Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
zerm68k.elf

Overview

General Information

Sample name:zerm68k.elf
Analysis ID:1580173
MD5:6993337fe9c4d04353adea460fbf4f66
SHA1:ca7d6b6ccd37e8f1af368e19e8e4a901faf08ca4
SHA256:36757239bf74e791dbd6102b2ab03581fae8adfe4cf422eebe7d13ed9182660e
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1580173
Start date and time:2024-12-24 03:43:16 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 11s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:zerm68k.elf
Detection:MAL
Classification:mal52.troj.linELF@0/0@3/0
Command:/tmp/zerm68k.elf
PID:6269
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
The Peoples Bank of China.
Standard Error:
  • system is lnxubuntu20
  • zerm68k.elf (PID: 6269, Parent: 6190, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/zerm68k.elf
  • dash New Fork (PID: 6280, Parent: 4331)
  • rm (PID: 6280, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.86Fxgk4gwr /tmp/tmp.dyL73VOhcG /tmp/tmp.zu2UenayB4
  • dash New Fork (PID: 6281, Parent: 4331)
  • rm (PID: 6281, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.86Fxgk4gwr /tmp/tmp.dyL73VOhcG /tmp/tmp.zu2UenayB4
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: zerm68k.elfReversingLabs: Detection: 28%

