Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
sparc.elf

Overview

General Information

Sample name:sparc.elf
Analysis ID:1575389
MD5:0a05b259df22cf4dfa0337c5bf81a7a4
SHA1:58b052f5c8527992c02afc1a47993e9532c670d5
SHA256:96bb5e45ede6b0645715cd33e78a53e8883d6f2a83b0f6538f60d5f695393f02
Tags:elfuser-abuse_ch
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Opens /sys/class/net/* files useful for querying network interface information
Performs DNS TXT record lookups
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1575389
Start date and time:2024-12-15 13:12:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 49s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:sparc.elf
Detection:MAL
Classification:mal64.troj.spyw.evad.linELF@0/0@1/0
  • VT rate limit hit for: iranistrash.libre
Command:/tmp/sparc.elf
PID:6249
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
Firmware update in progress
Standard Error:
  • system is lnxubuntu20
  • dash New Fork (PID: 6238, Parent: 4337)
  • rm (PID: 6238, Parent: 4337, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.cuGczAxhTT /tmp/tmp.KbY3AWkCz7 /tmp/tmp.5NoFuaPYAa
  • dash New Fork (PID: 6239, Parent: 4337)
  • rm (PID: 6239, Parent: 4337, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.cuGczAxhTT /tmp/tmp.KbY3AWkCz7 /tmp/tmp.5NoFuaPYAa
  • sparc.elf (PID: 6249, Parent: 6170, MD5: 7dc1c0e23cd5e102bb12e5c29403410e) Arguments: /tmp/sparc.elf
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: sparc.elfVirustotal: Detection: 28%Perma Link
Source: sparc.elfReversingLabs: Detection: 36%

Networking

barindex
Source: global trafficTCP traffic: 86.104.72.130 ports 0,1,2,4,27014,7
Source: /tmp/sparc.elf (PID: 6253)Opens: /sys/class/net/Jump to behavior
Source: /tmp/sparc.elf (PID: 6253)Opens: /sys/class/net/ens160/addressJump to behavior
Source: /tmp/sparc.elf (PID: 6253)Opens: /sys/class/net/ens160/flagsJump to behavior
Source: /tmp/sparc.elf (PID: 6253)Opens: /sys/class/net/ens160/carrierJump to behavior
Source: global trafficTCP traffic: 192.168.2.23:47152 -> 86.104.72.130:27014
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 86.104.72.130
Source: unknownTCP traffic detected without corresponding DNS query: 86.104.72.130
Source: unknownTCP traffic detected without corresponding DNS query: 86.104.72.130
Source: unknownTCP traffic detected without corresponding DNS query: 86.104.72.130
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 86.104.72.130
Source: unknownTCP traffic detected without corresponding DNS query: 86.104.72.130
Source: unknownUDP traffic detected without corresponding DNS query: 172.217.192.127
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: global trafficDNS traffic detected: DNS query: iranistrash.libre
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal64.troj.spyw.evad.linELF@0/0@1/0
Source: /usr/bin/dash (PID: 6238)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.cuGczAxhTT /tmp/tmp.KbY3AWkCz7 /tmp/tmp.5NoFuaPYAaJump to behavior
Source: /usr/bin/dash (PID: 6239)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.cuGczAxhTT /tmp/tmp.KbY3AWkCz7 /tmp/tmp.5NoFuaPYAaJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/sparc.elf (PID: 6249)File: /tmp/sparc.elfJump to behavior
Source: /tmp/sparc.elf (PID: 6249)Queries kernel information via 'uname': Jump to behavior
Source: /tmp/sparc.elf (PID: 6253)Queries kernel information via 'uname': Jump to behavior
Source: sparc.elf, 6249.1.000055c6529cb000.000055c652a30000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sparc
Source: sparc.elf, 6249.1.000055c6529cb000.000055c652a30000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/sparc
Source: sparc.elf, 6249.1.00007ffed9295000.00007ffed92b6000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc
Source: sparc.elf, 6249.1.00007ffed9295000.00007ffed92b6000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sparc/tmp/sparc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sparc.elf

