Edit tour
Linux
Analysis Report
Kloki.m68k.elf
Overview
General Information
Sample name: | Kloki.m68k.elf |
Analysis ID: | 1584115 |
MD5: | b7d6c1ca193fee24d9a386474f15a7d2 |
SHA1: | 60a713edd561452c5b97c999f0a8f977ac981e1f |
SHA256: | 6e15ca0d44f9755e25d43b727e0f955dc8fc8047db4d0fc8c180a7f1f75a7adb |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Mirai
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample tries to kill multiple processes (SIGKILL)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1584115 |
Start date and time: | 2025-01-04 09:30:40 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 3s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | Kloki.m68k.elf |
Detection: | MAL |
Classification: | mal60.spre.troj.linELF@0/18@5/0 |
- Connection to analysis system has been lost, crash info: Unknown
Command: | /tmp/Kloki.m68k.elf |
PID: | 5432 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | dear |
Standard Error: |
- system is lnxubuntu20
- Kloki.m68k.elf New Fork (PID: 5434, Parent: 5432)
- Kloki.m68k.elf New Fork (PID: 5436, Parent: 5434)
- Kloki.m68k.elf New Fork (PID: 5438, Parent: 5434)
- Kloki.m68k.elf New Fork (PID: 5440, Parent: 5434)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | String: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | Socket: | Jump to behavior |
Source: | DNS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
System Summary |
---|
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior |
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: |
Source: | .symtab present: |
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior |
Source: | Classification label: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | Windows Management Instrumentation | 1 Scripting | Path Interception | Direct Volume Access | 1 OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 1 Non-Standard Port | Exfiltration Over Other Network Medium | 1 Service Stop |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
⊘No configs have been found
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
26% | ReversingLabs | Linux.Backdoor.Mirai |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
secure-network-rebirthltd.ru | unknown | unknown | false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
210.99.25.249 | unknown | Korea Republic of | 17841 | NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR | false | |
210.99.235.51 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.11.24 | unknown | Korea Republic of | 45400 | NICNETKoreaTelecomKR | false | |
210.99.228.110 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.31.54 | unknown | Korea Republic of | 17841 | NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR | false | |
210.99.130.155 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.72.228 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.107.58 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.202.63 | unknown | Korea Republic of | 9696 | EDAS-ASOscarEnterpriseKR | false | |
