Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
m68k.elf

Overview

General Information

Sample name:m68k.elf
Analysis ID:1582211
MD5:dbc04445a813c5905e6b71fb70c44d53
SHA1:352277d81284d4b7e069b435050dc6ec7955e2d6
SHA256:a0345eb45390f9d2c4f49243fbea330364752a34580b01f07217513c693fc8bc
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:84
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Moobot
Sample deletes itself
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1582211
Start date and time:2024-12-30 04:09:57 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 28s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:m68k.elf
Detection:MAL
Classification:mal84.troj.evad.linELF@0/0@15/0
Command:/tmp/m68k.elf
PID:6207
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • m68k.elf (PID: 6207, Parent: 6126, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/m68k.elf
    • m68k.elf New Fork (PID: 6209, Parent: 6207)
      • m68k.elf New Fork (PID: 6211, Parent: 6209)
      • m68k.elf New Fork (PID: 6212, Parent: 6209)
        • m68k.elf New Fork (PID: 6215, Parent: 6212)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
m68k.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    m68k.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      m68k.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xe58c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe5a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe5b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe5c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe5dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe5f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe604:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe618:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe62c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe640:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe654:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe668:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe67c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe690:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe6a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe6b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe6cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe6e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe6f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe708:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xe71c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      6207.1.00007f47c0001000.00007f47c0011000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        6207.1.00007f47c0001000.00007f47c0011000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          6207.1.00007f47c0001000.00007f47c0011000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xe58c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe5a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe5b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe5c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe5dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe5f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe604:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe618:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe62c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe640:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe654:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe668:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe67c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe690:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe6a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe6b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe6cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe6e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe6f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe708:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xe71c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Process Memory Space: m68k.elf PID: 6207JoeSecurity_MoobotYara detected MoobotJoe Security
            Process Memory Space: m68k.elf PID: 6207JoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Click to see the 1 entries
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: m68k.elfAvira: detected
              Source: m68k.elfVirustotal: Detection: 55%Perma Link
              Source: m68k.elfReversingLabs: Detection: 60%
              Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
              Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
              Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
              Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
              Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
              Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
              Source: global trafficDNS traffic detected: DNS query: wcjwcj.cn
              Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

              System Summary

              barindex
              Source: m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 6207.1.00007f47c0001000.00007f47c0011000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: m68k.elf PID: 6207, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 6207.1.00007f47c0001000.00007f47c0011000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: m68k.elf PID: 6207, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal84.troj.evad.linELF@0/0@15/0
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6230/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6232/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6231/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6234/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6233/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6236/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6235/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1582/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/3088/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/230/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/231/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/232/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1579/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/233/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1699/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/234/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1335/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1698/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1334/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1576/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/2302/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/236/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/237/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/910/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/912/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6229/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6228/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/2307/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/918/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6241/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6240/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6243/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6242/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6244/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1594/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1349/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1344/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1465/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1586/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/248/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/249/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1463/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6238/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/801/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6237/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/6239/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1900/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/491/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/252/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/253/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/254/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/255/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/256/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 6211)File opened: /proc/1599/cmdlineJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: /tmp/m68k.elf (PID: 6207)File: /tmp/m68k.elfJump to behavior
              Source: /tmp/m68k.elf (PID: 6207)Queries kernel information via 'uname': Jump to behavior
              Source: m68k.elf, 6207.1.000055c965078000.000055c9650fd000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/m68k
              Source: m68k.elf, 6207.1.00007ffdddc9b000.00007ffdddcbc000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
              Source: m68k.elf, 6207.1.000055c965078000.000055c9650fd000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
              Source: m68k.elf, 6207.1.00007ffdddc9b000.00007ffdddcbc000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-m68k/tmp/m68k.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/m68k.elf

