Edit tour
Linux
Analysis Report
x86.elf
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Sample tries to kill multiple processes (SIGKILL)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Yara signature match
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1583919 |
Start date and time: | 2025-01-03 21:12:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 20s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | x86.elf |
Detection: | MAL |
Classification: | mal64.spre.linELF@0/0@5/0 |
- VT rate limit hit for: x86.elf
Command: | /tmp/x86.elf |
PID: | 6217 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | dear |
Standard Error: |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Linux_Trojan_Mirai_b14f4c5d | unknown | unknown |
| |
Linux_Trojan_Mirai_88de437f | unknown | unknown |
| |
Linux_Trojan_Mirai_389ee3e9 | unknown | unknown |
| |
Linux_Trojan_Mirai_cc93863b | unknown | unknown |
| |
Linux_Trojan_Mirai_8aa7b5d3 | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Linux_Trojan_Mirai_b14f4c5d | unknown | unknown |
| |
Linux_Trojan_Mirai_88de437f | unknown | unknown |
| |
Linux_Trojan_Mirai_389ee3e9 | unknown | unknown |
| |
Linux_Trojan_Mirai_cc93863b | unknown | unknown |
| |
Linux_Trojan_Mirai_8aa7b5d3 | unknown | unknown |
|
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | String: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | DNS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior |
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: |
Source: | .symtab present: |
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | Windows Management Instrumentation | 1 Scripting | Path Interception | Direct Volume Access | 1 OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | 1 Service Stop |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 2 Application Layer Protocol | Traffic Duplication | Data Destruction |
⊘No configs have been found
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
39% | ReversingLabs | Linux.Backdoor.Mirai | ||
100% | Joe Sandbox ML |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
secure-network-rebirthltd.ru | unknown | unknown | true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
210.99.82.151 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.185.68 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.18.73 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.251.37 | unknown | Korea Republic of | 17841 | NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR | false | |
210.99.238.249 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.15.188 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.170.52 | unknown | Korea Republic of | 9647 | SEOULMETRO-ASSeoulMetropolitanGovernmentKR | false | |
91.189.91.43 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false | |
91.189.91.42 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false | |
210.99.167.219 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.91.209 | unknown | Korea Republic of | 45400 | NICNETKoreaTelecomKR | false | |
83.222.191.90 | unknown | Bulgaria | 43561 | NET1-ASBG | false | |
109.202.202.202 | unknown | Switzerland | 13030 | INIT7CH | false | |
210.99.156.146 | unknown | Korea Republic of | 9696 | EDAS-ASOscarEnterpriseKR | false | |