Networking

barindex
Source: global trafficTCP traffic: 209.38.192.73 ports 38241,1,2,3,4,8
Source: global trafficTCP traffic: 192.168.2.23:42982 -> 209.38.192.73:38241
Source: /tmp/zerm68k.elf (PID: 6269)Socket: 127.0.0.1:39148Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 34.249.145.219
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownUDP traffic detected without corresponding DNS query: 81.169.136.222
Source: unknownUDP traffic detected without corresponding DNS query: 51.158.108.203
Source: unknownUDP traffic detected without corresponding DNS query: 152.53.15.127
Source: global trafficDNS traffic detected: DNS query: serisbot.geek
Source: global trafficDNS traffic detected: DNS query: serisontop.dyn
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39256
Source: unknownNetwork traffic detected: HTTP traffic on port 39256 -> 443
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne
Source: Initial sampleString containing 'busybox' found: /bin/busybox echo -ne >> > .dPon521rootZte521root621vizxvoelinux123wabjtamZxic521tsgoingon123456xc3511solokeydefaulthkipc2016unisheenFireituphslwificam5upjvbzdsystemzlxx.antslqxc12345xmhdipcicatch99founder88xirtam/*6.=_jat0talc0ntr0l4!7ujMko0adminjuantechipc71aroot12320080826admin123admin1234admin@123BrAhMoS@15GeNeXiS@19supportadmintelnetadminadmintelecomtelecomadminguestftpusernobodydaemon1cDuLJ7ctlJwpbo6S2fGqNFsOxhlwSG8tluafedbin20150602vstarcam2015supporte8ehomee8telnetarmarm5arm6arm7mipsmpslppcspcsh4knfggvgfchinj.catqerkwmlvop.dxnqerkw`mv.geejqerkwpgr.libseVhe"Tgmrles Cank of Bihoa/VSowvag"Engioe Query-prmg--exg-fd-cmfhklg-prmg-'f/exepebmkvdtpugev-bil+nmein/proc/net/tcp/dev/null
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.troj.linELF@0/0@3/0
Source: /usr/bin/dash (PID: 6280)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.86Fxgk4gwr /tmp/tmp.dyL73VOhcG /tmp/tmp.zu2UenayB4Jump to behavior
Source: /usr/bin/dash (PID: 6281)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.86Fxgk4gwr /tmp/tmp.dyL73VOhcG /tmp/tmp.zu2UenayB4Jump to behavior
Source: /tmp/zerm68k.elf (PID: 6269)Queries kernel information via 'uname': Jump to behavior
Source: zerm68k.elf, 6269.1.000055d36df2a000.000055d36dfaf000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/m68k
Source: zerm68k.elf, 6269.1.00007ffde358e000.00007ffde35af000.rw-.sdmpBinary or memory string: ux86_64/usr/bin/qemu-m68k/tmp/zerm68k.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/zerm68k.elf
Source: zerm68k.elf, 6269.1.00007ffde358e000.00007ffde35af000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
Source: zerm68k.elf, 6269.1.000055d36df2a000.000055d36dfaf000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
File Deletion
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1580173 Sample: zerm68k.elf Startdate: 24/12/2024 Architecture: LINUX Score: 52 18 109.202.202.202, 80 INIT7CH Switzerland 2->18 20 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->20 22 3 other IPs or domains 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Connects to many ports of the same IP (likely port scanning) 2->26 8 zerm68k.elf 2->8         started        10 dash rm 2->10         started        12 dash rm 2->12         started        signatures3 process4 process5 14 zerm68k.elf 8->14         started        process6 16 zerm68k.elf 14->16         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
zerm68k.elf29%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
serisontop.dyn
209.38.192.73
truefalse
    high
    serisbot.geek
    unknown
    unknownfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      34.249.145.219
      unknownUnited States
      16509AMAZON-02USfalse
      209.38.192.73
      serisontop.dynUnited States
      7018ATT-INTERNET4USfalse
      109.202.202.202
      unknownSwitzerland
      13030INIT7CHfalse
      91.189.91.42
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      34.249.145.219hidakibest.ppc.elfGet hashmaliciousGafgyt, MiraiBrowse
        hidakibest.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
          main_mips.elfGet hashmaliciousMiraiBrowse
            powerpc.elfGet hashmaliciousMiraiBrowse
              main_arm6.elfGet hashmaliciousMiraiBrowse
                main_x86.elfGet hashmaliciousMiraiBrowse
                  main_m68k.elfGet hashmaliciousMiraiBrowse
                    Space.mips.elfGet hashmaliciousMiraiBrowse
                      hmips.elfGet hashmaliciousUnknownBrowse
                        armv4l.elfGet hashmaliciousUnknownBrowse
                          209.38.192.73zerarm.elfGet hashmaliciousUnknownBrowse
                            zerx86.elfGet hashmaliciousUnknownBrowse
                              109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                              • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                              91.189.91.42zerarm6.elfGet hashmaliciousUnknownBrowse
                                armv4eb.elfGet hashmaliciousUnknownBrowse
                                  x86_32.nn.elfGet hashmaliciousOkiruBrowse
                                    tftp.elfGet hashmaliciousUnknownBrowse
                                      arm5.nn-20241224-0050.elfGet hashmaliciousOkiruBrowse
                                        bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                          mipsel.nn.elfGet hashmaliciousOkiruBrowse
                                            powerpc.nn.elfGet hashmaliciousOkiruBrowse
                                              arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                arm5.nn.elfGet hashmaliciousOkiruBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  serisontop.dynzerarm.elfGet hashmaliciousUnknownBrowse
                                                  • 209.38.192.73
                                                  zerx86.elfGet hashmaliciousUnknownBrowse
                                                  • 209.38.192.73
                                                  jklmpsl.elfGet hashmaliciousUnknownBrowse
                                                  • 209.38.192.73
                                                  arm5.elfGet hashmaliciousUnknownBrowse
                                                  • 209.38.192.73
                                                  nabarm5.elfGet hashmaliciousUnknownBrowse
                                                  • 154.216.16.244
                                                  nklx86.elfGet hashmaliciousUnknownBrowse
                                                  • 154.216.16.250
                                                  sh4.elfGet hashmaliciousUnknownBrowse
                                                  • 209.38.192.73
                                                  nklppc.elfGet hashmaliciousUnknownBrowse
                                                  • 154.216.16.244
                                                  nklmips.elfGet hashmaliciousUnknownBrowse
                                                  • 154.216.16.244
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  CANONICAL-ASGBzerarm6.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  armv4eb.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  x86_32.nn.elfGet hashmaliciousOkiruBrowse
                                                  • 91.189.91.42
                                                  tftp.elfGet hashmaliciousUnknownBrowse
