Linux
Analysis Report
dbus.elf
Overview
General Information
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1579014 |
Start date and time: | 2024-12-20 17:40:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 1s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | dbus.elf |
Detection: | MAL |
Classification: | mal56.troj.evad.linELF@0/0@0/0 |
- VT rate limit hit for: dbus.elf
Command: | /tmp/dbus.elf |
PID: | 6239 |
Exit Code: | |
Exit Code Info: | |
Killed: | True |
Standard Output: | |
Standard Error: | 2024/12/20 10:40:59 Processo udiskssd no encontrado. Tentando reexecutar... 2024/12/20 10:40:59 Erro ao executar minerador diretamente: exec: "udiskssd": executable file not found in $PATH 2024/12/20 10:41:00 Erro ao buscar URL atualizado ou link invlido 2024/12/20 10:41:01 Erro ao contar instncias do processo: exit status 1 2024/12/20 10:41:14 Processo udiskssd no encontrado. Tentando reexecutar... 2024/12/20 10:41:14 Erro ao executar minerador diretamente: exec: "udiskssd": executable file not found in $PATH 2024/12/20 10:41:15 Erro ao buscar URL atualizado ou link invlido 2024/12/20 10:41:17 Erro ao contar instncias do processo: exit status 1 2024/12/20 10:41:29 Processo udiskssd no encontrado. Tentando reexecutar... 2024/12/20 10:41:29 Erro ao executar minerador diretamente: exec: "udiskssd": executable file not found in $PATH 2024/12/20 10:41:30 Erro ao buscar URL atualizado ou link invlido 2024/12/20 10:41:31 Erro ao contar instncias do processo: exit status 1 |
- system is lnxubuntu20
- dbus.elf New Fork (PID: 6243, Parent: 6239)
- dbus.elf New Fork (PID: 6244, Parent: 6239)
- dbus.elf New Fork (PID: 6247, Parent: 6239)
- dbus.elf New Fork (PID: 6253, Parent: 6239)
- dbus.elf New Fork (PID: 6254, Parent: 6239)
- dbus.elf New Fork (PID: 6277, Parent: 6239)
- dbus.elf New Fork (PID: 6282, Parent: 6239)
- dbus.elf New Fork (PID: 6285, Parent: 6239)
- dbus.elf New Fork (PID: 6286, Parent: 6239)
- dbus.elf New Fork (PID: 6292, Parent: 6239)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior |
Networking |
---|
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | .symtab present: |
Source: | Classification label: |
Source: | Submission: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Ps executable: | Jump to behavior | ||
Source: | Ps executable: | Jump to behavior | ||
Source: | Ps executable: | Jump to behavior | ||
Source: | Ps executable: | Jump to behavior |
Source: | Reads from proc file: | Jump to behavior | ||
Source: | Reads from proc file: | Jump to behavior | ||
Source: | Reads from proc file: | Jump to behavior | ||
Source: | Reads from proc file: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior |
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | Direct Volume Access | 1 OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | 11 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 2 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 2 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | 1 Proxy | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | 1 Ingress Tool Transfer | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
32% | ReversingLabs | Win32.Trojan.Generic |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
107.172.88.151 | unknown | United States | 36352 | AS-COLOCROSSINGUS | false | |
109.202.202.202 | unknown | Switzerland | 13030 | INIT7CH | false | |
91.189.91.43 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false | |
91.189.91.42 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
107.172.88.151 | Get hash | malicious | Unknown | Browse |
| |
109.202.202.202 | Get hash | malicious | Unknown | Browse |