210.99.45.211 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.144.204 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.234.181 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.95.52 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.34.26 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.208.6 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.113.64 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.19.133 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.252.114 | unknown | Korea Republic of | 17841 | NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR | false | |
210.99.235.231 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.179.142 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
83.222.191.90 | Get hash | malicious | Mirai | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
109.202.202.202 | Get hash | malicious | Unknown | Browse |
| |
91.189.91.43 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | XorDDoS | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
91.189.91.42 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | XorDDoS | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai | Browse |
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
KIXS-AS-KRKoreaTelecomKR | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
KIXS-AS-KRKoreaTelecomKR | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
KIXS-AS-KRKoreaTelecomKR | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
⊘No context
⊘No context
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 6.270284862385435 |
TrID: |
|
File name: | x86.elf |
File size: | 45'904 bytes |
MD5: | 75c592fdbef6e2a717e94a7243747a55 |
SHA1: | b75ac97b39dc661c5fdddff8b81b894af292b46e |
SHA256: | 5e32cd9ca17361b8deea9202641ff4db44bbc56324ba81b880a457b62f892cac |
SHA512: | 29d4ed63b50497e1d8eded924d0eb6128a44f656ffdabecab02ee5c707350331b96acf8d9e9832863689976f46507272036f41642b55bda383f8d36e85bbb320 |
SSDEEP: | 768:DaCgnDEPlIgqMtjBMxub1P1UAIMCTz377ooz2W2RXrA4vH:DaCtlIZSjBMK1dUAIlr7rz2WcbA4vH |
TLSH: | BB233AC8D943E4F0EC0616B124B7E7338773F97A102CF997D79DDA32A842A45A61B19C |
File Content Preview: | .ELF....................d...4...........4. ...(..............................................0...0......`...........Q.td............................U..S.......w....h........[]...$.............U......=.1...t..5....$0.....$0......u........t....h.).......... |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 45504 |
Section Header Size: | 40 |
Number of Section Headers: | 10 |
Header String Table Index: | 9 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x8048094 | 0x94 | 0x1c | 0x0 | 0x6 | AX | 0 | 0 | 1 |
.text | PROGBITS | 0x80480b0 | 0xb0 | 0x9da6 | 0x0 | 0x6 | AX | 0 | 0 | 16 |
.fini | PROGBITS | 0x8051e56 | 0x9e56 | 0x17 | 0x0 | 0x6 | AX | 0 | 0 | 1 |
.rodata | PROGBITS | 0x8051e80 | 0x9e80 | 0xb60 | 0x0 | 0x2 | A | 0 | 0 | 32 |
.ctors | PROGBITS | 0x8053000 | 0xb000 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.dtors | PROGBITS | 0x8053008 | 0xb008 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x8053020 | 0xb020 | 0x160 | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.bss | NOBITS | 0x8053180 | 0xb180 | 0x4e0 | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.shstrtab | STRTAB | 0x0 | 0xb180 | 0x3e | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x8048000 | 0x8048000 | 0xa9e0 | 0xa9e0 | 6.4257 | 0x5 | R E | 0x1000 | .init .text .fini .rodata | |
LOAD | 0xb000 | 0x8053000 | 0x8053000 | 0x180 | 0x660 | 4.4758 | 0x6 | RW | 0x1000 | .ctors .dtors .data .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 3, 2025 21:12:44.041968107 CET | 54244 | 13566 | 192.168.2.23 | 210.99.167.219 |