                                                  • 91.189.91.42
                                                  arm5.nn-20241224-0050.elfGet hashmaliciousOkiruBrowse
                                                  • 91.189.91.42
                                                  bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                  • 91.189.91.42
                                                  mipsel.nn.elfGet hashmaliciousOkiruBrowse
                                                  • 91.189.91.42
                                                  powerpc.nn.elfGet hashmaliciousOkiruBrowse
                                                  • 91.189.91.42
                                                  arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                  • 91.189.91.42
                                                  bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                  • 185.125.190.26
                                                  ATT-INTERNET4USzerarm.elfGet hashmaliciousUnknownBrowse
                                                  • 209.38.192.73
                                                  zerx86.elfGet hashmaliciousUnknownBrowse
                                                  • 209.38.192.73
                                                  jklmpsl.elfGet hashmaliciousUnknownBrowse
                                                  • 12.242.244.195
                                                  arm5.elfGet hashmaliciousUnknownBrowse
                                                  • 104.55.155.192
                                                  nabarm5.elfGet hashmaliciousUnknownBrowse
                                                  • 32.96.179.169
                                                  nklx86.elfGet hashmaliciousUnknownBrowse
                                                  • 67.127.218.45
                                                  sh4.elfGet hashmaliciousUnknownBrowse
                                                  • 108.255.169.52
                                                  nklppc.elfGet hashmaliciousUnknownBrowse
                                                  • 99.116.76.29
                                                  armv4l.elfGet hashmaliciousUnknownBrowse
                                                  • 12.29.53.204
                                                  nklmips.elfGet hashmaliciousUnknownBrowse
                                                  • 70.133.32.51
                                                  INIT7CHzerarm6.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  armv4eb.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  x86_32.nn.elfGet hashmaliciousOkiruBrowse
                                                  • 109.202.202.202
                                                  tftp.elfGet hashmaliciousUnknownBrowse
                                                  • 109.202.202.202
                                                  arm5.nn-20241224-0050.elfGet hashmaliciousOkiruBrowse
                                                  • 109.202.202.202
                                                  bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                                  • 109.202.202.202
                                                  mipsel.nn.elfGet hashmaliciousOkiruBrowse
                                                  • 109.202.202.202
                                                  powerpc.nn.elfGet hashmaliciousOkiruBrowse
                                                  • 109.202.202.202
                                                  arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                  • 109.202.202.202
                                                  arm5.nn.elfGet hashmaliciousOkiruBrowse
                                                  • 109.202.202.202
                                                  AMAZON-02USzerarm6.elfGet hashmaliciousUnknownBrowse
                                                  • 54.171.230.55
                                                  jklmpsl.elfGet hashmaliciousUnknownBrowse
                                                  • 52.62.245.204
                                                  arm5.elfGet hashmaliciousUnknownBrowse
                                                  • 71.152.11.87
                                                  nabarm5.elfGet hashmaliciousUnknownBrowse
                                                  • 3.164.4.166
                                                  sh4.elfGet hashmaliciousUnknownBrowse
                                                  • 52.119.232.160
                                                  nklppc.elfGet hashmaliciousUnknownBrowse
                                                  • 18.179.63.196
                                                  armv4l.elfGet hashmaliciousUnknownBrowse
                                                  • 34.222.220.8
                                                  https://www.canva.com/design/DAGaHpv1g1M/bVE7B2sT8b8T3P-e2xb64w/view?utm_content=DAGaHpv1g1M&utm_campaign=designshare&utm_medium=link2&utm_source=uniquelinks&utlId=h1ee3678e45Get hashmaliciousHTMLPhisherBrowse
                                                  • 75.2.57.54
                                                  Violated Heroine_91zbZ-1.exeGet hashmaliciousUnknownBrowse
                                                  • 35.162.223.47
                                                  Violated Heroine_91zbZ-1.exeGet hashmaliciousUnknownBrowse
                                                  • 52.35.239.119
                                                  No context
                                                  No context
                                                  No created / dropped files found
                                                  File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                                                  Entropy (8bit):6.189778707259999
                                                  TrID:
                                                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                  File name:zerm68k.elf
                                                  File size:48'324 bytes
                                                  MD5:6993337fe9c4d04353adea460fbf4f66
                                                  SHA1:ca7d6b6ccd37e8f1af368e19e8e4a901faf08ca4
                                                  SHA256:36757239bf74e791dbd6102b2ab03581fae8adfe4cf422eebe7d13ed9182660e
                                                  SHA512:3c73ff2b283978bda1104d4c39c7983242e5adf2da81e0d28e17dee048319ddd5c27ee172ae2bbca1e888fb43b165dad0a2b99e86f6d01ed22b3d09dba9f7e1f
                                                  SSDEEP:768:zLe4Ps+80x0ha2gMu8MKxLdOpkOa0FQuWjuu9J8rXAiD:3FPT50ha/58/xLMpkOFQuCuuj8rbD
                                                  TLSH:8C232CA5B800AD3CF95EE7FE84130B0CB571275651930B27676BFDA72C322954D26EC2
                                                  File Content Preview:.ELF.......................D...4.........4. ...(.......................F...F...... ........L...L...L...|.......... .dt.Q............................NV..a....da.....N^NuNV..J9....f>"y...d QJ.g.X.#....dN."y...d QJ.f.A.....J.g.Hy...HN.X.........N^NuNV..N^NuN

