Linux
Analysis Report
file.elf
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1587491 |
Start date and time: | 2025-01-10 13:04:08 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 42s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | file.elf |
Detection: | MAL |
Classification: | mal72.troj.linELF@0/18@4/0 |
- VT rate limit hit for: cnc.pinklander.com
Command: | /tmp/file.elf |
PID: | 5523 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: |
- system is lnxubuntu20
- file.elf New Fork (PID: 5525, Parent: 5523)
- file.elf New Fork (PID: 5527, Parent: 5525)
- file.elf New Fork (PID: 5538, Parent: 5525)
- sh New Fork (PID: 5540, Parent: 5538)
- file.elf New Fork (PID: 5546, Parent: 5525)
- sh New Fork (PID: 5548, Parent: 5546)
- file.elf New Fork (PID: 5549, Parent: 5525)
- file.elf New Fork (PID: 5555, Parent: 5549)
- file.elf New Fork (PID: 5557, Parent: 5549)
- sh New Fork (PID: 5559, Parent: 5557)
- file.elf New Fork (PID: 5587, Parent: 5549)
- sh New Fork (PID: 5589, Parent: 5587)
- file.elf New Fork (PID: 5599, Parent: 5549)
- sh New Fork (PID: 5601, Parent: 5599)
- file.elf New Fork (PID: 5610, Parent: 5549)
- sh New Fork (PID: 5612, Parent: 5610)
- file.elf New Fork (PID: 5629, Parent: 5549)
- sh New Fork (PID: 5635, Parent: 5629)
- file.elf New Fork (PID: 5642, Parent: 5549)
- sh New Fork (PID: 5644, Parent: 5642)
- file.elf New Fork (PID: 5652, Parent: 5549)
- sh New Fork (PID: 5654, Parent: 5652)
- file.elf New Fork (PID: 5665, Parent: 5549)
- sh New Fork (PID: 5667, Parent: 5665)
- file.elf New Fork (PID: 5550, Parent: 5525)
- file.elf New Fork (PID: 5553, Parent: 5525)
- cleanup
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T13:04:51.926756+0100 | 2034317 | 1 | Domain Observed Used for C2 Detected | 192.168.2.15 | 38412 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:52.929204+0100 | 2034317 | 1 | Domain Observed Used for C2 Detected | 192.168.2.15 | 39744 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:55.274675+0100 | 2034317 | 1 | Domain Observed Used for C2 Detected | 192.168.2.15 | 37414 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:56.277243+0100 | 2034317 | 1 | Domain Observed Used for C2 Detected | 192.168.2.15 | 45062 | 8.8.8.8 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T13:04:59.509942+0100 | 2018141 | 1 | A Network Trojan was detected | 13.251.16.150 | 80 | 192.168.2.15 | 50788 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T13:04:59.509942+0100 | 2037771 | 1 | A Network Trojan was detected | 13.251.16.150 | 80 | 192.168.2.15 | 50788 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Iptables executable using switch for changing the iptables rules: | Jump to behavior | ||
Source: | Iptables executable using switch for changing the iptables rules: | Jump to behavior | ||
Source: | Iptables executable using switch for changing the iptables rules: | Jump to behavior |
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior |
Source: | Socket: | Jump to behavior | ||
Source: | Socket: | Jump to behavior |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: |
Source: | Classification label: |
Persistence and Installation Behavior |
---|
Source: | Iptables executable using switch for changing the iptables rules: | Jump to behavior | ||
Source: | Iptables executable using switch for changing the iptables rules: | Jump to behavior | ||
Source: | Iptables executable using switch for changing the iptables rules: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior |
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior | ||
Source: | Iptables executable: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Network traffic detected: |
Source: | Sleeps longer then 60s: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | Windows Management Instrumentation | 1 Scripting | Path Interception | 1 Virtualization/Sandbox Evasion | 1 OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 11 Non-Standard Port | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 1 System Network Configuration Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