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: m68k.elf, type: SAMPLE
              Source: Yara matchFile source: 6207.1.00007f47c0001000.00007f47c0011000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 6207, type: MEMORYSTR
              Source: Yara matchFile source: m68k.elf, type: SAMPLE
              Source: Yara matchFile source: 6207.1.00007f47c0001000.00007f47c0011000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 6207, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: m68k.elf, type: SAMPLE
              Source: Yara matchFile source: 6207.1.00007f47c0001000.00007f47c0011000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 6207, type: MEMORYSTR
              Source: Yara matchFile source: m68k.elf, type: SAMPLE
              Source: Yara matchFile source: 6207.1.00007f47c0001000.00007f47c0011000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 6207, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
              File Deletion
              1
              OS Credential Dumping
              11
              Security Software Discovery
              Remote ServicesData from Local System1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1582211 Sample: m68k.elf Startdate: 30/12/2024 Architecture: LINUX Score: 84 20 109.202.202.202, 80 INIT7CH Switzerland 2->20 22 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->22 24 2 other IPs or domains 2->24 26 Malicious sample detected (through community Yara rule) 2->26 28 Antivirus / Scanner detection for submitted sample 2->28 30 Multi AV Scanner detection for submitted file 2->30 32 2 other signatures 2->32 9 m68k.elf 2->9         started        signatures3 process4 signatures5 34 Sample deletes itself 9->34 12 m68k.elf 9->12         started        process6 process7 14 m68k.elf 12->14         started        16 m68k.elf 12->16         started        process8 18 m68k.elf 14->18         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              m68k.elf56%VirustotalBrowse
              m68k.elf61%ReversingLabsLinux.Trojan.Mirai
              m68k.elf100%AviraEXP/ELF.Mirai.Z.A
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              wcjwcj.cn
              69.165.74.109
              truefalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                109.202.202.202
                unknownSwitzerland
                13030INIT7CHfalse
                91.189.91.43
                unknownUnited Kingdom
                41231CANONICAL-ASGBfalse
                91.189.91.42
                unknownUnited Kingdom
                41231CANONICAL-ASGBfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                91.189.91.43arm6.elfGet hashmaliciousMirai, MoobotBrowse
                  .Sspc.elfGet hashmaliciousUnknownBrowse
                    zmap.arm5.elfGet hashmaliciousOkiruBrowse
                      .Sppc.elfGet hashmaliciousUnknownBrowse
                        main_arm6.elfGet hashmaliciousMiraiBrowse
                          rebirth.sh4.elfGet hashmaliciousGafgytBrowse
                            .Sarm5.elfGet hashmaliciousUnknownBrowse
                              arm5.elfGet hashmaliciousUnknownBrowse
                                zmap.arm6.elfGet hashmaliciousMirai, OkiruBrowse
                                  .Smpsl.elfGet hashmaliciousUnknownBrowse
                                    91.189.91.42arm6.elfGet hashmaliciousMirai, MoobotBrowse
                                      .Sspc.elfGet hashmaliciousUnknownBrowse
                                        zmap.arm5.elfGet hashmaliciousOkiruBrowse
                                          spc.elfGet hashmaliciousMirai, MoobotBrowse
                                            .Sppc.elfGet hashmaliciousUnknownBrowse
                                              main_arm6.elfGet hashmaliciousMiraiBrowse
                                                dlr.arm.elfGet hashmaliciousUnknownBrowse
                                                  rebirth.sh4.elfGet hashmaliciousGafgytBrowse
                                                    .Sarm5.elfGet hashmaliciousUnknownBrowse
                                                      arm5.elfGet hashmaliciousUnknownBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        wcjwcj.cnx86_64.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 69.165.74.109
                                                        spc.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 69.165.74.109
                                                        sh4.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 69.165.74.109
                                                        ppc.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 69.165.74.109
                                                        x86.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 69.165.74.109
                                                        debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 69.165.74.109
                                                        arm.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 69.165.74.109
                                                        arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 69.165.74.109
                                                        mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 69.165.74.109
                                                        JgR39HaU3e.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 154.9.29.154
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        CANONICAL-ASGBwkb86.elfGet hashmaliciousMiraiBrowse
                                                        • 185.125.190.26
                                                        arm6.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 91.189.91.42
                                                        .Sspc.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        zmap.arm5.elfGet hashmaliciousOkiruBrowse
                                                        • 91.189.91.42
                                                        spc.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 91.189.91.42
                                                        .Sppc.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        main_arm6.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        dlr.arm.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        rebirth.sh4.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        dlr.mpsl.elfGet hashmaliciousUnknownBrowse
                                                        • 185.125.190.26
                                                        CANONICAL-ASGBwkb86.elfGet hashmaliciousMiraiBrowse
                                                        • 185.125.190.26
                                                        arm6.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 91.189.91.42
                                                        .Sspc.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        zmap.arm5.elfGet hashmaliciousOkiruBrowse
                                                        • 91.189.91.42
                                                        spc.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 91.189.91.42
                                                        .Sppc.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        main_arm6.elfGet hashmaliciousMiraiBrowse
                                                        • 91.189.91.42
                                                        dlr.arm.elfGet hashmaliciousUnknownBrowse
                                                        • 91.189.91.42
                                                        rebirth.sh4.elfGet hashmaliciousGafgytBrowse
                                                        • 91.189.91.42
                                                        dlr.mpsl.elfGet hashmaliciousUnknownBrowse
                                                        • 185.125.190.26
                                                        INIT7CHarm6.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 109.202.202.202
                                                        .Sspc.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        zmap.arm5.elfGet hashmaliciousOkiruBrowse
                                                        • 109.202.202.202
                                                        spc.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 109.202.202.202
                                                        .Sppc.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        main_arm6.elfGet hashmaliciousMiraiBrowse
                                                        • 109.202.202.202
                                                        dlr.arm.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        rebirth.sh4.elfGet hashmaliciousGafgytBrowse
                                                        • 109.202.202.202
                                                        .Sarm5.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        arm5.elfGet hashmaliciousUnknownBrowse
                                                        • 109.202.202.202
                                                        No context
                                                        No context
                                                        No created / dropped files found
                                                        File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                                                        Entropy (8bit):6.226279467292566
                                                        TrID:
                                                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                        File name:m68k.elf
                                                        File size:66'428 bytes
                                                        MD5:dbc04445a813c5905e6b71fb70c44d53
                                                        SHA1:352277d81284d4b7e069b435050dc6ec7955e2d6
                                                        SHA256:a0345eb45390f9d2c4f49243fbea330364752a34580b01f07217513c693fc8bc
                                                        SHA512:48b88ccf784f6eed39d173681390f443848c360f58b12b1ef90248464ac677a268a931eaa4bae5e37c665135ce5daa6e0782eb4424d7c4fc232ad0688a359004
                                                        SSDEEP:1536:ysg2RnTbbMg1o8/gv8+iwhQ7DfLopM2kD8Y/oC:ys7RXAg1tgiGQfYm8Y/oC
                                                        TLSH:CB532B9AF802CD7DF84BD77B44570909BA31B3D112835B3627ABF9A37C721991D22E81
                                                        File Content Preview:.ELF.......................D...4.........4. ...(.......................B...B...... ........H...H...H...d..%$...... .dt.Q............................NV..a....da.....N^NuNV..J9..!.f>"y...` QJ.g.X.#....`N."y...` QJ.f.A.....J.g.Hy...DN.X.......!.N^NuNV..N^NuN