| |
91.189.91.43 | Get hash | malicious | Mirai | Browse | ||
Get hash | malicious | Sliver | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CANONICAL-ASGB | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Sliver | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
AS-COLOCROSSINGUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
INIT7CH | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Sliver | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
File type: | |
Entropy (8bit): | 6.226180706643571 |
TrID: |
|
File name: | dbus.elf |
File size: | 4'948'120 bytes |
MD5: | 89282100982e5f4dc24ce6dff1690346 |
SHA1: | 610a2ce20b7a81e059c9a79f6da19dd3fbd34fa0 |
SHA256: | ff0e1d1cd4f5cde24a3cb9ad571e92f8fa795aa9b42c829aeaeae2a6b8b020ae |
SHA512: | 0a665e856ffc66eefc3563da31a2b0aac1cc2eb4eba35d9b381282946d72e6bc530552f4e7bfcd3d4dd7a4824f8a566a39b05c57069f506a41d3be65df43e142 |
SSDEEP: | 49152:mKGGrlmcbl3/hS/rybEXsyCjRqpPZ6s5x5EYhcguvW/j8dwi:QpcbhJLDRqP0yEYh/Yr |
TLSH: | 4A363B07EC9545E5C0AEE6318662D253BA717C485B3023D33FA0F7292F76BD0AAB9714 |
File Content Preview: | .ELF..............>.......F.....@...................@.8...@.............@.......@.@.....@.@.....P.......P.................................@.......@.....d.......d.................................@.......@.....{z#.....{z#.......................#.......c.... |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 64 |
Program Header Offset: | 64 |
Program Header Size: | 56 |
Number of Program Headers: | 6 |
Section Header Offset: | 400 |
Section Header Size: | 64 |
Number of Section Headers: | 14 |
Header String Table Index: | 13 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.text | PROGBITS | 0x401000 | 0x1000 | 0x236a7b | 0x0 | 0x6 | AX | 0 | 0 | 32 |
.rodata | PROGBITS | 0x638000 | 0x238000 | 0xf1567 | 0x0 | 0x2 | A | 0 | 0 | 32 |
.typelink | PROGBITS | 0x729580 | 0x329580 | 0x1668 | 0x0 | 0x2 | A | 0 | 0 | 32 |
.itablink | PROGBITS | 0x72ac00 | 0x32ac00 | 0x848 | 0x0 | 0x2 | A | 0 | 0 | 32 |
.gosymtab | PROGBITS | 0x72b448 | 0x32b448 | 0x0 | 0x0 | 0x2 | A | 0 | 0 | 1 |
.gopclntab | PROGBITS | 0x72b460 | 0x32b460 | 0x159cf0 | 0x0 | 0x2 | A | 0 | 0 | 32 |
.go.buildinfo | PROGBITS | 0x886000 | 0x486000 | 0xf0 | 0x0 | 0x3 | WA | 0 | 0 | 16 |
.noptrdata | PROGBITS | 0x886100 | 0x486100 | 0x26842 | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.data | PROGBITS | 0x8ac960 | 0x4ac960 | 0xa9d0 | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.bss | NOBITS | 0x8b7340 | 0x4b7340 | 0x61d30 | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.noptrbss | NOBITS | 0x919080 | 0x519080 | 0x6700 | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.note.go.buildid | NOTE | 0x400f9c | 0xf9c | 0x64 | 0x0 | 0x2 | A | 0 | 0 | 4 |
.shstrtab | STRTAB | 0x0 | 0x4b8000 | 0x98 | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
PHDR | 0x40 | 0x400040 | 0x400040 | 0x150 | 0x150 | 1.7117 | 0x4 | R | 0x1000 | ||
NOTE | 0xf9c | 0x400f9c | 0x400f9c | 0x64 | 0x64 | 5.2598 | 0x4 | R | 0x4 | .note.go.buildid | |
LOAD | 0x0 | 0x400000 | 0x400000 | 0x237a7b | 0x237a7b | 6.2006 | 0x5 | R E | 0x1000 | .text .note.go.buildid | |
LOAD | 0x238000 | 0x638000 | 0x638000 | 0x24d150 | 0x24d150 | 5.6726 | 0x4 | R | 0x1000 | .rodata .typelink .itablink .gosymtab .gopclntab | |
LOAD | 0x486000 | 0x886000 | 0x886000 | 0x31340 | 0x99780 | 5.4471 | 0x6 | RW | 0x1000 | .go.buildinfo .noptrdata .data .bss .noptrbss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x8 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 20, 2024 17:40:54.127785921 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Dec 20, 2024 17:40:59.502840042 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Dec 20, 2024 17:40:59.537585020 CET | 58340 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:40:59.657471895 CET | 3693 | 58340 | 107.172.88.151 | 192.168.2.23 |