210.99.6.107 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.205.144 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.82.38 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.133.122 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.107.140 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.155.107 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.41.205 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.148.158 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.87.190 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.200.85 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.99.236 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.172.106 | unknown | Korea Republic of | 45400 | NICNETKoreaTelecomKR | false | |
210.99.205.184 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.33.211 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.9.28 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.209.235 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.177.240 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.180.66 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.38.210 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.41.190 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
83.222.191.90 | unknown | Bulgaria | 43561 | NET1-ASBG | false | |
210.99.173.147 | unknown | Korea Republic of | 45400 | NICNETKoreaTelecomKR | false | |
210.99.163.69 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.237.45 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.101.44 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.252.119 | unknown | Korea Republic of | 17841 | NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR | false | |
210.99.97.54 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.81.228 | unknown | Korea Republic of | 17600 | ENVICO-AS-KRKOREARESOURCESRECOVERYANDREUTILIZATIONCORP | false | |
210.99.196.79 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.185.53 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.207.221 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.155.230 | unknown | Korea Republic of | 4766 | KIXS-AS-KRKoreaTelecomKR | false | |
210.99.203.182 | unknown | Korea Republic of | 9696 | EDAS-ASOscarEnterpriseKR | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
83.222.191.90 | Get hash | malicious | Mirai | Browse | ||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
NICNETKoreaTelecomKR | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
NCIA-AS-KRNATIONALINFORMATIONRESOURCESSERVICEKR | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
KIXS-AS-KRKoreaTelecomKR | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
KIXS-AS-KRKoreaTelecomKR | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
⊘No context
⊘No context
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 293 |
Entropy (8bit): | 3.5625157751674723 |
Encrypted: | false |
SSDEEP: | 6:Ygg2XqKISY/V8a2XgKUY/VfKoO/VNfiY/VH:YgPqKv9V9Al |
MD5: | 93CAF4EA7D005ACBCEB19D23B94A8E2E |
SHA1: | 5A22CDB46D5963BD3D4C8E5E9D9B4D62968066A8 |
SHA-256: | FC3981B68ECB6BBB1B86DD75B6D31367468402F098AC6D1CB0A75C731FC13EA2 |
