Edit tour
Linux
Analysis Report
Kloki.ppc.elf
Overview
General Information
Sample name: | Kloki.ppc.elf |
Analysis ID: | 1584111 |
MD5: | 882122df0b30bde6021e4987fed11755 |
SHA1: | 229f98429ccf445b61e14a1eb275fb50120b7ddb |
SHA256: | 0fcf14ca363a57d61610bfc67af3ddbb87f1635e6d456becb340e4428ca60df2 |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Mirai
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample tries to kill multiple processes (SIGKILL)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1584111 |
Start date and time: | 2025-01-04 09:27:24 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 57s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | Kloki.ppc.elf |
Detection: | MAL |
Classification: | mal68.spre.troj.linELF@0/23@5/0 |
- Connection to analysis system has been lost, crash info: Unknown
Command: | /tmp/Kloki.ppc.elf |
PID: | 5488 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | dear |
Standard Error: |
- system is lnxubuntu20
- Kloki.ppc.elf New Fork (PID: 5490, Parent: 5488)
- Kloki.ppc.elf New Fork (PID: 5492, Parent: 5490)
- Kloki.ppc.elf New Fork (PID: 5496, Parent: 5490)
- Kloki.ppc.elf New Fork (PID: 5498, Parent: 5490)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | String: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | Socket: | Jump to behavior |
Source: | DNS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
System Summary |
---|
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior |
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: |
Source: | .symtab present: |
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior |
Source: | Classification label: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | Windows Management Instrumentation | 1 Scripting | Path Interception | Direct Volume Access | 1 OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 1 Non-Standard Port | Exfiltration Over Other Network Medium | 1 Service Stop |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
⊘No configs have been found
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
34% | ReversingLabs | Linux.Backdoor.Mirai | ||
100% | Avira | EXP/ELF.Mirai.W |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
secure-network-rebirthltd.ru | unknown | unknown | false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
210.99.249.152 | unknown | Korea Republic of | 17841 | NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR | false | |
210.99.186.59 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.128.96 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.103.53 | unknown | Korea Republic of | 45400 | NICNETKoreaTelecomKR | false | |
210.99.66.254 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.214.7 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.40.186 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.5.190 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.24.188 | unknown | Korea Republic of | 17841 | NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR | false | |
210.99.149.231 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.54.246 | unknown | Korea Republic of | 17841 | NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR | false | |
