Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
debug.dbg.elf

Overview

General Information

Sample name:debug.dbg.elf
Analysis ID:1582165
MD5:ea56e60f91f0fa3738d4df693bab342d
SHA1:564d18040a8e321671664ea982845ce408fd4d2f
SHA256:485ffe1c79706a0e5f2f36aa04e99ddcd60993d61d92e8f45c8d9890e2aa364a
Tags:elfMiraiuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:88
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Moobot
Machine Learning detection for sample
Sample deletes itself
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1582165
Start date and time:2024-12-30 03:18:33 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 11s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:debug.dbg.elf
Detection:MAL
Classification:mal88.troj.evad.linELF@0/0@13/0
  • VT rate limit hit for: wcjwcj.cn
Command:/tmp/debug.dbg.elf
PID:5427
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
debug.dbg.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    debug.dbg.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      debug.dbg.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xd98c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd9a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd9b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd9c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd9dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd9f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xda04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xda18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xda2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xda40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xda54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xda68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xda7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xda90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdaa4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdab8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdacc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdae0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdaf4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdb08:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xdb1c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      debug.dbg.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
      • 0x5ce0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
      debug.dbg.elfLinux_Trojan_Mirai_88de437funknownunknown
      • 0x8922:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
      Click to see the 3 entries
      SourceRuleDescriptionAuthorStrings
      5427.1.0000000008048000.0000000008058000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5427.1.0000000008048000.0000000008058000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5427.1.0000000008048000.0000000008058000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xd98c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd9a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd9b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd9c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd9dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd9f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xda04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xda18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xda2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xda40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xda54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xda68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xda7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xda90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdaa4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdab8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdacc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdae0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdaf4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdb08:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xdb1c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5427.1.0000000008048000.0000000008058000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
          • 0x5ce0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
          5427.1.0000000008048000.0000000008058000.r-x.sdmpLinux_Trojan_Mirai_88de437funknownunknown
          • 0x8922:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
          Click to see the 5 entries
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: debug.dbg.elfAvira: detected
          Source: debug.dbg.elfVirustotal: Detection: 51%Perma Link
          Source: debug.dbg.elfReversingLabs: Detection: 50%
          Source: debug.dbg.elfJoe Sandbox ML: detected
          Source: global trafficTCP traffic: 192.168.2.13:48202 -> 185.125.190.26:443
          Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
          Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
          Source: global trafficDNS traffic detected: DNS query: wcjwcj.cn
          Source: unknownNetwork traffic detected: HTTP traffic on port 48202 -> 443

          System Summary

          barindex
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
          Source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
          Source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
          Source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
          Source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
          Source: Process Memory Space: debug.dbg.elf PID: 5427, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: debug.dbg.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
          Source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
          Source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
          Source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
          Source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
          Source: Process Memory Space: debug.dbg.elf PID: 5427, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal88.troj.evad.linELF@0/0@13/0
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/230/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/110/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/231/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/111/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/232/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/112/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/233/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/113/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/234/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/114/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/235/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/115/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/236/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/116/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/237/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/117/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/238/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/118/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/239/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/119/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/3633/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/914/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/10/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/917/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/11/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/12/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/13/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/14/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/15/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/16/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/17/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/18/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/19/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/240/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/3095/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/120/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/241/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/5271/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/121/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/242/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/1/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/122/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/243/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/2/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/123/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/244/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/3/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/124/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/245/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/1588/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/125/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/4/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/246/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/126/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/5/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/247/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/127/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/6/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/248/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/128/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/7/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/249/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/129/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/8/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/800/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/9/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/1906/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/3763/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/802/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/803/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/20/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/21/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/22/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/23/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/24/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/25/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/26/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/27/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/28/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/29/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/3420/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/1482/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/490/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/1480/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/250/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/371/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/130/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/251/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/131/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/252/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/132/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/253/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/254/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/1238/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/134/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/255/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/256/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/257/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/378/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/3413/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/258/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/259/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/1475/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/936/cmdlineJump to behavior
          Source: /tmp/debug.dbg.elf (PID: 5429)File opened: /proc/30/cmdlineJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: /tmp/debug.dbg.elf (PID: 5427)File: /tmp/debug.dbg.elfJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: debug.dbg.elf, type: SAMPLE
          Source: Yara matchFile source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: debug.dbg.elf PID: 5427, type: MEMORYSTR
          Source: Yara matchFile source: debug.dbg.elf, type: SAMPLE
          Source: Yara matchFile source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: debug.dbg.elf, type: SAMPLE
          Source: Yara matchFile source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: debug.dbg.elf PID: 5427, type: MEMORYSTR
          Source: Yara matchFile source: debug.dbg.elf, type: SAMPLE
          Source: Yara matchFile source: 5427.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          File Deletion
          1
          OS Credential Dumping
          System Service DiscoveryRemote ServicesData from Local System1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1582165 Sample: debug.dbg.elf Startdate: 30/12/2024 Architecture: LINUX Score: 88 20 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->20 22 wcjwcj.cn 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 3 other signatures 2->30 9 debug.dbg.elf 2->9         started        signatures3 process4 signatures5 32 Sample deletes itself 9->32 12 debug.dbg.elf 9->12         started        process6 process7 14 debug.dbg.elf 12->14         started        16 debug.dbg.elf 12->16         started        process8 18 debug.dbg.elf 14->18         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          debug.dbg.elf52%VirustotalBrowse
          debug.dbg.elf50%ReversingLabsLinux.Trojan.Mirai
          debug.dbg.elf100%AviraEXP/ELF.Mirai.Z.A
          debug.dbg.elf100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          wcjwcj.cn
          69.165.74.109
          truefalse
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            185.125.190.26
            unknownUnited Kingdom
            41231CANONICAL-ASGBfalse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            185.125.190.26x86.elfGet hashmaliciousUnknownBrowse
              dlr.arm6.elfGet hashmaliciousUnknownBrowse
                Aqua.arm6.elfGet hashmaliciousUnknownBrowse
                  Aqua.arm4.elfGet hashmaliciousUnknownBrowse
                    Aqua.ppc.elfGet hashmaliciousUnknownBrowse
                      arm5.elfGet hashmaliciousUnknownBrowse
                        x86_64.elfGet hashmaliciousUnknownBrowse
                          bot.x86.elfGet hashmaliciousMirai, OkiruBrowse
                            armv6l.elfGet hashmaliciousMiraiBrowse
                              x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                wcjwcj.cnarm.elfGet hashmaliciousMirai, MoobotBrowse
                                • 69.165.74.109
                                arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                • 69.165.74.109
                                mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                • 69.165.74.109
                                JgR39HaU3e.elfGet hashmaliciousMirai, MoobotBrowse
                                • 154.9.29.154
                                n2pg2vVhEO.elfGet hashmaliciousMirai, MoobotBrowse
                                • 154.9.29.154
                                J6yrFHwNuC.elfGet hashmaliciousMirai, MoobotBrowse
                                • 154.9.29.154
                                sg123JWcuU.elfGet hashmaliciousMirai, MoobotBrowse
                                • 154.9.29.154
                                HePOITlRYk.elfGet hashmaliciousMirai, MoobotBrowse
                                • 154.9.29.154
                                4GI3jkntqw.elfGet hashmaliciousMirai, MoobotBrowse
                                • 154.9.29.154
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                CANONICAL-ASGB.Smpsl.elfGet hashmaliciousUnknownBrowse
                                • 91.189.91.42
                                arm.elfGet hashmaliciousMirai, MoobotBrowse
                                • 91.189.91.42
                                rebirth.ppc.elfGet hashmaliciousGafgytBrowse
                                • 91.189.91.42
                                dlr.arm7.elfGet hashmaliciousMiraiBrowse
                                • 91.189.91.42
                                .Sm68k.elfGet hashmaliciousUnknownBrowse
                                • 91.189.91.42
                                m68k.elfGet hashmaliciousUnknownBrowse
                                • 91.189.91.42
                                main_mpsl.elfGet hashmaliciousMiraiBrowse
                                • 91.189.91.42
                                .Sx86_64.elfGet hashmaliciousUnknownBrowse
                                • 91.189.91.42
                                x86.elfGet hashmaliciousUnknownBrowse
                                • 185.125.190.26
                                udpmpsl.elfGet hashmaliciousUnknownBrowse
                                • 91.189.91.42
                                No context
                                No context
                                No created / dropped files found
                                File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                Entropy (8bit):6.485656547332464
                                TrID:
                                • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                File name:debug.dbg.elf
                                File size:66'640 bytes
                                MD5:ea56e60f91f0fa3738d4df693bab342d
                                SHA1:564d18040a8e321671664ea982845ce408fd4d2f
                                SHA256:485ffe1c79706a0e5f2f36aa04e99ddcd60993d61d92e8f45c8d9890e2aa364a
                                SHA512:6d04d7d1c624cb67b73702f0d8c0664d535c020f6d766f8ff9a7713ba7e234a17814cc598c07e5885f22807c6fad850023f8c7ee3b157cce8322261e55335bf7
                                SSDEEP:1536:44W0SfWaI7sJ1MIJ64NdWxjTpXexMSfpoeUaT2BxyZU8WKvS9tYep:L5SOawsJ1rJZN8xjTpXXSfpzUcKIPWKI
                                TLSH:58533BC5E143D8F2E85B15706037F73B9E32E0AA1218FA87D778D671F8D2641A527A8C
                                File Content Preview:.ELF....................d...4...........4. ...(..........................................................'..........Q.td............................U..S.......w....h....c...[]...$.............U......=.....t..5....$......$.......u........t....h.z..........