SHA-512: | 45814C110AE579AD244AEBC889B22F73479A8E29FA7CC144B7FDBE12F30CA9341C2AAB6C143FD6F7EEB387B39B10DE096DA26D0575A635750B72511A42A150D0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 293 |
Entropy (8bit): | 3.5625157751674723 |
Encrypted: | false |
SSDEEP: | 6:Ygg2XqKISY/V8a2XgKUY/VfKoO/VNfiY/VH:YgPqKv9V9Al |
MD5: | 93CAF4EA7D005ACBCEB19D23B94A8E2E |
SHA1: | 5A22CDB46D5963BD3D4C8E5E9D9B4D62968066A8 |
SHA-256: | FC3981B68ECB6BBB1B86DD75B6D31367468402F098AC6D1CB0A75C731FC13EA2 |
SHA-512: | 45814C110AE579AD244AEBC889B22F73479A8E29FA7CC144B7FDBE12F30CA9341C2AAB6C143FD6F7EEB387B39B10DE096DA26D0575A635750B72511A42A150D0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 61 |
Entropy (8bit): | 3.1545915359543995 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+0:Ygg20 |
MD5: | 5C5B1219B55762A961E78FD9E398C74B |
SHA1: | FDED6A25BC90A6A844152921ECDE20C5FCB21197 |
SHA-256: | 06E8D6991F09FCBBAC998182F0D5211B4B700F88C5486C345E68C417860A212A |
SHA-512: | BC7DBD3057CF10CBDFDC375089C782CCD682BF94F3927AFFB3135067C634168311D890441AD1727DB598498355C2019AF5D8CF4E97B3F4074332EEB7349F75A3 |
Malicious: | false |
Preview: |
Process: | /tmp/Kloki.m68k.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 267 |
Entropy (8bit): | 3.233490537955532 |
Encrypted: | false |
SSDEEP: | 3:FVwdVvYX9FQWUT+erXOXSY/VXM3FQWUT+eBRXSY/VVdf/FVXKfwuv/VVdf/FVUMd:Ygg2EISY/V8a2OUY/VfKoO/VNfiY/VH |
MD5: | AF7CD67A50AD7996D302BBB649986B1F |
SHA1: | BB5B2FD76B463E5B768DB8CB8FCCAA6FD3D2FA4C |
SHA-256: | BC9C214D0906D31D204DC502EDEFE78BF97B790F74C49EC72829D6FC4218F873 |
SHA-512: | DB2E7793BEB01A26A40612C605789CDC81687A677B9F4683B2759B71A503272EB43C04F08BE2AC292DA67EC1F7670A645DFF7A0A1E6334F319F7ED7056C3D783 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.739698633354 |
TrID: |
|
File name: | Kloki.m68k.elf |
File size: | 157'344 bytes |
MD5: | b7d6c1ca193fee24d9a386474f15a7d2 |
SHA1: | 60a713edd561452c5b97c999f0a8f977ac981e1f |
SHA256: | 6e15ca0d44f9755e25d43b727e0f955dc8fc8047db4d0fc8c180a7f1f75a7adb |
SHA512: | 8bf6ebb2930ed2b7b9a4b789d15b7e876d864f5ae083632d0931478785575640b7440b0ed927b565faca69bb19d01f31226d42fdd463f172a11e892cafe6b9e6 |
SSDEEP: | 3072:oxymB42S8PghoYYYdJONJ0WGpyH9VsjbijLgK+AhcyVHNXH:AH7YdJO70pyHtL1cyVdH |
TLSH: | 3AF33AC7F800CDBDF80AE73A48130909B130BB9555924B377257797BED3A1D90A6BE86 |
File Content Preview: | .ELF.......................D...4..e......4. ...(.......................>...>...... ........D..<D..<D..H........... .dt.Q............................NV..a....da.....N^NuNV..J9....f>"y..<d QJ.g.X.#...<dN."y..<d QJ.f.A.....J.g.Hy...@N.X.........N^NuNV..N^NuN |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 156944 |
Section Header Size: | 40 |
Number of Section Headers: | 10 |
Header String Table Index: | 9 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x80000094 | 0x94 | 0x14 | 0x0 | 0x6 | AX | 0 | 0 | 2 |
.text | PROGBITS | 0x800000a8 | 0xa8 | 0x1fcb6 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.fini | PROGBITS | 0x8001fd5e | 0x1fd5e | 0xe | 0x0 | 0x6 | AX | 0 | 0 | 2 |
.rodata | PROGBITS | 0x8001fd6c | 0x1fd6c | 0x1ed2 | 0x0 | 0x2 | A | 0 | 0 | 2 |
.ctors | PROGBITS | 0x80023c44 | 0x21c44 | 0xc | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.dtors | PROGBITS | 0x80023c50 | 0x21c50 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x80023c60 | 0x21c60 | 0x4870 | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.bss | NOBITS | 0x800284d0 | 0x264d0 | 0x555c | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.shstrtab | STRTAB | 0x0 | 0x264d0 | 0x3e | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x80000000 | 0x80000000 | 0x21c3e | 0x21c3e | 6.1578 | 0x5 | R E | 0x2000 | .init .text .fini .rodata | |
LOAD | 0x21c44 | 0x80023c44 | 0x80023c44 | 0x488c | 0x9de8 | 0.3625 | 0x6 | RW | 0x2000 | .ctors .dtors .data .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 4, 2025 09:31:25.138060093 CET | 40228 | 13566 | 192.168.2.13 | 210.99.87.190 |
Jan 4, 2025 09:31:25.142337084 CET | 58912 | 13566 | 192.168.2.13 | 210.99.148.158 |
Jan 4, 2025 09:31:25.142869949 CET | 13566 | 40228 | 210.99.87.190 | 192.168.2.13 |
Jan 4, 2025 09:31:25.142925978 CET | 40228 | 13566 | 192.168.2.13 | 210.99.87.190 |
Jan 4, 2025 09:31:25.145092964 CET | 40624 | 13566 | 192.168.2.13 | 210.99.180.66 |
Jan 4, 2025 09:31:25.147259951 CET | 13566 | 58912 | 210.99.148.158 | 192.168.2.13 |
Jan 4, 2025 09:31:25.147315979 CET | 58912 | 13566 | 192.168.2.13 | 210.99.148.158 |
Jan 4, 2025 09:31:25.148220062 CET | 38666 | 13566 | 192.168.2.13 | 210.99.9.28 |
Jan 4, 2025 09:31:25.149903059 CET | 13566 | 40624 | 210.99.180.66 | 192.168.2.13 |
Jan 4, 2025 09:31:25.149941921 CET | 40624 | 13566 | 192.168.2.13 | 210.99.180.66 |
Jan 4, 2025 09:31:25.150722027 CET | 50040 | 13566 | 192.168.2.13 | 210.99.99.236 |
Jan 4, 2025 09:31:25.152962923 CET | 13566 | 38666 | 210.99.9.28 | 192.168.2.13 |
Jan 4, 2025 09:31:25.152996063 CET | 38666 | 13566 | 192.168.2.13 | 210.99.9.28 |
Jan 4, 2025 09:31:25.154292107 CET | 38774 | 13566 | 192.168.2.13 | 210.99.202.63 |
Jan 4, 2025 09:31:25.155536890 CET | 13566 | 50040 | 210.99.99.236 | 192.168.2.13 |
Jan 4, 2025 09:31:25.155579090 CET | 50040 | 13566 | 192.168.2.13 | 210.99.99.236 |
Jan 4, 2025 09:31:25.156503916 CET | 47204 | 13566 | 192.168.2.13 | 210.99.252.119 |
Jan 4, 2025 09:31:25.159091949 CET | 13566 | 38774 | 210.99.202.63 | 192.168.2.13 |
Jan 4, 2025 09:31:25.159147024 CET | 38774 | 13566 | 192.168.2.13 | 210.99.202.63 |
Jan 4, 2025 09:31:25.159288883 CET | 58428 | 13566 | 192.168.2.13 | 210.99.200.85 |
Jan 4, 2025 09:31:25.161290884 CET | 13566 | 47204 | 210.99.252.119 | 192.168.2.13 |
Jan 4, 2025 09:31:25.161333084 CET | 47204 | 13566 | 192.168.2.13 | 210.99.252.119 |
Jan 4, 2025 09:31:25.161891937 CET | 43272 | 13566 | 192.168.2.13 | 210.99.107.58 |
Jan 4, 2025 09:31:25.164043903 CET | 13566 | 58428 | 210.99.200.85 | 192.168.2.13 |
Jan 4, 2025 09:31:25.164089918 CET | 58428 | 13566 | 192.168.2.13 | 210.99.200.85 |
Jan 4, 2025 09:31:25.164731979 CET | 58918 | 13566 | 192.168.2.13 | 210.99.172.106 |
Jan 4, 2025 09:31:25.166716099 CET | 13566 | 43272 | 210.99.107.58 | 192.168.2.13 |
Jan 4, 2025 09:31:25.166758060 CET | 43272 | 13566 | 192.168.2.13 | 210.99.107.58 |
Jan 4, 2025 09:31:25.167180061 CET | 44102 | 13566 | 192.168.2.13 | 210.99.205.144 |
Jan 4, 2025 09:31:25.169465065 CET | 13566 | 58918 | 210.99.172.106 | 192.168.2.13 |
Jan 4, 2025 09:31:25.169500113 CET | 58918 | 13566 | 192.168.2.13 | 210.99.172.106 |
Jan 4, 2025 09:31:25.170073986 CET | 49866 | 13566 | 192.168.2.13 | 210.99.97.54 |
Jan 4, 2025 09:31:25.171989918 CET | 13566 | 44102 | 210.99.205.144 | 192.168.2.13 |
Jan 4, 2025 09:31:25.172024965 CET | 44102 | 13566 | 192.168.2.13 | 210.99.205.144 |
Jan 4, 2025 09:31:25.172816038 CET | 44404 | 13566 | 192.168.2.13 | 210.99.163.69 |
Jan 4, 2025 09:31:25.174839973 CET | 13566 | 49866 | 210.99.97.54 | 192.168.2.13 |
Jan 4, 2025 09:31:25.174875021 CET | 49866 | 13566 | 192.168.2.13 | 210.99.97.54 |
Jan 4, 2025 09:31:25.176003933 CET | 36126 | 13566 | 192.168.2.13 | 210.99.237.45 |
Jan 4, 2025 09:31:25.177598953 CET | 13566 | 44404 | 210.99.163.69 | 192.168.2.13 |
Jan 4, 2025 09:31:25.177638054 CET | 44404 | 13566 | 192.168.2.13 | 210.99.163.69 |
Jan 4, 2025 09:31:25.178483963 CET | 55684 | 13566 | 192.168.2.13 | 210.99.207.221 |
Jan 4, 2025 09:31:25.180820942 CET | 13566 | 36126 | 210.99.237.45 | 192.168.2.13 |
Jan 4, 2025 09:31:25.180885077 CET | 36126 | 13566 | 192.168.2.13 | 210.99.237.45 |
Jan 4, 2025 09:31:25.181782007 CET | 37678 | 13566 | 192.168.2.13 | 210.99.82.38 |
Jan 4, 2025 09:31:25.183221102 CET | 13566 | 55684 | 210.99.207.221 | 192.168.2.13 |
Jan 4, 2025 09:31:25.183268070 CET | 55684 | 13566 | 192.168.2.13 | 210.99.207.221 |
Jan 4, 2025 09:31:25.184417963 CET | 57042 | 13566 | 192.168.2.13 | 210.99.155.230 |
Jan 4, 2025 09:31:25.186517954 CET | 13566 | 37678 | 210.99.82.38 | 192.168.2.13 |
Jan 4, 2025 09:31:25.186606884 CET | 37678 | 13566 | 192.168.2.13 | 210.99.82.38 |
Jan 4, 2025 09:31:25.187302113 CET | 54592 | 13566 | 192.168.2.13 | 210.99.196.79 |
Jan 4, 2025 09:31:25.189147949 CET | 13566 | 57042 | 210.99.155.230 | 192.168.2.13 |
Jan 4, 2025 09:31:25.189178944 CET | 57042 | 13566 | 192.168.2.13 | 210.99.155.230 |
Jan 4, 2025 09:31:25.189578056 CET | 60042 | 13566 | 192.168.2.13 | 210.99.41.205 |
Jan 4, 2025 09:31:25.192099094 CET | 13566 | 54592 | 210.99.196.79 | 192.168.2.13 |
Jan 4, 2025 09:31:25.192147970 CET | 54592 | 13566 | 192.168.2.13 | 210.99.196.79 |
Jan 4, 2025 09:31:25.192418098 CET | 43580 | 13566 | 192.168.2.13 | 210.99.107.140 |
Jan 4, 2025 09:31:25.194356918 CET | 13566 | 60042 | 210.99.41.205 | 192.168.2.13 |
Jan 4, 2025 09:31:25.194396973 CET | 60042 | 13566 | 192.168.2.13 | 210.99.41.205 |
Jan 4, 2025 09:31:25.194854975 CET | 38876 | 13566 | 192.168.2.13 | 210.99.185.53 |
Jan 4, 2025 09:31:25.197194099 CET | 13566 | 43580 | 210.99.107.140 | 192.168.2.13 |
Jan 4, 2025 09:31:25.197235107 CET | 43580 | 13566 | 192.168.2.13 | 210.99.107.140 |
Jan 4, 2025 09:31:25.197900057 CET | 56458 | 13566 | 192.168.2.13 | 210.99.203.182 |
Jan 4, 2025 09:31:25.199606895 CET | 13566 | 38876 | 210.99.185.53 | 192.168.2.13 |
Jan 4, 2025 09:31:25.199641943 CET | 38876 | 13566 | 192.168.2.13 | 210.99.185.53 |
Jan 4, 2025 09:31:25.200562000 CET | 37594 | 13566 | 192.168.2.13 | 210.99.173.147 |
Jan 4, 2025 09:31:25.202698946 CET | 13566 | 56458 | 210.99.203.182 | 192.168.2.13 |
Jan 4, 2025 09:31:25.202740908 CET | 56458 | 13566 | 192.168.2.13 | 210.99.203.182 |
Jan 4, 2025 09:31:25.203330994 CET | 53656 | 13566 | 192.168.2.13 | 210.99.11.24 |
Jan 4, 2025 09:31:25.205341101 CET | 13566 | 37594 | 210.99.173.147 | 192.168.2.13 |
Jan 4, 2025 09:31:25.205383062 CET | 37594 | 13566 | 192.168.2.13 | 210.99.173.147 |
Jan 4, 2025 09:31:25.205670118 CET | 59450 | 13566 | 192.168.2.13 | 210.99.205.184 |
Jan 4, 2025 09:31:25.208065987 CET | 13566 | 53656 | 210.99.11.24 | 192.168.2.13 |
Jan 4, 2025 09:31:25.208108902 CET | 53656 | 13566 | 192.168.2.13 | 210.99.11.24 |
Jan 4, 2025 09:31:25.208673000 CET | 49222 | 13566 | 192.168.2.13 | 210.99.130.155 |
Jan 4, 2025 09:31:25.210408926 CET | 13566 | 59450 | 210.99.205.184 | 192.168.2.13 |
Jan 4, 2025 09:31:25.210453033 CET | 59450 | 13566 | 192.168.2.13 | 210.99.205.184 |
Jan 4, 2025 09:31:25.211123943 CET | 35782 | 13566 | 192.168.2.13 | 210.99.72.228 |
Jan 4, 2025 09:31:25.213447094 CET | 13566 | 49222 | 210.99.130.155 | 192.168.2.13 |
Jan 4, 2025 09:31:25.213485003 CET | 49222 | 13566 | 192.168.2.13 | 210.99.130.155 |
Jan 4, 2025 09:31:25.214296103 CET | 52644 | 13566 | 192.168.2.13 | 210.99.209.235 |
Jan 4, 2025 09:31:25.215924025 CET | 13566 | 35782 | 210.99.72.228 | 192.168.2.13 |
Jan 4, 2025 09:31:25.215990067 CET | 35782 | 13566 | 192.168.2.13 | 210.99.72.228 |
Jan 4, 2025 09:31:25.217133999 CET | 57892 | 13566 | 192.168.2.13 | 210.99.41.190 |
Jan 4, 2025 09:31:25.219079018 CET | 13566 | 52644 | 210.99.209.235 | 192.168.2.13 |
Jan 4, 2025 09:31:25.219114065 CET | 52644 | 13566 | 192.168.2.13 | 210.99.209.235 |
Jan 4, 2025 09:31:25.219923973 CET | 54328 | 13566 | 192.168.2.13 | 210.99.25.249 |
Jan 4, 2025 09:31:25.221935987 CET | 38320 | 13566 | 192.168.2.13 | 210.99.155.107 |
Jan 4, 2025 09:31:25.221982956 CET | 13566 | 57892 | 210.99.41.190 | 192.168.2.13 |
Jan 4, 2025 09:31:25.222040892 CET | 57892 | 13566 | 192.168.2.13 | 210.99.41.190 |
Jan 4, 2025 09:31:25.223690033 CET | 35288 | 13566 | 192.168.2.13 | 210.99.31.54 |
Jan 4, 2025 09:31:25.224684000 CET | 13566 | 54328 | 210.99.25.249 | 192.168.2.13 |
Jan 4, 2025 09:31:25.224719048 CET | 54328 | 13566 | 192.168.2.13 | 210.99.25.249 |
Jan 4, 2025 09:31:25.225626945 CET | 43294 | 13566 | 192.168.2.13 | 210.99.81.228 |
Jan 4, 2025 09:31:25.226690054 CET | 13566 | 38320 | 210.99.155.107 | 192.168.2.13 |
Jan 4, 2025 09:31:25.226725101 CET | 38320 | 13566 | 192.168.2.13 | 210.99.155.107 |
Jan 4, 2025 09:31:25.227428913 CET | 42658 | 13566 | 192.168.2.13 | 210.99.133.122 |
Jan 4, 2025 09:31:25.228503942 CET | 13566 | 35288 | 210.99.31.54 | 192.168.2.13 |
Jan 4, 2025 09:31:25.228533983 CET | 35288 | 13566 | 192.168.2.13 | 210.99.31.54 |
Jan 4, 2025 09:31:25.229429960 CET | 56128 | 13566 | 192.168.2.13 | 210.99.177.240 |
Jan 4, 2025 09:31:25.230366945 CET | 13566 | 43294 | 210.99.81.228 | 192.168.2.13 |
Jan 4, 2025 09:31:25.230401039 CET | 43294 | 13566 | 192.168.2.13 | 210.99.81.228 |
Jan 4, 2025 09:31:25.231071949 CET | 38308 | 13566 | 192.168.2.13 | 210.99.6.107 |
Jan 4, 2025 09:31:25.232232094 CET | 13566 | 42658 | 210.99.133.122 | 192.168.2.13 |
Jan 4, 2025 09:31:25.232270002 CET | 42658 | 13566 | 192.168.2.13 | 210.99.133.122 |
Jan 4, 2025 09:31:25.232938051 CET | 48630 | 13566 | 192.168.2.13 | 210.99.38.210 |
Jan 4, 2025 09:31:25.234225988 CET | 13566 | 56128 | 210.99.177.240 | 192.168.2.13 |
Jan 4, 2025 09:31:25.234267950 CET | 56128 | 13566 | 192.168.2.13 | 210.99.177.240 |
Jan 4, 2025 09:31:25.234544992 CET | 52060 | 13566 | 192.168.2.13 | 210.99.33.211 |
Jan 4, 2025 09:31:25.235804081 CET | 13566 | 38308 | 210.99.6.107 | 192.168.2.13 |
Jan 4, 2025 09:31:25.235841990 CET | 38308 | 13566 | 192.168.2.13 | 210.99.6.107 |
Jan 4, 2025 09:31:25.236442089 CET | 47034 | 13566 | 192.168.2.13 | 210.99.101.44 |
Jan 4, 2025 09:31:25.237689972 CET | 13566 | 48630 | 210.99.38.210 | 192.168.2.13 |
Jan 4, 2025 09:31:25.237725019 CET | 48630 | 13566 | 192.168.2.13 | 210.99.38.210 |
Jan 4, 2025 09:31:25.238285065 CET | 52602 | 13566 | 192.168.2.13 | 210.99.235.51 |
Jan 4, 2025 09:31:25.239315987 CET | 13566 | 52060 | 210.99.33.211 | 192.168.2.13 |
Jan 4, 2025 09:31:25.239356995 CET | 52060 | 13566 | 192.168.2.13 | 210.99.33.211 |
Jan 4, 2025 09:31:25.240113020 CET | 39570 | 13566 | 192.168.2.13 | 210.99.228.110 |
Jan 4, 2025 09:31:25.241161108 CET | 13566 | 47034 | 210.99.101.44 | 192.168.2.13 |
Jan 4, 2025 09:31:25.241245985 CET | 47034 | 13566 | 192.168.2.13 | 210.99.101.44 |
Jan 4, 2025 09:31:25.243062019 CET | 13566 | 52602 | 210.99.235.51 | 192.168.2.13 |
Jan 4, 2025 09:31:25.243098021 CET | 52602 | 13566 | 192.168.2.13 | 210.99.235.51 |
Jan 4, 2025 09:31:25.244873047 CET | 13566 | 39570 | 210.99.228.110 | 192.168.2.13 |
Jan 4, 2025 09:31:25.244914055 CET | 39570 | 13566 | 192.168.2.13 | 210.99.228.110 |
Jan 4, 2025 09:31:25.293833971 CET | 42744 | 13566 | 192.168.2.13 | 83.222.191.90 |
Jan 4, 2025 09:31:25.298618078 CET | 13566 | 42744 | 83.222.191.90 | 192.168.2.13 |
Jan 4, 2025 09:31:25.298661947 CET | 42744 | 13566 | 192.168.2.13 | 83.222.191.90 |
Jan 4, 2025 09:31:25.300765991 CET | 42744 | 13566 | 192.168.2.13 | 83.222.191.90 |
Jan 4, 2025 09:31:25.305542946 CET | 13566 | 42744 | 83.222.191.90 | 192.168.2.13 |
Jan 4, 2025 09:31:25.305583000 CET | 42744 | 13566 | 192.168.2.13 | 83.222.191.90 |
Jan 4, 2025 09:31:25.310339928 CET | 13566 | 42744 | 83.222.191.90 | 192.168.2.13 |
Jan 4, 2025 09:31:35.311047077 CET | 42744 | 13566 | 192.168.2.13 | 83.222.191.90 |
Jan 4, 2025 09:31:35.316195011 CET | 13566 | 42744 | 83.222.191.90 | 192.168.2.13 |
Jan 4, 2025 09:31:35.512420893 CET | 13566 | 42744 | 83.222.191.90 | 192.168.2.13 |
Jan 4, 2025 09:31:35.512486935 CET | 42744 | 13566 | 192.168.2.13 | 83.222.191.90 |
Jan 4, 2025 09:31:35.872610092 CET | 13566 | 42744 | 83.222.191.90 | 192.168.2.13 |
Jan 4, 2025 09:31:35.872670889 CET | 42744 | 13566 | 192.168.2.13 | 83.222.191.90 |
Jan 4, 2025 09:32:35.895504951 CET | 42744 | 13566 | 192.168.2.13 | 83.222.191.90 |
Jan 4, 2025 09:32:35.900362968 CET | 13566 | 42744 | 83.222.191.90 | 192.168.2.13 |
Jan 4, 2025 09:32:36.097126961 CET | 13566 | 42744 | 83.222.191.90 | 192.168.2.13 |
Jan 4, 2025 09:32:36.097203016 CET | 42744 | 13566 | 192.168.2.13 | 83.222.191.90 |
Jan 4, 2025 09:32:36.872606993 CET | 13566 | 42744 | 83.222.191.90 | 192.168.2.13 |
Jan 4, 2025 09:32:36.872661114 CET | 42744 | 13566 | 192.168.2.13 | 83.222.191.90 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 4, 2025 09:31:25.248163939 CET | 41341 | 53 | 192.168.2.13 | 8.8.8.8 |
Jan 4, 2025 09:31:25.254936934 CET | 53 | 41341 | 8.8.8.8 | 192.168.2.13 |
Jan 4, 2025 09:31:25.256943941 CET | 58039 | 53 | 192.168.2.13 | 8.8.8.8 |
Jan 4, 2025 09:31:25.263782024 CET | 53 | 58039 | 8.8.8.8 | 192.168.2.13 |
Jan 4, 2025 09:31:25.265738964 CET | 44001 | 53 | 192.168.2.13 | 8.8.8.8 |
Jan 4, 2025 09:31:25.273771048 CET | 53 | 44001 | 8.8.8.8 | 192.168.2.13 |
Jan 4, 2025 09:31:25.276839018 CET | 57876 | 53 | 192.168.2.13 | 8.8.8.8 |
Jan 4, 2025 09:31:25.283684969 CET | 53 | 57876 | 8.8.8.8 | 192.168.2.13 |
Jan 4, 2025 09:31:25.285747051 CET | 38497 | 53 | 192.168.2.13 | 8.8.8.8 |
Jan 4, 2025 09:31:25.292725086 CET | 53 | 38497 | 8.8.8.8 | 192.168.2.13 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 4, 2025 09:31:25.248163939 CET | 192.168.2.13 | 8.8.8.8 | 0x4375 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:31:25.256943941 CET | 192.168.2.13 | 8.8.8.8 | 0x4375 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:31:25.265738964 CET | 192.168.2.13 | 8.8.8.8 | 0x4375 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:31:25.276839018 CET | 192.168.2.13 | 8.8.8.8 | 0x4375 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:31:25.285747051 CET | 192.168.2.13 | 8.8.8.8 | 0x4375 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 4, 2025 09:31:25.254936934 CET | 8.8.8.8 | 192.168.2.13 | 0x4375 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:31:25.263782024 CET | 8.8.8.8 | 192.168.2.13 | 0x4375 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:31:25.273771048 CET | 8.8.8.8 | 192.168.2.13 | 0x4375 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:31:25.283684969 CET | 8.8.8.8 | 192.168.2.13 | 0x4375 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 4, 2025 09:31:25.292725086 CET | 8.8.8.8 | 192.168.2.13 | 0x4375 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 08:31:22 |
Start date (UTC): | 04/01/2025 |
Path: | /tmp/Kloki.m68k.elf |
Arguments: | /tmp/Kloki.m68k.elf |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 08:31:22 |
Start date (UTC): | 04/01/2025 |
Path: | /tmp/Kloki.m68k.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 08:31:22 |
Start date (UTC): | 04/01/2025 |
Path: | /tmp/Kloki.m68k.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 08:31:23 |
Start date (UTC): | 04/01/2025 |
Path: | /tmp/Kloki.m68k.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 08:31:24 |
Start date (UTC): | 04/01/2025 |
Path: | /tmp/Kloki.m68k.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |