Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
SPARC.elf

Overview

General Information

Sample name:SPARC.elf
Analysis ID:1583545
MD5:96c9c49ce0283154aaf3929426d19b4c
SHA1:44c83a667615f4ffeff4bd702ad129b74052606c
SHA256:2c992fcfbb66ed6d42e58584dc915343ec41fd758850254502f4c9aa0a205f53
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Opens /proc/net/* files useful for finding connected devices and routers
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1583545
Start date and time:2025-01-03 02:27:07 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:SPARC.elf
Detection:MAL
Classification:mal52.spre.linELF@0/1@0/0
Command:/tmp/SPARC.elf
PID:6239
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
Cia Qbot Has Infected This Device ;)
Standard Error:
  • system is lnxubuntu20
  • SPARC.elf (PID: 6239, Parent: 6164, MD5: 7dc1c0e23cd5e102bb12e5c29403410e) Arguments: /tmp/SPARC.elf
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SPARC.elfReversingLabs: Detection: 28%

Spreading

barindex
Source: /tmp/SPARC.elf (PID: 6239)Opens: /proc/net/routeJump to behavior
Source: global trafficTCP traffic: 192.168.2.23:45566 -> 216.9.227.143:9168
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.spre.linELF@0/1@0/0
Source: /tmp/SPARC.elf (PID: 6239)Queries kernel information via 'uname': Jump to behavior
Source: SPARC.elf, 6239.1.00007ffd89679000.00007ffd8969a000.rw-.sdmp, SPARC.elf, 6241.1.00007ffd89679000.00007ffd8969a000.rw-.sdmp, SPARC.elf, 6242.1.00007ffd89679000.00007ffd8969a000.rw-.sdmpBinary or memory string: Whx86_64/usr/bin/qemu-sparc/tmp/SPARC.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/SPARC.elf
Source: SPARC.elf, 6239.1.0000559f1fcf8000.0000559f1fd7f000.rw-.sdmp, SPARC.elf, 6241.1.0000559f1fcf8000.0000559f1fd7f000.rw-.sdmp, SPARC.elf, 6242.1.0000559f1fcf8000.0000559f1fd7f000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sparc
Source: SPARC.elf, 6239.1.0000559f1fcf8000.0000559f1fd7f000.rw-.sdmp, SPARC.elf, 6241.1.0000559f1fcf8000.0000559f1fd7f000.rw-.sdmp, SPARC.elf, 6242.1.0000559f1fcf8000.0000559f1fd7f000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/sparc
Source: SPARC.elf, 6239.1.00007ffd89679000.00007ffd8969a000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.kmDl4V\
Source: SPARC.elf, 6239.1.00007ffd89679000.00007ffd8969a000.rw-.sdmp, SPARC.elf, 6241.1.00007ffd89679000.00007ffd8969a000.rw-.sdmp, SPARC.elf, 6242.1.00007ffd89679000.00007ffd8969a000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc
Source: SPARC.elf, 6239.1.00007ffd89679000.00007ffd8969a000.rw-.sdmpBinary or memory string: /tmp/qemu-open.kmDl4V
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
Remote System Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583545 Sample: SPARC.elf Startdate: 03/01/2025 Architecture: LINUX Score: 52 17 109.202.202.202, 80 INIT7CH Switzerland 2->17 19 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->19 21 2 other IPs or domains 2->21 23 Multi AV Scanner detection for submitted file 2->23 8 SPARC.elf 2->8         started        signatures3 process4 signatures5 25 Opens /proc/net/* files useful for finding connected devices and routers 8->25 11 SPARC.elf 8->11         started        13 SPARC.elf 8->13         started        process6 process7 15 SPARC.elf 11->15         started       
SourceDetectionScannerLabelLink
SPARC.elf29%ReversingLabsLinux.Backdoor.Bashlite
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
109.202.202.202
unknownSwitzerland
13030INIT7CHfalse
216.9.227.143
unknownReserved
7018ATT-INTERNET4USfalse
91.189.91.43
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
91.189.91.42
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
  • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
216.9.227.143SH4.elfGet hashmaliciousMiraiBrowse
    POWERPC.elfGet hashmaliciousMiraiBrowse
      SPARC.elfGet hashmaliciousMiraiBrowse
        MIPSEL.elfGet hashmaliciousMiraiBrowse
          MIPS.elfGet hashmaliciousMiraiBrowse
            ARMV6L.elfGet hashmaliciousMiraiBrowse
              ARMV4L.elfGet hashmaliciousMiraiBrowse
                I586.elfGet hashmaliciousMiraiBrowse
                  ARMV5L.elfGet hashmaliciousMiraiBrowse
                    ARMV7L.elfGet hashmaliciousMiraiBrowse
                      91.189.91.43wind.arm5.elfGet hashmaliciousMiraiBrowse
                        sshd.elfGet hashmaliciousUnknownBrowse
                          wind.mpsl.elfGet hashmaliciousMiraiBrowse
                            wind.x86.elfGet hashmaliciousMiraiBrowse
                              wind.m68k.elfGet hashmaliciousMiraiBrowse
                                wind.spc.elfGet hashmaliciousMiraiBrowse
                                  wind.ppc.elfGet hashmaliciousMiraiBrowse
                                    wind.mips.elfGet hashmaliciousMiraiBrowse
                                      wind.arm6.elfGet hashmaliciousMiraiBrowse
                                        wind.arm.elfGet hashmaliciousMiraiBrowse
                                          91.189.91.42wind.arm5.elfGet hashmaliciousMiraiBrowse
                                            sshd.elfGet hashmaliciousUnknownBrowse
                                              wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                                wind.x86.elfGet hashmaliciousMiraiBrowse
                                                  wind.m68k.elfGet hashmaliciousMiraiBrowse
                                                    wind.spc.elfGet hashmaliciousMiraiBrowse
                                                      wind.ppc.elfGet hashmaliciousMiraiBrowse
                                                        wind.mips.elfGet hashmaliciousMiraiBrowse
                                                          wind.arm6.elfGet hashmaliciousMiraiBrowse
                                                            wind.arm.elfGet hashmaliciousMiraiBrowse
                                                              No context
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              CANONICAL-ASGBwind.arm5.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              sshd.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              wind.x86.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              wind.m68k.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              wind.spc.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              wind.ppc.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              wind.sh4.elfGet hashmaliciousMiraiBrowse
                                                              • 185.125.190.26
                                                              wind.arc.elfGet hashmaliciousMiraiBrowse
                                                              • 185.125.190.26
                                                              wind.mips.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              CANONICAL-ASGBwind.arm5.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              sshd.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              wind.x86.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              wind.m68k.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              wind.spc.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              wind.ppc.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              wind.sh4.elfGet hashmaliciousMiraiBrowse
                                                              • 185.125.190.26
                                                              wind.arc.elfGet hashmaliciousMiraiBrowse
                                                              • 185.125.190.26
                                                              wind.mips.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              INIT7CHwind.arm5.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              sshd.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              wind.x86.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              wind.m68k.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              wind.spc.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              wind.ppc.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              wind.mips.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              wind.arm6.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              wind.arm.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              ATT-INTERNET4US3.elfGet hashmaliciousUnknownBrowse
                                                              • 12.114.129.91
                                                              https://midoregoncu-securemessagecenter.s3.us-east-1.amazonaws.com/open/message_12832.htmlGet hashmaliciousHTMLPhisherBrowse
                                                              • 13.32.27.129
                                                              DEMONS.ppc.elfGet hashmaliciousUnknownBrowse
                                                              • 108.84.153.89
                                                              DEMONS.arm.elfGet hashmaliciousUnknownBrowse
                                                              • 12.113.68.34
                                                              DEMONS.x86.elfGet hashmaliciousUnknownBrowse
                                                              • 99.146.190.116
                                                              DEMONS.spc.elfGet hashmaliciousUnknownBrowse
                                                              • 99.151.175.124
                                                              DEMONS.sh4.elfGet hashmaliciousUnknownBrowse
                                                              • 13.39.87.96
                                                              Hilix.ppc.elfGet hashmaliciousMiraiBrowse
                                                              • 99.12.142.11
                                                              Hilix.m68k.elfGet hashmaliciousMiraiBrowse
                                                              • 45.30.40.161
                                                              Hilix.mpsl.elfGet hashmaliciousMiraiBrowse
                                                              • 70.159.173.199
                                                              No context
                                                              No context
                                                              Process:/tmp/SPARC.elf
                                                              File Type:ASCII text
                                                              Category:dropped
                                                              Size (bytes):230
                                                              Entropy (8bit):3.709552666863289
                                                              Encrypted:false
                                                              SSDEEP:6:iekrEcvwAsE5KlwSd4pzKaV6Lpms/a/1VCxGF:ur+m5MwSdIKaV6L1adVRF
                                                              MD5:2E667F43AE18CD1FE3C108641708A82C
                                                              SHA1:12B90DE2DA0FBCFE66F3D6130905E56C8D6A68D3
                                                              SHA-256:6F721492E7A337C5B498A8F55F5EB7AC745AFF716D0B5B08EFF2C1B6B250F983
                                                              SHA-512:D2A0EE2509154EC1098994F38BE172F98F4150399C534A04D5C675D7C05630802225019F19344CC9070C576BC465A4FEB382AC7712DE6BF25E9244B54A9DB830
                                                              Malicious:false
                                                              Reputation:high, very likely benign file
                                                              Preview:Iface.Destination.Gateway .Flags.RefCnt.Use.Metric.Mask..MTU.Window.IRTT .ens160.00000000.c0a80201.0003.0.0.0.00000000.0.0.0.ens160.c0a80200.00000000.0001.0.0.0.ffffff00.0.0.0.
                                                              File type:ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, stripped
                                                              Entropy (8bit):5.9993484662327345
                                                              TrID:
                                                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                              File name:SPARC.elf
                                                              File size:89'416 bytes
                                                              MD5:96c9c49ce0283154aaf3929426d19b4c
                                                              SHA1:44c83a667615f4ffeff4bd702ad129b74052606c
                                                              SHA256:2c992fcfbb66ed6d42e58584dc915343ec41fd758850254502f4c9aa0a205f53
                                                              SHA512:2f7cb362b05ca595f59f5add4ca82102612f2b305f360f1eb25ba584dcabc63746a449c4d47c0fcf11159ce1063c86656ec0a82caea7b6fd375dd45e44363aa3
                                                              SSDEEP:768:dTgpAq3C4CxiCqA/Yn0ytUcVbmK4GPzdhp2lnFAj+2ZYO+N95VDzBftN095Z1t1v:C+X2P0KBk1FArUN95lpb0tMd8Ut6sCsw
                                                              TLSH:4893B52B7B134F63C0C610B152E30632B8B9EF5934BC8697A8E07D9D6F3698431567E9
                                                              File Content Preview:.ELF...........................4..[@.....4. ...(......................K...K...............K...K...K.......h4........dt.Q................................@..(....@.H.................#.....c...`.....!..... ...@.....".........`......$ ... ...@...........`....

                                                              ELF header

                                                              Class:ELF32
                                                              Data:2's complement, big endian
                                                              Version:1 (current)
                                                              Machine:Sparc
                                                              Version Number:0x1
                                                              Type:EXEC (Executable file)
                                                              OS/ABI:UNIX - System V
                                                              ABI Version:0
                                                              Entry Point Address:0x101a4
                                                              Flags:0x0
                                                              ELF Header Size:52
                                                              Program Header Offset:52
                                                              Program Header Size:32
                                                              Number of Program Headers:3
                                                              Section Header Offset:88896
                                                              Section Header Size:40
                                                              Number of Section Headers:13
                                                              Header String Table Index:12
                                                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                              NULL0x00x00x00x00x0000
                                                              .initPROGBITS0x100940x940x1c0x00x6AX004
                                                              .textPROGBITS0x100b00xb00x122700x00x6AX004
                                                              .finiPROGBITS0x223200x123200x140x00x6AX004
                                                              .rodataPROGBITS0x223380x123380x28b80x00x2A008
                                                              .eh_framePROGBITS0x24bf00x14bf00x40x00x2A004
                                                              .ctorsPROGBITS0x34bf40x14bf40x80x00x3WA004
                                                              .dtorsPROGBITS0x34bfc0x14bfc0x80x00x3WA004
                                                              .jcrPROGBITS0x34c040x14c040x40x00x3WA004
                                                              .dataPROGBITS0x34c080x14c080x3b40x00x3WA008
                                                              .bssNOBITS0x34fc00x14fbc0x64680x00x3WA008
                                                              .commentPROGBITS0x00x14fbc0xb2e0x00x0001
                                                              .shstrtabSTRTAB0x00x15aea0x560x00x0001
                                                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                              LOAD0x00x100000x100000x14bf40x14bf45.97630x5R E0x10000.init .text .fini .rodata .eh_frame
                                                              LOAD0x14bf40x34bf40x34bf40x3c80x68342.76840x6RW 0x10000.ctors .dtors .jcr .data .bss
                                                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Jan 3, 2025 02:27:52.654221058 CET455669168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 02:27:52.659132957 CET916845566216.9.227.143192.168.2.23
                                                              Jan 3, 2025 02:27:52.659193993 CET455669168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 02:27:52.661864996 CET455669168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 02:27:52.666726112 CET916845566216.9.227.143192.168.2.23
                                                              Jan 3, 2025 02:27:54.658632040 CET43928443192.168.2.2391.189.91.42
                                                              Jan 3, 2025 02:28:00.033859968 CET42836443192.168.2.2391.189.91.43
                                                              Jan 3, 2025 02:28:01.057610989 CET4251680192.168.2.23109.202.202.202
                                                              Jan 3, 2025 02:28:15.135771036 CET43928443192.168.2.2391.189.91.42
                                                              Jan 3, 2025 02:28:17.581017017 CET916845566216.9.227.143192.168.2.23
                                                              Jan 3, 2025 02:28:17.581104994 CET455669168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 02:28:17.773582935 CET916845566216.9.227.143192.168.2.23
                                                              Jan 3, 2025 02:28:17.773705959 CET455669168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 02:28:27.422089100 CET42836443192.168.2.2391.189.91.43
                                                              Jan 3, 2025 02:28:31.517525911 CET4251680192.168.2.23109.202.202.202
                                                              Jan 3, 2025 02:28:56.090168953 CET43928443192.168.2.2391.189.91.42
                                                              Jan 3, 2025 02:29:17.586246967 CET916845566216.9.227.143192.168.2.23
                                                              Jan 3, 2025 02:29:17.586524010 CET455669168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 02:29:17.759341955 CET916845566216.9.227.143192.168.2.23
                                                              Jan 3, 2025 02:29:17.759629965 CET455669168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 02:30:17.590914965 CET916845566216.9.227.143192.168.2.23
                                                              Jan 3, 2025 02:30:17.591706991 CET455669168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 02:30:17.764585972 CET916845566216.9.227.143192.168.2.23
                                                              Jan 3, 2025 02:30:17.764904022 CET455669168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 02:31:17.599205017 CET916845566216.9.227.143192.168.2.23
                                                              Jan 3, 2025 02:31:17.599437952 CET455669168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 02:31:17.776583910 CET916845566216.9.227.143192.168.2.23
                                                              Jan 3, 2025 02:31:17.776770115 CET455669168192.168.2.23216.9.227.143

                                                              System Behavior

                                                              Start time (UTC):01:27:51
                                                              Start date (UTC):03/01/2025
                                                              Path:/tmp/SPARC.elf
                                                              Arguments:/tmp/SPARC.elf
                                                              File size:4379400 bytes
                                                              MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                                              Start time (UTC):01:27:51
                                                              Start date (UTC):03/01/2025
                                                              Path:/tmp/SPARC.elf
                                                              Arguments:-
                                                              File size:4379400 bytes
                                                              MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                                              Start time (UTC):01:27:51
                                                              Start date (UTC):03/01/2025
                                                              Path:/tmp/SPARC.elf
                                                              Arguments:-
                                                              File size:4379400 bytes
                                                              MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                                              Start time (UTC):01:27:51
                                                              Start date (UTC):03/01/2025
                                                              Path:/tmp/SPARC.elf
                                                              Arguments:-
                                                              File size:4379400 bytes
                                                              MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e