Edit tour
Linux
Analysis Report
boatnet.x86.elf
Overview
General Information
Sample name: | boatnet.x86.elf |
Analysis ID: | 1588205 |
MD5: | 3650dd2fdd4e6be4d027777f6760383a |
SHA1: | 4f074715f2ed635f8f8c536b9f383dd6ac5214c0 |
SHA256: | 40d30fa34b242436fec4b8a503dcfcdd4e57aac55229a30a91e3e67ee2cb59d4 |
Tags: | user-elfdigest |
Infos: |
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Sample is packed with UPX
Sends malformed DNS queries
ELF contains segments with high entropy indicating compressed/encrypted content
Sample contains only a LOAD segment without any section mappings
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1588205 |
Start date and time: | 2025-01-10 22:39:12 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 34s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | boatnet.x86.elf |
Detection: | MAL |
Classification: | mal68.troj.evad.linELF@0/0@6/0 |
- VT rate limit hit for: infectedslurs.geek
Command: | /tmp/boatnet.x86.elf |
PID: | 6247 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | The Peoples Bank of China. |
Standard Error: |
- system is lnxubuntu20
- boatnet.x86.elf New Fork (PID: 6248, Parent: 6247)
- boatnet.x86.elf New Fork (PID: 6249, Parent: 6248)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Linux_Trojan_Mirai_88de437f | unknown | unknown |
| |
Linux_Trojan_Mirai_cc93863b | unknown | unknown |
| |
Linux_Trojan_Mirai_8aa7b5d3 | unknown | unknown |
|
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Networking |
---|
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Program segment: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Data Obfuscation |
---|
Source: | String containing UPX found: | ||
Source: | String containing UPX found: | ||
Source: | String containing UPX found: |
Source: | Submission file: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 11 Obfuscated Files or Information | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
⊘No configs have been found
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
22% | Virustotal | Browse | ||
29% | ReversingLabs | Linux.Backdoor.Mirai | ||
100% | Joe Sandbox ML |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
infectedslurs.geek | 172.105.109.175 | true | true | unknown | |
hiakamai.dyn. [malformed] | unknown | unknown | true | unknown | |
netfags.geek. [malformed] | unknown | unknown | true | unknown | |
infectedslurs.geek. [malformed] | unknown | unknown | true | unknown | |
freethemonkeys.pirate | unknown | unknown | true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
109.202.202.202 | unknown | Switzerland | 13030 | INIT7CH | false | |
172.234.20.31 | unknown | United States | 20940 | AKAMAI-ASN1EU | false | |
91.189.91.43 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false | |
91.189.91.42 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
109.202.202.202 | Get hash | malicious | Unknown | Browse |
| |
172.234.20.31 | Get hash | malicious | Unknown | Browse | ||
91.189.91.43 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Gafgyt | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Gafgyt | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
91.189.91.42 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Gafgyt | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Gafgyt | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
infectedslurs.geek | Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CANONICAL-ASGB | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
AKAMAI-ASN1EU | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
INIT7CH | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Gafgyt | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
⊘No context
⊘No context
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 7.838340634752311 |
TrID: |
|
File name: | boatnet.x86.elf |
File size: | 15'296 bytes |
MD5: | 3650dd2fdd4e6be4d027777f6760383a |
SHA1: | 4f074715f2ed635f8f8c536b9f383dd6ac5214c0 |
SHA256: | 40d30fa34b242436fec4b8a503dcfcdd4e57aac55229a30a91e3e67ee2cb59d4 |
SHA512: | d51411765b68c9e9ef03f9e0354d7faba9f5211304a0d37c9f6fade6098fee14da0915bc0a6c7c92359dea601c3dfe8f8ed565ea577f41c3a44b38418b31a3fc |
SSDEEP: | 384:Mslj7EIK6/shzNZ6q5ulqSHTgfviqv9v1R1Q:UhZe4J3m |
TLSH: | CB62C021D6BE2C3DD2EACA39512CD8FF4C516AD423EAC910BF4A876D97D50B10974633 |
File Content Preview: | .ELF.....................B..4...........4. ...(......................:...:..............`...`...`...................Q.td...............................tUPX!........Pb..Pb......[........?d..ELF.......d.......4..`.4. (.......k.-.#..^...........`...........Q |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 0 |
Section Header Size: | 40 |
Number of Section Headers: | 0 |
Header String Table Index: | 0 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0xc01000 | 0xc01000 | 0x3abb | 0x3abb | 7.8483 | 0x5 | R E | 0x1000 | ||