57% | Virustotal | Browse | ||
61% | ReversingLabs | Linux.Trojan.Pink | ||
100% | Avira | LINUX/Agent.rguwm |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cnc.pinklander.com | 13.251.16.150 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
13.251.16.150 | cnc.pinklander.com | United States | 16509 | AMAZON-02US | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
13.251.16.150 | Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| |
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | AgentTesla, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla, DBatLoader, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AMAZON-02US | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 20 |
Entropy (8bit): | 1.2917601481809733 |
Encrypted: | false |
SSDEEP: | 3:Ftt:Xt |
MD5: | 7029066C27AC6F5EF18D660D5741979A |
SHA1: | 46C6643F07AA7F6BFE7118DE926B86DEFC5087C4 |
SHA-256: | 59869DB34853933B239F1E2219CF7D431DA006AA919635478511FABBFC8849D2 |
SHA-512: | 7E8E93F4A89CE7FAE011403E14A1D53544C6E6F6B6010D61129DC27937806D2B03802610D7999EAB33A4C36B0F9E001D9D76001B8354087634C1AA9C740C536F |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 10 |
Entropy (8bit): | 2.721928094887362 |
Encrypted: | false |
SSDEEP: | 3:LaVTh:2 |
MD5: | EA6799EC47FAAF547D6A916B059D8BCA |
SHA1: | 620C2CC980548257069A173FAE2304752107E882 |
SHA-256: | 17B1B5B2A80B151847A10950DA0203FBEB15D10FB5751D62FC443C16F6C6DD1C |
SHA-512: | FF659CAA0EFFFD9371C673F34FE3C52B5CF62A62F0E5228CFBD72A17E5C50B5C985D9C06CADBB8F8973D45842E42EA644B1C261AB6034516EAD2403FC709CA48 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 10 |
Entropy (8bit): | 2.721928094887362 |
Encrypted: | false |
SSDEEP: | 3:LaVTh:2 |
MD5: | EA6799EC47FAAF547D6A916B059D8BCA |
SHA1: | 620C2CC980548257069A173FAE2304752107E882 |
SHA-256: | 17B1B5B2A80B151847A10950DA0203FBEB15D10FB5751D62FC443C16F6C6DD1C |
SHA-512: | FF659CAA0EFFFD9371C673F34FE3C52B5CF62A62F0E5228CFBD72A17E5C50B5C985D9C06CADBB8F8973D45842E42EA644B1C261AB6034516EAD2403FC709CA48 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.0 |
Encrypted: | false |
SSDEEP: | 3:pjB:n |
MD5: | 10311431E6EFA482F2E69D5B9D192941 |
SHA1: | 1CD04617938FD693AFA091FFD9BD71D793D595AD |
SHA-256: | 9EF249AEBF53BC11E0179D8296301AAB1AE68362E68DFDE28042CCA233EE31EA |
SHA-512: | 320E63AB594BB32FD83FF28F8C8C92D82B647006DC0AA87F1D8A892C158D126CDBD0F643FD333EAA7FDF0E1B5D4203B8A16F5322CC2A43A704379C130FFD209A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 4 |
Entropy (8bit): | 1.0 |
Encrypted: | false |
SSDEEP: | 3:pp:j |
MD5: | B74BE257D5C98576EB7D74FBE53DECE1 |
SHA1: | 3503F3850BB04BF5FAF736BD1642066EC6D5A558 |
SHA-256: | 774E9B190BEEA2232D5A5F7D17C17961284CD3AF11E76D25A28AF755F002E8C4 |
SHA-512: | 699AED21719FA161B2AE2741A0A538BA1E16D11BC7C7FCC5EFECF46C68A766F10979B1287881087A7B0FA7E3225FBAA72895129367F84050B41FB040175398C7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /sbin/iptables |
File Type: | |
Category: | dropped |
Size (bytes): | 164 |
Entropy (8bit): | 3.77769731203799 |
Encrypted: | false |
SSDEEP: | 3:ULUsTt1xMJ+DRF09hZxRXWmms8IWhSN5eNKVKGv:ULUsmJ+DRKhhXWXgS4KGv |
MD5: | A96BDE933539F9145925F60C195DC33A |
SHA1: | C869E5E6E617623819436CE06D1074C90F2981F9 |
SHA-256: | 9211E22FDC170B0E2B70FB4954E52A74C0D73B3DF4CAF9EB806B25A879F24F7E |
SHA-512: | 034822D25CAD5D0C6F9B930AA72549DA6FD1C770BF13F721563E3F3018E2F33579E6E5B112672C3259470A9CF5FA375AC8D87876AB7B77AEC15F1124677EF654 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /sbin/iptables |
File Type: | |
Category: | dropped |
Size (bytes): | 91 |
Entropy (8bit): | 3.745406018260019 |
Encrypted: | false |
SSDEEP: | 3:ULlA3Vzt1xMJ+DRF09hZxRXt:ULlI4J+DRKhhXt |
MD5: | 5C6B03281E68751E6D3A4555637090E4 |
SHA1: | FCA886FF5D09EA5CACB19B0E72773F407539DEC4 |
SHA-256: | 88A1A8CB11B5CFFE4CACF01CC5D2154DF6CC26DA8E2362F3A187B56AE7537F10 |
SHA-512: | AF027E266925B884149B73710669E29295EAA01496628086EDFF4E77C6980E87890EC9905C75C5517EA5D07C7CA2A5A6E6B32CF8FE336436112DDC7D120F1946 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 14 |
Entropy (8bit): | 3.2359263506290334 |
Encrypted: | false |
SSDEEP: | 3:Tg4n:Tg4 |
MD5: | 256E722E092BB0C35A003C120A06CD0D |
SHA1: | F0282586CBD36C0015025C0200A4208BB6AD130C |
SHA-256: | E8B8C21D838E7B51627767942CC6FDF182E5E409C634A7C85002D1109161B649 |
SHA-512: | 4F52DCF7944A06CE22BF363BD40E32DD842EEC3FEDEBAC50DAF1A2705B095BEBD0AB4E8313EEAE238B82E5BF23D5C95D722A4D36F578E6551C502E305CE6603C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 14 |
Entropy (8bit): | 3.2359263506290334 |
Encrypted: | false |
SSDEEP: | 3:Tg4n:Tg4 |
MD5: | 256E722E092BB0C35A003C120A06CD0D |
SHA1: | F0282586CBD36C0015025C0200A4208BB6AD130C |
SHA-256: | E8B8C21D838E7B51627767942CC6FDF182E5E409C634A7C85002D1109161B649 |
SHA-512: | 4F52DCF7944A06CE22BF363BD40E32DD842EEC3FEDEBAC50DAF1A2705B095BEBD0AB4E8313EEAE238B82E5BF23D5C95D722A4D36F578E6551C502E305CE6603C |
Malicious: | false |
Preview: |
Process: | /tmp/file.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 14 |
Entropy (8bit): | 3.2359263506290334 |
Encrypted: | false |
SSDEEP: | 3:Tg4n:Tg4 |
MD5: | 256E722E092BB0C35A003C120A06CD0D |
SHA1: | F0282586CBD36C0015025C0200A4208BB6AD130C |
SHA-256: | E8B8C21D838E7B51627767942CC6FDF182E5E409C634A7C85002D1109161B649 |
SHA-512: | 4F52DCF7944A06CE22BF363BD40E32DD842EEC3FEDEBAC50DAF1A2705B095BEBD0AB4E8313EEAE238B82E5BF23D5C95D722A4D36F578E6551C502E305CE6603C |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.30495574987329 |
TrID: |
|
File name: | file.elf |
File size: | 610'960 bytes |
MD5: | 3a620ff356686b461e0e1a12535bea24 |
SHA1: | a1f6ddfdd78885eb585704131b6dac1d0abae4ea |
SHA256: | a430ed516a8a596570bc3a496b99cf6c7dd0a69ae0614ab2d2de6e9a8a6c2fc8 |
SHA512: | c7a610bf76225bd01cbc99857c87aa63f5dd316625f400ccc9562f4ad77f55ebfcf4116731f82ba55d1d195c81ddde5701e7faf86f832da8e0ae01438f2f0b0d |
SSDEEP: | 6144:Px603RYIUg4fisEb+bua9vRdM+RRVdp/kzEd/EudQMxsuOfzmJ/0j+etz5bHZ:Px6DTOs79TRdAEhEU5NYzKI+etZZ |
TLSH: | B3D462EDABA12EBFD81EDE3200650682144C429A13D66B7FA5B6C518F78FD0F49D3C58 |
File Content Preview: | .ELF....................p.@.4...........4. ...(........p......@...@...........................@...@.P,..P,...............0...0J..0J.."..d...............\0..\0J.\0J.................Q.td..................................................J....<...'!......'... |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 5 |
Section Header Offset: | 0 |
Section Header Size: | 40 |
Number of Section Headers: | 0 |
Header String Table Index: | 0 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
<unknown> | 0xd4 | 0x4000d4 | 0x4000d4 | 0x18 | 0x18 | 1.4575 | 0x4 | R | 0x4 | ||
LOAD | 0x0 | 0x400000 | 0x400000 | 0x92c50 | 0x92c50 | 5.3067 | 0x5 | R E | 0x10000 | ||
LOAD | 0x93000 | 0x4a3000 | 0x4a3000 | 0x2290 | 0x128d64 | 4.7222 | 0x6 | RW | 0x10000 | ||
TLS | 0x9305c | 0x4a305c | 0x4a305c | 0x0 | 0x8 | 0.0000 | 0x4 | R | 0x4 | ||
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x7 | RWE | 0x4 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T13:04:51.926756+0100 | 2034317 | ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) | 1 | 192.168.2.15 | 38412 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:52.929204+0100 | 2034317 | ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) | 1 | 192.168.2.15 | 39744 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:55.274675+0100 | 2034317 | ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) | 1 | 192.168.2.15 | 37414 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:56.277243+0100 | 2034317 | ET MALWARE PinkBot CnC Domain in DNS Lookup (cnc .pinklander .com) | 1 | 192.168.2.15 | 45062 | 8.8.8.8 | 53 | UDP |
2025-01-10T13:04:59.509942+0100 | 2018141 | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz | 1 | 13.251.16.150 | 80 | 192.168.2.15 | 50788 | TCP |
2025-01-10T13:04:59.509942+0100 | 2037771 | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst | 1 | 13.251.16.150 | 80 | 192.168.2.15 | 50788 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 13:04:53.933773994 CET | 53726 | 1088 | 192.168.2.15 | 13.251.16.150 |
Jan 10, 2025 13:04:53.938723087 CET | 1088 | 53726 | 13.251.16.150 | 192.168.2.15 |
Jan 10, 2025 13:04:53.938796043 CET | 53726 | 1088 | 192.168.2.15 | 13.251.16.150 |
Jan 10, 2025 13:04:54.044399023 CET | 53726 | 1088 | 192.168.2.15 | 13.251.16.150 |
Jan 10, 2025 13:04:54.049278975 CET | 1088 | 53726 | 13.251.16.150 | 192.168.2.15 |
Jan 10, 2025 13:04:55.233983994 CET | 1088 | 53726 | 13.251.16.150 | 192.168.2.15 |
Jan 10, 2025 13:04:55.234042883 CET | 1088 | 53726 | 13.251.16.150 | 192.168.2.15 |
Jan 10, 2025 13:04:55.234095097 CET | 53726 | 1088 | 192.168.2.15 | 13.251.16.150 |
Jan 10, 2025 13:04:55.270572901 CET | 53726 | 1088 | 192.168.2.15 | 13.251.16.150 |
Jan 10, 2025 13:04:55.275495052 CET | 1088 | 53726 | 13.251.16.150 | 192.168.2.15 |
Jan 10, 2025 13:04:57.281049967 CET | 50788 | 80 | 192.168.2.15 | 13.251.16.150 |
Jan 10, 2025 13:04:57.285963058 CET | 80 | 50788 | 13.251.16.150 | 192.168.2.15 |
Jan 10, 2025 13:04:57.286036968 CET | 50788 | 80 | 192.168.2.15 | 13.251.16.150 |
Jan 10, 2025 13:04:57.400341988 CET | 50788 | 80 | 192.168.2.15 | 13.251.16.150 |
Jan 10, 2025 13:04:57.405273914 CET | 80 | 50788 | 13.251.16.150 | 192.168.2.15 |
Jan 10, 2025 13:04:58.662766933 CET | 80 | 50788 | 13.251.16.150 | 192.168.2.15 |
Jan 10, 2025 13:04:58.662827969 CET | 80 | 50788 | 13.251.16.150 | 192.168.2.15 |
Jan 10, 2025 13:04:58.662864923 CET | 50788 | 80 | 192.168.2.15 | 13.251.16.150 |
Jan 10, 2025 13:04:58.705275059 CET | 50788 | 80 | 192.168.2.15 | 13.251.16.150 |
Jan 10, 2025 13:04:59.504882097 CET | 50788 | 80 | 192.168.2.15 | 13.251.16.150 |
Jan 10, 2025 13:04:59.504924059 CET | 50788 | 80 | 192.168.2.15 | 13.251.16.150 |
Jan 10, 2025 13:04:59.509942055 CET | 80 | 50788 | 13.251.16.150 | 192.168.2.15 |
Jan 10, 2025 13:04:59.510029078 CET | 50788 | 80 | 192.168.2.15 | 13.251.16.150 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 13:04:51.926755905 CET | 38412 | 53 | 192.168.2.15 | 8.8.8.8 |
Jan 10, 2025 13:04:52.024991989 CET | 53 | 38412 | 8.8.8.8 | 192.168.2.15 |
Jan 10, 2025 13:04:52.929203987 CET | 39744 | 53 | 192.168.2.15 | 8.8.8.8 |
Jan 10, 2025 13:04:53.065288067 CET | 53 | 39744 | 8.8.8.8 | 192.168.2.15 |
Jan 10, 2025 13:04:55.274674892 CET | 37414 | 53 | 192.168.2.15 | 8.8.8.8 |
Jan 10, 2025 13:04:55.281688929 CET | 53 | 37414 | 8.8.8.8 | 192.168.2.15 |
Jan 10, 2025 13:04:56.277242899 CET | 45062 | 53 | 192.168.2.15 | 8.8.8.8 |
Jan 10, 2025 13:04:56.284754992 CET | 53 | 45062 | 8.8.8.8 | 192.168.2.15 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 10, 2025 13:04:51.926755905 CET | 192.168.2.15 | 8.8.8.8 | 0xf2b0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 13:04:52.929203987 CET | 192.168.2.15 | 8.8.8.8 | 0x4156 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 13:04:55.274674892 CET | 192.168.2.15 | 8.8.8.8 | 0xa5fc | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 13:04:56.277242899 CET | 192.168.2.15 | 8.8.8.8 | 0xa6ae | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 10, 2025 13:04:52.024991989 CET | 8.8.8.8 | 192.168.2.15 | 0xf2b0 | No error (0) | 13.251.16.150 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 13:04:53.065288067 CET | 8.8.8.8 | 192.168.2.15 | 0x4156 | No error (0) | 13.251.16.150 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 13:04:55.281688929 CET | 8.8.8.8 | 192.168.2.15 | 0xa5fc | No error (0) | 13.251.16.150 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 13:04:56.284754992 CET | 8.8.8.8 | 192.168.2.15 | 0xa6ae | No error (0) | 13.251.16.150 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
0 | 192.168.2.15 | 53726 | 13.251.16.150 | 1088 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 10, 2025 13:04:54.044399023 CET | 290 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
1 | 192.168.2.15 | 50788 | 13.251.16.150 | 80 |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 10, 2025 13:04:57.400341988 CET | 286 | OUT | |
Jan 10, 2025 13:04:58.662766933 CET | 474 | IN |
System Behavior
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | /tmp/file.elf |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:04:51 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -t mangle -D PREROUTING -p tcp --dport 80 -j QUEUE |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -t mangle -D POSTROUTING -p tcp --sport 80 -j QUEUE |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:05:11 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:05:11 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:11 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:11 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:05:27 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:05:27 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:27 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:27 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:05:43 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:05:43 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:43 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:43 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:05:59 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:05:59 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:59 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:59 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:06:15 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:06:15 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:15 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:15 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:06:31 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:06:31 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:31 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:31 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:06:47 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:06:47 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L OUTPUT > /tmp/pink/protect_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:47 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:47 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L OUTPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:05:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:05:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:05:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:55 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L INPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:05:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:05:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:05:55 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -I INPUT -p udp --dport 123 -j ACCEPT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:06:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:06:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |
Start time (UTC): | 12:06:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -c "/sbin/iptables -n -L INPUT > /tmp/pink/p2p_ipt_check" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:55 |
Start date (UTC): | 10/01/2025 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 12:06:55 |
Start date (UTC): | 10/01/2025 |
Path: | /sbin/iptables |
Arguments: | /sbin/iptables -n -L INPUT |
File size: | 99296 bytes |
MD5 hash: | 1ab05fef765b6342cdfadaa5275b33af |
Start time (UTC): | 12:04:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/file.elf |
Arguments: | - |
File size: | 5773336 bytes |
MD5 hash: | 0d6f61f82cf2f781c6eb0661071d42d9 |