HIPS / PFW / Operating System Protection Evasion

barindex
Source: TrafficDNS traffic detected: queries for: iranistrash.libre
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
File Deletion
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1575389 Sample: sparc.elf Startdate: 15/12/2024 Architecture: LINUX Score: 64 20 iranistrash.libre 2->20 22 86.104.72.130, 27014, 47152 TELE-ROM-ASstrAleeaPaciiBlB5Ap16RO Romania 2->22 24 4 other IPs or domains 2->24 26 Multi AV Scanner detection for submitted file 2->26 28 Connects to many ports of the same IP (likely port scanning) 2->28 8 dash rm sparc.elf 2->8         started        11 dash rm 2->11         started        signatures3 30 Performs DNS TXT record lookups 20->30 process4 signatures5 32 Sample deletes itself 8->32 13 sparc.elf 8->13         started        process6 signatures7 34 Opens /sys/class/net/* files useful for querying network interface information 13->34 16 sparc.elf 13->16         started        18 sparc.elf 13->18         started        process8
SourceDetectionScannerLabelLink
sparc.elf29%VirustotalBrowse
sparc.elf37%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
iranistrash.libre
unknown
unknowntrue
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    109.202.202.202
    unknownSwitzerland
    13030INIT7CHfalse
    172.217.192.127
    unknownUnited States
    15169GOOGLEUSfalse
    91.189.91.43
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    86.104.72.130
    unknownRomania
    50636TELE-ROM-ASstrAleeaPaciiBlB5Ap16ROtrue
    91.189.91.42
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
    • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
    91.189.91.43IGz.arm5.elfGet hashmaliciousMiraiBrowse
      main_m68k.elfGet hashmaliciousMiraiBrowse
        main_x86_64.elfGet hashmaliciousMiraiBrowse
          main_arm6.elfGet hashmaliciousMiraiBrowse
            hidakibest.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
              hidakibest.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                Mozi.m.elfGet hashmaliciousUnknownBrowse
                  sshd.elfGet hashmaliciousUnknownBrowse
                    m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                      sshd.elfGet hashmaliciousUnknownBrowse
                        91.189.91.42IGz.arm5.elfGet hashmaliciousMiraiBrowse
                          main_m68k.elfGet hashmaliciousMiraiBrowse
                            main_x86_64.elfGet hashmaliciousMiraiBrowse
                              main_arm6.elfGet hashmaliciousMiraiBrowse
                                hidakibest.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                  hidakibest.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                                    arm6.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                      Mozi.m.elfGet hashmaliciousUnknownBrowse
                                        sshd.elfGet hashmaliciousUnknownBrowse
                                          m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CANONICAL-ASGBIGz.arm5.elfGet hashmaliciousMiraiBrowse
                                            • 91.189.91.42
                                            main_m68k.elfGet hashmaliciousMiraiBrowse
                                            • 91.189.91.42
                                            main_mpsl.elfGet hashmaliciousMiraiBrowse
                                            • 185.125.190.26
                                            main_x86_64.elfGet hashmaliciousMiraiBrowse
                                            • 91.189.91.42
                                            main_ppc.elfGet hashmaliciousMiraiBrowse
                                            • 185.125.190.26
                                            main_arm6.elfGet hashmaliciousMiraiBrowse
                                            • 91.189.91.42
                                            hidakibest.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                            • 91.189.91.42
                                            hidakibest.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                                            • 185.125.190.26
                                            hidakibest.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                                            • 91.189.91.42
                                            arm6.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 91.189.91.42
                                            INIT7CHIGz.arm5.elfGet hashmaliciousMiraiBrowse
                                            • 109.202.202.202
                                            main_m68k.elfGet hashmaliciousMiraiBrowse
                                            • 109.202.202.202
                                            main_x86_64.elfGet hashmaliciousMiraiBrowse
                                            • 109.202.202.202
                                            main_arm6.elfGet hashmaliciousMiraiBrowse
                                            • 109.202.202.202
                                            hidakibest.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                            • 109.202.202.202
                                            hidakibest.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                                            • 109.202.202.202
                                            arm6.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 109.202.202.202
                                            Mozi.m.elfGet hashmaliciousUnknownBrowse
                                            • 109.202.202.202
                                            sshd.elfGet hashmaliciousUnknownBrowse
                                            • 109.202.202.202
                                            m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 109.202.202.202
                                            TELE-ROM-ASstrAleeaPaciiBlB5Ap16RORHxJqGoGFB.exeGet hashmaliciousSalityBrowse
                                            • 86.104.74.51
                                            uniswap-sniper-bot-with-gui Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                            • 86.104.74.51
                                            uniswap-sniper-bot-with-gui Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                            • 86.104.74.51
                                            na.htaGet hashmaliciousMetasploitBrowse
                                            • 86.104.74.31
                                            g4nWvGoRNZ.exeGet hashmaliciousRemcosBrowse
                                            • 86.104.72.183
                                            5046511eb489387b7a835a990ea3b36b77185f3fad905511c4bce30aa654c60b_dump.exeGet hashmaliciousRemcosBrowse
                                            • 86.104.72.183
                                            aqB7l6kvXl.exeGet hashmaliciousRemcosBrowse
                                            • 86.104.72.183
                                            https://libidotechnexus.com/cdn-vs/cache.phpGet hashmaliciousUnknownBrowse
                                            • 86.104.72.5
                                            v65EwoFOxj.exeGet hashmaliciousMetasploit, MeterpreterBrowse
                                            • 86.104.74.31
                                            HQuxVxuLV.ps1Get hashmaliciousNetSupport RATBrowse
                                            • 86.104.72.157
                                            No context
                                            No context
                                            No created / dropped files found
                                            File type:ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, stripped
                                            Entropy (8bit):6.031981552208405
                                            TrID:
                                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                            File name:sparc.elf
                                            File size:91'388 bytes
                                            MD5:0a05b259df22cf4dfa0337c5bf81a7a4
                                            SHA1:58b052f5c8527992c02afc1a47993e9532c670d5
                                            SHA256:96bb5e45ede6b0645715cd33e78a53e8883d6f2a83b0f6538f60d5f695393f02
                                            SHA512:5e2132832dbdaf94c4f829cc6f863d719c22dfa5c27fd36de4be33db9cf91cd4997cd7df3888c3175d6c45a4083b8303df7b65ea76ac5703c1925bb8d3935d62
                                            SSDEEP:1536:MYozQSa7dSZ8c9H7CXkmOBnVTEVjFWEyA/1CE0Ow7RAt37W:MtzDaR+8kwktBnGPDF0RABW
                                            TLSH:7D934B25AA7A1E27C0D0B17921F3436AF2F256491468CB1F7E710E8EFF255A032177B8
                                            File Content Preview:.ELF...........................4..c......4. ...(......................\(..\(..............`...`...`.......:.........dt.Q................................@..(....@.T.................#.....b...`.....!..... ...@.....".........`......$ ... ...@...........`....

                                            ELF header

                                            Class:ELF32
                                            Data:2's complement, big endian
                                            Version:1 (current)
                                            Machine:Sparc
                                            Version Number:0x1
                                            Type:EXEC (Executable file)
                                            OS/ABI:UNIX - System V
                                            ABI Version:0
                                            Entry Point Address:0x101a4
                                            Flags:0x0
                                            ELF Header Size:52
                                            Program Header Offset:52
                                            Program Header Size:32
                                            Number of Program Headers:3
                                            Section Header Offset:90908
                                            Section Header Size:40
                                            Number of Section Headers:12
                                            Header String Table Index:11
                                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                            NULL0x00x00x00x00x0000
                                            .initPROGBITS0x100940x940x1c0x00x6AX004
                                            .textPROGBITS0x100b00xb00x152380x00x6AX004
                                            .finiPROGBITS0x252e80x152e80x140x00x6AX004
                                            .rodataPROGBITS0x253000x153000x9280x00x2A008
                                            .eh_framePROGBITS0x360000x160000x40x00x3WA004
                                            .ctorsPROGBITS0x360040x160040x80x00x3WA004
                                            .dtorsPROGBITS0x3600c0x1600c0x80x00x3WA004
                                            .gotPROGBITS0x360180x160180xd40x40x3WA004
                                            .dataPROGBITS0x360f00x160f00x1dc0x00x3WA008
                                            .bssNOBITS0x362d00x162cc0x37400x00x3WA008
                                            .shstrtabSTRTAB0x00x162cc0x4d0x00x0001
                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                            LOAD0x00x100000x100000x15c280x15c286.08950x5R E0x10000.init .text .fini .rodata
                                            LOAD0x160000x360000x360000x2cc0x3a103.00330x6RW 0x10000.eh_frame .ctors .dtors .got .data .bss
                                            GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                            TimestampSource PortDest PortSource IPDest IP
                                            Dec 15, 2024 13:13:05.359805107 CET42836443192.168.2.2391.189.91.43
                                            Dec 15, 2024 13:13:06.126697063 CET4251680192.168.2.23109.202.202.202
                                            Dec 15, 2024 13:13:07.113822937 CET4715227014192.168.2.2386.104.72.130
                                            Dec 15, 2024 13:13:07.234055042 CET270144715286.104.72.130192.168.2.23
                                            Dec 15, 2024 13:13:07.234129906 CET4715227014192.168.2.2386.104.72.130
                                            Dec 15, 2024 13:13:07.234577894 CET4715227014192.168.2.2386.104.72.130
                                            Dec 15, 2024 13:13:07.354476929 CET270144715286.104.72.130192.168.2.23
                                            Dec 15, 2024 13:13:09.142122984 CET270144715286.104.72.130192.168.2.23
                                            Dec 15, 2024 13:13:09.142590046 CET4715227014192.168.2.2386.104.72.130
                                            Dec 15, 2024 13:13:21.228456020 CET43928443192.168.2.2391.189.91.42
                                            Dec 15, 2024 13:13:31.467180967 CET42836443192.168.2.2391.189.91.43
                                            Dec 15, 2024 13:13:35.562474966 CET4251680192.168.2.23109.202.202.202
                                            Dec 15, 2024 13:14:02.182796001 CET43928443192.168.2.2391.189.91.42
                                            Dec 15, 2024 13:14:49.202893019 CET4715227014192.168.2.2386.104.72.130
                                            Dec 15, 2024 13:14:49.323438883 CET270144715286.104.72.130192.168.2.23
                                            Dec 15, 2024 13:14:49.519617081 CET270144715286.104.72.130192.168.2.23
                                            Dec 15, 2024 13:14:49.520013094 CET4715227014192.168.2.2386.104.72.130
                                            TimestampSource PortDest PortSource IPDest IP
                                            Dec 15, 2024 13:13:05.565114975 CET606743478192.168.2.23172.217.192.127
                                            Dec 15, 2024 13:13:06.766300917 CET347860674172.217.192.127192.168.2.23
                                            Dec 15, 2024 13:13:06.852130890 CET3808953192.168.2.23194.36.144.87
                                            Dec 15, 2024 13:13:07.103549004 CET5338089194.36.144.87192.168.2.23
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Dec 15, 2024 13:13:06.852130890 CET192.168.2.23194.36.144.870xce05Standard query (0)iranistrash.libre16IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Dec 15, 2024 13:13:07.103549004 CET194.36.144.87192.168.2.230xce05No error (0)iranistrash.libreTXT (Text strings)IN (0x0001)false

                                            System Behavior

                                            Start time (UTC):12:12:53
                                            Start date (UTC):15/12/2024
                                            Path:/usr/bin/dash
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):12:12:53
                                            Start date (UTC):15/12/2024
                                            Path:/usr/bin/rm
                                            Arguments:rm -f /tmp/tmp.cuGczAxhTT /tmp/tmp.KbY3AWkCz7 /tmp/tmp.5NoFuaPYAa
                                            File size:72056 bytes
                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                            Start time (UTC):12:12:53
                                            Start date (UTC):15/12/2024
                                            Path:/usr/bin/dash
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):12:12:53
                                            Start date (UTC):15/12/2024
                                            Path:/usr/bin/rm
                                            Arguments:rm -f /tmp/tmp.cuGczAxhTT /tmp/tmp.KbY3AWkCz7 /tmp/tmp.5NoFuaPYAa
                                            File size:72056 bytes
                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                            Start time (UTC):12:13:02
                                            Start date (UTC):15/12/2024
                                            Path:/tmp/sparc.elf
                                            Arguments:/tmp/sparc.elf
                                            File size:4379400 bytes
                                            MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                            Start time (UTC):12:13:04
                                            Start date (UTC):15/12/2024
                                            Path:/tmp/sparc.elf
                                            Arguments:-
                                            File size:4379400 bytes
                                            MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                            Start time (UTC):12:13:06
                                            Start date (UTC):15/12/2024
                                            Path:/tmp/sparc.elf
                                            Arguments:-
                                            File size:4379400 bytes
                                            MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                            Start time (UTC):12:13:06
                                            Start date (UTC):15/12/2024
                                            Path:/tmp/sparc.elf
                                            Arguments:-
                                            File size:4379400 bytes
                                            MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e