linux_Trojan_Mirai_88de437f | unknown | unknown |
| |
Linux_Trojan_Mirai_cc93863b | unknown | unknown |
| |
Linux_Trojan_Mirai_8aa7b5d3 | unknown | unknown |
|
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Networking |
---|
Source: | TCP traffic: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Program segment: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Data Obfuscation |
---|
Source: | String containing UPX found: | ||
Source: | String containing UPX found: | ||
Source: | String containing UPX found: |
Source: | Submission file: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 11 Obfuscated Files or Information | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 2 Application Layer Protocol | Traffic Duplication | Data Destruction |
⊘No configs have been found
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
24% | ReversingLabs | Linux.Backdoor.Mirai | ||
26% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | Virustotal | Browse |
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
himrresearcher.dyn | 172.232.34.247 | true | true |
| unknown |
himrresearcher.dyn. [malformed] | unknown | unknown | true | unknown | |
chinklabs.dyn. [malformed] | unknown | unknown | true | unknown | |
dogeatingchink.parody. [malformed] | unknown | unknown | true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.237.135.249 | unknown | United States | 63949 | LINODE-APLinodeLLCUS | true | |
109.202.202.202 | unknown | Switzerland | 13030 | INIT7CH | false | |
91.189.91.43 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false | |
91.189.91.42 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
109.202.202.202 | Get hash | malicious | Unknown | Browse |
| |
91.189.91.43 | Get hash | malicious | Mirai | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
91.189.91.42 | Get hash | malicious | Mirai | Browse | ||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
himrresearcher.dyn | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CANONICAL-ASGB | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
CANONICAL-ASGB | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
LINODE-APLinodeLLCUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | XenoRAT | Browse |
| ||
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
INIT7CH | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
⊘No context
⊘No context
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 7.838482395911089 |
TrID: |
|
File name: | boatnet.x86.elf |
File size: | 15'296 bytes |
MD5: | c59fbeee0774d04c95351dc2c2462499 |
SHA1: | f3d986ca1811f5a64d6b1c685e50eb29e207e04a |
SHA256: | d552d3ff41490f9a491fdbb8ebe5a0088e5a7b29f68309acdfc21ec93394b2b6 |
SHA512: | e8b526357eef6953c37e1a338c3f3591cad2d9135f2d8c3a3c77fcf3193ebcc33fcff57ed0dd059f72337f736901c1cb5a871dc6b1fe352045e16256b1372fa9 |
SSDEEP: | 384:Mslj7EIKl/shzNZ6q5ulqSHTgfviqv9v1R1K:UhSe4J3M |
TLSH: | 5E62CF21D6BE2C3DD2EACA3A512CD8EF4C516AD423E9C910BE4A876D97950B10974633 |
File Content Preview: | .ELF.....................B..4...........4. ...(......................:...:..............`...`...`...................Q.td...............................tUPX!........Pb..Pb......[........?d..ELF.......d.......4..`.4. (.......k.-.#..^...........`...........Q |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 0 |
Section Header Size: | 40 |
Number of Section Headers: | 0 |
Header String Table Index: | 0 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0xc01000 | 0xc01000 | 0x3abb | 0x3abb | 7.8484 | 0x5 | R E | 0x1000 | ||
LOAD | 0x560 | 0x804e560 | 0x804e560 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x1000 | ||
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 20, 2024 01:30:33.924704075 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Nov 20, 2024 01:30:36.926265001 CET | 56474 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:30:36.932671070 CET | 38241 | 56474 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:30:36.932837009 CET | 56474 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:30:36.932934999 CET | 56474 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:30:36.939197063 CET | 38241 | 56474 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:30:36.939295053 CET | 56474 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:30:36.944118977 CET | 38241 | 56474 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:30:39.555891991 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Nov 20, 2024 01:30:46.941616058 CET | 56474 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:30:46.946594000 CET | 38241 | 56474 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:30:53.889866114 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Nov 20, 2024 01:30:58.299046040 CET | 38241 | 56474 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:30:58.299578905 CET | 56474 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:30:58.305766106 CET | 38241 | 56474 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:31:02.080775976 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Nov 20, 2024 01:31:04.304579020 CET | 56476 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:04.309835911 CET | 38241 | 56476 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:31:04.310023069 CET | 56476 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:04.310107946 CET | 56476 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:04.315332890 CET | 38241 | 56476 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:31:04.315399885 CET | 56476 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:04.320337057 CET | 38241 | 56476 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:31:06.176235914 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Nov 20, 2024 01:31:25.709562063 CET | 38241 | 56476 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:31:25.709990025 CET | 56476 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:25.714814901 CET | 38241 | 56476 