Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
x86_64.elf

Overview

General Information

Sample name:x86_64.elf
Analysis ID:1583933
MD5:ed891007b83f07e55a4dfb6e92b1a1cc
SHA1:e25fd8410dda41b3f4005b0e1dc66f9ee1951358
SHA256:b75eab90673b94fd015bc817741fe37bfaee97166f5430e327c578bd57622349
Tags:elfuser-abuse_ch
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Sample tries to kill multiple processes (SIGKILL)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1583933
Start date and time:2025-01-03 21:42:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:x86_64.elf
Detection:MAL
Classification:mal64.spre.linELF@0/0@5/0
  • Connection to analysis system has been lost, crash info: Unknown
  • VT rate limit hit for: x86_64.elf
Command:/tmp/x86_64.elf
PID:5454
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
dear
Standard Error:
  • system is lnxubuntu20
  • x86_64.elf (PID: 5454, Parent: 5380, MD5: ed891007b83f07e55a4dfb6e92b1a1cc) Arguments: /tmp/x86_64.elf
  • cleanup
SourceRuleDescriptionAuthorStrings
x86_64.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0x8438:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
x86_64.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0x8c27:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
x86_64.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x7aae:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x7be4:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
x86_64.elfLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0x87e7:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
x86_64.elfLinux_Trojan_Gafgyt_33b4111aunknownunknown
  • 0x8ab2:$a: C1 83 E1 0F 74 1A B8 10 00 00 00 48 29 C8 48 8D 0C 02 48 89 DA 48
Click to see the 3 entries
SourceRuleDescriptionAuthorStrings
5454.1.0000000000400000.000000000040c000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0x8438:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
5454.1.0000000000400000.000000000040c000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0x8c27:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
5454.1.0000000000400000.000000000040c000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x7aae:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x7be4:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
5454.1.0000000000400000.000000000040c000.r-x.sdmpLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0x87e7:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
5454.1.0000000000400000.000000000040c000.r-x.sdmpLinux_Trojan_Gafgyt_33b4111aunknownunknown
  • 0x8ab2:$a: C1 83 E1 0F 74 1A B8 10 00 00 00 48 29 C8 48 8D 0C 02 48 89 DA 48
Click to see the 3 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: x86_64.elfReversingLabs: Detection: 28%
Source: x86_64.elfJoe Sandbox ML: detected
Source: x86_64.elfString: /proc/self/exeself/proc//bin/bash/bin/sh/bin/dashwgettftpncnetcatnmaptcpdumpsocatcurlbusyboxpythonrebootechoinitcroniptablessshdtelnetdtftpdrshdrexecdxinetdpftp/bin/login
Source: global trafficTCP traffic: 192.168.2.13:44246 -> 210.99.132.5:13566
Source: global trafficTCP traffic: 192.168.2.13:41314 -> 210.99.159.41:13566
Source: global trafficTCP traffic: 192.168.2.13:52158 -> 210.99.228.38:13566
Source: global trafficTCP traffic: 192.168.2.13:55814 -> 210.99.81.8:13566
Source: global trafficTCP traffic: 192.168.2.13:36224 -> 210.99.159.53:13566
Source: global trafficTCP traffic: 192.168.2.13:47182 -> 210.99.52.99:13566
Source: global trafficTCP traffic: 192.168.2.13:42452 -> 210.99.112.151:13566
Source: global trafficTCP traffic: 192.168.2.13:46204 -> 210.99.100.134:13566
Source: global trafficTCP traffic: 192.168.2.13:44586 -> 210.99.66.152:13566
Source: global trafficTCP traffic: 192.168.2.13:41822 -> 210.99.145.114:13566
Source: global trafficTCP traffic: 192.168.2.13:37202 -> 210.99.203.215:13566
Source: global trafficTCP traffic: 192.168.2.13:52022 -> 210.99.39.92:13566
Source: global trafficTCP traffic: 192.168.2.13:38238 -> 210.99.105.26:13566
Source: global trafficTCP traffic: 192.168.2.13:33094 -> 210.99.117.64:13566
Source: global trafficTCP traffic: 192.168.2.13:40982 -> 210.99.4.109:13566
Source: global trafficTCP traffic: 192.168.2.13:34336 -> 210.99.83.136:13566
Source: global trafficTCP traffic: 192.168.2.13:59526 -> 210.99.114.242:13566
Source: global trafficTCP traffic: 192.168.2.13:52712 -> 210.99.178.86:13566
Source: global trafficTCP traffic: 192.168.2.13:44556 -> 210.99.24.3:13566
Source: global trafficTCP traffic: 192.168.2.13:36304 -> 210.99.94.184:13566
Source: global trafficTCP traffic: 192.168.2.13:45932 -> 210.99.56.147:13566
Source: global trafficTCP traffic: 192.168.2.13:53820 -> 210.99.27.168:13566
Source: global trafficTCP traffic: 192.168.2.13:43710 -> 210.99.42.127:13566
Source: global trafficTCP traffic: 192.168.2.13:48658 -> 210.99.46.108:13566
Source: global trafficTCP traffic: 192.168.2.13:47132 -> 210.99.23.191:13566
Source: global trafficTCP traffic: 192.168.2.13:34536 -> 210.99.222.226:13566
Source: global trafficTCP traffic: 192.168.2.13:48714 -> 210.99.150.5:13566
Source: global trafficTCP traffic: 192.168.2.13:41860 -> 210.99.62.0:13566
Source: global trafficTCP traffic: 192.168.2.13:38568 -> 210.99.32.179:13566
