Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
boatnet.spc.elf

Overview

General Information

Sample name:boatnet.spc.elf
Analysis ID:1575966
MD5:35068d4675fbe06e1372e029f1466a75
SHA1:baae99785d54935abd2d6280981db718eff1174a
SHA256:b53e923c1938960d4c9107939ca16a3499e239cd8fd2d1bb7ee25d5c23e7cdfc
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:76
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample tries to kill multiple processes (SIGKILL)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1575966
Start date and time:2024-12-16 12:47:26 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 49s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:boatnet.spc.elf
Detection:MAL
Classification:mal76.spre.troj.linELF@0/0@2/0
  • VT rate limit hit for: boatnet.spc.elf
Command:/tmp/boatnet.spc.elf
PID:5434
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • wrapper-2.0 (PID: 5444, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
  • wrapper-2.0 (PID: 5445, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
  • wrapper-2.0 (PID: 5446, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
  • wrapper-2.0 (PID: 5447, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
  • wrapper-2.0 (PID: 5448, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
  • wrapper-2.0 (PID: 5449, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
boatnet.spc.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    boatnet.spc.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0xc958:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc96c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc980:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc994:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc9a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc9bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc9d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc9e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xc9f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xca0c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xca20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xca34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xca48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xca5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xca70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xca84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xca98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcaac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcac0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcad4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0xcae8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    boatnet.spc.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
    • 0xceb8:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
    SourceRuleDescriptionAuthorStrings
    5434.1.00007fbefc011000.00007fbefc01f000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5434.1.00007fbefc011000.00007fbefc01f000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xc958:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc96c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc980:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc994:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc9a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc9bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc9d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc9e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xc9f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xca0c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xca20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xca34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xca48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xca5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xca70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xca84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xca98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcaac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcac0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcad4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcae8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5434.1.00007fbefc011000.00007fbefc01f000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
      • 0xceb8:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
      5437.1.00007fbefc011000.00007fbefc01f000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        5437.1.00007fbefc011000.00007fbefc01f000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0xc958:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc96c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc980:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc994:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc9a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc9bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc9d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc9e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xc9f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xca0c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xca20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xca34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xca48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xca5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xca70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xca84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xca98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcaac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcac0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcad4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0xcae8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        Click to see the 4 entries
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: boatnet.spc.elfAvira: detected
        Source: boatnet.spc.elfReversingLabs: Detection: 65%
        Source: global trafficTCP traffic: 192.168.2.13:39176 -> 147.78.65.71:3778
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: unknownTCP traffic detected without corresponding DNS query: 147.78.65.71
        Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

