Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
ppc.elf

Overview

General Information

Sample name:ppc.elf
Analysis ID:1583936
MD5:b526dd0417d246e72364bce37b0cbeaa
SHA1:fa1356fbb4a64e677f38e34b1f6c12f78342cd4c
SHA256:73363cf068841767dd08e4caac4f5a2eca9b39a30c1e7efcb243e97c3c8b7292
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Sample tries to kill multiple processes (SIGKILL)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1583936
Start date and time:2025-01-03 21:47:05 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 3s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ppc.elf
Detection:MAL
Classification:mal52.spre.linELF@0/21@5/0
  • Connection to analysis system has been lost, crash info: Unknown
  • VT rate limit hit for: ppc.elf
Command:/tmp/ppc.elf
PID:6249
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
dear
Standard Error:
  • system is lnxubuntu20
  • ppc.elf (PID: 6249, Parent: 6168, MD5: ae65271c943d3451b7f026d1fadccea6) Arguments: /tmp/ppc.elf
    • ppc.elf New Fork (PID: 6251, Parent: 6249)
      • ppc.elf New Fork (PID: 6253, Parent: 6251)
      • ppc.elf New Fork (PID: 6255, Parent: 6251)
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ppc.elfReversingLabs: Detection: 23%
Source: ppc.elfString: /proc/self/exe/. self/proc//bin/bash/bin/sh/bin/dashbashshftpwgettftpncnetcatnmaptcpdumpsocatcurlbusyboxpythonrebootechoinitcroniptablessshdtelnettelnetdtftpdrshdrexecdftpdxinetdpftp/bin/login
Source: global trafficTCP traffic: 192.168.2.23:46016 -> 210.99.75.30:13566
Source: global trafficTCP traffic: 192.168.2.23:32830 -> 210.99.50.186:13566
Source: global trafficTCP traffic: 192.168.2.23:35798 -> 210.99.125.144:13566
Source: global trafficTCP traffic: 192.168.2.23:55146 -> 210.99.2.78:13566
Source: global trafficTCP traffic: 192.168.2.23:44726 -> 210.99.158.93:13566
Source: global trafficTCP traffic: 192.168.2.23:34620 -> 210.99.147.248:13566
Source: global trafficTCP traffic: 192.168.2.23:34322 -> 210.99.44.210:13566
Source: global trafficTCP traffic: 192.168.2.23:56012 -> 210.99.67.90:13566
Source: global trafficTCP traffic: 192.168.2.23:40068 -> 210.99.147.242:13566
Source: global trafficTCP traffic: 192.168.2.23:41436 -> 210.99.34.176:13566
Source: global trafficTCP traffic: 192.168.2.23:54974 -> 210.99.22.228:13566
Source: global trafficTCP traffic: 192.168.2.23:43190 -> 210.99.212.237:13566
Source: global trafficTCP traffic: 192.168.2.23:49914 -> 210.99.142.203:13566
Source: global trafficTCP traffic: 192.168.2.23:52586 -> 210.99.239.73:13566
Source: global trafficTCP traffic: 192.168.2.23:57322 -> 210.99.207.144:13566
Source: global trafficTCP traffic: 192.168.2.23:34296 -> 210.99.215.26:13566
Source: global trafficTCP traffic: 192.168.2.23:37736 -> 210.99.174.9:13566
Source: global trafficTCP traffic: 192.168.2.23:50722 -> 210.99.212.43:13566
Source: global trafficTCP traffic: 192.168.2.23:33284 -> 210.99.153.214:13566
Source: global trafficTCP traffic: 192.168.2.23:42586 -> 83.222.191.90:13566
Source: /tmp/ppc.elf (PID: 6249)Socket: 127.0.0.1:8341Jump to behavior
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownDNS traffic detected: query: secure-network-rebirthltd.ru replaycode: Name error (3)
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
Source: global trafficDNS traffic detected: DNS query: secure-network-rebirthltd.ru
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

System Summary

barindex
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6255, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6272, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6273, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6274, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6275, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6276, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6277, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6278, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6279, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6280, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6281, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6282, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6283, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6284, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6285, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6286, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6287, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6288, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6289, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6326, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6340, result: successfulJump to behavior
Source: Initial sampleString containing 'busybox' found: busybox