Source: global trafficTCP traffic: 192.168.2.13:46442 -> 210.99.64.36:13566
Source: global trafficTCP traffic: 192.168.2.13:45502 -> 210.99.33.147:13566
Source: global trafficTCP traffic: 192.168.2.13:37618 -> 210.99.173.147:13566
Source: global trafficTCP traffic: 192.168.2.13:57892 -> 210.99.133.95:13566
Source: global trafficTCP traffic: 192.168.2.13:35772 -> 210.99.234.158:13566
Source: global trafficTCP traffic: 192.168.2.13:50220 -> 210.99.98.72:13566
Source: global trafficTCP traffic: 192.168.2.13:40886 -> 210.99.86.154:13566
Source: global trafficTCP traffic: 192.168.2.13:42740 -> 83.222.191.90:13566
Source: /tmp/x86_64.elf (PID: 5454)Socket: 127.0.0.1:8341Jump to behavior
Source: unknownDNS traffic detected: query: secure-network-rebirthltd.ru replaycode: Name error (3)
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: global trafficDNS traffic detected: DNS query: secure-network-rebirthltd.ru

System Summary

barindex
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5474, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5475, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5476, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5477, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5478, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5479, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5480, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5481, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5482, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5483, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5484, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5485, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5486, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5487, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5488, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5489, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5490, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5532, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5541, result: successfulJump to behavior
Source: Initial sampleString containing 'busybox' found: busybox
Source: Initial sampleString containing 'busybox' found: /proc/self/exeself/proc//bin/bash/bin/sh/bin/dashwgettftpncnetcatnmaptcpdumpsocatcurlbusyboxpythonrebootechoinitcroniptablessshdtelnetdtftpdrshdrexecdxinetdpftp/bin/login
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5474, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5475, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5476, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5477, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5478, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5479, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5480, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5481, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5482, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5483, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5484, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5485, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5486, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5487, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5488, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5489, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5490, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5532, result: successfulJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)SIGKILL sent: pid: 5541, result: successfulJump to behavior
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
Source: 5454.1.0000000000400000.000000000040c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: classification engineClassification label: mal64.spre.linELF@0/0@5/0
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5481/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5481/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5482/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5482/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5483/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5483/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5484/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5484/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5474/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5474/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5485/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5485/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5475/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5475/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5486/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5486/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5476/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5476/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5487/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5487/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5477/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5477/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5488/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5488/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5490/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5490/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5480/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5480/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5478/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5478/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5489/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5489/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5457/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5479/mapsJump to behavior