        System Summary

        barindex
        Source: boatnet.spc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: boatnet.spc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
        Source: 5434.1.00007fbefc011000.00007fbefc01f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: 5434.1.00007fbefc011000.00007fbefc01f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
        Source: 5437.1.00007fbefc011000.00007fbefc01f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: 5437.1.00007fbefc011000.00007fbefc01f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
        Source: Process Memory Space: boatnet.spc.elf PID: 5434, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: Process Memory Space: boatnet.spc.elf PID: 5434, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3104, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3161, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3162, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3163, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3164, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3165, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3170, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3182, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3208, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3212, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 5444, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 5445, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 5446, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 5447, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 5448, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 5449, result: successfulJump to behavior
        Source: ELF static info symbol of initial sample.symtab present: no
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3104, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3161, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3162, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3163, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3164, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3165, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3170, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3182, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3208, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 3212, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 5444, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 5445, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 5446, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 5447, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 5448, result: successfulJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)SIGKILL sent: pid: 5449, result: successfulJump to behavior
        Source: boatnet.spc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: boatnet.spc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
        Source: 5434.1.00007fbefc011000.00007fbefc01f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: 5434.1.00007fbefc011000.00007fbefc01f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
        Source: 5437.1.00007fbefc011000.00007fbefc01f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: 5437.1.00007fbefc011000.00007fbefc01f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
        Source: Process Memory Space: boatnet.spc.elf PID: 5434, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: Process Memory Space: boatnet.spc.elf PID: 5434, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
        Source: classification engineClassification label: mal76.spre.troj.linELF@0/0@2/0
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3122/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3117/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3114/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/914/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/518/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/519/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/5417/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/5418/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/917/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/5272/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/5033/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3134/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3375/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3132/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3095/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1745/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1866/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1588/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/884/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1982/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/765/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3246/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/767/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/800/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1906/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/802/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3764/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/803/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1748/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/5440/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/5444/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3420/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1482/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/490/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1480/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1755/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1238/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1875/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/2964/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3413/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1751/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1872/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/2961/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1475/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/656/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/778/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/657/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/658/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/659/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/418/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/936/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/419/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/816/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1879/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1891/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3310/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3153/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/780/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/660/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1921/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/783/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1765/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/2974/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1400/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1884/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3424/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/2972/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3147/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/2970/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1881/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3146/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3300/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/5445/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/5446/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/5447/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1805/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/5448/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1925/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1804/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/5449/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1648/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1922/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3429/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3442/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3165/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3164/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3163/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3162/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/790/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3161/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/792/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/793/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/672/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1930/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/674/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/795/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3315/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1411/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/2984/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/1410/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/797/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/676/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3434/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/3158/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5436)File opened: /proc/678/cmdlineJump to behavior
        Source: /tmp/boatnet.spc.elf (PID: 5434)Queries kernel information via 'uname': Jump to behavior
        Source: boatnet.spc.elf, 5434.1.0000563d127fa000.0000563d1287f000.rw-.sdmp, boatnet.spc.elf, 5437.1.0000563d127fa000.0000563d1287f000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sparc
        Source: boatnet.spc.elf, 5434.1.0000563d127fa000.0000563d1287f000.rw-.sdmp, boatnet.spc.elf, 5437.1.0000563d127fa000.0000563d1287f000.rw-.sdmpBinary or memory string: =V!/etc/qemu-binfmt/sparc
        Source: boatnet.spc.elf, 5434.1.00007fff76a99000.00007fff76aba000.rw-.sdmp, boatnet.spc.elf, 5437.1.00007fff76a99000.00007fff76aba000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sparc/tmp/boatnet.spc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/boatnet.spc.elf
        Source: boatnet.spc.elf, 5434.1.00007fff76a99000.00007fff76aba000.rw-.sdmp, boatnet.spc.elf, 5437.1.00007fff76a99000.00007fff76aba000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: boatnet.spc.elf, type: SAMPLE
        Source: Yara matchFile source: 5434.1.00007fbefc011000.00007fbefc01f000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5437.1.00007fbefc011000.00007fbefc01f000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: boatnet.spc.elf PID: 5434, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: boatnet.spc.elf, type: SAMPLE
        Source: Yara matchFile source: 5434.1.00007fbefc011000.00007fbefc01f000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5437.1.00007fbefc011000.00007fbefc01f000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: boatnet.spc.elf PID: 5434, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
        OS Credential Dumping
        11
        Security Software Discovery
        Remote ServicesData from Local System1
        Non-Standard Port
        Exfiltration Over Other Network Medium1
        Service Stop
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1575966 Sample: boatnet.spc.elf Startdate: 16/12/2024 Architecture: LINUX Score: 76 22 147.78.65.71, 3778, 39176, 39178 SUPERSERVERSDATACENTERRU Russian Federation 2->22 24 daisy.ubuntu.com 2->24 26 Malicious sample detected (through community Yara rule) 2->26 28 Antivirus / Scanner detection for submitted sample 2->28 30 Multi AV Scanner detection for submitted file 2->30 32 Yara detected Mirai 2->32 7 boatnet.spc.elf 2->7         started        9 xfce4-panel wrapper-2.0 2->9         started        11 xfce4-panel wrapper-2.0 2->11         started        13 4 other processes 2->13 signatures3 process4 process5 15 boatnet.spc.elf 7->15         started        18 boatnet.spc.elf 7->18         started        20 boatnet.spc.elf 7->20         started        signatures6 34 Sample tries to kill multiple processes (SIGKILL) 15->34