                                                  ELF header

                                                  Class:ELF32
                                                  Data:2's complement, big endian
                                                  Version:1 (current)
                                                  Machine:MC68000
                                                  Version Number:0x1
                                                  Type:EXEC (Executable file)
                                                  OS/ABI:UNIX - System V
                                                  ABI Version:0
                                                  Entry Point Address:0x80000144
                                                  Flags:0x0
                                                  ELF Header Size:52
                                                  Program Header Offset:52
                                                  Program Header Size:32
                                                  Number of Program Headers:3
                                                  Section Header Offset:47884
                                                  Section Header Size:40
                                                  Number of Section Headers:11
                                                  Header String Table Index:10
                                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                  NULL0x00x00x00x00x0000
                                                  .initPROGBITS0x800000940x940x140x00x6AX002
                                                  .textPROGBITS0x800000a80xa80xb20e0x00x6AX004
                                                  .finiPROGBITS0x8000b2b60xb2b60xe0x00x6AX002
                                                  .rodataPROGBITS0x8000b2c40xb2c40x6820x00x2A002
                                                  .ctorsPROGBITS0x8000d94c0xb94c0x80x00x3WA004
                                                  .dtorsPROGBITS0x8000d9540xb9540x80x00x3WA004
                                                  .jcrPROGBITS0x8000d95c0xb95c0x40x00x3WA004
                                                  .dataPROGBITS0x8000d9600xb9600x1680x00x3WA004
                                                  .bssNOBITS0x8000dac80xbac80x1740x00x3WA004
                                                  .shstrtabSTRTAB0x00xbac80x430x00x0001
                                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                  LOAD0x00x800000000x800000000xb9460xb9466.23810x5R E0x2000.init .text .fini .rodata
                                                  LOAD0xb94c0x8000d94c0x8000d94c0x17c0x2f00.87310x6RW 0x2000.ctors .dtors .jcr .data .bss
                                                  GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 24, 2024 03:44:33.090718031 CET43928443192.168.2.2391.189.91.42
                                                  Dec 24, 2024 03:44:34.694009066 CET4298238241192.168.2.23209.38.192.73
                                                  Dec 24, 2024 03:44:34.814555883 CET3824142982209.38.192.73192.168.2.23
                                                  Dec 24, 2024 03:44:34.814724922 CET4298238241192.168.2.23209.38.192.73
                                                  Dec 24, 2024 03:44:34.816257000 CET4298238241192.168.2.23209.38.192.73
                                                  Dec 24, 2024 03:44:34.936322927 CET3824142982209.38.192.73192.168.2.23
                                                  Dec 24, 2024 03:44:34.936589003 CET4298238241192.168.2.23209.38.192.73
                                                  Dec 24, 2024 03:44:35.057177067 CET3824142982209.38.192.73192.168.2.23
                                                  Dec 24, 2024 03:44:44.825464010 CET4298238241192.168.2.23209.38.192.73
                                                  Dec 24, 2024 03:44:44.945405960 CET3824142982209.38.192.73192.168.2.23
                                                  Dec 24, 2024 03:44:44.968477964 CET4433925634.249.145.219192.168.2.23
                                                  Dec 24, 2024 03:44:44.968732119 CET39256443192.168.2.2334.249.145.219
                                                  Dec 24, 2024 03:44:45.088311911 CET4433925634.249.145.219192.168.2.23
                                                  Dec 24, 2024 03:44:45.247481108 CET3824142982209.38.192.73192.168.2.23
                                                  Dec 24, 2024 03:44:45.247822046 CET4298238241192.168.2.23209.38.192.73
                                                  Dec 24, 2024 03:44:45.367425919 CET3824142982209.38.192.73192.168.2.23
                                                  Dec 24, 2024 03:44:46.499919891 CET4298438241192.168.2.23209.38.192.73
                                                  Dec 24, 2024 03:44:46.619683981 CET3824142984209.38.192.73192.168.2.23
                                                  Dec 24, 2024 03:44:46.619782925 CET4298438241192.168.2.23209.38.192.73
                                                  Dec 24, 2024 03:44:46.621258020 CET4298438241192.168.2.23209.38.192.73
                                                  Dec 24, 2024 03:44:46.740869999 CET3824142984209.38.192.73192.168.2.23
                                                  Dec 24, 2024 03:44:46.741090059 CET4298438241192.168.2.23209.38.192.73
                                                  Dec 24, 2024 03:44:46.860704899 CET3824142984209.38.192.73192.168.2.23
                                                  Dec 24, 2024 03:44:48.448538065 CET4251680192.168.2.23109.202.202.202
                                                  Dec 24, 2024 03:44:54.591675997 CET43928443192.168.2.2391.189.91.42
                                                  Dec 24, 2024 03:45:35.545866966 CET43928443192.168.2.2391.189.91.42
                                                  Dec 24, 2024 03:45:46.662308931 CET4298438241192.168.2.23209.38.192.73
                                                  Dec 24, 2024 03:45:46.785731077 CET3824142984209.38.192.73192.168.2.23
                                                  Dec 24, 2024 03:45:47.084973097 CET3824142984209.38.192.73192.168.2.23
                                                  Dec 24, 2024 03:45:47.085249901 CET4298438241192.168.2.23209.38.192.73
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 24, 2024 03:44:33.212239027 CET5251353192.168.2.2381.169.136.222
                                                  Dec 24, 2024 03:44:33.450522900 CET535251381.169.136.222192.168.2.23
                                                  Dec 24, 2024 03:44:34.454500914 CET5415453192.168.2.2351.158.108.203
                                                  Dec 24, 2024 03:44:34.692742109 CET535415451.158.108.203192.168.2.23
                                                  Dec 24, 2024 03:44:46.250082016 CET5197253192.168.2.23152.53.15.127
                                                  Dec 24, 2024 03:44:46.498955965 CET5351972152.53.15.127192.168.2.23
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Dec 24, 2024 03:44:33.212239027 CET192.168.2.2381.169.136.2220x4f21Standard query (0)serisbot.geekA (IP address)IN (0x0001)false
                                                  Dec 24, 2024 03:44:34.454500914 CET192.168.2.2351.158.108.2030x93aStandard query (0)serisontop.dynA (IP address)IN (0x0001)false
                                                  Dec 24, 2024 03:44:46.250082016 CET192.168.2.23152.53.15.1270xdd69Standard query (0)serisontop.dynA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Dec 24, 2024 03:44:33.450522900 CET81.169.136.222192.168.2.230x4f21Refused (5)serisbot.geeknonenoneA (IP address)IN (0x0001)false
                                                  Dec 24, 2024 03:44:34.692742109 CET51.158.108.203192.168.2.230x93aNo error (0)serisontop.dyn209.38.192.73A (IP address)IN (0x0001)false
                                                  Dec 24, 2024 03:44:46.498955965 CET152.53.15.127192.168.2.230xdd69No error (0)serisontop.dyn154.216.16.244A (IP address)IN (0x0001)false
                                                  Dec 24, 2024 03:44:46.498955965 CET152.53.15.127192.168.2.230xdd69No error (0)serisontop.dyn154.216.16.250A (IP address)IN (0x0001)false
                                                  Dec 24, 2024 03:44:46.498955965 CET152.53.15.127192.168.2.230xdd69No error (0)serisontop.dyn209.38.192.73A (IP address)IN (0x0001)false