Source: /tmp/x86_64.elf (PID: 5456)File opened: /proc/5479/cmdlineJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path InterceptionDirect Volume Access1
OS Credential Dumping
System Service DiscoveryRemote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network Medium1
Service Stop
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583933 Sample: x86_64.elf Startdate: 03/01/2025 Architecture: LINUX Score: 64 17 secure-network-rebirthltd.ru 2->17 19 210.99.159.41, 13566, 41314 NICNETKoreaTelecomKR Korea Republic of 2->19 21 36 other IPs or domains 2->21 23 Malicious sample detected (through community Yara rule) 2->23 25 Multi AV Scanner detection for submitted file 2->25 27 Machine Learning detection for sample 2->27 8 x86_64.elf 2->8         started        signatures3 process4 process5 10 x86_64.elf 8->10         started        process6 12 x86_64.elf 10->12         started        15 x86_64.elf 10->15         started        signatures7 29 Sample tries to kill multiple processes (SIGKILL) 12->29
SourceDetectionScannerLabelLink
x86_64.elf29%ReversingLabsLinux.Backdoor.Mirai
x86_64.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
secure-network-rebirthltd.ru
unknown
unknowntrue
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    210.99.62.0
    unknownKorea Republic of
    17841NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKRfalse
    210.99.64.36
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.33.147
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.159.53
    unknownKorea Republic of
    45400NICNETKoreaTelecomKRfalse
    210.99.39.92
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.100.134
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.46.108
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.42.127
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.4.109
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.66.152
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.83.136
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.222.226
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.203.215
    unknownKorea Republic of
    9696EDAS-ASOscarEnterpriseKRfalse
    210.99.24.3
    unknownKorea Republic of
    17841NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKRfalse
    210.99.98.72
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.86.154
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.81.8
    unknownKorea Republic of
    17600ENVICO-AS-KRKOREARESOURCESRECOVERYANDREUTILIZATIONCORPfalse
    210.99.228.38
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.145.114
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.27.168
    unknownKorea Republic of
    17841NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKRfalse
    210.99.234.158
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.178.86
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.133.95
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    83.222.191.90
    unknownBulgaria
    43561NET1-ASBGfalse
    210.99.105.26
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.159.41
    unknownKorea Republic of
    45400NICNETKoreaTelecomKRfalse
    210.99.94.184
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.173.147
    unknownKorea Republic of
    45400NICNETKoreaTelecomKRfalse
    210.99.23.191
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.52.99
    unknownKorea Republic of
    17841NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKRfalse
    210.99.56.147
    unknownKorea Republic of
    17841NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKRfalse
    210.99.32.179
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.117.64
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.150.5
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.112.151
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.132.5
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.114.242
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    83.222.191.90arm5.elfGet hashmaliciousUnknownBrowse
      x86.elfGet hashmaliciousUnknownBrowse
        arm7.elfGet hashmaliciousMiraiBrowse
          arm4.elfGet hashmaliciousUnknownBrowse
            m68k.elfGet hashmaliciousUnknownBrowse
              mips.elfGet hashmaliciousUnknownBrowse
                mpsl.elfGet hashmaliciousUnknownBrowse
                  mpsl.elfGet hashmaliciousUnknownBrowse
                    m68k.elfGet hashmaliciousMiraiBrowse
                      ppc.elfGet hashmaliciousMiraiBrowse
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKRarm5.elfGet hashmaliciousUnknownBrowse
                        • 210.99.27.225
                        x86.elfGet hashmaliciousUnknownBrowse
                        • 210.99.252.114