Dec 20, 2024 17:40:59.657752991 CET | 58340 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:40:59.660732985 CET | 58340 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:40:59.780672073 CET | 3693 | 58340 | 107.172.88.151 | 192.168.2.23 |
Dec 20, 2024 17:41:00.582024097 CET | 3693 | 58340 | 107.172.88.151 | 192.168.2.23 |
Dec 20, 2024 17:41:00.582667112 CET | 58340 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:41:00.584243059 CET | 58340 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:41:00.704132080 CET | 3693 | 58340 | 107.172.88.151 | 192.168.2.23 |
Dec 20, 2024 17:41:01.038614035 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Dec 20, 2024 17:41:14.837482929 CET | 58342 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:41:14.960921049 CET | 3693 | 58342 | 107.172.88.151 | 192.168.2.23 |
Dec 20, 2024 17:41:14.961124897 CET | 58342 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:41:14.963249922 CET | 58342 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:41:15.086863041 CET | 3693 | 58342 | 107.172.88.151 | 192.168.2.23 |
Dec 20, 2024 17:41:15.372618914 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Dec 20, 2024 17:41:16.013242006 CET | 3693 | 58342 | 107.172.88.151 | 192.168.2.23 |
Dec 20, 2024 17:41:16.015171051 CET | 58342 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:41:16.134895086 CET | 3693 | 58342 | 107.172.88.151 | 192.168.2.23 |
Dec 20, 2024 17:41:25.611309052 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Dec 20, 2024 17:41:29.773122072 CET | 58344 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:41:29.892784119 CET | 3693 | 58344 | 107.172.88.151 | 192.168.2.23 |
Dec 20, 2024 17:41:29.893099070 CET | 58344 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:41:29.895190001 CET | 58344 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:41:30.016489029 CET | 3693 | 58344 | 107.172.88.151 | 192.168.2.23 |
Dec 20, 2024 17:41:30.825978041 CET | 3693 | 58344 | 107.172.88.151 | 192.168.2.23 |
Dec 20, 2024 17:41:30.826339960 CET | 58344 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:41:30.828073978 CET | 58344 | 3693 | 192.168.2.23 | 107.172.88.151 |
Dec 20, 2024 17:41:30.947871923 CET | 3693 | 58344 | 107.172.88.151 | 192.168.2.23 |
Dec 20, 2024 17:41:31.754216909 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Dec 20, 2024 17:41:56.326914072 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Dec 20, 2024 17:42:16.803942919 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
0 | 192.168.2.23 | 58340 | 107.172.88.151 | 3693 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 20, 2024 17:40:59.660732985 CET | 119 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
1 | 192.168.2.23 | 58342 | 107.172.88.151 | 3693 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 20, 2024 17:41:14.963249922 CET | 119 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
2 | 192.168.2.23 | 58344 | 107.172.88.151 | 3693 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 20, 2024 17:41:29.895190001 CET | 119 | OUT |
System Behavior
Start time (UTC): | 16:40:55 |
Start date (UTC): | 20/12/2024 |
Path: | /tmp/dbus.elf |
Arguments: | /tmp/dbus.elf |
File size: | 4948120 bytes |
MD5 hash: | 89282100982e5f4dc24ce6dff1690346 |
Start time (UTC): | 16:40:55 |
Start date (UTC): | 20/12/2024 |
Path: | /tmp/dbus.elf |
Arguments: | - |