                                                        ELF header

                                                        Class:ELF32
                                                        Data:2's complement, big endian
                                                        Version:1 (current)
                                                        Machine:MC68000
                                                        Version Number:0x1
                                                        Type:EXEC (Executable file)
                                                        OS/ABI:UNIX - System V
                                                        ABI Version:0
                                                        Entry Point Address:0x80000144
                                                        Flags:0x0
                                                        ELF Header Size:52
                                                        Program Header Offset:52
                                                        Program Header Size:32
                                                        Number of Program Headers:3
                                                        Section Header Offset:66028
                                                        Section Header Size:40
                                                        Number of Section Headers:10
                                                        Header String Table Index:9
                                                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                        NULL0x00x00x00x00x0000
                                                        .initPROGBITS0x800000940x940x140x00x6AX002
                                                        .textPROGBITS0x800000a80xa80xe3f60x00x6AX004
                                                        .finiPROGBITS0x8000e49e0xe49e0xe0x00x6AX002
                                                        .rodataPROGBITS0x8000e4ac0xe4ac0x19960x00x2A002
                                                        .ctorsPROGBITS0x80011e480xfe480x80x00x3WA004
                                                        .dtorsPROGBITS0x80011e500xfe500x80x00x3WA004
                                                        .dataPROGBITS0x80011e5c0xfe5c0x3500x00x3WA004
                                                        .bssNOBITS0x800121ac0x101ac0x21c00x00x3WA004
                                                        .shstrtabSTRTAB0x00x101ac0x3e0x00x0001
                                                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                        LOAD0x00x800000000x800000000xfe420xfe426.26440x5R E0x2000.init .text .fini .rodata
                                                        LOAD0xfe480x80011e480x80011e480x3640x25242.82820x6RW 0x2000.ctors .dtors .data .bss
                                                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Dec 30, 2024 04:10:35.623157024 CET43928443192.168.2.2391.189.91.42
                                                        Dec 30, 2024 04:10:41.254367113 CET42836443192.168.2.2391.189.91.43
                                                        Dec 30, 2024 04:10:42.790143013 CET4251680192.168.2.23109.202.202.202
                                                        Dec 30, 2024 04:10:56.100184917 CET43928443192.168.2.2391.189.91.42
                                                        Dec 30, 2024 04:11:08.386667967 CET42836443192.168.2.2391.189.91.43
                                                        Dec 30, 2024 04:11:12.482067108 CET4251680192.168.2.23109.202.202.202
                                                        Dec 30, 2024 04:11:37.054683924 CET43928443192.168.2.2391.189.91.42
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Dec 30, 2024 04:10:35.049489975 CET3542553192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:10:35.056582928 CET53354258.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:10:45.074666023 CET4303253192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:10:45.081209898 CET53430328.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:10:57.088099003 CET5914053192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:10:57.095402002 CET53591408.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:11:11.101723909 CET3587053192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:11:11.108997107 CET53358708.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:11:19.113471985 CET5700953192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:11:19.120100975 CET53570098.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:11:25.123243093 CET3464153192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:11:25.130789042 CET53346418.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:11:30.139956951 CET5082453192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:11:30.147263050 CET53508248.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:11:37.151232958 CET5162053192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:11:37.157951117 CET53516208.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:11:46.164489031 CET4672253192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:11:46.171858072 CET53467228.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:11:57.180187941 CET5172553192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:11:57.186837912 CET53517258.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:12:03.191854000 CET5293053192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:12:03.199385881 CET53529308.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:12:13.202169895 CET3591953192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:12:13.209171057 CET53359198.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:12:17.215595961 CET3475853192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:12:17.494249105 CET53347588.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:12:25.503180027 CET5036853192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:12:25.509937048 CET53503688.8.8.8192.168.2.23