                        arm7.elfGet hashmaliciousMiraiBrowse
                        • 210.99.50.140
                        arm4.elfGet hashmaliciousUnknownBrowse
                        • 210.99.58.159
                        mips.elfGet hashmaliciousUnknownBrowse
                        • 210.99.58.148
                        mpsl.elfGet hashmaliciousUnknownBrowse
                        • 210.99.251.181
                        loligang.x86.elfGet hashmaliciousMiraiBrowse
                        • 152.99.11.225
                        mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                        • 27.101.40.27
                        x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                        • 152.99.241.255
                        arm7.nn-20241218-0633.elfGet hashmaliciousMirai, OkiruBrowse
                        • 203.241.53.42
                        NICNETKoreaTelecomKRarm5.elfGet hashmaliciousUnknownBrowse
                        • 210.99.158.157
                        x86.elfGet hashmaliciousUnknownBrowse
                        • 210.99.91.209
                        arm7.elfGet hashmaliciousMiraiBrowse
                        • 210.99.103.22
                        arm4.elfGet hashmaliciousUnknownBrowse
                        • 210.99.173.201
                        m68k.elfGet hashmaliciousUnknownBrowse
                        • 210.99.168.215
                        mips.elfGet hashmaliciousUnknownBrowse
                        • 210.99.103.28
                        mpsl.elfGet hashmaliciousUnknownBrowse
                        • 210.99.175.253
                        teste.arm7.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                        • 210.96.87.160
                        la.bot.sh4.elfGet hashmaliciousMiraiBrowse
                        • 210.104.218.111
                        arm7.elfGet hashmaliciousMiraiBrowse
                        • 211.34.175.190
                        KIXS-AS-KRKoreaTelecomKRarm5.elfGet hashmaliciousUnknownBrowse
                        • 210.99.196.148
                        x86.elfGet hashmaliciousUnknownBrowse
                        • 210.99.179.142
                        armv6l.elfGet hashmaliciousMiraiBrowse
                        • 183.120.140.88
                        arm7.elfGet hashmaliciousMiraiBrowse
                        • 210.99.13.2
                        arm4.elfGet hashmaliciousUnknownBrowse
                        • 210.99.96.5
                        m68k.elfGet hashmaliciousUnknownBrowse
                        • 210.99.235.155
                        mips.elfGet hashmaliciousUnknownBrowse
                        • 210.99.93.155
                        mpsl.elfGet hashmaliciousUnknownBrowse
                        • 210.99.224.65
                        armv5l.elfGet hashmaliciousMiraiBrowse
                        • 220.92.130.121
                        armv7l.elfGet hashmaliciousMiraiBrowse
                        • 221.161.77.61
                        KIXS-AS-KRKoreaTelecomKRarm5.elfGet hashmaliciousUnknownBrowse
                        • 210.99.196.148
                        x86.elfGet hashmaliciousUnknownBrowse
                        • 210.99.179.142
                        armv6l.elfGet hashmaliciousMiraiBrowse
                        • 183.120.140.88
                        arm7.elfGet hashmaliciousMiraiBrowse
                        • 210.99.13.2
                        arm4.elfGet hashmaliciousUnknownBrowse
                        • 210.99.96.5
                        m68k.elfGet hashmaliciousUnknownBrowse
                        • 210.99.235.155
                        mips.elfGet hashmaliciousUnknownBrowse
                        • 210.99.93.155
                        mpsl.elfGet hashmaliciousUnknownBrowse
                        • 210.99.224.65
                        armv5l.elfGet hashmaliciousMiraiBrowse
                        • 220.92.130.121
                        armv7l.elfGet hashmaliciousMiraiBrowse
                        • 221.161.77.61
                        No context
                        No context
                        No created / dropped files found
                        File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):5.991012329464663
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:x86_64.elf
                        File size:50'464 bytes
                        MD5:ed891007b83f07e55a4dfb6e92b1a1cc
                        SHA1:e25fd8410dda41b3f4005b0e1dc66f9ee1951358
                        SHA256:b75eab90673b94fd015bc817741fe37bfaee97166f5430e327c578bd57622349
                        SHA512:93009a3a0212f713370ad8fd9e636b6eabf5b260abcee7977da70354099ca89fbf52398f7d2442d8c6a4d42b63487f0b74629ea3352f4136c955573c8e6a55bf
                        SSDEEP:1536:tFd1tcGNKHpG156FBNtvPf5HG0gPpN9T77777777777777777L7777777L777O7y:V1tvKJGTeNPf5HcpN9T777777777777/
                        TLSH:AD332907F942C0FDC459C6B00E67B53AC57735BEC239B2A677D4FB26A885F111E29848
                        File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@...............................................P.......P.....`.......................Q.td....................................................H...._....*...H........