LOAD | 0x560 | 0x804e560 | 0x804e560 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x1000 | ||
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 22:39:56.210848093 CET | 38278 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:39:56.215912104 CET | 25596 | 38278 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:39:56.216006041 CET | 38278 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:39:56.216033936 CET | 38278 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:39:56.224704981 CET | 25596 | 38278 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:39:56.224782944 CET | 38278 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:39:56.232315063 CET | 25596 | 38278 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:39:56.359757900 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Jan 10, 2025 22:40:01.734983921 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Jan 10, 2025 22:40:03.526725054 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Jan 10, 2025 22:40:06.224776030 CET | 38278 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:40:06.229619980 CET | 25596 | 38278 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:40:16.836972952 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Jan 10, 2025 22:40:17.599909067 CET | 25596 | 38278 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:40:17.600095987 CET | 38278 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:40:17.604973078 CET | 25596 | 38278 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:40:23.604346991 CET | 38280 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:40:23.611248016 CET | 25596 | 38280 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:40:23.611351013 CET | 38280 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:40:23.614191055 CET | 38280 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:40:23.619003057 CET | 25596 | 38280 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:40:23.619334936 CET | 38280 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:40:23.624100924 CET | 25596 | 38280 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:40:29.123152971 CET | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Jan 10, 2025 22:40:33.218556881 CET | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Jan 10, 2025 22:40:44.971621990 CET | 25596 | 38280 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:40:44.971936941 CET | 38280 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:40:44.976859093 CET | 25596 | 38280 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:40:45.989434958 CET | 38282 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:40:45.994251966 CET | 25596 | 38282 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:40:45.994360924 CET | 38282 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:40:45.994421959 CET | 38282 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:40:45.999238968 CET | 25596 | 38282 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:40:45.999320984 CET | 38282 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:40:46.004179001 CET | 25596 | 38282 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:40:57.791148901 CET | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Jan 10, 2025 22:41:07.363300085 CET | 25596 | 38282 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:07.363528013 CET | 38282 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:07.368382931 CET | 25596 | 38282 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:08.382375956 CET | 38284 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:08.387346029 CET | 25596 | 38284 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:08.387422085 CET | 38284 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:08.387485027 CET | 38284 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:08.392241001 CET | 25596 | 38284 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:08.392299891 CET | 38284 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:08.397119045 CET | 25596 | 38284 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:18.396342039 CET | 38284 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:18.401314020 CET | 25596 | 38284 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:29.773334026 CET | 25596 | 38284 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:29.773654938 CET | 38284 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:29.778630972 CET | 25596 | 38284 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:35.775872946 CET | 38286 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:35.780771971 CET | 25596 | 38286 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:35.781045914 CET | 38286 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:35.781045914 