Source: Initial sampleString containing 'busybox' found: /proc/self/exe/. self/proc//bin/bash/bin/sh/bin/dashbashshftpwgettftpncnetcatnmaptcpdumpsocatcurlbusyboxpythonrebootechoinitcroniptablessshdtelnettelnetdtftpdrshdrexecdftpdxinetdpftp/bin/login
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6255, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6272, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6273, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6274, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6275, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6276, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6277, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6278, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6279, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6280, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6281, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6282, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6283, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6284, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6285, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6286, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6287, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6288, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6289, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6326, result: successfulJump to behavior
Source: /tmp/ppc.elf (PID: 6253)SIGKILL sent: pid: 6340, result: successfulJump to behavior
Source: classification engineClassification label: mal52.spre.linELF@0/21@5/0
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6274/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6274/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6285/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6285/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6273/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6273/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6284/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6284/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6276/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6276/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6287/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6287/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6275/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6275/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6286/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6286/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6278/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6278/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6289/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6289/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6255/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6255/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6277/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6277/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6288/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6288/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6279/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6279/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6281/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6281/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6280/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6280/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6272/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6272/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6283/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6283/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6282/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6282/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6326/mapsJump to behavior
Source: /tmp/ppc.elf (PID: 6253)File opened: /proc/6326/cmdlineJump to behavior
Source: /tmp/ppc.elf (PID: 6249)Queries kernel information via 'uname': Jump to behavior
Source: ppc.elf, 6249.1.000055a6e54bf000.000055a6e556f000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc1
Source: ppc.elf, 6249.1.00007ffc7cd83000.00007ffc7cda4000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-ppc/tmp/ppc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/ppc.elf
Source: ppc.elf, 6249.1.000055a6e54bf000.000055a6e556f000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
Source: ppc.elf, 6249.1.00007ffc7cd83000.00007ffc7cda4000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network Medium1
Service Stop