                        ELF header

                        Class:ELF64
                        Data:2's complement, little endian
                        Version:1 (current)
                        Machine:Advanced Micro Devices X86-64
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x400194
                        Flags:0x0
                        ELF Header Size:64
                        Program Header Offset:64
                        Program Header Size:56
                        Number of Program Headers:3
                        Section Header Offset:49824
                        Section Header Size:64
                        Number of Section Headers:10
                        Header String Table Index:9
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x4000e80xe80x130x00x6AX001
                        .textPROGBITS0x4001000x1000xaa560x00x6AX0016
                        .finiPROGBITS0x40ab560xab560xe0x00x6AX001
                        .rodataPROGBITS0x40ab800xab800xe000x00x2A0032
                        .ctorsPROGBITS0x50c0000xc0000x100x00x3WA008
                        .dtorsPROGBITS0x50c0100xc0100x100x00x3WA008
                        .dataPROGBITS0x50c0400xc0400x2200x00x3WA0032
                        .bssNOBITS0x50c2600xc2600x8a80x00x3WA0032
                        .shstrtabSTRTAB0x00xc2600x3e0x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x4000000x4000000xb9800xb9806.18090x5R E0x100000.init .text .fini .rodata
                        LOAD0xc0000x50c0000x50c0000x2600xb083.15420x6RW 0x100000.ctors .dtors .data .bss
                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 3, 2025 21:42:51.250031948 CET4424613566192.168.2.13210.99.132.5
                        Jan 3, 2025 21:42:51.252392054 CET4131413566192.168.2.13210.99.159.41
                        Jan 3, 2025 21:42:51.253844976 CET5215813566192.168.2.13210.99.228.38
                        Jan 3, 2025 21:42:51.255100012 CET1356644246210.99.132.5192.168.2.13
                        Jan 3, 2025 21:42:51.255152941 CET4424613566192.168.2.13210.99.132.5
                        Jan 3, 2025 21:42:51.256417990 CET5581413566192.168.2.13210.99.81.8
                        Jan 3, 2025 21:42:51.257322073 CET1356641314210.99.159.41192.168.2.13
                        Jan 3, 2025 21:42:51.257391930 CET4131413566192.168.2.13210.99.159.41
                        Jan 3, 2025 21:42:51.257919073 CET3622413566192.168.2.13210.99.159.53
                        Jan 3, 2025 21:42:51.258661985 CET1356652158210.99.228.38192.168.2.13
                        Jan 3, 2025 21:42:51.258708954 CET5215813566192.168.2.13210.99.228.38
                        Jan 3, 2025 21:42:51.259016991 CET4718213566192.168.2.13210.99.52.99
                        Jan 3, 2025 21:42:51.260198116 CET4245213566192.168.2.13210.99.112.151
                        Jan 3, 2025 21:42:51.261226892 CET4620413566192.168.2.13210.99.100.134
                        Jan 3, 2025 21:42:51.261315107 CET1356655814210.99.81.8192.168.2.13
                        Jan 3, 2025 21:42:51.261358023 CET5581413566192.168.2.13210.99.81.8
                        Jan 3, 2025 21:42:51.262435913 CET4458613566192.168.2.13210.99.66.152
                        Jan 3, 2025 21:42:51.262679100 CET1356636224210.99.159.53192.168.2.13
                        Jan 3, 2025 21:42:51.262721062 CET3622413566192.168.2.13210.99.159.53
                        Jan 3, 2025 21:42:51.263478041 CET4182213566192.168.2.13210.99.145.114
                        Jan 3, 2025 21:42:51.263803005 CET1356647182210.99.52.99192.168.2.13
                        Jan 3, 2025 21:42:51.263856888 CET4718213566192.168.2.13210.99.52.99
                        Jan 3, 2025 21:42:51.264687061 CET3720213566192.168.2.13210.99.203.215
                        Jan 3, 2025 21:42:51.265008926 CET1356642452210.99.112.151192.168.2.13
                        Jan 3, 2025 21:42:51.265067101 CET4245213566192.168.2.13210.99.112.151
                        Jan 3, 2025 21:42:51.265753031 CET5202213566192.168.2.13210.99.39.92
                        Jan 3, 2025 21:42:51.266048908 CET1356646204210.99.100.134192.168.2.13
