Edit tour
Linux
Analysis Report
zmap.arm.elf
Overview
General Information
Sample name: | zmap.arm.elf |
Analysis ID: | 1580386 |
MD5: | 4cc9fdecf09fabbff42f5ab3ca16fa15 |
SHA1: | aee6caa3525ca6c067f7e0d844336a04b6085671 |
SHA256: | a158a046f746ebc155d7a71cc35ae489742e10e674201e2225e7ab8097976a07 |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Mirai, Okiru
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Okiru
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1580386 |
Start date and time: | 2024-12-24 12:52:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 33s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | zmap.arm.elf |
Detection: | MAL |
Classification: | mal84.troj.evad.linELF@0/0@8/0 |
- VT rate limit hit for: zmap.arm.elf
Command: | /tmp/zmap.arm.elf |
PID: | 6237 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | VagneRHere |
Standard Error: |
- system is lnxubuntu20
- zmap.arm.elf New Fork (PID: 6239, Parent: 6237)
- zmap.arm.elf New Fork (PID: 6241, Parent: 6239)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Linux_Trojan_Gafgyt_28a2fe0c | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Linux_Trojan_Gafgyt_28a2fe0c | unknown | unknown |
| |
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Click to see the 6 entries |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | TCP traffic: |
Source: | Socket: | Jump to behavior |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | .symtab present: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 1 File Deletion | OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 2 Application Layer Protocol | Traffic Duplication | Data Destruction |
⊘No configs have been found
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
66% | ReversingLabs | Linux.Trojan.Mirai | ||
100% | Avira | EXP/ELF.Mirai.Z.A |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
srvy.vlrt-gap.com | 185.196.8.105 | true | false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.196.8.105 | srvy.vlrt-gap.com | Switzerland | 34888 | SIMPLECARRER2IT | false | |
109.202.202.202 | unknown | Switzerland | 13030 | INIT7CH | false | |
91.189.91.43 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false | |
91.189.91.42 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
109.202.202.202 | Get hash | malicious | Unknown | Browse |
| |
91.189.91.43 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Okiru | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
91.189.91.42 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Okiru | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CANONICAL-ASGB | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Okiru | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
CANONICAL-ASGB | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Okiru | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
SIMPLECARRER2IT | Get hash | malicious | LiteHTTP Bot | Browse |
| |
Get hash | malicious | LummaC, Amadey, Credential Flusher, LiteHTTP Bot, LummaC Stealer, Stealc, Xmrig | Browse |
| ||
Get hash | malicious | ScreenConnect Tool, Amadey, RHADAMANTHYS, XWorm, Xmrig | Browse |
| ||
Get hash | malicious | AsyncRAT, VenomRAT | Browse |
| ||
Get hash | malicious | AsyncRAT, VenomRAT | Browse |
| ||
Get hash | malicious | AsyncRAT, VenomRAT | Browse |
| ||
Get hash | malicious | AsyncRAT, VenomRAT | Browse |
| ||
Get hash | malicious | RHADAMANTHYS | Browse |
| ||
Get hash | malicious | PureLog Stealer, XWorm | Browse |
| ||
Get hash | malicious | Socks5Systemz | Browse |
| ||
INIT7CH | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Okiru | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
⊘No context
⊘No context
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 6.1950751164662705 |
TrID: |
|
File name: | zmap.arm.elf |
File size: | 75'852 bytes |
MD5: | 4cc9fdecf09fabbff42f5ab3ca16fa15 |
SHA1: | aee6caa3525ca6c067f7e0d844336a04b6085671 |
SHA256: | a158a046f746ebc155d7a71cc35ae489742e10e674201e2225e7ab8097976a07 |
SHA512: | 44a4e3c84a783a75bcd0be525ac8657b670edc16bd56f42090679d8e31331627d334e53f677792df4fe1b0e22564c2999b67bca6cbc8677a443675bbd5b9c1ad |
SSDEEP: | 1536:Mx1O+MsI8J9CGgavmuTLK6wqwqgL6ojvzx:MxC4muC6wAKpzx |
TLSH: | C7733A45BC815A13C6E1127BFAAE018D372523E8E3DF7217DE216F21379682F0D67A81 |
File Content Preview: | .ELF...a..........(.........4....&......4. ...(......................"..."..............."..."...".......'..........Q.td..................................-...L."...V@..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 75452 |
Section Header Size: | 40 |
Number of Section Headers: | 10 |
Header String Table Index: | 9 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x8094 | 0x94 | 0x18 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.text | PROGBITS | 0x80b0 | 0xb0 | 0x10190 | 0x0 | 0x6 | AX | 0 | 0 | 16 |
.fini | PROGBITS | 0x18240 | 0x10240 | 0x14 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.rodata | PROGBITS | 0x18254 | 0x10254 | 0x2080 | 0x0 | 0x2 | A | 0 | 0 | 4 |
.ctors | PROGBITS | 0x222d8 | 0x122d8 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.dtors | PROGBITS | 0x222e0 | 0x122e0 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x222ec | 0x122ec | 0x390 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.bss | NOBITS | 0x2267c | 0x1267c | 0x2430 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.shstrtab | STRTAB | 0x0 | 0x1267c | 0x3e | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x8000 | 0x8000 | 0x122d4 | 0x122d4 | 6.2239 | 0x5 | R E | 0x8000 | .init .text .fini .rodata | |