210.99.155.164 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.174.139 | unknown | Korea Republic of | 45400 | NICNETKoreaTelecomKR | false | |
210.99.163.209 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.95.255 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
83.222.191.90 | unknown | Bulgaria | 43561 | NET1-ASBG | false | |
210.99.255.94 | unknown | Korea Republic of | 17841 | NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR | false | |
210.99.53.71 | unknown | Korea Republic of | 17841 | NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR | false | |
210.99.150.142 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.188.216 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.214.129 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.176.157 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.206.58 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.99.145 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.222.217 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.11.251 | unknown | Korea Republic of | 45400 | NICNETKoreaTelecomKR | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
83.222.191.90 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
KIXS-AS-KRKoreaTelecomKR | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
NICNETKoreaTelecomKR | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
KIXS-AS-KRKoreaTelecomKR | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
⊘No context
⊘No context
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 291 |
Entropy (8bit): | 3.4997943442966797 |
Encrypted: | false |
SSDEEP: | 6:MUgDFjAJ/VUwaDFZmY/VfKoO/VNfiY/VH:MZVdLm/l |
MD5: | 46B7FF1534EE81856D90B394EA0CE543 |
SHA1: | BAC94B11786B746FDDA3759D8D581C828FEECA4B |
SHA-256: | 72B6164591A5AF8D291D5B7ECC7619307EC24F3343804EBE0CA510CE5138E62D |
SHA-512: | 76CBB1917B218F4D3E0FDC4CE96BFC527D122BC6110386282D6E8581487D29C73976D4451276062392BA18C2746A7F2F1A3EE3F9FFA45658D3617DB2F4CCC2C6 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 291 |
Entropy (8bit): | 3.4997943442966797 |
Encrypted: | false |
SSDEEP: | 6:MUgDFjAJ/VUwaDFZmY/VfKoO/VNfiY/VH:MZVdLm/l |
MD5: | 46B7FF1534EE81856D90B394EA0CE543 |
SHA1: | BAC94B11786B746FDDA3759D8D581C828FEECA4B |
SHA-256: | 72B6164591A5AF8D291D5B7ECC7619307EC24F3343804EBE0CA510CE5138E62D |
SHA-512: | 76CBB1917B218F4D3E0FDC4CE96BFC527D122BC6110386282D6E8581487D29C73976D4451276062392BA18C2746A7F2F1A3EE3F9FFA45658D3617DB2F4CCC2C6 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.ppc.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.2046777842533603 |
Encrypted: | false |
SSDEEP: | 3:MVHOX9FQWUT5FFNFuP/VUAV3FQWUT5FFNFPVxmY/VVdf/FVXKfwuv/VVdf/FVUMd:MUgDFg/VUwaDFnmY/VfKoO/VNfiY/VH |
MD5: | 444AA6A21DBE69233C80F2DDFB60340D |
SHA1: | CE422B2097D3FA248B3C3182E5949D294B9EFF4A |
SHA-256: | BECEFD87F0E9F020EE0364443724AA39FF748CAC76A6D667B30D5AE0498222CB |
SHA-512: | 0922E46399147518E8FC0811A22BB2DEF7ABE80C31F04B30D03A79A3A82D2FF71468468CFB16D64B356A73368551949C0F1C0876733FA46D2FCC24A20278E036 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.669122070187971 |
TrID: |
|
File name: | Kloki.ppc.elf |
File size: | 142'028 bytes |
MD5: | 882122df0b30bde6021e4987fed11755 |
SHA1: | 229f98429ccf445b61e14a1eb275fb50120b7ddb |
SHA256: | 0fcf14ca363a57d61610bfc67af3ddbb87f1635e6d456becb340e4428ca60df2 |