                                                        Dec 30, 2024 04:12:34.516799927 CET4254853192.168.2.238.8.8.8
                                                        Dec 30, 2024 04:12:34.523880005 CET53425488.8.8.8192.168.2.23
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Dec 30, 2024 04:10:35.049489975 CET192.168.2.238.8.8.80xe9b0Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:10:45.074666023 CET192.168.2.238.8.8.80x38c5Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:10:57.088099003 CET192.168.2.238.8.8.80x4180Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:11.101723909 CET192.168.2.238.8.8.80x9c07Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:19.113471985 CET192.168.2.238.8.8.80x7585Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:25.123243093 CET192.168.2.238.8.8.80xd84cStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:30.139956951 CET192.168.2.238.8.8.80xdee4Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:37.151232958 CET192.168.2.238.8.8.80x97d8Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:46.164489031 CET192.168.2.238.8.8.80x6da3Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:57.180187941 CET192.168.2.238.8.8.80x21afStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:12:03.191854000 CET192.168.2.238.8.8.80xeeebStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:12:13.202169895 CET192.168.2.238.8.8.80x12d0Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:12:17.215595961 CET192.168.2.238.8.8.80x2e3eStandard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:12:25.503180027 CET192.168.2.238.8.8.80xc503Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:12:34.516799927 CET192.168.2.238.8.8.80x9aa9Standard query (0)wcjwcj.cnA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Dec 30, 2024 04:10:35.056582928 CET8.8.8.8192.168.2.230xe9b0No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:10:45.081209898 CET8.8.8.8192.168.2.230x38c5No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:10:57.095402002 CET8.8.8.8192.168.2.230x4180No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:11.108997107 CET8.8.8.8192.168.2.230x9c07No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:19.120100975 CET8.8.8.8192.168.2.230x7585No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:25.130789042 CET8.8.8.8192.168.2.230xd84cNo error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:30.147263050 CET8.8.8.8192.168.2.230xdee4No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:37.157951117 CET8.8.8.8192.168.2.230x97d8No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:46.171858072 CET8.8.8.8192.168.2.230x6da3No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:11:57.186837912 CET8.8.8.8192.168.2.230x21afNo error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:12:03.199385881 CET8.8.8.8192.168.2.230xeeebNo error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:12:13.209171057 CET8.8.8.8192.168.2.230x12d0No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:12:17.494249105 CET8.8.8.8192.168.2.230x2e3eNo error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:12:25.509937048 CET8.8.8.8192.168.2.230xc503No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false
                                                        Dec 30, 2024 04:12:34.523880005 CET8.8.8.8192.168.2.230x9aa9No error (0)wcjwcj.cn69.165.74.109A (IP address)IN (0x0001)false

                                                        System Behavior

                                                        Start time (UTC):03:10:33
                                                        Start date (UTC):30/12/2024
                                                        Path:/tmp/m68k.elf
                                                        Arguments:/tmp/m68k.elf
                                                        File size:4463432 bytes
                                                        MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                        Start time (UTC):03:10:34
                                                        Start date (UTC):30/12/2024
                                                        Path:/tmp/m68k.elf
                                                        Arguments:-
                                                        File size:4463432 bytes
                                                        MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                        Start time (UTC):03:10:34
                                                        Start date (UTC):30/12/2024
                                                        Path:/tmp/m68k.elf
                                                        Arguments:-
                                                        File size:4463432 bytes
                                                        MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                        Start time (UTC):03:10:34
                                                        Start date (UTC):30/12/2024
                                                        Path:/tmp/m68k.elf
                                                        Arguments:-
                                                        File size:4463432 bytes
                                                        MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                        Start time (UTC):03:10:34
                                                        Start date (UTC):30/12/2024
                                                        Path:/tmp/m68k.elf
                                                        Arguments:-
                                                        File size:4463432 bytes
                                                        MD5 hash:cd177594338c77b895ae27c33f8f86cc