Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
M68K.elf

Overview

General Information

Sample name:M68K.elf
Analysis ID:1583577
MD5:e60e58c1f61acbf65e42a54fe3c69ab5
SHA1:36fd04b018e2522108841fe21a8b875001a9d6b9
SHA256:5f013e3164ca0f77bab983fd69f0875a618a0ac1cf1f985db1ba889d934b2d32
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Opens /proc/net/* files useful for finding connected devices and routers
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1583577
Start date and time:2025-01-03 05:02:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 8s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:M68K.elf
Detection:MAL
Classification:mal52.spre.linELF@0/1@0/0
Command:/tmp/M68K.elf
PID:6239
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
Cia Qbot Has Infected This Device ;)
Standard Error:
  • system is lnxubuntu20
  • M68K.elf (PID: 6239, Parent: 6159, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/M68K.elf
    • M68K.elf New Fork (PID: 6241, Parent: 6239)
    • M68K.elf New Fork (PID: 6243, Parent: 6239)
      • M68K.elf New Fork (PID: 6245, Parent: 6243)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: M68K.elfReversingLabs: Detection: 31%
Source: M68K.elfVirustotal: Detection: 32%Perma Link

Spreading

barindex
Source: /tmp/M68K.elf (PID: 6239)Opens: /proc/net/routeJump to behavior
Source: global trafficTCP traffic: 192.168.2.23:45570 -> 216.9.227.143:9168
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownTCP traffic detected without corresponding DNS query: 216.9.227.143
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.spre.linELF@0/1@0/0
Source: /tmp/M68K.elf (PID: 6239)Queries kernel information via 'uname': Jump to behavior
Source: M68K.elf, 6239.1.00007ffcf9244000.00007ffcf9265000.rw-.sdmpBinary or memory string: /tmp/qemu-open.wZU2AV
Source: M68K.elf, 6239.1.00007ffcf9244000.00007ffcf9265000.rw-.sdmpBinary or memory string: >V/tmp/qemu-open.wZU2AV\
Source: M68K.elf, 6239.1.0000563e18d46000.0000563e18dcb000.rw-.sdmp, M68K.elf, 6241.1.0000563e18d46000.0000563e18dcb000.rw-.sdmp, M68K.elf, 6243.1.0000563e18d46000.0000563e18dcb000.rw-.sdmpBinary or memory string: >V!/etc/qemu-binfmt/m68k
Source: M68K.elf, 6239.1.00007ffcf9244000.00007ffcf9265000.rw-.sdmp, M68K.elf, 6241.1.00007ffcf9244000.00007ffcf9265000.rw-.sdmp, M68K.elf, 6243.1.00007ffcf9244000.00007ffcf9265000.rw-.sdmpBinary or memory string: Ix86_64/usr/bin/qemu-m68k/tmp/M68K.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/M68K.elf
Source: M68K.elf, 6239.1.00007ffcf9244000.00007ffcf9265000.rw-.sdmp, M68K.elf, 6241.1.00007ffcf9244000.00007ffcf9265000.rw-.sdmp, M68K.elf, 6243.1.00007ffcf9244000.00007ffcf9265000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
Source: M68K.elf, 6239.1.0000563e18d46000.0000563e18dcb000.rw-.sdmp, M68K.elf, 6241.1.0000563e18d46000.0000563e18dcb000.rw-.sdmp, M68K.elf, 6243.1.0000563e18d46000.0000563e18dcb000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
Remote System Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583577 Sample: M68K.elf Startdate: 03/01/2025 Architecture: LINUX Score: 52 17 109.202.202.202, 80 INIT7CH Switzerland 2->17 19 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->19 21 2 other IPs or domains 2->21 23 Multi AV Scanner detection for submitted file 2->23 8 M68K.elf 2->8         started        signatures3 process4 signatures5 25 Opens /proc/net/* files useful for finding connected devices and routers 8->25 11 M68K.elf 8->11         started        13 M68K.elf 8->13         started        process6 process7 15 M68K.elf 11->15         started       
SourceDetectionScannerLabelLink
M68K.elf32%ReversingLabsLinux.Backdoor.Bashlite
M68K.elf33%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
109.202.202.202
unknownSwitzerland
13030INIT7CHfalse
216.9.227.143
unknownReserved
7018ATT-INTERNET4USfalse
91.189.91.43
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
91.189.91.42
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
  • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
216.9.227.143I586.elfGet hashmaliciousUnknownBrowse
    SH4.elfGet hashmaliciousUnknownBrowse
      SPARC.elfGet hashmaliciousUnknownBrowse
        SH4.elfGet hashmaliciousMiraiBrowse
          POWERPC.elfGet hashmaliciousMiraiBrowse
            SPARC.elfGet hashmaliciousMiraiBrowse
              MIPSEL.elfGet hashmaliciousMiraiBrowse
                MIPS.elfGet hashmaliciousMiraiBrowse
                  ARMV6L.elfGet hashmaliciousMiraiBrowse
                    ARMV4L.elfGet hashmaliciousMiraiBrowse
