Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
Kloki.mpsl.elf

Overview

General Information

Sample name:Kloki.mpsl.elf
Analysis ID:1584114
MD5:c8d1cde12006ea0252db29fc4d7dfcdf
SHA1:3aa7285fa8c9dcbc01557fe3acc10b9035cb0059
SHA256:eb3e694a5a22497585690a3c97acfdf0d6788968538cd0a05dc30fe3599aa79b
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:68
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample tries to kill multiple processes (SIGKILL)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1584114
Start date and time:2025-01-04 09:30:11 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 8s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:Kloki.mpsl.elf
Detection:MAL
Classification:mal68.spre.troj.linELF@0/21@5/0
Command:/tmp/Kloki.mpsl.elf
PID:5842
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
dear
Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
Kloki.mpsl.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    SourceRuleDescriptionAuthorStrings
    5846.1.00007f4134400000.00007f4134429000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5842.1.00007f4134400000.00007f4134429000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: Kloki.mpsl.elfAvira: detected
        Source: Kloki.mpsl.elfReversingLabs: Detection: 31%
        Source: Kloki.mpsl.elfString: '%d/proc/self/exe/. ppid/proc/net/tcp/proc//exe/status/fd//dev/null/dev/consolesocket05self/bin/bash/bin/sh/bin/dashbashshftpwgettftpncnetcatnmaptcpdumpsocatcurlbusyboxpythonrebootechoinitcroniptablessshdtelnettelnetdtftpdrshdrexecdftpdxinetdpftp/bin/login/dev/watchdog/dev/misc/watchdog/
        Source: global trafficTCP traffic: 192.168.2.15:50582 -> 210.99.230.233:13566
        Source: global trafficTCP traffic: 192.168.2.15:35792 -> 210.99.173.104:13566
        Source: global trafficTCP traffic: 192.168.2.15:47118 -> 210.99.118.196:13566
        Source: global trafficTCP traffic: 192.168.2.15:57880 -> 210.99.42.207:13566
        Source: global trafficTCP traffic: 192.168.2.15:50132 -> 210.99.205.49:13566
        Source: global trafficTCP traffic: 192.168.2.15:54900 -> 210.99.93.54:13566
        Source: global trafficTCP traffic: 192.168.2.15:51398 -> 210.99.142.127:13566
        Source: global trafficTCP traffic: 192.168.2.15:48752 -> 210.99.106.92:13566
        Source: global trafficTCP traffic: 192.168.2.15:56488 -> 210.99.198.10:13566
        Source: global trafficTCP traffic: 192.168.2.15:40904 -> 210.99.149.163:13566
        Source: global trafficTCP traffic: 192.168.2.15:45506 -> 210.99.212.41:13566
        Source: global trafficTCP traffic: 192.168.2.15:36076 -> 210.99.19.211:13566
        Source: global trafficTCP traffic: 192.168.2.15:37770 -> 210.99.17.232:13566
        Source: global trafficTCP traffic: 192.168.2.15:43242 -> 210.99.78.169:13566
        Source: global trafficTCP traffic: 192.168.2.15:55904 -> 210.99.94.101:13566
        Source: global trafficTCP traffic: 192.168.2.15:53254 -> 210.99.9.68:13566
        Source: global trafficTCP traffic: 192.168.2.15:38844 -> 210.99.78.183:13566
        Source: global trafficTCP traffic: 192.168.2.15:48654 -> 210.99.172.196:13566
        Source: global trafficTCP traffic: 192.168.2.15:49846 -> 210.99.123.215:13566
        Source: global trafficTCP traffic: 192.168.2.15:55066 -> 210.99.148.72:13566
        Source: global trafficTCP traffic: 192.168.2.15:59234 -> 210.99.8.241:13566
        Source: global trafficTCP traffic: 192.168.2.15:50466 -> 210.99.126.151:13566
        Source: global trafficTCP traffic: 192.168.2.15:47938 -> 210.99.112.232:13566
        Source: global trafficTCP traffic: 192.168.2.15:49768 -> 210.99.243.54:13566
        Source: global trafficTCP traffic: 192.168.2.15:60902 -> 210.99.243.137:13566
        Source: global trafficTCP traffic: 192.168.2.15:33908 -> 210.99.217.199:13566
        Source: global trafficTCP traffic: 192.168.2.15:49778 -> 210.99.178.236:13566
        Source: global trafficTCP traffic: 192.168.2.15:58238 -> 210.99.154.196:13566
        Source: global trafficTCP traffic: 192.168.2.15:46064 -> 210.99.213.232:13566
        Source: global trafficTCP traffic: 192.168.2.15:34064 -> 210.99.109.51:13566
        Source: global trafficTCP traffic: 192.168.2.15:47894 -> 210.99.77.118:13566
        Source: global trafficTCP traffic: 192.168.2.15:57082 -> 210.99.120.156:13566
        Source: global trafficTCP traffic: 192.168.2.15:36054 -> 210.99.45.36:13566
        Source: global trafficTCP traffic: 192.168.2.15:37792 -> 210.99.96.168:13566
        Source: global trafficTCP traffic: 192.168.2.15:33918 -> 210.99.251.244:13566
        Source: global trafficTCP traffic: 192.168.2.15:56040 -> 210.99.240.4:13566
        Source: global trafficTCP traffic: 192.168.2.15:54636 -> 210.99.230.110:13566
        Source: global trafficTCP traffic: 192.168.2.15:52258 -> 210.99.155.86:13566
        Source: global trafficTCP traffic: 192.168.2.15:38860 -> 210.99.87.142:13566
        Source: global trafficTCP traffic: 192.168.2.15:45806 -> 210.99.141.74:13566
        Source: global trafficTCP traffic: 192.168.2.15:38958 -> 210.99.23.102:13566
        Source: global trafficTCP traffic: 192.168.2.15:49188 -> 210.99.17.202:13566
        Source: global trafficTCP traffic: 192.168.2.15:42444 -> 210.99.83.171:13566