                        Jan 3, 2025 21:42:51.266078949 CET4620413566192.168.2.13210.99.100.134
                        Jan 3, 2025 21:42:51.267030001 CET3823813566192.168.2.13210.99.105.26
                        Jan 3, 2025 21:42:51.267473936 CET1356644586210.99.66.152192.168.2.13
                        Jan 3, 2025 21:42:51.267514944 CET4458613566192.168.2.13210.99.66.152
                        Jan 3, 2025 21:42:51.268117905 CET3309413566192.168.2.13210.99.117.64
                        Jan 3, 2025 21:42:51.268623114 CET1356641822210.99.145.114192.168.2.13
                        Jan 3, 2025 21:42:51.268661976 CET4182213566192.168.2.13210.99.145.114
                        Jan 3, 2025 21:42:51.269309998 CET4098213566192.168.2.13210.99.4.109
                        Jan 3, 2025 21:42:51.269781113 CET1356637202210.99.203.215192.168.2.13
                        Jan 3, 2025 21:42:51.269823074 CET3720213566192.168.2.13210.99.203.215
                        Jan 3, 2025 21:42:51.270323992 CET3433613566192.168.2.13210.99.83.136
                        Jan 3, 2025 21:42:51.270863056 CET1356652022210.99.39.92192.168.2.13
                        Jan 3, 2025 21:42:51.270905018 CET5202213566192.168.2.13210.99.39.92
                        Jan 3, 2025 21:42:51.271491051 CET5952613566192.168.2.13210.99.114.242
                        Jan 3, 2025 21:42:51.272269964 CET1356638238210.99.105.26192.168.2.13
                        Jan 3, 2025 21:42:51.272309065 CET3823813566192.168.2.13210.99.105.26
                        Jan 3, 2025 21:42:51.272495031 CET5271213566192.168.2.13210.99.178.86
                        Jan 3, 2025 21:42:51.273430109 CET1356633094210.99.117.64192.168.2.13
                        Jan 3, 2025 21:42:51.273475885 CET3309413566192.168.2.13210.99.117.64
                        Jan 3, 2025 21:42:51.273658991 CET4455613566192.168.2.13210.99.24.3
                        Jan 3, 2025 21:42:51.274601936 CET1356640982210.99.4.109192.168.2.13
                        Jan 3, 2025 21:42:51.274646044 CET4098213566192.168.2.13210.99.4.109
                        Jan 3, 2025 21:42:51.274671078 CET3630413566192.168.2.13210.99.94.184
                        Jan 3, 2025 21:42:51.275666952 CET1356634336210.99.83.136192.168.2.13
                        Jan 3, 2025 21:42:51.275708914 CET3433613566192.168.2.13210.99.83.136
                        Jan 3, 2025 21:42:51.275916100 CET4593213566192.168.2.13210.99.56.147
                        Jan 3, 2025 21:42:51.276941061 CET5382013566192.168.2.13210.99.27.168
                        Jan 3, 2025 21:42:51.277064085 CET1356659526210.99.114.242192.168.2.13
                        Jan 3, 2025 21:42:51.277106047 CET5952613566192.168.2.13210.99.114.242
                        Jan 3, 2025 21:42:51.278158903 CET4371013566192.168.2.13210.99.42.127
                        Jan 3, 2025 21:42:51.278201103 CET1356652712210.99.178.86192.168.2.13
                        Jan 3, 2025 21:42:51.278233051 CET5271213566192.168.2.13210.99.178.86
                        Jan 3, 2025 21:42:51.279175043 CET4865813566192.168.2.13210.99.46.108
                        Jan 3, 2025 21:42:51.279383898 CET1356644556210.99.24.3192.168.2.13
                        Jan 3, 2025 21:42:51.279424906 CET4455613566192.168.2.13210.99.24.3
                        Jan 3, 2025 21:42:51.280406952 CET4713213566192.168.2.13210.99.23.191
                        Jan 3, 2025 21:42:51.280466080 CET1356636304210.99.94.184192.168.2.13
                        Jan 3, 2025 21:42:51.280503988 CET3630413566192.168.2.13210.99.94.184
                        Jan 3, 2025 21:42:51.281434059 CET3453613566192.168.2.13210.99.222.226
                        Jan 3, 2025 21:42:51.281899929 CET1356645932210.99.56.147192.168.2.13
                        Jan 3, 2025 21:42:51.281930923 CET1356653820210.99.27.168192.168.2.13
                        Jan 3, 2025 21:42:51.281939030 CET4593213566192.168.2.13210.99.56.147
                        Jan 3, 2025 21:42:51.281980991 CET5382013566192.168.2.13210.99.27.168
                        Jan 3, 2025 21:42:51.282694101 CET4871413566192.168.2.13210.99.150.5
                        Jan 3, 2025 21:42:51.283006907 CET1356643710210.99.42.127192.168.2.13
                        Jan 3, 2025 21:42:51.283036947 CET4371013566192.168.2.13210.99.42.127
                        Jan 3, 2025 21:42:51.283651114 CET4186013566192.168.2.13210.99.62.0
                        Jan 3, 2025 21:42:51.284159899 CET1356648658210.99.46.108192.168.2.13
                        Jan 3, 2025 21:42:51.284185886 CET4865813566192.168.2.13210.99.46.108
                        Jan 3, 2025 21:42:51.284842014 CET3856813566192.168.2.13210.99.32.179
                        Jan 3, 2025 21:42:51.285245895 CET1356647132210.99.23.191192.168.2.13
                        Jan 3, 2025 21:42:51.285299063 CET4713213566192.168.2.13210.99.23.191
                        Jan 3, 2025 21:42:51.285352945 CET4644213566192.168.2.13210.99.64.36
                        Jan 3, 2025 21:42:51.285897017 CET4550213566192.168.2.13210.99.33.147
                        Jan 3, 2025 21:42:51.286425114 CET3761813566192.168.2.13210.99.173.147
                        Jan 3, 2025 21:42:51.286648035 CET1356634536210.99.222.226192.168.2.13
                        Jan 3, 2025 21:42:51.286689043 CET3453613566192.168.2.13210.99.222.226
                        Jan 3, 2025 21:42:51.286967039 CET5789213566192.168.2.13210.99.133.95
                        Jan 3, 2025 21:42:51.287492990 CET3577213566192.168.2.13210.99.234.158
                        Jan 3, 2025 21:42:51.287839890 CET1356648714210.99.150.5192.168.2.13
                        Jan 3, 2025 21:42:51.287900925 CET4871413566192.168.2.13210.99.150.5
                        Jan 3, 2025 21:42:51.288049936 CET5022013566192.168.2.13210.99.98.72
                        Jan 3, 2025 21:42:51.288589001 CET4088613566192.168.2.13210.99.86.154
                        Jan 3, 2025 21:42:51.288921118 CET1356641860210.99.62.0192.168.2.13
                        Jan 3, 2025 21:42:51.288965940 CET4186013566192.168.2.13210.99.62.0
                        Jan 3, 2025 21:42:51.290034056 CET1356638568210.99.32.179192.168.2.13
                        Jan 3, 2025 21:42:51.290152073 CET3856813566192.168.2.13210.99.32.179
                        Jan 3, 2025 21:42:51.291439056 CET1356646442210.99.64.36192.168.2.13
                        Jan 3, 2025 21:42:51.291480064 CET4644213566192.168.2.13210.99.64.36
                        Jan 3, 2025 21:42:51.291488886 CET1356645502210.99.33.147192.168.2.13
                        Jan 3, 2025 21:42:51.291517973 CET1356637618210.99.173.147192.168.2.13
                        Jan 3, 2025 21:42:51.291528940 CET4550213566192.168.2.13210.99.33.147
                        Jan 3, 2025 21:42:51.291608095 CET3761813566192.168.2.13210.99.173.147
                        Jan 3, 2025 21:42:51.292643070 CET1356657892210.99.133.95192.168.2.13
                        Jan 3, 2025 21:42:51.292670965 CET1356635772210.99.234.158192.168.2.13
                        Jan 3, 2025 21:42:51.292684078 CET5789213566192.168.2.13210.99.133.95
                        Jan 3, 2025 21:42:51.292710066 CET3577213566192.168.2.13210.99.234.158
                        Jan 3, 2025 21:42:51.293764114 CET1356650220210.99.98.72192.168.2.13
                        Jan 3, 2025 21:42:51.293793917 CET1356640886210.99.86.154192.168.2.13
                        Jan 3, 2025 21:42:51.293819904 CET5022013566192.168.2.13210.99.98.72
                        Jan 3, 2025 21:42:51.293839931 CET4088613566192.168.2.13210.99.86.154
                        Jan 3, 2025 21:42:51.329142094 CET4274013566192.168.2.1383.222.191.90
                        Jan 3, 2025 21:42:51.333977938 CET135664274083.222.191.90192.168.2.13
                        Jan 3, 2025 21:42:51.334024906 CET4274013566192.168.2.1383.222.191.90
                        Jan 3, 2025 21:42:51.334630013 CET4274013566192.168.2.1383.222.191.90
                        Jan 3, 2025 21:42:51.339435101 CET135664274083.222.191.90192.168.2.13
                        Jan 3, 2025 21:42:51.339477062 CET4274013566192.168.2.1383.222.191.90
                        Jan 3, 2025 21:42:51.344295025 CET135664274083.222.191.90192.168.2.13
                        Jan 3, 2025 21:43:01.343430042 CET4274013566192.168.2.1383.222.191.90
                        Jan 3, 2025 21:43:01.348228931 CET135664274083.222.191.90192.168.2.13
                        Jan 3, 2025 21:43:01.544647932 CET135664274083.222.191.90192.168.2.13
                        Jan 3, 2025 21:43:01.544935942 CET4274013566192.168.2.1383.222.191.90
                        Jan 3, 2025 21:43:01.906466007 CET135664274083.222.191.90192.168.2.13
                        Jan 3, 2025 21:43:01.906531096 CET4274013566192.168.2.1383.222.191.90
                        Jan 3, 2025 21:44:01.966679096 CET4274013566192.168.2.1383.222.191.90
                        Jan 3, 2025 21:44:01.972881079 CET135664274083.222.191.90192.168.2.13
                        Jan 3, 2025 21:44:02.169419050 CET135664274083.222.191.90192.168.2.13
                        Jan 3, 2025 21:44:02.169467926 CET4274013566192.168.2.1383.222.191.90
                        Jan 3, 2025 21:44:02.906445026 CET135664274083.222.191.90192.168.2.13
                        Jan 3, 2025 21:44:02.906500101 CET4274013566192.168.2.1383.222.191.90
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 3, 2025 21:42:51.290544987 CET3563553192.168.2.138.8.8.8
                        Jan 3, 2025 21:42:51.297544956 CET53356358.8.8.8192.168.2.13
                        Jan 3, 2025 21:42:51.298351049 CET4247653192.168.2.138.8.8.8
                        Jan 3, 2025 21:42:51.305658102 CET53424768.8.8.8192.168.2.13
                        Jan 3, 2025 21:42:51.306281090 CET3791753192.168.2.138.8.8.8
                        Jan 3, 2025 21:42:51.313218117 CET53379178.8.8.8192.168.2.13
                        Jan 3, 2025 21:42:51.313810110 CET4735153192.168.2.138.8.8.8
                        Jan 3, 2025 21:42:51.321136951 CET53473518.8.8.8192.168.2.13
                        Jan 3, 2025 21:42:51.321736097 CET4445453192.168.2.138.8.8.8
                        Jan 3, 2025 21:42:51.328855038 CET53444548.8.8.8192.168.2.13
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 3, 2025 21:42:51.290544987 CET192.168.2.138.8.8.80xec0Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:42:51.298351049 CET192.168.2.138.8.8.80xec0Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:42:51.306281090 CET192.168.2.138.8.8.80xec0Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:42:51.313810110 CET192.168.2.138.8.8.80xec0Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:42:51.321736097 CET192.168.2.138.8.8.80xec0Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 3, 2025 21:42:51.297544956 CET8.8.8.8192.168.2.130xec0Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:42:51.305658102 CET8.8.8.8192.168.2.130xec0Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:42:51.313218117 CET8.8.8.8192.168.2.130xec0Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:42:51.321136951 CET8.8.8.8192.168.2.130xec0Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:42:51.328855038 CET8.8.8.8192.168.2.130xec0Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):20:42:50
                        Start date (UTC):03/01/2025
                        Path:/tmp/x86_64.elf
                        Arguments:/tmp/x86_64.elf
                        File size:50464 bytes
                        MD5 hash:ed891007b83f07e55a4dfb6e92b1a1cc

                        Start time (UTC):20:42:50
                        Start date (UTC):03/01/2025
                        Path:/tmp/x86_64.elf
                        Arguments:-
                        File size:50464 bytes
                        MD5 hash:ed891007b83f07e55a4dfb6e92b1a1cc

                        Start time (UTC):20:42:50
                        Start date (UTC):03/01/2025
                        Path:/tmp/x86_64.elf
                        Arguments:-
                        File size:50464 bytes
                        MD5 hash:ed891007b83f07e55a4dfb6e92b1a1cc

                        Start time (UTC):20:42:50
                        Start date (UTC):03/01/2025
                        Path:/tmp/x86_64.elf
                        Arguments:-
                        File size:50464 bytes
                        MD5 hash:ed891007b83f07e55a4dfb6e92b1a1cc