                      91.189.91.43bin.sh.elfGet hashmaliciousMiraiBrowse
                        I586.elfGet hashmaliciousUnknownBrowse
                          ARMV4L.elfGet hashmaliciousUnknownBrowse
                            POWERPC.elfGet hashmaliciousUnknownBrowse
                              wind.arm7.elfGet hashmaliciousMiraiBrowse
                                SH4.elfGet hashmaliciousUnknownBrowse
                                  SPARC.elfGet hashmaliciousUnknownBrowse
                                    wind.arm5.elfGet hashmaliciousMiraiBrowse
                                      sshd.elfGet hashmaliciousUnknownBrowse
                                        wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                          91.189.91.42bin.sh.elfGet hashmaliciousMiraiBrowse
                                            I586.elfGet hashmaliciousUnknownBrowse
                                              ARMV4L.elfGet hashmaliciousUnknownBrowse
                                                POWERPC.elfGet hashmaliciousUnknownBrowse
                                                  wind.arm7.elfGet hashmaliciousMiraiBrowse
                                                    SH4.elfGet hashmaliciousUnknownBrowse
                                                      SPARC.elfGet hashmaliciousUnknownBrowse
                                                        wind.arm5.elfGet hashmaliciousMiraiBrowse
                                                          sshd.elfGet hashmaliciousUnknownBrowse
                                                            wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                                              No context
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              CANONICAL-ASGBbin.sh.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              I586.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              ARMV4L.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              POWERPC.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              wind.arm7.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              SH4.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              SPARC.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              wind.arm5.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              sshd.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              CANONICAL-ASGBbin.sh.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              I586.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              ARMV4L.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              POWERPC.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              wind.arm7.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              SH4.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              SPARC.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              wind.arm5.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              sshd.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              INIT7CHbin.sh.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              I586.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              ARMV4L.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              POWERPC.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              wind.arm7.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              SH4.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              SPARC.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              wind.arm5.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              sshd.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              ATT-INTERNET4US1.elfGet hashmaliciousUnknownBrowse
                                                              • 139.151.95.187
                                                              I586.elfGet hashmaliciousUnknownBrowse
                                                              • 216.9.227.143
                                                              4.elfGet hashmaliciousUnknownBrowse
                                                              • 208.61.41.157
                                                              4.elfGet hashmaliciousUnknownBrowse
                                                              • 75.42.13.152
                                                              SH4.elfGet hashmaliciousUnknownBrowse
                                                              • 216.9.227.143
                                                              SPARC.elfGet hashmaliciousUnknownBrowse
                                                              • 216.9.227.143
                                                              3.elfGet hashmaliciousUnknownBrowse
                                                              • 12.114.129.91
                                                              https://midoregoncu-securemessagecenter.s3.us-east-1.amazonaws.com/open/message_12832.htmlGet hashmaliciousHTMLPhisherBrowse
                                                              • 13.32.27.129
                                                              DEMONS.ppc.elfGet hashmaliciousUnknownBrowse
                                                              • 108.84.153.89
                                                              DEMONS.arm.elfGet hashmaliciousUnknownBrowse
                                                              • 12.113.68.34
                                                              No context
                                                              No context
                                                              Process:/tmp/M68K.elf
                                                              File Type:ASCII text
                                                              Category:dropped
                                                              Size (bytes):230
                                                              Entropy (8bit):3.709552666863289
                                                              Encrypted:false
                                                              SSDEEP:6:iekrEcvwAsE5KlwSd4pzKaV6Lpms/a/1VCxGF:ur+m5MwSdIKaV6L1adVRF
                                                              MD5:2E667F43AE18CD1FE3C108641708A82C
                                                              SHA1:12B90DE2DA0FBCFE66F3D6130905E56C8D6A68D3
                                                              SHA-256:6F721492E7A337C5B498A8F55F5EB7AC745AFF716D0B5B08EFF2C1B6B250F983
                                                              SHA-512:D2A0EE2509154EC1098994F38BE172F98F4150399C534A04D5C675D7C05630802225019F19344CC9070C576BC465A4FEB382AC7712DE6BF25E9244B54A9DB830
                                                              Malicious:false
                                                              Reputation:high, very likely benign file
                                                              Preview:Iface.Destination.Gateway .Flags.RefCnt.Use.Metric.Mask..MTU.Window.IRTT .ens160.00000000.c0a80201.0003.0.0.0.00000000.0.0.0.ens160.c0a80200.00000000.0001.0.0.0.ffffff00.0.0.0.
                                                              File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                                                              Entropy (8bit):6.0691978477239115
                                                              TrID:
                                                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                              File name:M68K.elf
                                                              File size:82'456 bytes
                                                              MD5:e60e58c1f61acbf65e42a54fe3c69ab5
                                                              SHA1:36fd04b018e2522108841fe21a8b875001a9d6b9
                                                              SHA256:5f013e3164ca0f77bab983fd69f0875a618a0ac1cf1f985db1ba889d934b2d32
                                                              SHA512:94121d3d69cd0c396f080208a1b7b44737044b349ecf4e5b89f8f655965673290c9fa1ae62f49e25e193ff12212a3418484fbce5f8e078a5071b2a55f033ab5b
                                                              SSDEEP:1536:kP0wIRG4ll8FAoY0XgVMQG7CquUgASOEr8y8Gp6Yn:+0m4ljbdVzA7/Er8y8GcYn
                                                              TLSH:3583E693FD01DFB6F80AE3BA44A348157530BFA60E921976B2677897ED360D41423F4A
                                                              File Content Preview:.ELF.......................D...4..@......4. ...(......................0,..0,...... .......0,..P,..P,......g....... .dt.Q............................NV..a....da....,N^NuNV..J9..S.f>"y..PD QJ.g.X.#...PDN."y..PD QJ.f.A.....J.g.Hy..0(N.X.......S.N^NuNV..N^NuN

                                                              ELF header

                                                              Class:ELF32
                                                              Data:2's complement, big endian
                                                              Version:1 (current)
                                                              Machine:MC68000
                                                              Version Number:0x1
                                                              Type:EXEC (Executable file)
                                                              OS/ABI:UNIX - System V
                                                              ABI Version:0
                                                              Entry Point Address:0x80000144
                                                              Flags:0x0
                                                              ELF Header Size:52
                                                              Program Header Offset:52
                                                              Program Header Size:32
                                                              Number of Program Headers:3
                                                              Section Header Offset:81936
                                                              Section Header Size:40
                                                              Number of Section Headers:13
                                                              Header String Table Index:12
                                                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                              NULL0x00x00x00x00x0000
                                                              .initPROGBITS0x800000940x940x140x00x6AX002
                                                              .textPROGBITS0x800000a80xa80x108580x00x6AX004
                                                              .finiPROGBITS0x800109000x109000xe0x00x6AX002
                                                              .rodataPROGBITS0x8001090e0x1090e0x271a0x00x2A002
                                                              .eh_framePROGBITS0x800130280x130280x40x00x2A004
                                                              .ctorsPROGBITS0x8001502c0x1302c0x80x00x3WA004
                                                              .dtorsPROGBITS0x800150340x130340x80x00x3WA004
                                                              .jcrPROGBITS0x8001503c0x1303c0x40x00x3WA004
                                                              .dataPROGBITS0x800150400x130400x3a80x00x3WA004
                                                              .bssNOBITS0x800153e80x133e80x64200x00x3WA004
                                                              .commentPROGBITS0x00x133e80xbd00x00x0001
                                                              .shstrtabSTRTAB0x00x13fb80x560x00x0001
                                                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                              LOAD0x00x800000000x800000000x1302c0x1302c6.05610x5R E0x2000.init .text .fini .rodata .eh_frame
                                                              LOAD0x1302c0x8001502c0x8001502c0x3bc0x67dc2.97320x6RW 0x2000.ctors .dtors .jcr .data .bss
                                                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Jan 3, 2025 05:02:51.124696016 CET455709168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 05:02:51.129653931 CET916845570216.9.227.143192.168.2.23
                                                              Jan 3, 2025 05:02:51.129729033 CET455709168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 05:02:51.130170107 CET455709168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 05:02:51.134944916 CET916845570216.9.227.143192.168.2.23
                                                              Jan 3, 2025 05:02:52.395999908 CET43928443192.168.2.2391.189.91.42
                                                              Jan 3, 2025 05:02:58.027143955 CET42836443192.168.2.2391.189.91.43
                                                              Jan 3, 2025 05:02:59.563002110 CET4251680192.168.2.23109.202.202.202
                                                              Jan 3, 2025 05:03:13.641144991 CET43928443192.168.2.2391.189.91.42
                                                              Jan 3, 2025 05:03:21.974028111 CET916845570216.9.227.143192.168.2.23
                                                              Jan 3, 2025 05:03:21.974201918 CET455709168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 05:03:22.158413887 CET916845570216.9.227.143192.168.2.23
                                                              Jan 3, 2025 05:03:22.158485889 CET455709168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 05:03:23.879590034 CET42836443192.168.2.2391.189.91.43
                                                              Jan 3, 2025 05:03:30.022916079 CET4251680192.168.2.23109.202.202.202
                                                              Jan 3, 2025 05:03:54.595736980 CET43928443192.168.2.2391.189.91.42
                                                              Jan 3, 2025 05:04:15.072907925 CET42836443192.168.2.2391.189.91.43
                                                              Jan 3, 2025 05:04:21.978365898 CET916845570216.9.227.143192.168.2.23
                                                              Jan 3, 2025 05:04:21.978544950 CET455709168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 05:04:22.162872076 CET916845570216.9.227.143192.168.2.23
                                                              Jan 3, 2025 05:04:22.162997007 CET455709168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 05:05:21.983119011 CET916845570216.9.227.143192.168.2.23
                                                              Jan 3, 2025 05:05:21.983459949 CET455709168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 05:05:22.178272963 CET916845570216.9.227.143192.168.2.23
                                                              Jan 3, 2025 05:05:22.178478003 CET455709168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 05:06:21.988034010 CET916845570216.9.227.143192.168.2.23
                                                              Jan 3, 2025 05:06:21.988332987 CET455709168192.168.2.23216.9.227.143
                                                              Jan 3, 2025 05:06:22.164043903 CET916845570216.9.227.143192.168.2.23
                                                              Jan 3, 2025 05:06:22.164227009 CET455709168192.168.2.23216.9.227.143

                                                              System Behavior

                                                              Start time (UTC):04:02:50
                                                              Start date (UTC):03/01/2025
                                                              Path:/tmp/M68K.elf
                                                              Arguments:/tmp/M68K.elf
                                                              File size:4463432 bytes
                                                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                              Start time (UTC):04:02:50
                                                              Start date (UTC):03/01/2025
                                                              Path:/tmp/M68K.elf
                                                              Arguments:-
                                                              File size:4463432 bytes
                                                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                              Start time (UTC):04:02:50
                                                              Start date (UTC):03/01/2025
                                                              Path:/tmp/M68K.elf
                                                              Arguments:-
                                                              File size:4463432 bytes
                                                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                                                              Start time (UTC):04:02:50
                                                              Start date (UTC):03/01/2025
                                                              Path:/tmp/M68K.elf
                                                              Arguments:-
                                                              File size:4463432 bytes
                                                              MD5 hash:cd177594338c77b895ae27c33f8f86cc