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583936 Sample: ppc.elf Startdate: 03/01/2025 Architecture: LINUX Score: 52 17 210.99.158.93, 13566, 44726 NICNETKoreaTelecomKR Korea Republic of 2->17 19 210.99.174.9, 13566, 37736 NICNETKoreaTelecomKR Korea Republic of 2->19 21 22 other IPs or domains 2->21 23 Multi AV Scanner detection for submitted file 2->23 8 ppc.elf 2->8         started        signatures3 process4 process5 10 ppc.elf 8->10         started        process6 12 ppc.elf 10->12         started        15 ppc.elf 10->15         started        signatures7 25 Sample tries to kill multiple processes (SIGKILL) 12->25
SourceDetectionScannerLabelLink
ppc.elf24%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
secure-network-rebirthltd.ru
unknown
unknownfalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    210.99.2.78
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.153.214
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.147.242
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.239.73
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    83.222.191.90
    unknownBulgaria
    43561NET1-ASBGfalse
    210.99.147.248
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.158.93
    unknownKorea Republic of
    45400NICNETKoreaTelecomKRfalse
    210.99.22.228
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.215.26
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    109.202.202.202
    unknownSwitzerland
    13030INIT7CHfalse
    210.99.44.210
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.212.43
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.212.237
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.75.30
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.67.90
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.174.9
    unknownKorea Republic of
    45400NICNETKoreaTelecomKRfalse
    210.99.34.176
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.50.186
    unknownKorea Republic of
    17841NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKRfalse
    210.99.142.203
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.125.144
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    210.99.207.144
    unknownKorea Republic of
    4766KIXS-AS-KRKoreaTelecomKRfalse
    91.189.91.43
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    91.189.91.42
    unknownUnited Kingdom
    41231CANONICAL-ASGBfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    83.222.191.90spc.elfGet hashmaliciousUnknownBrowse
      x86_64.elfGet hashmaliciousUnknownBrowse
        arm5.elfGet hashmaliciousUnknownBrowse
          x86.elfGet hashmaliciousUnknownBrowse
            arm7.elfGet hashmaliciousMiraiBrowse
              arm4.elfGet hashmaliciousUnknownBrowse
                m68k.elfGet hashmaliciousUnknownBrowse
                  mips.elfGet hashmaliciousUnknownBrowse
                    mpsl.elfGet hashmaliciousUnknownBrowse
                      mpsl.elfGet hashmaliciousUnknownBrowse
                        210.99.215.26CuruFoiJiK.elfGet hashmaliciousMiraiBrowse
                        • /GponForm/diag_Form?images/
                        109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                        • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        KIXS-AS-KRKoreaTelecomKRspc.elfGet hashmaliciousUnknownBrowse
                        • 210.99.43.52
                        x86_64.elfGet hashmaliciousUnknownBrowse
                        • 210.99.114.242
                        arm5.elfGet hashmaliciousUnknownBrowse
                        • 210.99.196.148
                        x86.elfGet hashmaliciousUnknownBrowse
                        • 210.99.179.142
                        armv6l.elfGet hashmaliciousMiraiBrowse
                        • 183.120.140.88
                        arm7.elfGet hashmaliciousMiraiBrowse
                        • 210.99.13.2
                        arm4.elfGet hashmaliciousUnknownBrowse
                        • 210.99.96.5
                        m68k.elfGet hashmaliciousUnknownBrowse
                        • 210.99.235.155
                        mips.elfGet hashmaliciousUnknownBrowse
                        • 210.99.93.155
                        mpsl.elfGet hashmaliciousUnknownBrowse
                        • 210.99.224.65
                        KIXS-AS-KRKoreaTelecomKRspc.elfGet hashmaliciousUnknownBrowse
                        • 210.99.43.52
                        x86_64.elfGet hashmaliciousUnknownBrowse
                        • 210.99.114.242
                        arm5.elfGet hashmaliciousUnknownBrowse
                        • 210.99.196.148
                        x86.elfGet hashmaliciousUnknownBrowse
                        • 210.99.179.142
                        armv6l.elfGet hashmaliciousMiraiBrowse
                        • 183.120.140.88
                        arm7.elfGet hashmaliciousMiraiBrowse
                        • 210.99.13.2
                        arm4.elfGet hashmaliciousUnknownBrowse