LOAD | 0x122d8 | 0x222d8 | 0x222d8 | 0x3a4 | 0x27d4 | 3.0710 | 0x6 | RW | 0x8000 | .ctors .dtors .data .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x7 | RWE | 0x4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 12:52:49.711456060 CET | 39532 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:49.831051111 CET | 59962 | 39532 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:49.831135988 CET | 39532 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:49.832360029 CET | 39532 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:49.951801062 CET | 59962 | 39532 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:49.952024937 CET | 39532 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:50.071504116 CET | 59962 | 39532 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:51.128422976 CET | 59962 | 39532 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:51.128654003 CET | 39532 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:51.128868103 CET | 39532 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:51.227528095 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Dec 24, 2024 12:52:51.496664047 CET | 39534 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:51.616488934 CET | 59962 | 39534 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:51.616688967 CET | 39534 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:51.617618084 CET | 39534 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:51.737349987 CET | 59962 | 39534 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:51.737622023 CET | 39534 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:51.857141018 CET | 59962 | 39534 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:52.917296886 CET | 59962 | 39534 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:52.917428017 CET | 39534 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:52.917500973 CET | 39534 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:53.052912951 CET | 39536 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:53.172558069 CET | 59962 | 39536 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:53.172694921 CET | 39536 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:53.173628092 CET | 39536 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:53.293127060 CET | 59962 | 39536 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:53.293275118 CET | 39536 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:53.412781954 CET | 59962 | 39536 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:54.468719959 CET | 59962 | 39536 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:54.469002008 CET | 39536 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:54.469078064 CET | 39536 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:54.831635952 CET | 39538 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:54.952769041 CET | 59962 | 39538 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:54.952924967 CET | 39538 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:54.953753948 CET | 39538 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:55.075335979 CET | 59962 | 39538 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:55.075525045 CET | 39538 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:55.196486950 CET | 59962 | 39538 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:56.250911951 CET | 59962 | 39538 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:56.251113892 CET | 39538 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:56.251137972 CET | 39538 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:56.395905018 CET | 39540 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:56.515516043 CET | 59962 | 39540 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:56.515737057 CET | 39540 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:56.516720057 CET | 39540 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:56.602894068 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Dec 24, 2024 12:52:56.636190891 CET | 59962 | 39540 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:56.636353016 CET | 39540 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:56.755867004 CET | 59962 | 39540 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:57.812736988 CET | 59962 | 39540 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:57.812880039 CET | 39540 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:57.812928915 CET | 39540 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:57.882606030 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Dec 24, 2024 12:52:57.948700905 CET | 39542 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:58.068248987 CET | 59962 | 39542 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:58.068334103 CET | 39542 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:58.069051981 CET | 39542 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:58.188556910 CET | 59962 | 39542 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:58.188636065 CET | 39542 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:58.308186054 CET | 59962 | 39542 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:59.370629072 CET | 59962 | 39542 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:59.370757103 CET | 39542 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:59.370789051 CET | 39542 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:59.506664038 CET | 39544 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:59.626498938 CET | 59962 | 39544 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:59.626631021 CET | 39544 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:59.627779007 CET | 39544 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:59.747267962 CET | 59962 | 39544 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:52:59.747364044 CET | 39544 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:52:59.867398977 