SHA512: | fa35e5f90808a9b6e82b8bfca97cc2793c468f80e496a66a7faf63310c89b374111bf33a3b6c067973e31771b8b0e53d389f564fdef3820a16dcda14086430c7 |
SSDEEP: | 1536:KHOz6XN37cvseJ/VBZxt+//OGrD7cATN9tpDQHvAS+y7H7jhL8qcgJgHPn2f:qOuqxU/DX3N9zDdSjsn2f |
TLSH: | CCD33B06730C0947D1532EF43A3F27E093EFAA5121F8F644285FAA8A9271E375586EDD |
File Content Preview: | .ELF...........................4..(......4. ...(......................................................H.............dt.Q.............................!..|......$H...H......$8!. |...N.. .!..|.......?.........)...../...@..\?......$.+../...A..$8...}).....$N.. |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 141548 |
Section Header Size: | 40 |
Number of Section Headers: | 12 |
Header String Table Index: | 11 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x10000094 | 0x94 | 0x24 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.text | PROGBITS | 0x100000b8 | 0xb8 | 0x1bb08 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.fini | PROGBITS | 0x1001bbc0 | 0x1bbc0 | 0x20 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.rodata | PROGBITS | 0x1001bbe0 | 0x1bbe0 | 0x20f4 | 0x0 | 0x2 | A | 0 | 0 | 8 |
.ctors | PROGBITS | 0x1002e000 | 0x1e000 | 0xc | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.dtors | PROGBITS | 0x1002e00c | 0x1e00c | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x1002e020 | 0x1e020 | 0x4800 | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.sdata | PROGBITS | 0x10032820 | 0x22820 | 0x80 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.sbss | NOBITS | 0x100328a0 | 0x228a0 | 0x10c | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.bss | NOBITS | 0x100329b0 | 0x228a0 | 0x5448 | 0x0 | 0x3 | WA | 0 | 0 | 8 |
.shstrtab | STRTAB | 0x0 | 0x228a0 | 0x4b | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x10000000 | 0x10000000 | 0x1dcd4 | 0x1dcd4 | 6.2287 | 0x5 | R E | 0x10000 | .init .text .fini .rodata | |
LOAD | 0x1e000 | 0x1002e000 | 0x1002e000 | 0x48a0 | 0x9df8 | 0.3670 | 0x6 | RW | 0x10000 | .ctors .dtors .data .sdata .sbss .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 4, 2025 09:28:06.992625952 CET | 47164 | 13566 | 192.168.2.14 | 210.99.214.129 |
Jan 4, 2025 09:28:06.996114969 CET | 59380 | 13566 | 192.168.2.14 | 210.99.249.152 |
Jan 4, 2025 09:28:06.997505903 CET | 13566 | 47164 | 210.99.214.129 | 192.168.2.14 |
Jan 4, 2025 09:28:06.997562885 CET | 47164 | 13566 | 192.168.2.14 | 210.99.214.129 |
Jan 4, 2025 09:28:06.998497009 CET | 49958 | 13566 | 192.168.2.14 | 210.99.186.59 |
Jan 4, 2025 09:28:07.000962019 CET | 13566 | 59380 | 210.99.249.152 | 192.168.2.14 |
Jan 4, 2025 09:28:07.001036882 CET | 59380 | 13566 | 192.168.2.14 | 210.99.249.152 |
Jan 4, 2025 09:28:07.001082897 CET | 38266 | 13566 | 192.168.2.14 | 210.99.214.7 |
Jan 4, 2025 09:28:07.003062010 CET | 46210 | 13566 | 192.168.2.14 | 210.99.99.145 |
Jan 4, 2025 09:28:07.003299952 CET | 13566 | 49958 | 210.99.186.59 | 192.168.2.14 |
Jan 4, 2025 09:28:07.003343105 CET | 49958 | 13566 | 192.168.2.14 | 210.99.186.59 |
Jan 4, 2025 09:28:07.005800962 CET | 59898 | 13566 | 192.168.2.14 | 210.99.5.190 |
Jan 4, 2025 09:28:07.005882025 CET | 13566 | 38266 | 210.99.214.7 | 192.168.2.14 |