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        boatnet.spc.elf66%ReversingLabsLinux.Backdoor.Mirai
        boatnet.spc.elf100%AviraEXP/ELF.Gafgyt.D
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        daisy.ubuntu.com
        162.213.35.25
        truefalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          147.78.65.71
          unknownRussian Federation
          50113SUPERSERVERSDATACENTERRUfalse
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          147.78.65.71boatnet.arm7.elfGet hashmaliciousMiraiBrowse
            boatnet.mips.elfGet hashmaliciousMiraiBrowse
              boatnet.x86.elfGet hashmaliciousMiraiBrowse
                boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  daisy.ubuntu.comarmv4l.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 162.213.35.24
                  i586.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 162.213.35.24
                  armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 162.213.35.24
                  main_arm6.elfGet hashmaliciousMiraiBrowse
                  • 162.213.35.25
                  arm7.elfGet hashmaliciousMiraiBrowse
                  • 162.213.35.25
                  i686.elfGet hashmaliciousMiraiBrowse
                  • 162.213.35.25
                  mips.elfGet hashmaliciousMiraiBrowse
                  • 162.213.35.24
                  main_arm6.elfGet hashmaliciousMiraiBrowse
                  • 162.213.35.24
                  armv5l.elfGet hashmaliciousMiraiBrowse
                  • 162.213.35.24
                  armv7l.elfGet hashmaliciousMiraiBrowse
                  • 162.213.35.24
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  SUPERSERVERSDATACENTERRUboatnet.arm7.elfGet hashmaliciousMiraiBrowse
                  • 147.78.65.71
                  boatnet.mips.elfGet hashmaliciousMiraiBrowse
                  • 147.78.65.71
                  boatnet.x86.elfGet hashmaliciousMiraiBrowse
                  • 147.78.65.71
                  boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                  • 147.78.65.71
                  DocScan_20242175.jsGet hashmaliciousUnknownBrowse
                  • 185.103.253.176
                  DocScan_20242175.jsGet hashmaliciousUnknownBrowse
                  • 185.103.253.176
                  IYXE4Uz61k.exeGet hashmaliciousDCRat, PureLog Stealer, Xmrig, zgRATBrowse
                  • 185.17.0.139
                  qe4efGS22G.exeGet hashmaliciousUnknownBrowse
                  • 185.189.14.174
                  qe4efGS22G.exeGet hashmaliciousUnknownBrowse
                  • 185.189.14.174
                  hidakibest.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 185.212.148.212
                  No context
                  No context
                  No created / dropped files found
                  File type:ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, stripped
                  Entropy (8bit):6.066359265685508
                  TrID:
                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                  File name:boatnet.spc.elf
                  File size:58'376 bytes
                  MD5:35068d4675fbe06e1372e029f1466a75
                  SHA1:baae99785d54935abd2d6280981db718eff1174a
                  SHA256:b53e923c1938960d4c9107939ca16a3499e239cd8fd2d1bb7ee25d5c23e7cdfc
                  SHA512:89f67e5d748bf62baf9c6db04a380f880bfb932df78118a98bc9f7908d0cd66ba1d9b6eb4f4a1690b869b23a96d24ffd87f884140bebc47aaeff9d670d2e860d
                  SSDEEP:768:RqowmZPu9wtnfbltWgC6BSJsBcfDSTFI7QKqgESnmC/xO+KpAwi:RqtmZPuutfbltZFBSJsBcfDSTFIFBEi
                  TLSH:E3432921B63A1F13D0E0A47D21FB4B59B1A15ADE26A4C64E7D720F4FFF11680A943DB8
                  File Content Preview:.ELF...........................4...x.....4. ...(.......................................................8...P........dt.Q................................@..(....@.2.................#.....b8..`.....!..... ...@.....".........`......$ ... ...@...........`....