CET | 38286 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:35.785880089 CET | 25596 | 38286 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:35.785952091 CET | 38286 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:35.791273117 CET | 25596 | 38286 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:57.197319031 CET | 25596 | 38286 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:57.197743893 CET | 38286 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:57.202538013 CET | 25596 | 38286 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:58.216953039 CET | 38288 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:58.221749067 CET | 25596 | 38288 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:58.221820116 CET | 38288 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:58.221853971 CET | 38288 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:58.226670027 CET | 25596 | 38288 | 172.234.20.31 | 192.168.2.23 |
Jan 10, 2025 22:41:58.226733923 CET | 38288 | 25596 | 192.168.2.23 | 172.234.20.31 |
Jan 10, 2025 22:41:58.231535912 CET | 25596 | 38288 | 172.234.20.31 | 192.168.2.23 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 22:39:56.183193922 CET | 46701 | 53 | 192.168.2.23 | 217.160.70.42 |
Jan 10, 2025 22:39:56.210659981 CET | 53 | 46701 | 217.160.70.42 | 192.168.2.23 |
Jan 10, 2025 22:40:18.601681948 CET | 58169 | 53 | 192.168.2.23 | 178.254.22.166 |
Jan 10, 2025 22:40:45.973969936 CET | 37416 | 53 | 192.168.2.23 | 51.158.108.203 |
Jan 10, 2025 22:40:45.989090919 CET | 53 | 37416 | 51.158.108.203 | 192.168.2.23 |
Jan 10, 2025 22:41:08.364973068 CET | 43446 | 53 | 192.168.2.23 | 152.53.15.127 |
Jan 10, 2025 22:41:08.382122993 CET | 53 | 43446 | 152.53.15.127 | 192.168.2.23 |
Jan 10, 2025 22:41:30.775944948 CET | 36312 | 53 | 192.168.2.23 | 51.254.162.59 |
Jan 10, 2025 22:41:58.199456930 CET | 44603 | 53 | 192.168.2.23 | 185.232.68.212 |
Jan 10, 2025 22:41:58.216794968 CET | 53 | 44603 | 185.232.68.212 | 192.168.2.23 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 10, 2025 22:39:56.183193922 CET | 192.168.2.23 | 217.160.70.42 | 0x12b5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 22:40:18.601681948 CET | 192.168.2.23 | 178.254.22.166 | 0x4a41 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 22:40:45.973969936 CET | 192.168.2.23 | 51.158.108.203 | 0xd6e3 | Standard query (0) | 256 | 477 | false | |
Jan 10, 2025 22:41:08.364973068 CET | 192.168.2.23 | 152.53.15.127 | 0x74e | Standard query (0) | 256 | 500 | false | |
Jan 10, 2025 22:41:30.775944948 CET | 192.168.2.23 | 51.254.162.59 | 0xede9 | Standard query (0) | 256 | 271 | false | |
Jan 10, 2025 22:41:58.199456930 CET | 192.168.2.23 | 185.232.68.212 | 0x300f | Standard query (0) | 256 | 294 | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 172.105.109.175 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 170.187.181.188 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 74.207.230.91 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 45.79.236.13 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 172.236.61.194 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 104.237.135.249 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 172.104.165.127 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 192.46.236.113 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 172.236.11.132 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 172.236.28.137 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 172.232.34.247 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 172.105.120.101 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 172.233.66.46 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 172.234.20.31 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:39:56.210659981 CET | 217.160.70.42 | 192.168.2.23 | 0x12b5 | No error (0) | 104.237.135.234 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 22:40:45.989090919 CET | 51.158.108.203 | 192.168.2.23 | 0xd6e3 | Format error (1) | none | none | 256 | 477 | false | |
Jan 10, 2025 22:41:08.382122993 CET | 152.53.15.127 | 192.168.2.23 | 0x74e | Format error (1) | none | none | 256 | 500 | false |
System Behavior
Start time (UTC): | 21:39:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/boatnet.x86.elf |
Arguments: | /tmp/boatnet.x86.elf |
File size: | 15296 bytes |
MD5 hash: | 3650dd2fdd4e6be4d027777f6760383a |
Start time (UTC): | 21:39:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/boatnet.x86.elf |
Arguments: | - |
File size: | 15296 bytes |
MD5 hash: | 3650dd2fdd4e6be4d027777f6760383a |
Start time (UTC): | 21:39:55 |
Start date (UTC): | 10/01/2025 |
Path: | /tmp/boatnet.x86.elf |
Arguments: | - |
File size: | 15296 bytes |
MD5 hash: | 3650dd2fdd4e6be4d027777f6760383a |