Jan 4, 2025 09:28:07.005919933 CET | 38266 | 13566 | 192.168.2.14 | 210.99.214.7 |
Jan 4, 2025 09:28:07.007883072 CET | 13566 | 46210 | 210.99.99.145 | 192.168.2.14 |
Jan 4, 2025 09:28:07.007921934 CET | 46210 | 13566 | 192.168.2.14 | 210.99.99.145 |
Jan 4, 2025 09:28:07.008053064 CET | 38548 | 13566 | 192.168.2.14 | 210.99.163.209 |
Jan 4, 2025 09:28:07.010390043 CET | 38772 | 13566 | 192.168.2.14 | 210.99.255.94 |
Jan 4, 2025 09:28:07.010679007 CET | 13566 | 59898 | 210.99.5.190 | 192.168.2.14 |
Jan 4, 2025 09:28:07.010726929 CET | 59898 | 13566 | 192.168.2.14 | 210.99.5.190 |
Jan 4, 2025 09:28:07.012474060 CET | 50228 | 13566 | 192.168.2.14 | 210.99.222.217 |
Jan 4, 2025 09:28:07.012856007 CET | 13566 | 38548 | 210.99.163.209 | 192.168.2.14 |
Jan 4, 2025 09:28:07.012923956 CET | 38548 | 13566 | 192.168.2.14 | 210.99.163.209 |
Jan 4, 2025 09:28:07.015016079 CET | 45658 | 13566 | 192.168.2.14 | 210.99.176.157 |
Jan 4, 2025 09:28:07.015225887 CET | 13566 | 38772 | 210.99.255.94 | 192.168.2.14 |
Jan 4, 2025 09:28:07.015290976 CET | 38772 | 13566 | 192.168.2.14 | 210.99.255.94 |
Jan 4, 2025 09:28:07.017175913 CET | 35644 | 13566 | 192.168.2.14 | 210.99.11.251 |
Jan 4, 2025 09:28:07.017241001 CET | 13566 | 50228 | 210.99.222.217 | 192.168.2.14 |
Jan 4, 2025 09:28:07.017281055 CET | 50228 | 13566 | 192.168.2.14 | 210.99.222.217 |
Jan 4, 2025 09:28:07.019654036 CET | 46942 | 13566 | 192.168.2.14 | 210.99.150.142 |
Jan 4, 2025 09:28:07.019841909 CET | 13566 | 45658 | 210.99.176.157 | 192.168.2.14 |
Jan 4, 2025 09:28:07.019881010 CET | 45658 | 13566 | 192.168.2.14 | 210.99.176.157 |
Jan 4, 2025 09:28:07.021828890 CET | 57516 | 13566 | 192.168.2.14 | 210.99.40.186 |
Jan 4, 2025 09:28:07.021954060 CET | 13566 | 35644 | 210.99.11.251 | 192.168.2.14 |
Jan 4, 2025 09:28:07.021991968 CET | 35644 | 13566 | 192.168.2.14 | 210.99.11.251 |
Jan 4, 2025 09:28:07.024458885 CET | 52096 | 13566 | 192.168.2.14 | 210.99.174.139 |
Jan 4, 2025 09:28:07.024483919 CET | 13566 | 46942 | 210.99.150.142 | 192.168.2.14 |
Jan 4, 2025 09:28:07.024528980 CET | 46942 | 13566 | 192.168.2.14 | 210.99.150.142 |
Jan 4, 2025 09:28:07.026561022 CET | 36534 | 13566 | 192.168.2.14 | 210.99.95.255 |
Jan 4, 2025 09:28:07.026647091 CET | 13566 | 57516 | 210.99.40.186 | 192.168.2.14 |
Jan 4, 2025 09:28:07.026707888 CET | 57516 | 13566 | 192.168.2.14 | 210.99.40.186 |
Jan 4, 2025 09:28:07.029295921 CET | 13566 | 52096 | 210.99.174.139 | 192.168.2.14 |
Jan 4, 2025 09:28:07.029335976 CET | 52096 | 13566 | 192.168.2.14 | 210.99.174.139 |
Jan 4, 2025 09:28:07.029416084 CET | 40482 | 13566 | 192.168.2.14 | 210.99.103.53 |
Jan 4, 2025 09:28:07.031316996 CET | 13566 | 36534 | 210.99.95.255 | 192.168.2.14 |
Jan 4, 2025 09:28:07.031353951 CET | 36534 | 13566 | 192.168.2.14 | 210.99.95.255 |
Jan 4, 2025 09:28:07.031569958 CET | 45918 | 13566 | 192.168.2.14 | 210.99.128.96 |
Jan 4, 2025 09:28:07.034166098 CET | 13566 | 40482 | 210.99.103.53 | 192.168.2.14 |
Jan 4, 2025 09:28:07.034218073 CET | 40482 | 13566 | 192.168.2.14 | 210.99.103.53 |
Jan 4, 2025 09:28:07.034235954 CET | 46804 | 13566 | 192.168.2.14 | 210.99.206.58 |
Jan 4, 2025 09:28:07.036364079 CET | 13566 | 45918 | 210.99.128.96 | 192.168.2.14 |
Jan 4, 2025 09:28:07.036406994 CET | 45918 | 13566 | 192.168.2.14 | 210.99.128.96 |