Jan 3, 2025 21:12:44.041974068 CET | 43474 | 13566 | 192.168.2.23 | 210.99.235.231 |
Jan 3, 2025 21:12:44.042025089 CET | 47256 | 13566 | 192.168.2.23 | 210.99.234.181 |
Jan 3, 2025 21:12:44.042031050 CET | 60640 | 13566 | 192.168.2.23 | 210.99.91.209 |
Jan 3, 2025 21:12:44.042030096 CET | 51134 | 13566 | 192.168.2.23 | 210.99.82.151 |
Jan 3, 2025 21:12:44.042037010 CET | 41816 | 13566 | 192.168.2.23 | 210.99.185.68 |
Jan 3, 2025 21:12:44.042061090 CET | 55718 | 13566 | 192.168.2.23 | 210.99.251.37 |
Jan 3, 2025 21:12:44.042072058 CET | 51864 | 13566 | 192.168.2.23 | 210.99.170.52 |
Jan 3, 2025 21:12:44.042077065 CET | 60674 | 13566 | 192.168.2.23 | 210.99.19.133 |
Jan 3, 2025 21:12:44.042078972 CET | 45724 | 13566 | 192.168.2.23 | 210.99.45.211 |
Jan 3, 2025 21:12:44.042098045 CET | 42216 | 13566 | 192.168.2.23 | 210.99.34.26 |
Jan 3, 2025 21:12:44.042104959 CET | 36058 | 13566 | 192.168.2.23 | 210.99.179.142 |
Jan 3, 2025 21:12:44.042110920 CET | 44464 | 13566 | 192.168.2.23 | 210.99.252.114 |
Jan 3, 2025 21:12:44.042115927 CET | 41840 | 13566 | 192.168.2.23 | 210.99.156.146 |
Jan 3, 2025 21:12:44.042138100 CET | 37820 | 13566 | 192.168.2.23 | 210.99.95.52 |
Jan 3, 2025 21:12:44.042140007 CET | 37870 | 13566 | 192.168.2.23 | 210.99.208.6 |
Jan 3, 2025 21:12:44.042146921 CET | 51028 | 13566 | 192.168.2.23 | 210.99.15.188 |
Jan 3, 2025 21:12:44.042146921 CET | 39162 | 13566 | 192.168.2.23 | 210.99.238.249 |
Jan 3, 2025 21:12:44.042160988 CET | 38430 | 13566 | 192.168.2.23 | 210.99.113.64 |
Jan 3, 2025 21:12:44.042170048 CET | 54866 | 13566 | 192.168.2.23 | 210.99.144.204 |
Jan 3, 2025 21:12:44.042181969 CET | 59272 | 13566 | 192.168.2.23 | 210.99.18.73 |
Jan 3, 2025 21:12:44.047087908 CET | 13566 | 54244 | 210.99.167.219 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047105074 CET | 13566 | 43474 | 210.99.235.231 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047152042 CET | 54244 | 13566 | 192.168.2.23 | 210.99.167.219 |
Jan 3, 2025 21:12:44.047156096 CET | 43474 | 13566 | 192.168.2.23 | 210.99.235.231 |
Jan 3, 2025 21:12:44.047161102 CET | 13566 | 60640 | 210.99.91.209 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047173977 CET | 13566 | 41816 | 210.99.185.68 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047188044 CET | 13566 | 47256 | 210.99.234.181 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047199965 CET | 13566 | 55718 | 210.99.251.37 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047203064 CET | 60640 | 13566 | 192.168.2.23 | 210.99.91.209 |
Jan 3, 2025 21:12:44.047208071 CET | 41816 | 13566 | 192.168.2.23 | 210.99.185.68 |
Jan 3, 2025 21:12:44.047213078 CET | 13566 | 51134 | 210.99.82.151 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047224045 CET | 47256 | 13566 | 192.168.2.23 | 210.99.234.181 |
Jan 3, 2025 21:12:44.047224045 CET | 55718 | 13566 | 192.168.2.23 | 210.99.251.37 |
Jan 3, 2025 21:12:44.047233105 CET | 13566 | 51864 | 210.99.170.52 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047245026 CET | 51134 | 13566 | 192.168.2.23 | 210.99.82.151 |
Jan 3, 2025 21:12:44.047246933 CET | 13566 | 45724 | 210.99.45.211 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047259092 CET | 13566 | 60674 | 210.99.19.133 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047270060 CET | 51864 | 13566 | 192.168.2.23 | 210.99.170.52 |