                                ELF header

                                Class:ELF32
                                Data:2's complement, little endian
                                Version:1 (current)
                                Machine:Intel 80386
                                Version Number:0x1
                                Type:EXEC (Executable file)
                                OS/ABI:UNIX - System V
                                ABI Version:0
                                Entry Point Address:0x8048164
                                Flags:0x0
                                ELF Header Size:52
                                Program Header Offset:52
                                Program Header Size:32
                                Number of Program Headers:3
                                Section Header Offset:66240
                                Section Header Size:40
                                Number of Section Headers:10
                                Header String Table Index:9
                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                NULL0x00x00x00x00x0000
                                .initPROGBITS0x80480940x940x1c0x00x6AX001
                                .textPROGBITS0x80480b00xb00xd4860x00x6AX0016
                                .finiPROGBITS0x80555360xd5360x170x00x6AX001
                                .rodataPROGBITS0x80555600xd5600x24bc0x00x2A0032
                                .ctorsPROGBITS0x80580000x100000x80x00x3WA004
                                .dtorsPROGBITS0x80580080x100080x80x00x3WA004
                                .dataPROGBITS0x80580200x100200x2600x00x3WA0032
                                .bssNOBITS0x80582800x102800x25200x00x3WA0032
                                .shstrtabSTRTAB0x00x102800x3e0x00x0001
                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                LOAD0x00x80480000x80480000xfa1c0xfa1c6.60310x5R E0x1000.init .text .fini .rodata
                                LOAD0x100000x80580000x80580000x2800x27a03.42650x6RW 0x1000.ctors .dtors .data .bss
                                GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                TimestampSource PortDest PortSource IPDest IP
                                Dec 30, 2024 03:19:23.509958982 CET48202443192.168.2.13185.125.190.26
                                Dec 30, 2024 03:19:54.485826969 CET48202443192.168.2.13185.125.190.26
                                TimestampSource PortDest PortSource IPDest IP
                                Dec 30, 2024 03:19:11.190233946 CET4266353192.168.2.138.8.8.8
                                Dec 30, 2024 03:19:11.197132111 CET53426638.8.8.8192.168.2.13
                                Dec 30, 2024 03:19:19.499746084 CET5361653192.168.2.138.8.8.8
                                Dec 30, 2024 03:19:19.758959055 CET53536168.8.8.8192.168.2.13
                                Dec 30, 2024 03:19:53.144387007 CET4820653192.168.2.138.8.8.8
                                Dec 30, 2024 03:19:53.476099968 CET53482068.8.8.8192.168.2.13
                                Dec 30, 2024 03:19:55.621563911 CET5154753192.168.2.138.8.8.8
                                Dec 30, 2024 03:19:55.628438950 CET53515478.8.8.8192.168.2.13
                                Dec 30, 2024 03:20:02.738851070 CET4399553192.168.2.138.8.8.8
                                Dec 30, 2024 03:20:02.745800972 CET53439958.8.8.8192.168.2.13
                                Dec 30, 2024 03:20:09.853831053 CET5119253192.168.2.138.8.8.8
                                Dec 30, 2024 03:20:10.213247061 CET53511928.8.8.8192.168.2.13
                                Dec 30, 2024 03:20:20.316926003 CET3763153192.168.2.138.8.8.8
                                Dec 30, 2024 03:20:20.323605061 CET53376318.8.8.8192.168.2.13
                                Dec 30, 2024 03:20:24.415524006 CET5342053192.168.2.138.8.8.8
                                Dec 30, 2024 03:20:24.422709942 CET53534208.8.8.8192.168.2.13
                                Dec 30, 2024 03:20:31.526026011 CET3794753192.168.2.138.8.8.8
                                Dec 30, 2024 03:20:31.533041000 CET53379478.8.8.8192.168.2.13
                                Dec 30, 2024 03:20:49.695971966 CET3929453192.168.2.138.8.8.8
                                Dec 30, 2024 03:20:49.702948093 CET53392948.8.8.8192.168.2.13
                                Dec 30, 2024 03:20:50.781853914 CET3511753192.168.2.138.8.8.8
                                Dec 30, 2024 03:20:51.024075031 CET53351178.8.8.8192.168.2.13
                                Dec 30, 2024 03:21:08.028980970 CET5602053192.168.2.138.8.8.8
                                Dec 30, 2024 03:21:08.036103964 CET53560208.8.8.8192.168.2.13
                                Dec 30, 2024 03:21:13.037405968 CET3904953192.168.2.138.8.8.8
                                Dec 30, 2024 03:21:13.044895887 CET53390498.8.8.8192.168.2.13
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Dec 30, 2024 03:19:11.190233946 CET192.168.2.138.8.8.80x6b39Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                Dec 30, 2024 03:19:19.499746084 CET192.168.2.138.8.8.80xb806Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                Dec 30, 2024 03:19:53.144387007 CET192.168.2.138.8.8.80x2ac1Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                Dec 30, 2024 03:19:55.621563911 CET192.168.2.138.8.8.80xbac2Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:02.738851070 CET192.168.2.138.8.8.80x7846Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:09.853831053 CET192.168.2.138.8.8.80xc3a7Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:20.316926003 CET192.168.2.138.8.8.80x3f4eStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:24.415524006 CET192.168.2.138.8.8.80xf295Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:31.526026011 CET192.168.2.138.8.8.80x5c2dStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:49.695971966 CET192.168.2.138.8.8.80x2b28Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:50.781853914 CET192.168.2.138.8.8.80x7795Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                Dec 30, 2024 03:21:08.028980970 CET192.168.2.138.8.8.80x4691Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                Dec 30, 2024 03:21:13.037405968 CET192.168.2.138.8.8.80xc7cbStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Dec 30, 2024 03:19:11.197132111 CET8.8.8.8192.168.2.130x6b39No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                Dec 30, 2024 03:19:19.758959055 CET8.8.8.8192.168.2.130xb806No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                Dec 30, 2024 03:19:53.476099968 CET8.8.8.8192.168.2.130x2ac1No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                Dec 30, 2024 03:19:55.628438950 CET8.8.8.8192.168.2.130xbac2No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:02.745800972 CET8.8.8.8192.168.2.130x7846No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:10.213247061 CET8.8.8.8192.168.2.130xc3a7No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:20.323605061 CET8.8.8.8192.168.2.130x3f4eNo error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:24.422709942 CET8.8.8.8192.168.2.130xf295No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:31.533041000 CET8.8.8.8192.168.2.130x5c2dNo error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:49.702948093 CET8.8.8.8192.168.2.130x2b28No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                Dec 30, 2024 03:20:51.024075031 CET8.8.8.8192.168.2.130x7795No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                Dec 30, 2024 03:21:08.036103964 CET8.8.8.8192.168.2.130x4691No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                Dec 30, 2024 03:21:13.044895887 CET8.8.8.8192.168.2.130xc7cbNo error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false

                                System Behavior

                                Start time (UTC):02:19:10
                                Start date (UTC):30/12/2024
                                Path:/tmp/debug.dbg.elf
                                Arguments:/tmp/debug.dbg.elf
                                File size:66640 bytes
                                MD5 hash:ea56e60f91f0fa3738d4df693bab342d

                                Start time (UTC):02:19:10
                                Start date (UTC):30/12/2024
                                Path:/tmp/debug.dbg.elf
                                Arguments:-
                                File size:66640 bytes
                                MD5 hash:ea56e60f91f0fa3738d4df693bab342d

                                Start time (UTC):02:19:10
                                Start date (UTC):30/12/2024
                                Path:/tmp/debug.dbg.elf
                                Arguments:-
                                File size:66640 bytes
                                MD5 hash:ea56e60f91f0fa3738d4df693bab342d

                                Start time (UTC):02:19:10
                                Start date (UTC):30/12/2024
                                Path:/tmp/debug.dbg.elf
                                Arguments:-
                                File size:66640 bytes
                                MD5 hash:ea56e60f91f0fa3738d4df693bab342d

                                Start time (UTC):02:19:10
                                Start date (UTC):30/12/2024
                                Path:/tmp/debug.dbg.elf
                                Arguments:-
                                File size:66640 bytes
                                MD5 hash:ea56e60f91f0fa3738d4df693bab342d