Jan 4, 2025 09:28:07.036614895 CET | 58292 | 13566 | 192.168.2.14 | 210.99.155.164 |
Jan 4, 2025 09:28:07.039047003 CET | 13566 | 46804 | 210.99.206.58 | 192.168.2.14 |
Jan 4, 2025 09:28:07.039083004 CET | 46804 | 13566 | 192.168.2.14 | 210.99.206.58 |
Jan 4, 2025 09:28:07.039381981 CET | 48616 | 13566 | 192.168.2.14 | 210.99.66.254 |
Jan 4, 2025 09:28:07.041364908 CET | 13566 | 58292 | 210.99.155.164 | 192.168.2.14 |
Jan 4, 2025 09:28:07.041403055 CET | 58292 | 13566 | 192.168.2.14 | 210.99.155.164 |
Jan 4, 2025 09:28:07.041595936 CET | 58058 | 13566 | 192.168.2.14 | 210.99.53.71 |
Jan 4, 2025 09:28:07.044148922 CET | 13566 | 48616 | 210.99.66.254 | 192.168.2.14 |
Jan 4, 2025 09:28:07.044189930 CET | 48616 | 13566 | 192.168.2.14 | 210.99.66.254 |
Jan 4, 2025 09:28:07.044297934 CET | 35146 | 13566 | 192.168.2.14 | 210.99.188.216 |
Jan 4, 2025 09:28:07.046360970 CET | 13566 | 58058 | 210.99.53.71 | 192.168.2.14 |
Jan 4, 2025 09:28:07.046400070 CET | 58058 | 13566 | 192.168.2.14 | 210.99.53.71 |
Jan 4, 2025 09:28:07.046479940 CET | 41438 | 13566 | 192.168.2.14 | 210.99.24.188 |
Jan 4, 2025 09:28:07.049052954 CET | 13566 | 35146 | 210.99.188.216 | 192.168.2.14 |
Jan 4, 2025 09:28:07.049088955 CET | 35146 | 13566 | 192.168.2.14 | 210.99.188.216 |
Jan 4, 2025 09:28:07.049310923 CET | 33400 | 13566 | 192.168.2.14 | 210.99.54.246 |
Jan 4, 2025 09:28:07.051259041 CET | 13566 | 41438 | 210.99.24.188 | 192.168.2.14 |
Jan 4, 2025 09:28:07.051301956 CET | 41438 | 13566 | 192.168.2.14 | 210.99.24.188 |
Jan 4, 2025 09:28:07.051553965 CET | 33346 | 13566 | 192.168.2.14 | 210.99.149.231 |
Jan 4, 2025 09:28:07.054111004 CET | 13566 | 33400 | 210.99.54.246 | 192.168.2.14 |
Jan 4, 2025 09:28:07.054148912 CET | 33400 | 13566 | 192.168.2.14 | 210.99.54.246 |
Jan 4, 2025 09:28:07.056345940 CET | 13566 | 33346 | 210.99.149.231 | 192.168.2.14 |
Jan 4, 2025 09:28:07.056380987 CET | 33346 | 13566 | 192.168.2.14 | 210.99.149.231 |
Jan 4, 2025 09:28:07.110527039 CET | 56390 | 13566 | 192.168.2.14 | 83.222.191.90 |
Jan 4, 2025 09:28:07.115353107 CET | 13566 | 56390 | 83.222.191.90 | 192.168.2.14 |
Jan 4, 2025 09:28:07.115459919 CET | 56390 | 13566 | 192.168.2.14 | 83.222.191.90 |
Jan 4, 2025 09:28:07.117644072 CET | 56390 | 13566 | 192.168.2.14 | 83.222.191.90 |
Jan 4, 2025 09:28:07.122436047 CET | 13566 | 56390 | 83.222.191.90 | 192.168.2.14 |
Jan 4, 2025 09:28:07.122510910 CET | 56390 | 13566 | 192.168.2.14 | 83.222.191.90 |
Jan 4, 2025 09:28:07.127316952 CET | 13566 | 56390 | 83.222.191.90 | 192.168.2.14 |
Jan 4, 2025 09:28:17.127315044 CET | 56390 | 13566 | 192.168.2.14 | 83.222.191.90 |
Jan 4, 2025 09:28:17.132280111 CET | 13566 | 56390 | 83.222.191.90 | 192.168.2.14 |
Jan 4, 2025 09:28:17.330871105 CET | 13566 | 56390 | 83.222.191.90 | 192.168.2.14 |
Jan 4, 2025 09:28:17.330914974 CET | 56390 | 13566 | 192.168.2.14 | 83.222.191.90 |
Jan 4, 2025 09:28:17.696866035 CET | 13566 | 56390 | 83.222.191.90 | 192.168.2.14 |
Jan 4, 2025 09:28:17.696921110 CET | 56390 | 13566 | 192.168.2.14 | 83.222.191.90 |
Jan 4, 2025 09:29:17.755198002 CET | 56390 | 13566 | 192.168.2.14 | 83.222.191.90 |
Jan 4, 2025 09:29:17.760154963 CET | 13566 | 56390 | 83.222.191.90 | 192.168.2.14 |
Jan 4, 2025 09:29:17.958791971 CET | 13566 | 56390 | 83.222.191.90 | 192.168.2.14 |
Jan 4, 2025 09:29:17.958853006 CET | 56390 | 13566 | 192.168.2.14 | 83.222.191.90 |
Jan 4, 2025 09:29:18.697207928 CET | 13566 | 56390 | 83.222.191.90 | 192.168.2.14 |
Jan 4, 2025 09:29:18.697315931 CET | 56390 | 13566 | 192.168.2.14 | 83.222.191.90 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 4, 2025 09:28:07.063040018 CET | 38883 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 4, 2025 09:28:07.070163965 CET | 53 | 38883 | 8.8.8.8 | 192.168.2.14 |
Jan 4, 2025 09:28:07.073141098 CET | 58104 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 4, 2025 09:28:07.080284119 CET | 53 | 58104 | 8.8.8.8 | 192.168.2.14 |
Jan 4, 2025 09:28:07.082506895 CET | 33030 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 4, 2025 09:28:07.089879036 CET | 53 | 33030 | 8.8.8.8 | 192.168.2.14 |
Jan 4, 2025 09:28:07.092827082 CET | 36055 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 4, 2025 09:28:07.099908113 CET | 53 | 36055 | 8.8.8.8 | 192.168.2.14 |
Jan 4, 2025 09:28:07.102572918 CET | 50070 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 4, 2025 09:28:07.109347105 CET | 53 | 50070 | 8.8.8.8 | 192.168.2.14 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 4, 2025 09:28:07.063040018 CET | 192.168.2.14 | 8.8.8.8 | 0x7c79 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:28:07.073141098 CET | 192.168.2.14 | 8.8.8.8 | 0x7c79 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:28:07.082506895 CET | 192.168.2.14 | 8.8.8.8 | 0x7c79 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:28:07.092827082 CET | 192.168.2.14 | 8.8.8.8 | 0x7c79 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:28:07.102572918 CET | 192.168.2.14 | 8.8.8.8 | 0x7c79 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 4, 2025 09:28:07.070163965 CET | 8.8.8.8 | 192.168.2.14 | 0x7c79 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:28:07.080284119 CET | 8.8.8.8 | 192.168.2.14 | 0x7c79 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:28:07.089879036 CET | 8.8.8.8 | 192.168.2.14 | 0x7c79 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:28:07.099908113 CET | 8.8.8.8 | 192.168.2.14 | 0x7c79 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:28:07.109347105 CET | 8.8.8.8 | 192.168.2.14 | 0x7c79 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 08:28:05 |
Start date (UTC): | 04/01/2025 |
Path: | /tmp/Kloki.ppc.elf |
Arguments: | /tmp/Kloki.ppc.elf |
File size: | 5388968 bytes |
MD5 hash: | ae65271c943d3451b7f026d1fadccea6 |
Start time (UTC): | 08:28:05 |
Start date (UTC): | 04/01/2025 |
Path: | /tmp/Kloki.ppc.elf |
Arguments: | - |
File size: | 5388968 bytes |
MD5 hash: | ae65271c943d3451b7f026d1fadccea6 |
Start time (UTC): | 08:28:05 |
Start date (UTC): | 04/01/2025 |
Path: | /tmp/Kloki.ppc.elf |
Arguments: | - |
File size: | 5388968 bytes |
MD5 hash: | ae65271c943d3451b7f026d1fadccea6 |
Start time (UTC): | 08:28:06 |
Start date (UTC): | 04/01/2025 |
Path: | /tmp/Kloki.ppc.elf |
Arguments: | - |
File size: | 5388968 bytes |
MD5 hash: | ae65271c943d3451b7f026d1fadccea6 |
Start time (UTC): | 08:28:06 |
Start date (UTC): | 04/01/2025 |
Path: | /tmp/Kloki.ppc.elf |
Arguments: | - |
File size: | 5388968 bytes |
MD5 hash: | ae65271c943d3451b7f026d1fadccea6 |