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:31:31.717375994 CET | 56478 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:31.722445965 CET | 38241 | 56478 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:31:31.722616911 CET | 56478 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:31.722636938 CET | 56478 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:31.727458954 CET | 38241 | 56478 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:31:31.727598906 CET | 56478 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:31.732445002 CET | 38241 | 56478 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:31:34.844290972 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Nov 20, 2024 01:31:53.094981909 CET | 38241 | 56478 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:31:53.095609903 CET | 56478 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:53.100769043 CET | 38241 | 56478 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:31:54.128134966 CET | 56480 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:54.133080959 CET | 38241 | 56480 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:31:54.133228064 CET | 56480 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:54.133280993 CET | 56480 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:54.138206005 CET | 38241 | 56480 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:31:54.138279915 CET | 56480 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:31:54.143099070 CET | 38241 | 56480 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:32:04.142077923 CET | 56480 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:32:04.147114992 CET | 38241 | 56480 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:32:15.505651951 CET | 38241 | 56480 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:32:15.505875111 CET | 56480 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:32:15.510890961 CET | 38241 | 56480 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:32:16.601377010 CET | 56482 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:32:16.606621981 CET | 38241 | 56482 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:32:16.606730938 CET | 56482 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:32:16.606810093 CET | 56482 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:32:16.611882925 CET | 38241 | 56482 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:32:16.611958027 CET | 56482 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:32:16.617412090 CET | 38241 | 56482 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:32:37.970954895 CET | 38241 | 56482 | 104.237.135.249 | 192.168.2.23 |
Nov 20, 2024 01:32:37.971158981 CET | 56482 | 38241 | 192.168.2.23 | 104.237.135.249 |
Nov 20, 2024 01:32:37.976032019 CET | 38241 | 56482 | 104.237.135.249 | 192.168.2.23 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 20, 2024 01:30:35.793579102 CET | 49497 | 53 | 192.168.2.23 | 152.53.15.127 |
Nov 20, 2024 01:30:36.925853968 CET | 53 | 49497 | 152.53.15.127 | 192.168.2.23 |
Nov 20, 2024 01:30:59.301613092 CET | 59000 | 53 | 192.168.2.23 | 95.216.99.249 |
Nov 20, 2024 01:31:26.713036060 CET | 52887 | 53 | 192.168.2.23 | 65.21.1.106 |
Nov 20, 2024 01:31:54.099862099 CET | 58076 | 53 | 192.168.2.23 | 81.169.136.222 |
Nov 20, 2024 01:31:54.127650023 CET | 53 | 58076 | 81.169.136.222 | 192.168.2.23 |
Nov 20, 2024 01:32:16.507900000 CET | 47685 | 53 | 192.168.2.23 | 168.235.111.72 |
Nov 20, 2024 01:32:16.601064920 CET | 53 | 47685 | 168.235.111.72 | 192.168.2.23 |
Nov 20, 2024 01:32:38.973577976 CET | 60325 | 53 | 192.168.2.23 | 139.84.165.176 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 20, 2024 01:30:35.793579102 CET | 192.168.2.23 | 152.53.15.127 | 0x793d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 01:30:59.301613092 CET | 192.168.2.23 | 95.216.99.249 | 0xc5fd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 20, 2024 01:31:26.713036060 CET | 192.168.2.23 | 65.21.1.106 | 0x1342 | Standard query (0) | 256 | 483 | false | |
Nov 20, 2024 01:31:54.099862099 CET | 192.168.2.23 | 81.169.136.222 | 0x4d37 | Standard query (0) | 256 | 506 | false | |
Nov 20, 2024 01:32:16.507900000 CET | 192.168.2.23 | 168.235.111.72 | 0x8b0a | Standard query (0) | 256 | 272 | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 172.232.34.247 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 74.207.230.91 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 172.105.120.101 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 192.46.236.113 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 172.234.20.31 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 170.187.181.188 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 45.79.236.13 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 172.233.66.46 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 104.237.135.249 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 172.104.165.127 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 104.237.135.234 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 172.236.11.132 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 172.105.109.175 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 172.236.61.194 | A (IP address) | IN (0x0001) | false | ||
Nov 20, 2024 01:30:36.925853968 CET | 152.53.15.127 | 192.168.2.23 | 0x793d | No error (0) | 172.236.28.137 | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 00:30:34 |
Start date (UTC): | 20/11/2024 |
Path: | /tmp/boatnet.x86.elf |
Arguments: | /tmp/boatnet.x86.elf |
File size: | 15296 bytes |
MD5 hash: | c59fbeee0774d04c95351dc2c2462499 |
Start time (UTC): | 00:30:34 |
Start date (UTC): | 20/11/2024 |
Path: | /tmp/boatnet.x86.elf |
Arguments: | - |
File size: | 15296 bytes |
MD5 hash: | c59fbeee0774d04c95351dc2c2462499 |
Start time (UTC): | 00:30:34 |
Start date (UTC): | 20/11/2024 |
Path: | /tmp/boatnet.x86.elf |
Arguments: | - |
File size: | 15296 bytes |
MD5 hash: | c59fbeee0774d04c95351dc2c2462499 |