File size: | 4948120 bytes |
MD5 hash: | 89282100982e5f4dc24ce6dff1690346 |
Start time (UTC): | 16:40:55 |
Start date (UTC): | 20/12/2024 |
Path: | /bin/ps |
Arguments: | ps axo pid,comm,pcpu |
File size: | 137688 bytes |
MD5 hash: | ab48054475a6f70f8e7fa847331f3327 |
Start time (UTC): | 16:40:57 |
Start date (UTC): | 20/12/2024 |
Path: | /tmp/dbus.elf |
Arguments: | - |
File size: | 4948120 bytes |
MD5 hash: | 89282100982e5f4dc24ce6dff1690346 |
Start time (UTC): | 16:40:57 |
Start date (UTC): | 20/12/2024 |
Path: | /bin/pgrep |
Arguments: | pgrep -x udiskssd |
File size: | 30968 bytes |
MD5 hash: | fa96a75a08109d8842e4865b2907d51f |
Start time (UTC): | 16:41:00 |
Start date (UTC): | 20/12/2024 |
Path: | /tmp/dbus.elf |
Arguments: | - |
File size: | 4948120 bytes |
MD5 hash: | 89282100982e5f4dc24ce6dff1690346 |
Start time (UTC): | 16:41:00 |
Start date (UTC): | 20/12/2024 |
Path: | /bin/pgrep |
Arguments: | pgrep -c udiskssd |
File size: | 30968 bytes |
MD5 hash: | fa96a75a08109d8842e4865b2907d51f |
Start time (UTC): | 16:41:10 |
Start date (UTC): | 20/12/2024 |
Path: | /tmp/dbus.elf |
Arguments: | - |
File size: | 4948120 bytes |
MD5 hash: | 89282100982e5f4dc24ce6dff1690346 |
Start time (UTC): | 16:41:10 |
Start date (UTC): | 20/12/2024 |
Path: | /bin/ps |
Arguments: | ps axo pid,comm,pcpu |
File size: | 137688 bytes |
MD5 hash: | ab48054475a6f70f8e7fa847331f3327 |
Start time (UTC): | 16:41:12 |
Start date (UTC): | 20/12/2024 |
Path: | /tmp/dbus.elf |
Arguments: | - |
File size: | 4948120 bytes |
MD5 hash: | 89282100982e5f4dc24ce6dff1690346 |
Start time (UTC): | 16:41:12 |
Start date (UTC): | 20/12/2024 |
Path: | /bin/pgrep |
Arguments: | pgrep -x udiskssd |
File size: | 30968 bytes |
MD5 hash: | fa96a75a08109d8842e4865b2907d51f |
Start time (UTC): | 16:41:15 |
Start date (UTC): | 20/12/2024 |
Path: | /tmp/dbus.elf |
Arguments: | - |
File size: | 4948120 bytes |
MD5 hash: | 89282100982e5f4dc24ce6dff1690346 |
Start time (UTC): | 16:41:15 |
Start date (UTC): | 20/12/2024 |
Path: | /bin/pgrep |
Arguments: | pgrep -c udiskssd |
File size: | 30968 bytes |
MD5 hash: | fa96a75a08109d8842e4865b2907d51f |
Start time (UTC): | 16:41:26 |
Start date (UTC): | 20/12/2024 |
Path: | /tmp/dbus.elf |
Arguments: | - |
File size: | 4948120 bytes |
MD5 hash: | 89282100982e5f4dc24ce6dff1690346 |
Start time (UTC): | 16:41:26 |
Start date (UTC): | 20/12/2024 |
Path: | /bin/ps |
Arguments: | ps axo pid,comm,pcpu |
File size: | 137688 bytes |
MD5 hash: | ab48054475a6f70f8e7fa847331f3327 |
Start time (UTC): | 16:41:27 |
Start date (UTC): | 20/12/2024 |
Path: | /tmp/dbus.elf |
Arguments: | - |
File size: | 4948120 bytes |
MD5 hash: | 89282100982e5f4dc24ce6dff1690346 |
Start time (UTC): | 16:41:27 |
Start date (UTC): | 20/12/2024 |
Path: | /bin/pgrep |
Arguments: | pgrep -x udiskssd |
File size: | 30968 bytes |
MD5 hash: | fa96a75a08109d8842e4865b2907d51f |
Start time (UTC): | 16:41:30 |
Start date (UTC): | 20/12/2024 |
Path: | /tmp/dbus.elf |
Arguments: | - |
File size: | 4948120 bytes |
MD5 hash: | 89282100982e5f4dc24ce6dff1690346 |
Start time (UTC): | 16:41:30 |
Start date (UTC): | 20/12/2024 |
Path: | /bin/pgrep |
Arguments: | pgrep -c udiskssd |
File size: | 30968 bytes |
MD5 hash: | fa96a75a08109d8842e4865b2907d51f |
Start time (UTC): | 16:41:40 |
Start date (UTC): | 20/12/2024 |
Path: | /tmp/dbus.elf |
Arguments: | - |
File size: | 4948120 bytes |
MD5 hash: | 89282100982e5f4dc24ce6dff1690346 |
Start time (UTC): | 16:41:40 |
Start date (UTC): | 20/12/2024 |
Path: | /bin/ps |
Arguments: | ps axo pid,comm,pcpu |
File size: | 137688 bytes |
MD5 hash: | ab48054475a6f70f8e7fa847331f3327 |