Jan 3, 2025 21:12:44.047271013 CET | 13566 | 42216 | 210.99.34.26 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047272921 CET | 45724 | 13566 | 192.168.2.23 | 210.99.45.211 |
Jan 3, 2025 21:12:44.047283888 CET | 13566 | 41840 | 210.99.156.146 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047286034 CET | 60674 | 13566 | 192.168.2.23 | 210.99.19.133 |
Jan 3, 2025 21:12:44.047298908 CET | 13566 | 36058 | 210.99.179.142 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047307014 CET | 42216 | 13566 | 192.168.2.23 | 210.99.34.26 |
Jan 3, 2025 21:12:44.047317028 CET | 41840 | 13566 | 192.168.2.23 | 210.99.156.146 |
Jan 3, 2025 21:12:44.047321081 CET | 13566 | 44464 | 210.99.252.114 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047328949 CET | 36058 | 13566 | 192.168.2.23 | 210.99.179.142 |
Jan 3, 2025 21:12:44.047333956 CET | 13566 | 37820 | 210.99.95.52 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047348022 CET | 13566 | 37870 | 210.99.208.6 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047359943 CET | 44464 | 13566 | 192.168.2.23 | 210.99.252.114 |
Jan 3, 2025 21:12:44.047359943 CET | 13566 | 51028 | 210.99.15.188 | 192.168.2.23 |
Jan 3, 2025 21:12:44.047359943 CET | 37820 | 13566 | 192.168.2.23 | 210.99.95.52 |
Jan 3, 2025 21:12:44.047375917 CET | 37870 | 13566 | 192.168.2.23 | 210.99.208.6 |
Jan 3, 2025 21:12:44.047391891 CET | 51028 | 13566 | 192.168.2.23 | 210.99.15.188 |
Jan 3, 2025 21:12:44.051873922 CET | 13566 | 39162 | 210.99.238.249 | 192.168.2.23 |
Jan 3, 2025 21:12:44.051887989 CET | 13566 | 38430 | 210.99.113.64 | 192.168.2.23 |
Jan 3, 2025 21:12:44.051901102 CET | 13566 | 54866 | 210.99.144.204 | 192.168.2.23 |
Jan 3, 2025 21:12:44.051913023 CET | 13566 | 59272 | 210.99.18.73 | 192.168.2.23 |
Jan 3, 2025 21:12:44.051943064 CET | 38430 | 13566 | 192.168.2.23 | 210.99.113.64 |
Jan 3, 2025 21:12:44.051943064 CET | 54866 | 13566 | 192.168.2.23 | 210.99.144.204 |
Jan 3, 2025 21:12:44.051944017 CET | 39162 | 13566 | 192.168.2.23 | 210.99.238.249 |
Jan 3, 2025 21:12:44.051985025 CET | 59272 | 13566 | 192.168.2.23 | 210.99.18.73 |
Jan 3, 2025 21:12:44.083518028 CET | 42580 | 13566 | 192.168.2.23 | 83.222.191.90 |
Jan 3, 2025 21:12:44.088265896 CET | 13566 | 42580 | 83.222.191.90 | 192.168.2.23 |
Jan 3, 2025 21:12:44.088331938 CET | 42580 | 13566 | 192.168.2.23 | 83.222.191.90 |
Jan 3, 2025 21:12:44.088345051 CET | 42580 | 13566 | 192.168.2.23 | 83.222.191.90 |
Jan 3, 2025 21:12:44.093127012 CET | 13566 | 42580 | 83.222.191.90 | 192.168.2.23 |
Jan 3, 2025 21:12:44.093178988 CET | 42580 | 13566 | 192.168.2.23 | 83.222.191.90 |
Jan 3, 2025 21:12:44.098010063 CET | 13566 | 42580 | 83.222.191.90 | 192.168.2.23 |
Jan 3, 2025 21:12:45.174951077 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Jan 3, 2025 21:12:50.550189972 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Jan 3, 2025 21:12:52.086136103 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Jan 3, 2025 21:12:54.097074032 CET | 42580 | 13566 | 192.168.2.23 | 83.222.191.90 |
Jan 3, 2025 21:12:54.101949930 CET | 13566 | 42580 | 83.222.191.90 | 192.168.2.23 |
Jan 3, 2025 21:12:54.329761982 CET | 13566 | 42580 | 83.222.191.90 | 192.168.2.23 |
Jan 3, 2025 21:12:54.330068111 CET | 42580 | 13566 | 192.168.2.23 | 83.222.191.90 |
Jan 3, 2025 21:12:54.784728050 CET | 13566 | 42580 | 83.222.191.90 | 192.168.2.23 |
Jan 3, 2025 21:12:54.784786940 CET | 42580 | 13566 | 192.168.2.23 | 83.222.191.90 |
Jan 3, 2025 21:13:05.652133942 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Jan 3, 2025 21:13:17.938505888 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Jan 3, 2025 21:13:22.033998013 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Jan 3, 2025 21:13:46.606553078 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Jan 3, 2025 21:13:54.825417995 CET | 42580 | 13566 | 192.168.2.23 | 83.222.191.90 |
Jan 3, 2025 21:13:54.830310106 CET | 13566 | 42580 | 83.222.191.90 | 192.168.2.23 |
Jan 3, 2025 21:13:55.027185917 CET | 13566 | 42580 | 83.222.191.90 | 192.168.2.23 |
Jan 3, 2025 21:13:55.027292967 CET | 42580 | 13566 | 192.168.2.23 | 83.222.191.90 |
Jan 3, 2025 21:13:55.783409119 CET | 13566 | 42580 | 83.222.191.90 | 192.168.2.23 |
Jan 3, 2025 21:13:55.783488989 CET | 42580 | 13566 | 192.168.2.23 | 83.222.191.90 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 3, 2025 21:12:44.045002937 CET | 60043 | 53 | 192.168.2.23 | 8.8.8.8 |
Jan 3, 2025 21:12:44.054442883 CET | 53 | 60043 | 8.8.8.8 | 192.168.2.23 |
Jan 3, 2025 21:12:44.054528952 CET | 44055 | 53 | 192.168.2.23 | 8.8.8.8 |
Jan 3, 2025 21:12:44.061681032 CET | 53 | 44055 | 8.8.8.8 | 192.168.2.23 |
Jan 3, 2025 21:12:44.061748981 CET | 55017 | 53 | 192.168.2.23 | 8.8.8.8 |
Jan 3, 2025 21:12:44.069053888 CET | 53 | 55017 | 8.8.8.8 | 192.168.2.23 |
Jan 3, 2025 21:12:44.069118023 CET | 56944 | 53 | 192.168.2.23 | 8.8.8.8 |
Jan 3, 2025 21:12:44.076283932 CET | 53 | 56944 | 8.8.8.8 | 192.168.2.23 |
Jan 3, 2025 21:12:44.076486111 CET | 59016 | 53 | 192.168.2.23 | 8.8.8.8 |
Jan 3, 2025 21:12:44.083425999 CET | 53 | 59016 | 8.8.8.8 | 192.168.2.23 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 3, 2025 21:12:44.045002937 CET | 192.168.2.23 | 8.8.8.8 | 0x9274 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 21:12:44.054528952 CET | 192.168.2.23 | 8.8.8.8 | 0x9274 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 21:12:44.061748981 CET | 192.168.2.23 | 8.8.8.8 | 0x9274 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 21:12:44.069118023 CET | 192.168.2.23 | 8.8.8.8 | 0x9274 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 21:12:44.076486111 CET | 192.168.2.23 | 8.8.8.8 | 0x9274 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 3, 2025 21:12:44.054442883 CET | 8.8.8.8 | 192.168.2.23 | 0x9274 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 21:12:44.061681032 CET | 8.8.8.8 | 192.168.2.23 | 0x9274 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 21:12:44.069053888 CET | 8.8.8.8 | 192.168.2.23 | 0x9274 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 21:12:44.076283932 CET | 8.8.8.8 | 192.168.2.23 | 0x9274 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 3, 2025 21:12:44.083425999 CET | 8.8.8.8 | 192.168.2.23 | 0x9274 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 20:12:43 |
Start date (UTC): | 03/01/2025 |
Path: | /tmp/x86.elf |
Arguments: | /tmp/x86.elf |
File size: | 45904 bytes |
MD5 hash: | 75c592fdbef6e2a717e94a7243747a55 |
Start time (UTC): | 20:12:43 |
Start date (UTC): | 03/01/2025 |
Path: | /tmp/x86.elf |
Arguments: | - |
File size: | 45904 bytes |
MD5 hash: | 75c592fdbef6e2a717e94a7243747a55 |
Start time (UTC): | 20:12:43 |
Start date (UTC): | 03/01/2025 |
Path: | /tmp/x86.elf |
Arguments: | - |
File size: | 45904 bytes |
MD5 hash: | 75c592fdbef6e2a717e94a7243747a55 |
Start time (UTC): | 20:12:43 |
Start date (UTC): | 03/01/2025 |
Path: | /tmp/x86.elf |
Arguments: | - |
File size: | 45904 bytes |
MD5 hash: | 75c592fdbef6e2a717e94a7243747a55 |