                                                  System Behavior

                                                  Start time (UTC):02:44:32
                                                  Start date (UTC):24/12/2024
                                                  Path:/tmp/zerm68k.elf
                                                  Arguments:/tmp/zerm68k.elf
                                                  File size:4463432 bytes
                                                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                  Start time (UTC):02:44:32
                                                  Start date (UTC):24/12/2024
                                                  Path:/tmp/zerm68k.elf
                                                  Arguments:-
                                                  File size:4463432 bytes
                                                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                  Start time (UTC):02:44:32
                                                  Start date (UTC):24/12/2024
                                                  Path:/tmp/zerm68k.elf
                                                  Arguments:-
                                                  File size:4463432 bytes
                                                  MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                  Start time (UTC):02:44:44
                                                  Start date (UTC):24/12/2024
                                                  Path:/usr/bin/dash
                                                  Arguments:-
                                                  File size:129816 bytes
                                                  MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                  Start time (UTC):02:44:44
                                                  Start date (UTC):24/12/2024
                                                  Path:/usr/bin/rm
                                                  Arguments:rm -f /tmp/tmp.86Fxgk4gwr /tmp/tmp.dyL73VOhcG /tmp/tmp.zu2UenayB4
                                                  File size:72056 bytes
                                                  MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                  Start time (UTC):02:44:44
                                                  Start date (UTC):24/12/2024
                                                  Path:/usr/bin/dash
                                                  Arguments:-
                                                  File size:129816 bytes
                                                  MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                  Start time (UTC):02:44:44
                                                  Start date (UTC):24/12/2024
                                                  Path:/usr/bin/rm
                                                  Arguments:rm -f /tmp/tmp.86Fxgk4gwr /tmp/tmp.dyL73VOhcG /tmp/tmp.zu2UenayB4
                                                  File size:72056 bytes
                                                  MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b