                  ELF header

                  Class:ELF32
                  Data:2's complement, big endian
                  Version:1 (current)
                  Machine:Sparc
                  Version Number:0x1
                  Type:EXEC (Executable file)
                  OS/ABI:UNIX - System V
                  ABI Version:0
                  Entry Point Address:0x101a4
                  Flags:0x0
                  ELF Header Size:52
                  Program Header Offset:52
                  Program Header Size:32
                  Number of Program Headers:3
                  Section Header Offset:57976
                  Section Header Size:40
                  Number of Section Headers:10
                  Header String Table Index:9
                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                  NULL0x00x00x00x00x0000
                  .initPROGBITS0x100940x940x1c0x00x6AX004
                  .textPROGBITS0x100b00xb00xc8880x00x6AX004
                  .finiPROGBITS0x1c9380xc9380x140x00x6AX004
                  .rodataPROGBITS0x1c9500xc9500x11b00x00x2A008
                  .ctorsPROGBITS0x2e0000xe0000x80x00x3WA004
                  .dtorsPROGBITS0x2e0080xe0080x80x00x3WA004
                  .dataPROGBITS0x2e0180xe0180x2200x00x3WA008
                  .bssNOBITS0x2e2380xe2380x3180x00x3WA004
                  .shstrtabSTRTAB0x00xe2380x3e0x00x0001
                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                  LOAD0x00x100000x100000xdb000xdb006.17290x5R E0x10000.init .text .fini .rodata
                  LOAD0xe0000x2e0000x2e0000x2380x5502.92290x6RW 0x10000.ctors .dtors .data .bss
                  GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                  TimestampSource PortDest PortSource IPDest IP
                  Dec 16, 2024 12:48:07.452914953 CET391763778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:07.572727919 CET377839176147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:07.572787046 CET391763778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:07.609906912 CET391763778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:07.729676962 CET377839176147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:07.729746103 CET391763778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:07.849606991 CET377839176147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:08.890957117 CET377839176147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:08.891030073 CET391763778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:08.891207933 CET391763778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:08.900764942 CET391783778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:09.062305927 CET377839178147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:09.062427998 CET391783778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:09.075592995 CET391783778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:09.195715904 CET377839178147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:09.195779085 CET391783778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:09.317691088 CET377839178147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:10.397226095 CET377839178147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:10.397336960 CET391783778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:10.397377014 CET391783778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:10.398219109 CET391803778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:10.520946026 CET377839180147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:10.521079063 CET391803778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:10.522994041 CET391803778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:10.642714977 CET377839180147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:10.642788887 CET391803778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:10.764960051 CET377839180147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:11.846716881 CET377839180147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:11.846824884 CET391803778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:11.846906900 CET391803778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:11.848676920 CET391823778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:11.968389988 CET377839182147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:11.968487024 CET391823778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:11.970393896 CET391823778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:12.090588093 CET377839182147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:12.090662003 CET391823778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:12.210539103 CET377839182147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:13.292908907 CET377839182147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:13.292973995 CET391823778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:13.293121099 CET391823778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:13.296371937 CET391843778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:13.416560888 CET377839184147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:13.416699886 CET391843778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:13.427521944 CET391843778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:13.548676014 CET377839184147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:13.548741102 CET391843778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:13.668555975 CET377839184147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:14.752701998 CET377839184147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:14.752785921 CET391843778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:14.752840996 CET391843778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:14.753858089 CET391863778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:14.873644114 CET377839186147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:14.873733997 CET391863778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:14.875581980 CET391863778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:14.995347023 CET377839186147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:14.995433092 CET391863778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:15.115530968 CET377839186147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:16.190048933 CET377839186147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:16.190124989 CET391863778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:16.190180063 CET391863778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:16.190601110 CET391883778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:16.310358047 CET377839188147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:16.311741114 CET391883778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:16.312500954 CET391883778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:16.432286978 CET377839188147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:16.433830023 CET391883778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:16.553849936 CET377839188147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:17.637171030 CET377839188147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:17.637888908 CET391883778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:17.637888908 CET391883778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:17.646826029 CET391903778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:17.766798019 CET377839190147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:17.767038107 CET391903778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:17.777935028 CET391903778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:17.897825956 CET377839190147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:17.897994041 CET391903778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:18.017930031 CET377839190147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:19.083982944 CET377839190147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:19.084100962 CET391903778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:19.084140062 CET391903778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:19.084641933 CET391923778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:19.204387903 CET377839192147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:19.204488039 CET391923778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:19.205290079 CET391923778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:19.325304031 CET377839192147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:19.325433016 CET391923778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:19.445085049 CET377839192147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:20.536218882 CET377839192147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:20.536338091 CET391923778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:20.536376953 CET391923778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:20.536906004 CET391943778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:20.656698942 CET377839194147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:20.656805038 CET391943778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:20.657615900 CET391943778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:20.777554989 CET377839194147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:20.777640104 CET391943778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:20.897530079 CET377839194147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:21.992487907 CET377839194147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:21.992608070 CET391943778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:21.992639065 CET391943778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:21.993072987 CET391963778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:22.112766981 CET377839196147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:22.112926006 CET391963778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:22.113863945 CET391963778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:22.235343933 CET377839196147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:22.235549927 CET391963778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:22.356686115 CET377839196147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:23.458791018 CET377839196147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:23.458998919 CET391963778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:23.458998919 CET391963778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:23.459677935 CET391983778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:23.579436064 CET377839198147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:23.579526901 CET391983778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:23.580562115 CET391983778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:23.700439930 CET377839198147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:23.700635910 CET391983778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:23.820585966 CET377839198147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:24.905051947 CET377839198147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:24.905297995 CET391983778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:24.905297995 CET391983778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:24.905723095 CET392003778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:25.025924921 CET377839200147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:25.026056051 CET392003778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:25.026788950 CET392003778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:25.147166014 CET377839200147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:25.147265911 CET392003778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:25.268143892 CET377839200147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:26.360073090 CET377839200147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:26.360186100 CET392003778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:26.360235929 CET392003778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:26.360814095 CET392023778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:26.480716944 CET377839202147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:26.480851889 CET392023778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:26.481863976 CET392023778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:26.601766109 CET377839202147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:26.601891041 CET392023778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:26.721887112 CET377839202147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:36.490907907 CET392023778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:48:36.611565113 CET377839202147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:36.925610065 CET377839202147.78.65.71192.168.2.13
                  Dec 16, 2024 12:48:36.925815105 CET392023778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:49:36.974618912 CET392023778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:49:37.094600916 CET377839202147.78.65.71192.168.2.13
                  Dec 16, 2024 12:49:37.408170938 CET377839202147.78.65.71192.168.2.13
                  Dec 16, 2024 12:49:37.408354998 CET392023778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:50:37.440953016 CET392023778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:50:37.561108112 CET377839202147.78.65.71192.168.2.13
                  Dec 16, 2024 12:50:37.874557018 CET377839202147.78.65.71192.168.2.13
                  Dec 16, 2024 12:50:37.874708891 CET392023778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:51:37.909081936 CET392023778192.168.2.13147.78.65.71
                  Dec 16, 2024 12:51:38.028932095 CET377839202147.78.65.71192.168.2.13
                  Dec 16, 2024 12:51:38.341603041 CET377839202147.78.65.71192.168.2.13
                  Dec 16, 2024 12:51:38.341736078 CET392023778192.168.2.13147.78.65.71
                  TimestampSource PortDest PortSource IPDest IP
                  Dec 16, 2024 12:50:53.274132967 CET4586853192.168.2.131.1.1.1
                  Dec 16, 2024 12:50:53.274244070 CET4786053192.168.2.131.1.1.1
                  Dec 16, 2024 12:50:53.412940979 CET53478601.1.1.1192.168.2.13
                  Dec 16, 2024 12:50:53.497957945 CET53458681.1.1.1192.168.2.13
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Dec 16, 2024 12:50:53.274132967 CET192.168.2.131.1.1.10xeaeeStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                  Dec 16, 2024 12:50:53.274244070 CET192.168.2.131.1.1.10x8e00Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Dec 16, 2024 12:50:53.497957945 CET1.1.1.1192.168.2.130xeaeeNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                  Dec 16, 2024 12:50:53.497957945 CET1.1.1.1192.168.2.130xeaeeNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                  System Behavior

                  Start time (UTC):11:48:06
                  Start date (UTC):16/12/2024
                  Path:/tmp/boatnet.spc.elf
                  Arguments:/tmp/boatnet.spc.elf
                  File size:4379400 bytes
                  MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                  Start time (UTC):11:48:06
                  Start date (UTC):16/12/2024
                  Path:/tmp/boatnet.spc.elf
                  Arguments:-
                  File size:4379400 bytes
                  MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                  Start time (UTC):11:48:06
                  Start date (UTC):16/12/2024
                  Path:/tmp/boatnet.spc.elf
                  Arguments:-
                  File size:4379400 bytes
                  MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                  Start time (UTC):11:48:06
                  Start date (UTC):16/12/2024
                  Path:/tmp/boatnet.spc.elf
                  Arguments:-
                  File size:4379400 bytes
                  MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                  Start time (UTC):11:48:07
                  Start date (UTC):16/12/2024
                  Path:/usr/bin/xfce4-panel
                  Arguments:-
                  File size:375768 bytes
                  MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                  Start time (UTC):11:48:07
                  Start date (UTC):16/12/2024
                  Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                  Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
                  File size:35136 bytes
                  MD5 hash:ac0b8a906f359a8ae102244738682e76

                  Start time (UTC):11:48:07
                  Start date (UTC):16/12/2024
                  Path:/usr/bin/xfce4-panel
                  Arguments:-
                  File size:375768 bytes
                  MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                  Start time (UTC):11:48:07
                  Start date (UTC):16/12/2024
                  Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                  Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
                  File size:35136 bytes
                  MD5 hash:ac0b8a906f359a8ae102244738682e76

                  Start time (UTC):11:48:07
                  Start date (UTC):16/12/2024
                  Path:/usr/bin/xfce4-panel
                  Arguments:-
                  File size:375768 bytes
                  MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                  Start time (UTC):11:48:07
                  Start date (UTC):16/12/2024
                  Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                  Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
                  File size:35136 bytes
                  MD5 hash:ac0b8a906f359a8ae102244738682e76

                  Start time (UTC):11:48:07
                  Start date (UTC):16/12/2024
                  Path:/usr/bin/xfce4-panel
                  Arguments:-
                  File size:375768 bytes
                  MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                  Start time (UTC):11:48:07
                  Start date (UTC):16/12/2024
                  Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                  Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
                  File size:35136 bytes
                  MD5 hash:ac0b8a906f359a8ae102244738682e76

                  Start time (UTC):11:48:07
                  Start date (UTC):16/12/2024
                  Path:/usr/bin/xfce4-panel
                  Arguments:-
                  File size:375768 bytes
                  MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                  Start time (UTC):11:48:07
                  Start date (UTC):16/12/2024
                  Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                  Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
                  File size:35136 bytes
                  MD5 hash:ac0b8a906f359a8ae102244738682e76

                  Start time (UTC):11:48:07
                  Start date (UTC):16/12/2024
                  Path:/usr/bin/xfce4-panel
                  Arguments:-
                  File size:375768 bytes
                  MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                  Start time (UTC):11:48:07
                  Start date (UTC):16/12/2024
                  Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                  Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
                  File size:35136 bytes
                  MD5 hash:ac0b8a906f359a8ae102244738682e76