        Source: global trafficTCP traffic: 192.168.2.15:33982 -> 210.99.142.40:13566
        Source: global trafficTCP traffic: 192.168.2.15:43442 -> 210.99.148.251:13566
        Source: global trafficTCP traffic: 192.168.2.15:50744 -> 210.99.91.225:13566
        Source: global trafficTCP traffic: 192.168.2.15:53416 -> 210.99.113.211:13566
        Source: global trafficTCP traffic: 192.168.2.15:58012 -> 83.222.191.90:13566
        Source: /tmp/Kloki.mpsl.elf (PID: 5842)Socket: 127.0.0.1:8341Jump to behavior
        Source: unknownDNS traffic detected: query: secure-network-rebirthltd.ru replaycode: Name error (3)
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: unknownTCP traffic detected without corresponding DNS query: 83.222.191.90
        Source: global trafficDNS traffic detected: DNS query: secure-network-rebirthltd.ru

        System Summary

        barindex
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5852, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5866, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5867, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5868, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5869, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5870, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5871, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5872, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5873, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5874, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5875, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5876, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5877, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5878, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5879, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5880, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5881, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5932, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5944, result: successfulJump to behavior
        Source: Initial sampleString containing 'busybox' found: busybox
        Source: Initial sampleString containing 'busybox' found: '%d/proc/self/exe/. ppid/proc/net/tcp/proc//exe/status/fd//dev/null/dev/consolesocket05self/bin/bash/bin/sh/bin/dashbashshftpwgettftpncnetcatnmaptcpdumpsocatcurlbusyboxpythonrebootechoinitcroniptablessshdtelnettelnetdtftpdrshdrexecdftpdxinetdpftp/bin/login/dev/watchdog/dev/misc/watchdog/
        Source: ELF static info symbol of initial sample.symtab present: no
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5852, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5866, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5867, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5868, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5869, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5870, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5871, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5872, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5873, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5874, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5875, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5876, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5877, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5878, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5879, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5880, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5881, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5932, result: successfulJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)SIGKILL sent: pid: 5944, result: successfulJump to behavior
        Source: classification engineClassification label: mal68.spre.troj.linELF@0/21@5/0
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5880/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5880/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5870/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5870/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5881/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5881/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5871/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5871/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5872/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5872/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5873/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5873/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5852/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5852/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5874/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5874/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5875/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5875/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5876/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5876/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5866/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5866/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5877/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5877/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5932/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5932/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5867/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5867/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5878/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5878/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5944/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5944/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5868/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5868/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5879/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5879/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5869/mapsJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5850)File opened: /proc/5869/cmdlineJump to behavior
        Source: /tmp/Kloki.mpsl.elf (PID: 5842)Queries kernel information via 'uname': Jump to behavior
        Source: Kloki.mpsl.elf, 5842.1.000055f461fe7000.000055f4620b3000.rw-.sdmp, Kloki.mpsl.elf, 5846.1.000055f461fe7000.000055f4620b3000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
        Source: Kloki.mpsl.elf, 5842.1.00007fff54619000.00007fff5463a000.rw-.sdmpBinary or memory string: /tmp/qemu-open.e71vmY
        Source: Kloki.mpsl.elf, 5842.1.00007fff54619000.00007fff5463a000.rw-.sdmp, Kloki.mpsl.elf, 5846.1.00007fff54619000.00007fff5463a000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/Kloki.mpsl.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/Kloki.mpsl.elf
        Source: Kloki.mpsl.elf, 5842.1.00007fff54619000.00007fff5463a000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.e71vmY\4
        Source: Kloki.mpsl.elf, 5842.1.000055f461fe7000.000055f4620b3000.rw-.sdmp, Kloki.mpsl.elf, 5846.1.000055f461fe7000.000055f4620b3000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
        Source: Kloki.mpsl.elf, 5842.1.00007fff54619000.00007fff5463a000.rw-.sdmp, Kloki.mpsl.elf, 5846.1.00007fff54619000.00007fff5463a000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: Kloki.mpsl.elf, type: SAMPLE
        Source: Yara matchFile source: 5846.1.00007f4134400000.00007f4134429000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5842.1.00007f4134400000.00007f4134429000.r-x.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: Kloki.mpsl.elf, type: SAMPLE
        Source: Yara matchFile source: 5846.1.00007f4134400000.00007f4134429000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: 5842.1.00007f4134400000.00007f4134429000.r-x.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information1
        Scripting
        Valid AccountsWindows Management Instrumentation1
        Scripting
        Path InterceptionDirect Volume Access1
        OS Credential Dumping
        11
        Security Software Discovery
        Remote ServicesData from Local System1
        Non-Standard Port
        Exfiltration Over Other Network Medium1
        Service Stop
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1584114 Sample: Kloki.mpsl.elf Startdate: 04/01/2025 Architecture: LINUX Score: 68 19 210.99.154.196, 13566, 58238 NICNETKoreaTelecomKR Korea Republic of 2->19 21 210.99.172.196, 13566, 48654 NICNETKoreaTelecomKR Korea Republic of 2->21 23 47 other IPs or domains 2->23 25 Antivirus / Scanner detection for submitted sample 2->25 27 Multi AV Scanner detection for submitted file 2->27 29 Yara detected Mirai 2->29 8 Kloki.mpsl.elf 2->8         started        signatures3 process4 process5 10 Kloki.mpsl.elf 8->10         started        process6 12 Kloki.mpsl.elf 10->12         started        15 Kloki.mpsl.elf 10->15         started        17 Kloki.mpsl.elf 10->17         started        signatures7 31 Sample tries to kill multiple processes (SIGKILL) 12->31
        SourceDetectionScannerLabelLink
        Kloki.mpsl.elf32%ReversingLabsLinux.Exploit.Mirai
        Kloki.mpsl.elf100%AviraEXP/ELF.Mirai.W
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        secure-network-rebirthltd.ru
        unknown
        unknownfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          210.99.42.207
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.109.51
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.126.151
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.113.211
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.93.54
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.251.244
          unknownKorea Republic of
          17841NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKRfalse
          210.99.118.196
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.148.251
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.178.236
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.243.54
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.9.68
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.91.225
          unknownKorea Republic of
          45400NICNETKoreaTelecomKRfalse
          210.99.155.86
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.87.142
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.123.215
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.198.10
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.212.41
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.96.168
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.230.233
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.8.241
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.230.110
