Linux
Analysis Report
file.elf
Overview
General Information
Sample name: | file.elf |
Analysis ID: | 1587490 |
MD5: | 5ae1fec20c2f720269c2dc94732187e8 |
SHA1: | aff86a5d4a620141a54ad0664e6f9182475ee036 |
SHA256: | 41f7ed67877a3d6805d60ad5ea91816f2092012fa316f9fbf1b8fbb953fbada5 |
Tags: | elfPinksbuser-Bitsight |
Infos: |
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1587490 |
Start date and time: | 2025-01-10 13:04:07 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 38s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | file.elf |
Detection: | MAL |
Classification: | mal72.troj.linELF@0/18@4/0 |
- VT rate limit hit for: cnc.pinklander.com
Command: | /tmp/file.elf |
PID: | 5514 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: |
- system is lnxubuntu20
- file.elf New Fork (PID: 5516, Parent: 5514)
- file.elf New Fork (PID: 5518, Parent: 5516)
- file.elf New Fork (PID: 5522, Parent: 5516)
- sh New Fork (PID: 5528, Parent: 5522)
- file.elf New Fork (PID: 5534, Parent: 5516)
- sh New Fork (PID: 5536, Parent: 5534)
- file.elf New Fork (PID: 5537, Parent: 5516)
- file.elf New Fork (PID: 5543, Parent: 5537)
- file.elf New Fork (PID: 5545, Parent: 5537)
- sh New Fork (PID: 5550, Parent: 5545)
- file.elf New Fork (PID: 5565, Parent: 5537)
- sh New Fork (PID: 5567, Parent: 5565)
- file.elf New Fork (PID: 5596, Parent: 5537)
- sh New Fork (PID: 5598, Parent: 5596)
- file.elf New Fork (PID: 5608, Parent: 5537)
- sh New Fork (PID: 5610, Parent: 5608)
- file.elf New Fork (PID: 5628, Parent: 5537)
- sh New Fork (PID: 5630, Parent: 5628)
- file.elf New Fork (PID: 5638, Parent: 5537)
- sh New Fork (PID: 5640, Parent: 5638)
- file.elf New Fork (PID: 5647, Parent: 5537)
- sh New Fork (PID: 5653, Parent: 5647)
- file.elf New Fork (PID: 5663, Parent: 5537)
- sh New Fork (PID: 5665, Parent: 5663)
- file.elf New Fork (PID: 5538, Parent: 5516)
- file.elf New Fork (PID: 5541, Parent: 5516)
- cleanup
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T13:04:49.263621+0100 | 2034317 | 1 | Domain Observed Used for C2 Detected | 192.168.2.14 | 34484 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:50.270265+0100 | 2034317 | 1 | Domain Observed Used for C2 Detected | 192.168.2.14 | 46994 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:52.617273+0100 | 2034317 | 1 | Domain Observed Used for C2 Detected | 192.168.2.14 | 50058 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:53.618665+0100 | 2034317 | 1 | Domain Observed Used for C2 Detected | 192.168.2.14 | 53462 | 8.8.8.8 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T13:04:56.354704+0100 | 2018141 | 1 | A Network Trojan was detected | 13.251.16.150 | 80 | 192.168.2.14 | 57484 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T13:04:56.354704+0100 | 2037771 | 1 | A Network Trojan was detected | 13.251.16.150 | 80 | 192.168.2.14 | 57484 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Iptables executable using switch for changing the iptables rules: | Jump to behavior | ||
Source: | Iptables executable using switch for changing the iptables rules: | Jump to behavior | ||
Source: | Iptables executable using switch for changing the iptables rules: | Jump to behavior |
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior |
Source: | Socket: | Jump to behavior | ||
Source: | Socket: | Jump to behavior |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: |
Source: | Classification label: |
Persistence and Installation Behavior |
---|
Source: | Iptables executable using switch for changing the iptables rules: | Jump to behavior | ||
Source: | Iptables executable using switch for changing the iptables rules: | Jump to behavior | ||
Source: | Iptables executable using switch for changing the iptables rules: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior |
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Network traffic detected: |
Source: | Sleeps longer then 60s: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | Windows Management Instrumentation | 1 Scripting | Path Interception | 1 Virtualization/Sandbox Evasion | 1 OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 11 Non-Standard Port | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 1 System Network Configuration Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
66% | ReversingLabs | Linux.Trojan.Pink | ||
62% | Virustotal | Browse | ||
100% | Avira | LINUX/Agent.nezaj |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cnc.pinklander.com | 13.251.16.150 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
13.251.16.150 | cnc.pinklander.com | United States | 16509 | AMAZON-02US | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
13.251.16.150 | Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| |
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | AgentTesla, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla, DBatLoader, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AMAZON-02US | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 20 |
Entropy (8bit): | 1.2917601481809733 |
Encrypted: | false |
SSDEEP: | 3:Ftt:Xt |
MD5: | 7029066C27AC6F5EF18D660D5741979A |
SHA1: | 46C6643F07AA7F6BFE7118DE926B86DEFC5087C4 |
SHA-256: | 59869DB34853933B239F1E2219CF7D431DA006AA919635478511FABBFC8849D2 |
SHA-512: | 7E8E93F4A89CE7FAE011403E14A1D53544C6E6F6B6010D61129DC27937806D2B03802610D7999EAB33A4C36B0F9E001D9D76001B8354087634C1AA9C740C536F |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 10 |
Entropy (8bit): | 2.6464393446710153 |
Encrypted: | false |
SSDEEP: | 3:LaVTl:y |
MD5: | BFA5BC71F70E92DF65DAC7D1C8F165BA |
SHA1: | 75E3B7F4922DE31627D25A61B1FF1328A4ABADCC |
SHA-256: | 8C7C18155EB93D4BAADC6898C14EDDD2095DA23804289C60651F323BAB0C1DF1 |
SHA-512: | F3A966CDB5264E4D886F1B5EE9FB8AA3F6FF048232A71C4A16E566365DACDB938C6DFFEF006421601291E29F4B024E743E12F7624C76B23E113E202366903409 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 10 |
Entropy (8bit): | 2.6464393446710153 |
Encrypted: | false |
SSDEEP: | 3:LaVTl:y |
MD5: | BFA5BC71F70E92DF65DAC7D1C8F165BA |
SHA1: | 75E3B7F4922DE31627D25A61B1FF1328A4ABADCC |
SHA-256: | 8C7C18155EB93D4BAADC6898C14EDDD2095DA23804289C60651F323BAB0C1DF1 |
SHA-512: | F3A966CDB5264E4D886F1B5EE9FB8AA3F6FF048232A71C4A16E566365DACDB938C6DFFEF006421601291E29F4B024E743E12F7624C76B23E113E202366903409 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.0 |
Encrypted: | false |
SSDEEP: | 3:pjB:n |
MD5: | 10311431E6EFA482F2E69D5B9D192941 |
SHA1: | 1CD04617938FD693AFA091FFD9BD71D793D595AD |
SHA-256: | 9EF249AEBF53BC11E0179D8296301AAB1AE68362E68DFDE28042CCA233EE31EA |
SHA-512: | 320E63AB594BB32FD83FF28F8C8C92D82B647006DC0AA87F1D8A892C158D126CDBD0F643FD333EAA7FDF0E1B5D4203B8A16F5322CC2A43A704379C130FFD209A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 4 |
Entropy (8bit): | 1.0 |
Encrypted: | false |
SSDEEP: | 3:pp:j |
MD5: | B74BE257D5C98576EB7D74FBE53DECE1 |
SHA1: | 3503F3850BB04BF5FAF736BD1642066EC6D5A558 |
SHA-256: | 774E9B190BEEA2232D5A5F7D17C17961284CD3AF11E76D25A28AF755F002E8C4 |
SHA-512: | 699AED21719FA161B2AE2741A0A538BA1E16D11BC7C7FCC5EFECF46C68A766F10979B1287881087A7B0FA7E3225FBAA72895129367F84050B41FB040175398C7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /sbin/iptables |
File Type: | |
Category: | dropped |
Size (bytes): | 164 |
Entropy (8bit): | 3.77769731203799 |
Encrypted: | false |
SSDEEP: | 3:ULUsTt1xMJ+DRF09hZxRXWmms8IWhSN5eNKVKGv:ULUsmJ+DRKhhXWXgS4KGv |
MD5: | A96BDE933539F9145925F60C195DC33A |
SHA1: | C869E5E6E617623819436CE06D1074C90F2981F9 |
SHA-256: | 9211E22FDC170B0E2B70FB4954E52A74C0D73B3DF4CAF9EB806B25A879F24F7E |
SHA-512: | 034822D25CAD5D0C6F9B930AA72549DA6FD1C770BF13F721563E3F3018E2F33579E6E5B112672C3259470A9CF5FA375AC8D87876AB7B77AEC15F1124677EF654 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /sbin/iptables |
File Type: | |
Category: | dropped |
Size (bytes): | 91 |
Entropy (8bit): | 3.745406018260019 |
Encrypted: | false |
SSDEEP: | 3:ULlA3Vzt1xMJ+DRF09hZxRXt:ULlI4J+DRKhhXt |
MD5: | 5C6B03281E68751E6D3A4555637090E4 |
SHA1: | FCA886FF5D09EA5CACB19B0E72773F407539DEC4 |
SHA-256: | 88A1A8CB11B5CFFE4CACF01CC5D2154DF6CC26DA8E2362F3A187B56AE7537F10 |
SHA-512: | AF027E266925B884149B73710669E29295EAA01496628086EDFF4E77C6980E87890EC9905C75C5517EA5D07C7CA2A5A6E6B32CF8FE336436112DDC7D120F1946 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 14 |
Entropy (8bit): | 3.2359263506290334 |
Encrypted: | false |
SSDEEP: | 3:Tg4n:Tg4 |
MD5: | 256E722E092BB0C35A003C120A06CD0D |
SHA1: | F0282586CBD36C0015025C0200A4208BB6AD130C |
SHA-256: | E8B8C21D838E7B51627767942CC6FDF182E5E409C634A7C85002D1109161B649 |
SHA-512: | 4F52DCF7944A06CE22BF363BD40E32DD842EEC3FEDEBAC50DAF1A2705B095BEBD0AB4E8313EEAE238B82E5BF23D5C95D722A4D36F578E6551C502E305CE6603C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 14 |
Entropy (8bit): | 3.2359263506290334 |
Encrypted: | false |
SSDEEP: | 3:Tg4n:Tg4 |
MD5: | 256E722E092BB0C35A003C120A06CD0D |
SHA1: | F0282586CBD36C0015025C0200A4208BB6AD130C |
SHA-256: | E8B8C21D838E7B51627767942CC6FDF182E5E409C634A7C85002D1109161B649 |
SHA-512: | 4F52DCF7944A06CE22BF363BD40E32DD842EEC3FEDEBAC50DAF1A2705B095BEBD0AB4E8313EEAE238B82E5BF23D5C95D722A4D36F578E6551C502E305CE6603C |
Malicious: | false |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 14 |
Entropy (8bit): | 3.2359263506290334 |
Encrypted: | false |
SSDEEP: | 3:Tg4n:Tg4 |
MD5: | 256E722E092BB0C35A003C120A06CD0D |
SHA1: | F0282586CBD36C0015025C0200A4208BB6AD130C |
SHA-256: | E8B8C21D838E7B51627767942CC6FDF182E5E409C634A7C85002D1109161B649 |
SHA-512: | 4F52DCF7944A06CE22BF363BD40E32DD842EEC3FEDEBAC50DAF1A2705B095BEBD0AB4E8313EEAE238B82E5BF23D5C95D722A4D36F578E6551C502E305CE6603C |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.30394734370437 |
TrID: |
|
File name: | file.elf |
File size: | 610'960 bytes |
MD5: | 5ae1fec20c2f720269c2dc94732187e8 |
SHA1: | aff86a5d4a620141a54ad0664e6f9182475ee036 |
SHA256: | 41f7ed67877a3d6805d60ad5ea91816f2092012fa316f9fbf1b8fbb953fbada5 |
SHA512: | 2d4f1a752b8909fbca46ebef07f75938630d614bcb93dc96867947bc898520bd54abf46f02f752d2320e11198b8deecfd88a371290e440dec9bb24e5cb9b0bbe |
SSDEEP: | 6144:7J17kAqmRpuBYXZP3qWI5kaiLCZGNuWequsVOqS5Pxvr3+3awRV4v51u/HLGqeiH:P/pu+P/NuSSf+KwRAp8o8dskv |
TLSH: | 65D4A6366FB1AB5EE279473186F73AF0C36623C226A19541D27DC6189E7021D0CDFEA1 |
File Content Preview: | .ELF.....................@.p...4.........4. ...(....p........@...@...........................@...@....-`..-`..............0..J0..J0..."....d..............0\.J0\.J0\................dt.Q.................................................J..<...'......!'...... |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 5 |
Section Header Offset: | 0 |
Section Header Size: | 40 |
Number of Section Headers: | 0 |
Header String Table Index: | 0 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
<unknown> | 0xd4 | 0x4000d4 | 0x4000d4 | 0x18 | 0x18 | 1.4575 | 0x4 | R | 0x4 | ||
LOAD | 0x0 | 0x400000 | 0x400000 | 0x92d60 | 0x92d60 | 5.3042 | 0x5 | R E | 0x10000 | ||
LOAD | 0x93000 | 0x4a3000 | 0x4a3000 | 0x2290 | 0x128d64 | 4.7258 | 0x6 | RW | 0x10000 | ||
TLS | 0x9305c | 0x4a305c | 0x4a305c | 0x0 | 0x8 | 0.0000 | 0x4 | R | 0x4 | ||
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x7 | RWE | 0x4 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T13:04:49.263621+0100 | 2034317 | ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) | 1 | 192.168.2.14 | 34484 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:50.270265+0100 | 2034317 | ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) | 1 | 192.168.2.14 | 46994 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:52.617273+0100 | 2034317 | ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) | 1 | 192.168.2.14 | 50058 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:53.618665+0100 | 2034317 | ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) | 1 | 192.168.2.14 | 53462 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:56.354704+0100 | 2018141 | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz | 1 | 13.251.16.150 | 80 | 192.168.2.14 | 57484 | TCP |
2025-01-10T13:04:56.354704+0100 | 2037771 | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst | 1 | 13.251.16.150 | 80 | 192.168.2.14 | 57484 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 13:04:51.323824883 CET | 53448 | 1088 | 192.168.2.14 | 13.251.16.150 |
Jan 10, 2025 13:04:51.329852104 CET | 1088 | 53448 | 13.251.16.150 | 192.168.2.14 |
Jan 10, 2025 13:04:51.329963923 CET | 53448 | 1088 | 192.168.2.14 | 13.251.16.150 |
Jan 10, 2025 13:04:51.438118935 CET | 53448 | 1088 | 192.168.2.14 | 13.251.16.150 |
Jan 10, 2025 13:04:51.443183899 CET | 1088 | 53448 | 13.251.16.150 | 192.168.2.14 |
Jan 10, 2025 13:04:52.608875036 CET | 1088 | 53448 | 13.251.16.150 | 192.168.2.14 |
Jan 10, 2025 13:04:52.608946085 CET | 53448 | 1088 | 192.168.2.14 | 13.251.16.150 |
Jan 10, 2025 13:04:52.609081984 CET | 1088 | 53448 | 13.251.16.150 | 192.168.2.14 |
Jan 10, 2025 13:04:52.615622997 CET | 53448 | 1088 | 192.168.2.14 | 13.251.16.150 |
Jan 10, 2025 13:04:52.620549917 CET | 1088 | 53448 | 13.251.16.150 | 192.168.2.14 |
Jan 10, 2025 13:04:54.620611906 CET | 57484 | 80 | 192.168.2.14 | 13.251.16.150 |
Jan 10, 2025 13:04:54.625720024 CET | 80 | 57484 | 13.251.16.150 | 192.168.2.14 |
Jan 10, 2025 13:04:54.625808954 CET | 57484 | 80 | 192.168.2.14 | 13.251.16.150 |
Jan 10, 2025 13:04:54.722671032 CET | 57484 | 80 | 192.168.2.14 | 13.251.16.150 |
Jan 10, 2025 13:04:54.727668047 CET | 80 | 57484 | 13.251.16.150 | 192.168.2.14 |
Jan 10, 2025 13:04:55.991872072 CET | 80 | 57484 | 13.251.16.150 | 192.168.2.14 |
Jan 10, 2025 13:04:55.991982937 CET | 80 | 57484 | 13.251.16.150 | 192.168.2.14 |
Jan 10, 2025 13:04:55.992042065 CET | 57484 | 80 | 192.168.2.14 | 13.251.16.150 |
Jan 10, 2025 13:04:56.033735037 CET | 57484 | 80 | 192.168.2.14 | 13.251.16.150 |
Jan 10, 2025 13:04:56.349677086 CET | 57484 | 80 | 192.168.2.14 | 13.251.16.150 |
Jan 10, 2025 13:04:56.349678040 CET | 57484 | 80 | 192.168.2.14 | 13.251.16.150 |
Jan 10, 2025 13:04:56.354703903 CET | 80 | 57484 | 13.251.16.150 | 192.168.2.14 |
Jan 10, 2025 13:04:56.354784966 CET | 57484 | 80 | 192.168.2.14 | 13.251.16.150 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 13:04:49.263621092 CET | 34484 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 10, 2025 13:04:49.361524105 CET | 53 | 34484 | 8.8.8.8 | 192.168.2.14 |
Jan 10, 2025 13:04:50.270265102 CET | 46994 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 10, 2025 13:04:50.375885963 CET | 53 | 46994 | 8.8.8.8 | 192.168.2.14 |
Jan 10, 2025 13:04:52.617273092 CET | 50058 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 10, 2025 13:04:52.716103077 CET | 53 | 50058 | 8.8.8.8 | 192.168.2.14 |
Jan 10, 2025 13:04:53.618664980 CET | 53462 | 53 | 192.168.2.14 | 8.8.8.8 |
Jan 10, 2025 13:04:53.625801086 CET | 53 | 53462 | 8.8.8.8 | 192.168.2.14 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 10, 2025 13:04:49.263621092 CET | 192.168.2.14 | 8.8.8.8 | 0xb0f2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 13:04:50.270265102 CET | 192.168.2.14 | 8.8.8.8 | 0x5641 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 13:04:52.617273092 CET | 192.168.2.14 | 8.8.8.8 | 0xfca5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 13:04:53.618664980 CET | 192.168.2.14 | 8.8.8.8 | 0xaea6 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 10, 2025 13:04:49.361524105 CET | 8.8.8.8 | 192.168.2.14 | 0xb0f2 | No error (0) | 13.251.16.150 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 13:04:50.375885963 CET | 8.8.8.8 | 192.168.2.14 | 0x5641 | No error (0) | 13.251.16.150 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 13:04:52.716103077 CET | 8.8.8.8 | 192.168.2.14 | 0xfca5 | No error (0) | 13.251.16.150 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 13:04:53.625801086 CET | 8.8.8.8 | 192.168.2.14 | 0xaea6 | No error (0) | 13.251.16.150 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
0 | 192.168.2.14 | 53448 | 13.251.16.150 | 1088 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 10, 2025 13:04:51.438118935 CET | 294 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
1 | 192.168.2.14 | 57484 | 13.251.16.150 | 80 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 10, 2025 13:04:54.722671032 CET | 291 | OUT | |
Jan 10, 2025 13:04:55.991872072 CET | 474 | IN |
System Behavior
Start time (UTC): | 12:04:48 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | /tmp/file.elf |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:04:48 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:04:48 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:05:07 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:05:07 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:07 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:07 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:05:23 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:05:23 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:23 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:23 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:05:39 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:05:39 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:39 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:39 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:05:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:05:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:55 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:06:11 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:06:11 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:11 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:11 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:06:27 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:06:27 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:27 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:27 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:06:43 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:06:43 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:43 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:43 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:05:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:05:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:05:51 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:51 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:51 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L INPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:05:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:05:51 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:51 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:51 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:06:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:06:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |
Start time (UTC): | 12:06:51 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:51 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:51 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L INPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5777432 bytes |
MD5 hash: | 0083f1f0e77be34ad27f849842bbb00c |