                        • 210.99.96.5
                        m68k.elfGet hashmaliciousUnknownBrowse
                        • 210.99.235.155
                        mips.elfGet hashmaliciousUnknownBrowse
                        • 210.99.93.155
                        mpsl.elfGet hashmaliciousUnknownBrowse
                        • 210.99.224.65
                        KIXS-AS-KRKoreaTelecomKRspc.elfGet hashmaliciousUnknownBrowse
                        • 210.99.43.52
                        x86_64.elfGet hashmaliciousUnknownBrowse
                        • 210.99.114.242
                        arm5.elfGet hashmaliciousUnknownBrowse
                        • 210.99.196.148
                        x86.elfGet hashmaliciousUnknownBrowse
                        • 210.99.179.142
                        armv6l.elfGet hashmaliciousMiraiBrowse
                        • 183.120.140.88
                        arm7.elfGet hashmaliciousMiraiBrowse
                        • 210.99.13.2
                        arm4.elfGet hashmaliciousUnknownBrowse
                        • 210.99.96.5
                        m68k.elfGet hashmaliciousUnknownBrowse
                        • 210.99.235.155
                        mips.elfGet hashmaliciousUnknownBrowse
                        • 210.99.93.155
                        mpsl.elfGet hashmaliciousUnknownBrowse
                        • 210.99.224.65
                        KIXS-AS-KRKoreaTelecomKRspc.elfGet hashmaliciousUnknownBrowse
                        • 210.99.43.52
                        x86_64.elfGet hashmaliciousUnknownBrowse
                        • 210.99.114.242
                        arm5.elfGet hashmaliciousUnknownBrowse
                        • 210.99.196.148
                        x86.elfGet hashmaliciousUnknownBrowse
                        • 210.99.179.142
                        armv6l.elfGet hashmaliciousMiraiBrowse
                        • 183.120.140.88
                        arm7.elfGet hashmaliciousMiraiBrowse
                        • 210.99.13.2
                        arm4.elfGet hashmaliciousUnknownBrowse
                        • 210.99.96.5
                        m68k.elfGet hashmaliciousUnknownBrowse
                        • 210.99.235.155
                        mips.elfGet hashmaliciousUnknownBrowse
                        • 210.99.93.155
                        mpsl.elfGet hashmaliciousUnknownBrowse
                        • 210.99.224.65
                        No context
                        No context
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Reputation:low
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Reputation:low
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Reputation:low
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Reputation:low
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Reputation:low
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Reputation:low
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Reputation:low
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Reputation:low
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Reputation:low
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Reputation:low
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        Process:/tmp/ppc.elf
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):267
                        Entropy (8bit):3.1431234409557995
                        Encrypted:false
                        SSDEEP:6:MmtdDFZVpgVqY/V05sDF2/lr/VfKoO/VNfiY/VH:MmtdppgV25EsQl
                        MD5:D849C968545B352A70F9897B11BF68D3
                        SHA1:E22D7F3736973C157758AC99DB4ABDB525387800
                        SHA-256:0D6C39950FC8991E43EE6FB66090EDB188EBACD5D9DF4F32746E65FFB6986494
                        SHA-512:4AABB3C24A57A79504DECA11EBAA14A6E3DD0584692ACEE50545D7E4AB0E6AA4B82823899F4369F915A82EC714DE5E4150A588EB539731DC42BB32F7FA3226E0
                        Malicious:false
                        Preview:10000000-1000c000 r-xp 00000000 fd:00 531606 /tmp/..1001c000-1001d000 rw-p 0000c000 fd:00 531606 /tmp/..1001d000-1001e000 rw-p 00000000 00:00 0 .ff7fe000-ff7ff000 ---p 00000000 00:00 0 .ff7ff000-fffff000 rw-p 00000000 00:00 0 [stack].
                        File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):6.177668784787005
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:ppc.elf
                        File size:50'304 bytes
                        MD5:b526dd0417d246e72364bce37b0cbeaa
                        SHA1:fa1356fbb4a64e677f38e34b1f6c12f78342cd4c
                        SHA256:73363cf068841767dd08e4caac4f5a2eca9b39a30c1e7efcb243e97c3c8b7292
                        SHA512:6177c574b9cd501fbc7268e6e15fb6c878745d0c1ab85ce6b866db08ea3e1eb318e7ee9bf807d25f1fd0b70c8f568ac679fb0ae26af28b61a5f7dd54f30000b0
                        SSDEEP:768:ppT/xDdQQxxJ2bVvG1UWwR4knpzKLhfP4I6+0vn5N:pN/BaQ4Jva9wchn4IRqn5N
                        TLSH:E9333C03321C0A63D5A21AB4253F17F097FFAA9031E4B289685FAB5685B5F332446FDD
                        File Content Preview:.ELF...........................4.........4. ...(.......................<...<...........................T............dt.Q.............................!..|......$H...H......$8!. |...N.. .!..|.......?.............../...@..\?........+../...A..$8...})......N..

                        ELF header

                        Class:ELF32
                        Data:2's complement, big endian
                        Version:1 (current)
                        Machine:PowerPC
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x100001f0
                        Flags:0x0
                        ELF Header Size:52
                        Program Header Offset:52
                        Program Header Size:32
                        Number of Program Headers:3
                        Section Header Offset:49824
                        Section Header Size:40
                        Number of Section Headers:12
                        Header String Table Index:11
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x100000940x940x240x00x6AX004
                        .textPROGBITS0x100000b80xb80xb2500x00x6AX004
                        .finiPROGBITS0x1000b3080xb3080x200x00x6AX004
                        .rodataPROGBITS0x1000b3280xb3280xa140x00x2A004
                        .ctorsPROGBITS0x1001c0000xc0000x80x00x3WA004
                        .dtorsPROGBITS0x1001c0080xc0080x80x00x3WA004
                        .dataPROGBITS0x1001c0180xc0180x2240x00x3WA008
                        .sdataPROGBITS0x1001c23c0xc23c0x180x00x3WA004
                        .sbssNOBITS0x1001c2540xc2540x5c0x00x3WA004
                        .bssNOBITS0x1001c2b00xc2540x10c0x00x3WA004
                        .shstrtabSTRTAB0x00xc2540x4b0x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x100000000x100000000xbd3c0xbd3c6.27930x5R E0x10000.init .text .fini .rodata
                        LOAD0xc0000x1001c0000x1001c0000x2540x3bc3.23950x6RW 0x10000.ctors .dtors .data .sdata .sbss .bss
                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 3, 2025 21:47:50.190901995 CET4601613566192.168.2.23210.99.75.30
                        Jan 3, 2025 21:47:50.195791006 CET1356646016210.99.75.30192.168.2.23
                        Jan 3, 2025 21:47:50.195869923 CET4601613566192.168.2.23210.99.75.30
                        Jan 3, 2025 21:47:50.212964058 CET4601613566192.168.2.23210.99.75.30
                        Jan 3, 2025 21:47:50.217840910 CET1356646016210.99.75.30192.168.2.23
                        Jan 3, 2025 21:47:50.217889071 CET4601613566192.168.2.23210.99.75.30
                        Jan 3, 2025 21:47:50.222173929 CET3283013566192.168.2.23210.99.50.186
                        Jan 3, 2025 21:47:50.226954937 CET1356632830210.99.50.186192.168.2.23
                        Jan 3, 2025 21:47:50.227026939 CET3283013566192.168.2.23210.99.50.186
                        Jan 3, 2025 21:47:50.227375031 CET3283013566192.168.2.23210.99.50.186
                        Jan 3, 2025 21:47:50.229281902 CET3579813566192.168.2.23210.99.125.144
                        Jan 3, 2025 21:47:50.231585979 CET5514613566192.168.2.23210.99.2.78
                        Jan 3, 2025 21:47:50.232192039 CET1356632830210.99.50.186192.168.2.23
                        Jan 3, 2025 21:47:50.232232094 CET3283013566192.168.2.23210.99.50.186
                        Jan 3, 2025 21:47:50.234070063 CET1356635798210.99.125.144192.168.2.23
                        Jan 3, 2025 21:47:50.234180927 CET3579813566192.168.2.23210.99.125.144
                        Jan 3, 2025 21:47:50.236339092 CET1356655146210.99.2.78192.168.2.23
                        Jan 3, 2025 21:47:50.236381054 CET5514613566192.168.2.23210.99.2.78
                        Jan 3, 2025 21:47:50.245095015 CET5514613566192.168.2.23210.99.2.78
                        Jan 3, 2025 21:47:50.247342110 CET4472613566192.168.2.23210.99.158.93
                        Jan 3, 2025 21:47:50.249090910 CET3462013566192.168.2.23210.99.147.248
                        Jan 3, 2025 21:47:50.249919891 CET1356655146210.99.2.78192.168.2.23
                        Jan 3, 2025 21:47:50.249999046 CET5514613566192.168.2.23210.99.2.78
                        Jan 3, 2025 21:47:50.252202988 CET1356644726210.99.158.93192.168.2.23
                        Jan 3, 2025 21:47:50.252258062 CET4472613566192.168.2.23210.99.158.93
                        Jan 3, 2025 21:47:50.253890038 CET1356634620210.99.147.248192.168.2.23
                        Jan 3, 2025 21:47:50.253952980 CET3462013566192.168.2.23210.99.147.248
                        Jan 3, 2025 21:47:50.262851000 CET3462013566192.168.2.23210.99.147.248
                        Jan 3, 2025 21:47:50.264045000 CET3432213566192.168.2.23210.99.44.210
                        Jan 3, 2025 21:47:50.267443895 CET5601213566192.168.2.23210.99.67.90
                        Jan 3, 2025 21:47:50.267755985 CET1356634620210.99.147.248192.168.2.23
                        Jan 3, 2025 21:47:50.267798901 CET3462013566192.168.2.23210.99.147.248
                        Jan 3, 2025 21:47:50.268819094 CET1356634322210.99.44.210192.168.2.23
                        Jan 3, 2025 21:47:50.268871069 CET3432213566192.168.2.23210.99.44.210
                        Jan 3, 2025 21:47:50.270236015 CET4006813566192.168.2.23210.99.147.242
                        Jan 3, 2025 21:47:50.272217989 CET1356656012210.99.67.90192.168.2.23
                        Jan 3, 2025 21:47:50.272273064 CET5601213566192.168.2.23210.99.67.90
                        Jan 3, 2025 21:47:50.273648024 CET4143613566192.168.2.23210.99.34.176
                        Jan 3, 2025 21:47:50.275055885 CET1356640068210.99.147.242192.168.2.23
                        Jan 3, 2025 21:47:50.275098085 CET4006813566192.168.2.23210.99.147.242
                        Jan 3, 2025 21:47:50.276732922 CET5497413566192.168.2.23210.99.22.228
                        Jan 3, 2025 21:47:50.278477907 CET1356641436210.99.34.176192.168.2.23
                        Jan 3, 2025 21:47:50.278523922 CET4143613566192.168.2.23210.99.34.176
                        Jan 3, 2025 21:47:50.279923916 CET4319013566192.168.2.23210.99.212.237
                        Jan 3, 2025 21:47:50.281488895 CET1356654974210.99.22.228192.168.2.23
                        Jan 3, 2025 21:47:50.281531096 CET5497413566192.168.2.23210.99.22.228
                        Jan 3, 2025 21:47:50.283675909 CET4991413566192.168.2.23210.99.142.203
                        Jan 3, 2025 21:47:50.284696102 CET1356643190210.99.212.237192.168.2.23
                        Jan 3, 2025 21:47:50.284733057 CET4319013566192.168.2.23210.99.212.237
                        Jan 3, 2025 21:47:50.287520885 CET5258613566192.168.2.23210.99.239.73
                        Jan 3, 2025 21:47:50.288453102 CET1356649914210.99.142.203192.168.2.23
                        Jan 3, 2025 21:47:50.288496971 CET4991413566192.168.2.23210.99.142.203
                        Jan 3, 2025 21:47:50.288676977 CET5732213566192.168.2.23210.99.207.144
                        Jan 3, 2025 21:47:50.289886951 CET3429613566192.168.2.23210.99.215.26
                        Jan 3, 2025 21:47:50.291076899 CET3773613566192.168.2.23210.99.174.9
                        Jan 3, 2025 21:47:50.291681051 CET5072213566192.168.2.23210.99.212.43
                        Jan 3, 2025 21:47:50.292283058 CET3328413566192.168.2.23210.99.153.214
                        Jan 3, 2025 21:47:50.292332888 CET1356652586210.99.239.73192.168.2.23
                        Jan 3, 2025 21:47:50.292372942 CET5258613566192.168.2.23210.99.239.73
                        Jan 3, 2025 21:47:50.293431997 CET1356657322210.99.207.144192.168.2.23
                        Jan 3, 2025 21:47:50.293471098 CET5732213566192.168.2.23210.99.207.144
                        Jan 3, 2025 21:47:50.294764042 CET1356634296210.99.215.26192.168.2.23
                        Jan 3, 2025 21:47:50.294810057 CET3429613566192.168.2.23210.99.215.26
                        Jan 3, 2025 21:47:50.295865059 CET1356637736210.99.174.9192.168.2.23
                        Jan 3, 2025 21:47:50.295901060 CET3773613566192.168.2.23210.99.174.9
                        Jan 3, 2025 21:47:50.297082901 CET1356650722210.99.212.43192.168.2.23
                        Jan 3, 2025 21:47:50.297092915 CET1356633284210.99.153.214192.168.2.23
                        Jan 3, 2025 21:47:50.297125101 CET5072213566192.168.2.23210.99.212.43
                        Jan 3, 2025 21:47:50.297147989 CET3328413566192.168.2.23210.99.153.214
                        Jan 3, 2025 21:47:50.334935904 CET4258613566192.168.2.2383.222.191.90
                        Jan 3, 2025 21:47:50.339714050 CET135664258683.222.191.90192.168.2.23
                        Jan 3, 2025 21:47:50.339771986 CET4258613566192.168.2.2383.222.191.90
                        Jan 3, 2025 21:47:50.340527058 CET4258613566192.168.2.2383.222.191.90
                        Jan 3, 2025 21:47:50.345262051 CET135664258683.222.191.90192.168.2.23
                        Jan 3, 2025 21:47:50.345308065 CET4258613566192.168.2.2383.222.191.90
                        Jan 3, 2025 21:47:50.350128889 CET135664258683.222.191.90192.168.2.23
                        Jan 3, 2025 21:47:52.522023916 CET43928443192.168.2.2391.189.91.42
                        Jan 3, 2025 21:47:57.897458076 CET42836443192.168.2.2391.189.91.43
                        Jan 3, 2025 21:47:59.433063030 CET4251680192.168.2.23109.202.202.202
                        Jan 3, 2025 21:48:00.349390030 CET4258613566192.168.2.2383.222.191.90
                        Jan 3, 2025 21:48:00.354336977 CET135664258683.222.191.90192.168.2.23
                        Jan 3, 2025 21:48:00.550961971 CET135664258683.222.191.90192.168.2.23
                        Jan 3, 2025 21:48:00.551093102 CET4258613566192.168.2.2383.222.191.90
                        Jan 3, 2025 21:48:00.928002119 CET135664258683.222.191.90192.168.2.23
                        Jan 3, 2025 21:48:00.928090096 CET4258613566192.168.2.2383.222.191.90
                        Jan 3, 2025 21:48:14.279017925 CET43928443192.168.2.2391.189.91.42
                        Jan 3, 2025 21:48:24.517575026 CET42836443192.168.2.2391.189.91.43
                        Jan 3, 2025 21:48:30.660757065 CET4251680192.168.2.23109.202.202.202
                        Jan 3, 2025 21:48:55.233323097 CET43928443192.168.2.2391.189.91.42
                        Jan 3, 2025 21:49:00.962846041 CET4258613566192.168.2.2383.222.191.90
                        Jan 3, 2025 21:49:00.967699051 CET135664258683.222.191.90192.168.2.23
                        Jan 3, 2025 21:49:01.164103985 CET135664258683.222.191.90192.168.2.23
                        Jan 3, 2025 21:49:01.164344072 CET4258613566192.168.2.2383.222.191.90
                        Jan 3, 2025 21:49:01.927994967 CET135664258683.222.191.90192.168.2.23
                        Jan 3, 2025 21:49:01.928076029 CET4258613566192.168.2.2383.222.191.90
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 3, 2025 21:47:50.295676947 CET5954753192.168.2.238.8.8.8
                        Jan 3, 2025 21:47:50.302639961 CET53595478.8.8.8192.168.2.23
                        Jan 3, 2025 21:47:50.303613901 CET5125953192.168.2.238.8.8.8
                        Jan 3, 2025 21:47:50.310945034 CET53512598.8.8.8192.168.2.23
                        Jan 3, 2025 21:47:50.311657906 CET5759753192.168.2.238.8.8.8
                        Jan 3, 2025 21:47:50.318537951 CET53575978.8.8.8192.168.2.23
                        Jan 3, 2025 21:47:50.319227934 CET4444053192.168.2.238.8.8.8
                        Jan 3, 2025 21:47:50.326788902 CET53444408.8.8.8192.168.2.23
                        Jan 3, 2025 21:47:50.327507973 CET5362353192.168.2.238.8.8.8
                        Jan 3, 2025 21:47:50.334479094 CET53536238.8.8.8192.168.2.23
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 3, 2025 21:47:50.295676947 CET192.168.2.238.8.8.80x6304Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:47:50.303613901 CET192.168.2.238.8.8.80x6304Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:47:50.311657906 CET192.168.2.238.8.8.80x6304Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:47:50.319227934 CET192.168.2.238.8.8.80x6304Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:47:50.327507973 CET192.168.2.238.8.8.80x6304Standard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 3, 2025 21:47:50.302639961 CET8.8.8.8192.168.2.230x6304Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:47:50.310945034 CET8.8.8.8192.168.2.230x6304Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:47:50.318537951 CET8.8.8.8192.168.2.230x6304Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:47:50.326788902 CET8.8.8.8192.168.2.230x6304Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
                        Jan 3, 2025 21:47:50.334479094 CET8.8.8.8192.168.2.230x6304Name error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):20:47:48
                        Start date (UTC):03/01/2025
                        Path:/tmp/ppc.elf
                        Arguments:/tmp/ppc.elf
                        File size:5388968 bytes
                        MD5 hash:ae65271c943d3451b7f026d1fadccea6

                        Start time (UTC):20:47:48
                        Start date (UTC):03/01/2025
                        Path:/tmp/ppc.elf
                        Arguments:-
                        File size:5388968 bytes
                        MD5 hash:ae65271c943d3451b7f026d1fadccea6

                        Start time (UTC):20:47:48
                        Start date (UTC):03/01/2025
                        Path:/tmp/ppc.elf
                        Arguments:-
                        File size:5388968 bytes
                        MD5 hash:ae65271c943d3451b7f026d1fadccea6

                        Start time (UTC):20:47:49
                        Start date (UTC):03/01/2025
                        Path:/tmp/ppc.elf
                        Arguments:-
                        File size:5388968 bytes
                        MD5 hash:ae65271c943d3451b7f026d1fadccea6