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.205.49
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.213.232
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.120.156
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.78.169
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.17.202
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.172.196
          unknownKorea Republic of
          45400NICNETKoreaTelecomKRfalse
          210.99.154.196
          unknownKorea Republic of
          45400NICNETKoreaTelecomKRfalse
          210.99.83.171
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.23.102
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.77.118
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.142.127
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.148.72
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.17.232
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.217.199
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.106.92
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.240.4
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          83.222.191.90
          unknownBulgaria
          43561NET1-ASBGfalse
          210.99.173.104
          unknownKorea Republic of
          45400NICNETKoreaTelecomKRfalse
          210.99.94.101
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.141.74
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.243.137
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.142.40
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.149.163
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.112.232
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.45.36
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.19.211
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          210.99.78.183
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          KIXS-AS-KRKoreaTelecomKRKloki.ppc.elfGet hashmaliciousMiraiBrowse
          • 210.99.222.217
          Kloki.spc.elfGet hashmaliciousUnknownBrowse
          • 210.99.222.86
          Kloki.mips.elfGet hashmaliciousMiraiBrowse
          • 210.99.235.154
          Kloki.arm5.elfGet hashmaliciousMiraiBrowse
          • 210.99.77.3
          Kloki.arm4.elfGet hashmaliciousMiraiBrowse
          • 210.99.83.44
          Fantazy.i686.elfGet hashmaliciousUnknownBrowse
          • 14.37.185.220
          Fantazy.sh4.elfGet hashmaliciousUnknownBrowse
          • 115.10.35.0
          Fantazy.mips.elfGet hashmaliciousUnknownBrowse
          • 222.118.184.250
          Fantazy.spc.elfGet hashmaliciousUnknownBrowse
          • 203.251.148.181
          Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
          • 121.170.84.76
          KIXS-AS-KRKoreaTelecomKRKloki.ppc.elfGet hashmaliciousMiraiBrowse
          • 210.99.222.217
          Kloki.spc.elfGet hashmaliciousUnknownBrowse
          • 210.99.222.86
          Kloki.mips.elfGet hashmaliciousMiraiBrowse
          • 210.99.235.154
          Kloki.arm5.elfGet hashmaliciousMiraiBrowse
          • 210.99.77.3
          Kloki.arm4.elfGet hashmaliciousMiraiBrowse
          • 210.99.83.44
          Fantazy.i686.elfGet hashmaliciousUnknownBrowse
          • 14.37.185.220
          Fantazy.sh4.elfGet hashmaliciousUnknownBrowse
          • 115.10.35.0
          Fantazy.mips.elfGet hashmaliciousUnknownBrowse
          • 222.118.184.250
          Fantazy.spc.elfGet hashmaliciousUnknownBrowse
          • 203.251.148.181
          Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
          • 121.170.84.76
          KIXS-AS-KRKoreaTelecomKRKloki.ppc.elfGet hashmaliciousMiraiBrowse
          • 210.99.222.217
          Kloki.spc.elfGet hashmaliciousUnknownBrowse
          • 210.99.222.86
          Kloki.mips.elfGet hashmaliciousMiraiBrowse
          • 210.99.235.154
          Kloki.arm5.elfGet hashmaliciousMiraiBrowse
          • 210.99.77.3
          Kloki.arm4.elfGet hashmaliciousMiraiBrowse
          • 210.99.83.44
          Fantazy.i686.elfGet hashmaliciousUnknownBrowse
          • 14.37.185.220
          Fantazy.sh4.elfGet hashmaliciousUnknownBrowse
          • 115.10.35.0
          Fantazy.mips.elfGet hashmaliciousUnknownBrowse
          • 222.118.184.250
          Fantazy.spc.elfGet hashmaliciousUnknownBrowse
          • 203.251.148.181
          Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
          • 121.170.84.76
          No context
          No context
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Reputation:low
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Reputation:low
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Reputation:low
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Reputation:low
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Reputation:low
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Reputation:low
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Reputation:low
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Reputation:low
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Reputation:low
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Reputation:low
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Reputation:low
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):281
          Entropy (8bit):3.6061131731268428
          Encrypted:false
          SSDEEP:6:URmdDFpO0UV/wqY/VURsDFpO0qdFT/VDM/V+4D/VH:IgKPN2K/dDMfF
          MD5:476C7B40BD5AD91343C87DE1D52579C4
          SHA1:D2CCF5C2B9B3C0952B85F408AEF20FE542704C39
          SHA-256:38EACCD7D17ED77EFA911B47A6E0BE0FE441ED261D92ECD61922B9C26D371B1F
          SHA-512:8720ED202909F64E7B96A98A46213FED6B555C7ABFBD7404B06DEA11B918D4EF6A917E6BB79FD03DDC7ACDCDEEC2BE440EE1FD7368965D40E2038DAC4616D45A
          Malicious:false
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/Kloki.mpsl.elf.469000-46f000 rw-p 00029000 fd:00 531606 /tmp/Kloki.mpsl.elf.46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):255
          Entropy (8bit):3.253042923234638
          Encrypted:false
          SSDEEP:6:URmdDFZwqY/VURsDFLdFT/VDM/V+4D/VH:IgP2xdDMfF
          MD5:69D282CF57D6123EF30389E82EB04BF1
          SHA1:5116164669843DD082FAFCD28DB67F3B0AAEEACC
          SHA-256:84D266DFCE917728A07A7893E71AAD02BB71FD23368F668E771675D4B304BCBC
          SHA-512:83C0B0142F917AAD48C266814AE3247166EFA31B5215C884590C8F632D7306B1E30108F677F2F794DBA01A22C1BB5A08DE8BCAF3BC9DBD6DAB65F304B044B1E9
          Malicious:false
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/..469000-46f000 rw-p 00029000 fd:00 531606 /tmp/..46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          Process:/tmp/Kloki.mpsl.elf
          File Type:ASCII text
          Category:dropped
          Size (bytes):281
          Entropy (8bit):3.6061131731268428
          Encrypted:false
          SSDEEP:6:URmdDFpO0UV/wqY/VURsDFpO0qdFT/VDM/V+4D/VH:IgKPN2K/dDMfF
          MD5:476C7B40BD5AD91343C87DE1D52579C4
          SHA1:D2CCF5C2B9B3C0952B85F408AEF20FE542704C39
          SHA-256:38EACCD7D17ED77EFA911B47A6E0BE0FE441ED261D92ECD61922B9C26D371B1F
          SHA-512:8720ED202909F64E7B96A98A46213FED6B555C7ABFBD7404B06DEA11B918D4EF6A917E6BB79FD03DDC7ACDCDEEC2BE440EE1FD7368965D40E2038DAC4616D45A
          Malicious:false
          Preview:400000-429000 r-xp 00000000 fd:00 531606 /tmp/Kloki.mpsl.elf.469000-46f000 rw-p 00029000 fd:00 531606 /tmp/Kloki.mpsl.elf.46f000-475000 rw-p 00000000 00:00 0 .7f7ff000-7f800000 ---p 00000000 00:00 0 .7f800000-80000000 rw-p 00000000 00:00 0 [stack].
          File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
          Entropy (8bit):5.053703294660783
          TrID:
          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
          File name:Kloki.mpsl.elf
          File size:189'976 bytes
          MD5:c8d1cde12006ea0252db29fc4d7dfcdf
          SHA1:3aa7285fa8c9dcbc01557fe3acc10b9035cb0059
          SHA256:eb3e694a5a22497585690a3c97acfdf0d6788968538cd0a05dc30fe3599aa79b
          SHA512:ed4be75bb84f3573b8b698c45b4210c6e160d5ee790e9f7553afbf6ffa8771a160c651722df17f4f827ebf9e7cf8d79dd66b677dee76197e6ee8ee239587d6e4
          SSDEEP:3072:yFKiojSrxI4Kwe2+oewp/Qbdx2YdBXYh+4DmnF4Z:ygSrxItwe7wJQ5x2YdBCzo
          TLSH:B204D70AAF610EBBDCAFDD3702E90B0539CC941722A53B753674D928F54B64B4AD3C68
          File Content Preview:.ELF....................`.@.4...........4. ...(...............@...@.@...@.....................F...F..S..............Q.td...............................<|Y.'!......'.......................<XY.'!... .........9'.. ........................<(Y.'!...$........c9

          ELF header

          Class:ELF32
          Data:2's complement, little endian
          Version:1 (current)
          Machine:MIPS R3000
          Version Number:0x1
          Type:EXEC (Executable file)
          OS/ABI:UNIX - System V
          ABI Version:0
          Entry Point Address:0x400260
          Flags:0x1007
          ELF Header Size:52
          Program Header Offset:52
          Program Header Size:32
          Number of Program Headers:3
          Section Header Offset:189416
          Section Header Size:40
          Number of Section Headers:14
          Header String Table Index:13
          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
          NULL0x00x00x00x00x0000
          .initPROGBITS0x4000940x940x8c0x00x6AX004
          .textPROGBITS0x4001200x1200x263400x00x6AX0016
          .finiPROGBITS0x4264600x264600x5c0x00x6AX004
          .rodataPROGBITS0x4264c00x264c00x21800x00x2A0016
          .ctorsPROGBITS0x4690000x290000xc0x00x3WA004
          .dtorsPROGBITS0x46900c0x2900c0x80x00x3WA004
          .data.rel.roPROGBITS0x4690180x290180xec0x00x3WA004
          .dataPROGBITS0x4691200x291200x48f80x00x3WA0032
          .gotPROGBITS0x46da200x2da200x9640x40x10000003WAp0016
          .sbssNOBITS0x46e3840x2e3840x4c0x00x10000003WAp004
          .bssNOBITS0x46e3d00x2e3840x56c00x00x3WA0016
          .mdebug.abi32PROGBITS0x127e0x2e3840x00x00x0001
          .shstrtabSTRTAB0x00x2e3840x640x00x0001
          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
          LOAD0x00x4000000x4000000x286400x286405.45110x5R E0x10000.init .text .fini .rodata
          LOAD0x290000x4690000x4690000x53840xaa901.13640x6RW 0x10000.ctors .dtors .data.rel.ro .data .got .sbss .bss
          GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
          TimestampSource PortDest PortSource IPDest IP
          Jan 4, 2025 09:31:28.924395084 CET5058213566192.168.2.15210.99.230.233
          Jan 4, 2025 09:31:28.928173065 CET3579213566192.168.2.15210.99.173.104
          Jan 4, 2025 09:31:28.929276943 CET1356650582210.99.230.233192.168.2.15
          Jan 4, 2025 09:31:28.929343939 CET5058213566192.168.2.15210.99.230.233
          Jan 4, 2025 09:31:28.930701017 CET4711813566192.168.2.15210.99.118.196
          Jan 4, 2025 09:31:28.933021069 CET1356635792210.99.173.104192.168.2.15
          Jan 4, 2025 09:31:28.933079004 CET3579213566192.168.2.15210.99.173.104
          Jan 4, 2025 09:31:28.933429956 CET5788013566192.168.2.15210.99.42.207
          Jan 4, 2025 09:31:28.935556889 CET1356647118210.99.118.196192.168.2.15
          Jan 4, 2025 09:31:28.935563087 CET5013213566192.168.2.15210.99.205.49
          Jan 4, 2025 09:31:28.935589075 CET4711813566192.168.2.15210.99.118.196
          Jan 4, 2025 09:31:28.938229084 CET1356657880210.99.42.207192.168.2.15
          Jan 4, 2025 09:31:28.938277006 CET5788013566192.168.2.15210.99.42.207
          Jan 4, 2025 09:31:28.938694000 CET5490013566192.168.2.15210.99.93.54
          Jan 4, 2025 09:31:28.940349102 CET1356650132210.99.205.49192.168.2.15
          Jan 4, 2025 09:31:28.940387011 CET5013213566192.168.2.15210.99.205.49
          Jan 4, 2025 09:31:28.940890074 CET5139813566192.168.2.15210.99.142.127
          Jan 4, 2025 09:31:28.943331957 CET4875213566192.168.2.15210.99.106.92
          Jan 4, 2025 09:31:28.943456888 CET1356654900210.99.93.54192.168.2.15
          Jan 4, 2025 09:31:28.943507910 CET5490013566192.168.2.15210.99.93.54
          Jan 4, 2025 09:31:28.945462942 CET5648813566192.168.2.15210.99.198.10
          Jan 4, 2025 09:31:28.945696115 CET1356651398210.99.142.127192.168.2.15
          Jan 4, 2025 09:31:28.945741892 CET5139813566192.168.2.15210.99.142.127
          Jan 4, 2025 09:31:28.948138952 CET1356648752210.99.106.92192.168.2.15
          Jan 4, 2025 09:31:28.948153019 CET4090413566192.168.2.15210.99.149.163
          Jan 4, 2025 09:31:28.948200941 CET4875213566192.168.2.15210.99.106.92
          Jan 4, 2025 09:31:28.950110912 CET4550613566192.168.2.15210.99.212.41
          Jan 4, 2025 09:31:28.950237989 CET1356656488210.99.198.10192.168.2.15
          Jan 4, 2025 09:31:28.950299978 CET5648813566192.168.2.15210.99.198.10
          Jan 4, 2025 09:31:28.952593088 CET3607613566192.168.2.15210.99.19.211
          Jan 4, 2025 09:31:28.952903032 CET1356640904210.99.149.163192.168.2.15
          Jan 4, 2025 09:31:28.952948093 CET4090413566192.168.2.15210.99.149.163
          Jan 4, 2025 09:31:28.954873085 CET1356645506210.99.212.41192.168.2.15
          Jan 4, 2025 09:31:28.954926014 CET3777013566192.168.2.15210.99.17.232
          Jan 4, 2025 09:31:28.954947948 CET4550613566192.168.2.15210.99.212.41
          Jan 4, 2025 09:31:28.957375050 CET1356636076210.99.19.211192.168.2.15
          Jan 4, 2025 09:31:28.957436085 CET3607613566192.168.2.15210.99.19.211
          Jan 4, 2025 09:31:28.957474947 CET4324213566192.168.2.15210.99.78.169
          Jan 4, 2025 09:31:28.959495068 CET5590413566192.168.2.15210.99.94.101
          Jan 4, 2025 09:31:28.959696054 CET1356637770210.99.17.232192.168.2.15
          Jan 4, 2025 09:31:28.959736109 CET3777013566192.168.2.15210.99.17.232
          Jan 4, 2025 09:31:28.962203979 CET1356643242210.99.78.169192.168.2.15
          Jan 4, 2025 09:31:28.962304115 CET4324213566192.168.2.15210.99.78.169
          Jan 4, 2025 09:31:28.962599039 CET5325413566192.168.2.15210.99.9.68
          Jan 4, 2025 09:31:28.964294910 CET1356655904210.99.94.101192.168.2.15
          Jan 4, 2025 09:31:28.964335918 CET5590413566192.168.2.15210.99.94.101
          Jan 4, 2025 09:31:28.965131044 CET3884413566192.168.2.15210.99.78.183
          Jan 4, 2025 09:31:28.967408895 CET1356653254210.99.9.68192.168.2.15
          Jan 4, 2025 09:31:28.967447996 CET5325413566192.168.2.15210.99.9.68
          Jan 4, 2025 09:31:28.967771053 CET4865413566192.168.2.15210.99.172.196
          Jan 4, 2025 09:31:28.969893932 CET1356638844210.99.78.183192.168.2.15
          Jan 4, 2025 09:31:28.969930887 CET3884413566192.168.2.15210.99.78.183
          Jan 4, 2025 09:31:28.970061064 CET4984613566192.168.2.15210.99.123.215
          Jan 4, 2025 09:31:28.972490072 CET1356648654210.99.172.196192.168.2.15
          Jan 4, 2025 09:31:28.972527981 CET4865413566192.168.2.15210.99.172.196
          Jan 4, 2025 09:31:28.972690105 CET5506613566192.168.2.15210.99.148.72
          Jan 4, 2025 09:31:28.974836111 CET1356649846210.99.123.215192.168.2.15
          Jan 4, 2025 09:31:28.974874020 CET4984613566192.168.2.15210.99.123.215
          Jan 4, 2025 09:31:28.974901915 CET5923413566192.168.2.15210.99.8.241
          Jan 4, 2025 09:31:28.977473021 CET1356655066210.99.148.72192.168.2.15
          Jan 4, 2025 09:31:28.977509975 CET5506613566192.168.2.15210.99.148.72
          Jan 4, 2025 09:31:28.977540970 CET5046613566192.168.2.15210.99.126.151
          Jan 4, 2025 09:31:28.979721069 CET1356659234210.99.8.241192.168.2.15
          Jan 4, 2025 09:31:28.979721069 CET4793813566192.168.2.15210.99.112.232
          Jan 4, 2025 09:31:28.979756117 CET5923413566192.168.2.15210.99.8.241
          Jan 4, 2025 09:31:28.982275963 CET1356650466210.99.126.151192.168.2.15
          Jan 4, 2025 09:31:28.982332945 CET5046613566192.168.2.15210.99.126.151
          Jan 4, 2025 09:31:28.982516050 CET4976813566192.168.2.15210.99.243.54
          Jan 4, 2025 09:31:28.984437943 CET1356647938210.99.112.232192.168.2.15
          Jan 4, 2025 09:31:28.984528065 CET4793813566192.168.2.15210.99.112.232
          Jan 4, 2025 09:31:28.984586000 CET6090213566192.168.2.15210.99.243.137
          Jan 4, 2025 09:31:28.987251997 CET1356649768210.99.243.54192.168.2.15
          Jan 4, 2025 09:31:28.987334967 CET4976813566192.168.2.15210.99.243.54
          Jan 4, 2025 09:31:28.987417936 CET3390813566192.168.2.15210.99.217.199
          Jan 4, 2025 09:31:28.989341974 CET1356660902210.99.243.137192.168.2.15
          Jan 4, 2025 09:31:28.989393950 CET6090213566192.168.2.15210.99.243.137
          Jan 4, 2025 09:31:28.989587069 CET4977813566192.168.2.15210.99.178.236
          Jan 4, 2025 09:31:28.992124081 CET5823813566192.168.2.15210.99.154.196
          Jan 4, 2025 09:31:28.992170095 CET1356633908210.99.217.199192.168.2.15
          Jan 4, 2025 09:31:28.992209911 CET3390813566192.168.2.15210.99.217.199
          Jan 4, 2025 09:31:28.994338989 CET1356649778210.99.178.236192.168.2.15
          Jan 4, 2025 09:31:28.994373083 CET4977813566192.168.2.15210.99.178.236
          Jan 4, 2025 09:31:28.994396925 CET4606413566192.168.2.15210.99.213.232
          Jan 4, 2025 09:31:28.996896029 CET1356658238210.99.154.196192.168.2.15
          Jan 4, 2025 09:31:28.996949911 CET3406413566192.168.2.15210.99.109.51
          Jan 4, 2025 09:31:28.996972084 CET5823813566192.168.2.15210.99.154.196
          Jan 4, 2025 09:31:28.998614073 CET4789413566192.168.2.15210.99.77.118
          Jan 4, 2025 09:31:28.999155045 CET1356646064210.99.213.232192.168.2.15
          Jan 4, 2025 09:31:28.999234915 CET4606413566192.168.2.15210.99.213.232
          Jan 4, 2025 09:31:29.000494957 CET5708213566192.168.2.15210.99.120.156
          Jan 4, 2025 09:31:29.001705885 CET1356634064210.99.109.51192.168.2.15
          Jan 4, 2025 09:31:29.001744032 CET3406413566192.168.2.15210.99.109.51
          Jan 4, 2025 09:31:29.002046108 CET3605413566192.168.2.15210.99.45.36
          Jan 4, 2025 09:31:29.003422022 CET1356647894210.99.77.118192.168.2.15
          Jan 4, 2025 09:31:29.003458023 CET4789413566192.168.2.15210.99.77.118
          Jan 4, 2025 09:31:29.003827095 CET3779213566192.168.2.15210.99.96.168
          Jan 4, 2025 09:31:29.005266905 CET1356657082210.99.120.156192.168.2.15
          Jan 4, 2025 09:31:29.005307913 CET5708213566192.168.2.15210.99.120.156
          Jan 4, 2025 09:31:29.005378962 CET3391813566192.168.2.15210.99.251.244
          Jan 4, 2025 09:31:29.006839991 CET1356636054210.99.45.36192.168.2.15
          Jan 4, 2025 09:31:29.006906986 CET3605413566192.168.2.15210.99.45.36
          Jan 4, 2025 09:31:29.007275105 CET5604013566192.168.2.15210.99.240.4
          Jan 4, 2025 09:31:29.008645058 CET1356637792210.99.96.168192.168.2.15
          Jan 4, 2025 09:31:29.008681059 CET3779213566192.168.2.15210.99.96.168
          Jan 4, 2025 09:31:29.008852005 CET5463613566192.168.2.15210.99.230.110
          Jan 4, 2025 09:31:29.010201931 CET1356633918210.99.251.244192.168.2.15
          Jan 4, 2025 09:31:29.010241985 CET3391813566192.168.2.15210.99.251.244
          Jan 4, 2025 09:31:29.010633945 CET5225813566192.168.2.15210.99.155.86
          Jan 4, 2025 09:31:29.012110949 CET1356656040210.99.240.4192.168.2.15
          Jan 4, 2025 09:31:29.012202024 CET5604013566192.168.2.15210.99.240.4
          Jan 4, 2025 09:31:29.012249947 CET3886013566192.168.2.15210.99.87.142
          Jan 4, 2025 09:31:29.013653994 CET1356654636210.99.230.110192.168.2.15
          Jan 4, 2025 09:31:29.013693094 CET5463613566192.168.2.15210.99.230.110
          Jan 4, 2025 09:31:29.014193058 CET4580613566192.168.2.15210.99.141.74
          Jan 4, 2025 09:31:29.015455008 CET1356652258210.99.155.86192.168.2.15
          Jan 4, 2025 09:31:29.015497923 CET5225813566192.168.2.15210.99.155.86
          Jan 4, 2025 09:31:29.015877008 CET3895813566192.168.2.15210.99.23.102
          Jan 4, 2025 09:31:29.017033100 CET1356638860210.99.87.142192.168.2.15
          Jan 4, 2025 09:31:29.017072916 CET3886013566192.168.2.15210.99.87.142
          Jan 4, 2025 09:31:29.017649889 CET4918813566192.168.2.15210.99.17.202
          Jan 4, 2025 09:31:29.018975019 CET1356645806210.99.141.74192.168.2.15
          Jan 4, 2025 09:31:29.019036055 CET4580613566192.168.2.15210.99.141.74
          Jan 4, 2025 09:31:29.019359112 CET4244413566192.168.2.15210.99.83.171
          Jan 4, 2025 09:31:29.020632982 CET1356638958210.99.23.102192.168.2.15
          Jan 4, 2025 09:31:29.020673990 CET3895813566192.168.2.15210.99.23.102
          Jan 4, 2025 09:31:29.021094084 CET3398213566192.168.2.15210.99.142.40
          Jan 4, 2025 09:31:29.022500038 CET1356649188210.99.17.202192.168.2.15
          Jan 4, 2025 09:31:29.022547007 CET4918813566192.168.2.15210.99.17.202
          Jan 4, 2025 09:31:29.022836924 CET4344213566192.168.2.15210.99.148.251
          Jan 4, 2025 09:31:29.024224043 CET1356642444210.99.83.171192.168.2.15
          Jan 4, 2025 09:31:29.024266005 CET4244413566192.168.2.15210.99.83.171
          Jan 4, 2025 09:31:29.024307013 CET5074413566192.168.2.15210.99.91.225
          Jan 4, 2025 09:31:29.025892019 CET1356633982210.99.142.40192.168.2.15
          Jan 4, 2025 09:31:29.025929928 CET3398213566192.168.2.15210.99.142.40
          Jan 4, 2025 09:31:29.025963068 CET5341613566192.168.2.15210.99.113.211
          Jan 4, 2025 09:31:29.027748108 CET1356643442210.99.148.251192.168.2.15
          Jan 4, 2025 09:31:29.027795076 CET4344213566192.168.2.15210.99.148.251
          Jan 4, 2025 09:31:29.029181004 CET1356650744210.99.91.225192.168.2.15
          Jan 4, 2025 09:31:29.029231071 CET5074413566192.168.2.15210.99.91.225
          Jan 4, 2025 09:31:29.030719042 CET1356653416210.99.113.211192.168.2.15
          Jan 4, 2025 09:31:29.030755043 CET5341613566192.168.2.15210.99.113.211
          Jan 4, 2025 09:31:29.082226992 CET5801213566192.168.2.1583.222.191.90
          Jan 4, 2025 09:31:29.088449001 CET135665801283.222.191.90192.168.2.15
          Jan 4, 2025 09:31:29.088515997 CET5801213566192.168.2.1583.222.191.90
          Jan 4, 2025 09:31:29.090332985 CET5801213566192.168.2.1583.222.191.90
          Jan 4, 2025 09:31:29.096534967 CET135665801283.222.191.90192.168.2.15
          Jan 4, 2025 09:31:29.096575975 CET5801213566192.168.2.1583.222.191.90
          Jan 4, 2025 09:31:29.102962017 CET135665801283.222.191.90192.168.2.15
          Jan 4, 2025 09:31:39.100300074 CET5801213566192.168.2.1583.222.191.90
          Jan 4, 2025 09:31:39.105581045 CET135665801283.222.191.90192.168.2.15
          Jan 4, 2025 09:31:39.306158066 CET135665801283.222.191.90192.168.2.15
          Jan 4, 2025 09:31:39.306304932 CET5801213566192.168.2.1583.222.191.90
          Jan 4, 2025 09:31:39.680998087 CET135665801283.222.191.90192.168.2.15
          Jan 4, 2025 09:31:39.681057930 CET5801213566192.168.2.1583.222.191.90
          Jan 4, 2025 09:32:39.727159977 CET5801213566192.168.2.1583.222.191.90
          Jan 4, 2025 09:32:39.732459068 CET135665801283.222.191.90192.168.2.15
          Jan 4, 2025 09:32:39.932672977 CET135665801283.222.191.90192.168.2.15
          Jan 4, 2025 09:32:39.932809114 CET5801213566192.168.2.1583.222.191.90
          Jan 4, 2025 09:32:40.681269884 CET135665801283.222.191.90192.168.2.15
          Jan 4, 2025 09:32:40.681361914 CET5801213566192.168.2.1583.222.191.90
          TimestampSource PortDest PortSource IPDest IP
          Jan 4, 2025 09:31:29.033082962 CET5622653192.168.2.158.8.8.8
          Jan 4, 2025 09:31:29.040488005 CET53562268.8.8.8192.168.2.15
          Jan 4, 2025 09:31:29.042432070 CET3337653192.168.2.158.8.8.8
          Jan 4, 2025 09:31:29.049717903 CET53333768.8.8.8192.168.2.15
          Jan 4, 2025 09:31:29.051521063 CET5140953192.168.2.158.8.8.8
          Jan 4, 2025 09:31:29.058101892 CET53514098.8.8.8192.168.2.15
          Jan 4, 2025 09:31:29.059766054 CET3421153192.168.2.158.8.8.8
          Jan 4, 2025 09:31:29.069751024 CET53342118.8.8.8192.168.2.15
          Jan 4, 2025 09:31:29.071571112 CET5286953192.168.2.158.8.8.8
          Jan 4, 2025 09:31:29.081254005 CET53528698.8.8.8192.168.2.15
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Jan 4, 2025 09:31:29.033082962 CET192.168.2.158.8.8.80x132bStandard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
          Jan 4, 2025 09:31:29.042432070 CET192.168.2.158.8.8.80x132bStandard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
          Jan 4, 2025 09:31:29.051521063 CET192.168.2.158.8.8.80x132bStandard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
          Jan 4, 2025 09:31:29.059766054 CET192.168.2.158.8.8.80x132bStandard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
          Jan 4, 2025 09:31:29.071571112 CET192.168.2.158.8.8.80x132bStandard query (0)secure-network-rebirthltd.ruA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Jan 4, 2025 09:31:29.040488005 CET8.8.8.8192.168.2.150x132bName error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
          Jan 4, 2025 09:31:29.049717903 CET8.8.8.8192.168.2.150x132bName error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
          Jan 4, 2025 09:31:29.058101892 CET8.8.8.8192.168.2.150x132bName error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
          Jan 4, 2025 09:31:29.069751024 CET8.8.8.8192.168.2.150x132bName error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false
          Jan 4, 2025 09:31:29.081254005 CET8.8.8.8192.168.2.150x132bName error (3)secure-network-rebirthltd.runonenoneA (IP address)IN (0x0001)false

          System Behavior

          Start time (UTC):08:31:27
          Start date (UTC):04/01/2025
          Path:/tmp/Kloki.mpsl.elf
          Arguments:/tmp/Kloki.mpsl.elf
          File size:5773336 bytes
          MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

          Start time (UTC):08:31:27
          Start date (UTC):04/01/2025
          Path:/tmp/Kloki.mpsl.elf
          Arguments:-
          File size:5773336 bytes
          MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

          Start time (UTC):08:31:27
          Start date (UTC):04/01/2025
          Path:/tmp/Kloki.mpsl.elf
          Arguments:-
          File size:5773336 bytes
          MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

          Start time (UTC):08:31:28
          Start date (UTC):04/01/2025
          Path:/tmp/Kloki.mpsl.elf
          Arguments:-
          File size:5773336 bytes
          MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

          Start time (UTC):08:31:28
          Start date (UTC):04/01/2025
          Path:/tmp/Kloki.mpsl.elf
          Arguments:-
          File size:5773336 bytes
          MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9