CET | 59962 | 39544 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:53:00.924201965 CET | 59962 | 39544 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:53:00.924428940 CET | 39544 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:53:00.924559116 CET | 39544 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:53:01.278172016 CET | 39546 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:53:01.399353027 CET | 59962 | 39546 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:53:01.399539948 CET | 39546 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:53:01.400439978 CET | 39546 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:53:01.520028114 CET | 59962 | 39546 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:53:01.520164967 CET | 39546 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:53:01.639924049 CET | 59962 | 39546 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:53:11.409352064 CET | 39546 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:53:11.528932095 CET | 59962 | 39546 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:53:11.829046011 CET | 59962 | 39546 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:53:11.829395056 CET | 39546 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:53:12.984658957 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Dec 24, 2024 12:53:23.223108053 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Dec 24, 2024 12:53:27.318531036 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Dec 24, 2024 12:53:53.938779116 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Dec 24, 2024 12:54:11.881762028 CET | 39546 | 59962 | 192.168.2.23 | 185.196.8.105 |
Dec 24, 2024 12:54:12.001708031 CET | 59962 | 39546 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:54:12.301697016 CET | 59962 | 39546 | 185.196.8.105 | 192.168.2.23 |
Dec 24, 2024 12:54:12.301939011 CET | 39546 | 59962 | 192.168.2.23 | 185.196.8.105 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 12:52:49.345284939 CET | 47210 | 53 | 192.168.2.23 | 8.8.8.8 |
Dec 24, 2024 12:52:49.709920883 CET | 53 | 47210 | 8.8.8.8 | 192.168.2.23 |
Dec 24, 2024 12:52:51.129894972 CET | 52249 | 53 | 192.168.2.23 | 8.8.8.8 |
Dec 24, 2024 12:52:51.495857000 CET | 53 | 52249 | 8.8.8.8 | 192.168.2.23 |
Dec 24, 2024 12:52:52.918365955 CET | 60775 | 53 | 192.168.2.23 | 8.8.8.8 |
Dec 24, 2024 12:52:53.052144051 CET | 53 | 60775 | 8.8.8.8 | 192.168.2.23 |
Dec 24, 2024 12:52:54.470011950 CET | 36377 | 53 | 192.168.2.23 | 8.8.8.8 |
Dec 24, 2024 12:52:54.830806017 CET | 53 | 36377 | 8.8.8.8 | 192.168.2.23 |
Dec 24, 2024 12:52:56.252119064 CET | 36476 | 53 | 192.168.2.23 | 8.8.8.8 |
Dec 24, 2024 12:52:56.395354986 CET | 53 | 36476 | 8.8.8.8 | 192.168.2.23 |
Dec 24, 2024 12:52:57.813862085 CET | 50781 | 53 | 192.168.2.23 | 8.8.8.8 |
Dec 24, 2024 12:52:57.948091984 CET | 53 | 50781 | 8.8.8.8 | 192.168.2.23 |
Dec 24, 2024 12:52:59.372212887 CET | 57459 | 53 | 192.168.2.23 | 8.8.8.8 |
Dec 24, 2024 12:52:59.506212950 CET | 53 | 57459 | 8.8.8.8 | 192.168.2.23 |
Dec 24, 2024 12:53:00.925827980 CET | 44249 | 53 | 192.168.2.23 | 8.8.8.8 |
Dec 24, 2024 12:53:01.276953936 CET | 53 | 44249 | 8.8.8.8 | 192.168.2.23 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 24, 2024 12:52:49.345284939 CET | 192.168.2.23 | 8.8.8.8 | 0x19f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 12:52:51.129894972 CET | 192.168.2.23 | 8.8.8.8 | 0x4944 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 12:52:52.918365955 CET | 192.168.2.23 | 8.8.8.8 | 0xc7c0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 12:52:54.470011950 CET | 192.168.2.23 | 8.8.8.8 | 0x6fea | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 12:52:56.252119064 CET | 192.168.2.23 | 8.8.8.8 | 0xfd8e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 12:52:57.813862085 CET | 192.168.2.23 | 8.8.8.8 | 0x23fe | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 12:52:59.372212887 CET | 192.168.2.23 | 8.8.8.8 | 0xa1f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 24, 2024 12:53:00.925827980 CET | 192.168.2.23 | 8.8.8.8 | 0x72c4 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 24, 2024 12:52:49.709920883 CET | 8.8.8.8 | 192.168.2.23 | 0x19f | No error (0) | 185.196.8.105 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 12:52:51.495857000 CET | 8.8.8.8 | 192.168.2.23 | 0x4944 | No error (0) | 185.196.8.105 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 12:52:53.052144051 CET | 8.8.8.8 | 192.168.2.23 | 0xc7c0 | No error (0) | 185.196.8.105 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 12:52:54.830806017 CET | 8.8.8.8 | 192.168.2.23 | 0x6fea | No error (0) | 185.196.8.105 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 12:52:56.395354986 CET | 8.8.8.8 | 192.168.2.23 | 0xfd8e | No error (0) | 185.196.8.105 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 12:52:57.948091984 CET | 8.8.8.8 | 192.168.2.23 | 0x23fe | No error (0) | 185.196.8.105 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 12:52:59.506212950 CET | 8.8.8.8 | 192.168.2.23 | 0xa1f | No error (0) | 185.196.8.105 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 12:53:01.276953936 CET | 8.8.8.8 | 192.168.2.23 | 0x72c4 | No error (0) | 185.196.8.105 | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 11:52:48 |
Start date (UTC): | 24/12/2024 |
Path: | /tmp/zmap.arm.elf |
Arguments: | /tmp/zmap.arm.elf |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 11:52:48 |
Start date (UTC): | 24/12/2024 |
Path: | /tmp/zmap.arm.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 11:52:48 |
Start date (UTC): | 24/12/2024 |
Path: | /tmp/zmap.arm.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |