Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
boatnet.arm7.elf

Overview

General Information

Sample name:boatnet.arm7.elf
Analysis ID:1588206
MD5:c896d8523ad1a572db4b8f21e949a646
SHA1:8bda4459cea2d3ceb0d773711773a7f78809f15d
SHA256:5140241e0171d971f2695b4af89420e8a8e5a8529c473ace969d6230cdb1f20b
Tags:user-elfdigest
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Sample is packed with UPX
Sends malformed DNS queries
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Sample contains only a LOAD segment without any section mappings
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1588206
Start date and time:2025-01-10 22:39:17 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 30s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:boatnet.arm7.elf
Detection:MAL
Classification:mal56.troj.evad.linELF@0/0@10/0
  • VT rate limit hit for: w3d0ntlikebot5.parody
Command:/tmp/boatnet.arm7.elf
PID:5434
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
The Peoples Bank of China.
Standard Error:
  • system is lnxubuntu20
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: boatnet.arm7.elfVirustotal: Detection: 25%Perma Link
Source: boatnet.arm7.elfReversingLabs: Detection: 26%

Networking

barindex
Source: global trafficDNS traffic detected: malformed DNS query: infectedchink.pirate. [malformed]
Source: global trafficDNS traffic detected: malformed DNS query: hiakamai.dyn. [malformed]
Source: global trafficDNS traffic detected: malformed DNS query: freethewind.parody. [malformed]
Source: global trafficTCP traffic: 192.168.2.13:34284 -> 104.237.135.249:25596
Source: /tmp/boatnet.arm7.elf (PID: 5434)Socket: 127.0.0.1:39148Jump to behavior
Source: global trafficTCP traffic: 192.168.2.13:48202 -> 185.125.190.26:443
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknownUDP traffic detected without corresponding DNS query: 185.232.68.212
Source: unknownUDP traffic detected without corresponding DNS query: 185.232.68.212
Source: unknownUDP traffic detected without corresponding DNS query: 139.84.165.176
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 64.176.6.48
Source: unknownUDP traffic detected without corresponding DNS query: 81.169.136.222
Source: unknownUDP traffic detected without corresponding DNS query: 95.216.99.249
Source: unknownUDP traffic detected without corresponding DNS query: 5.161.109.23
Source: unknownUDP traffic detected without corresponding DNS query: 5.161.109.23
Source: unknownUDP traffic detected without corresponding DNS query: 5.161.109.23
Source: global trafficDNS traffic detected: DNS query: infectedslurs.geek
Source: global trafficDNS traffic detected: DNS query: yellowchink.pirate
Source: global trafficDNS traffic detected: DNS query: infectedchink.pirate. [malformed]
Source: global trafficDNS traffic detected: DNS query: hiakamai.dyn. [malformed]
Source: global trafficDNS traffic detected: DNS query: w3d0ntlikebot5.parody
Source: global trafficDNS traffic detected: DNS query: freethewind.parody. [malformed]
Source: global trafficDNS traffic detected: DNS query: infectedchink.pirate
Source: boatnet.arm7.elfString found in binary or memory: http://upx.sf.net
Source: unknownNetwork traffic detected: HTTP traffic on port 48202 -> 443
Source: LOAD without section mappingsProgram segment: 0x8000
Source: classification engineClassification label: mal56.troj.evad.linELF@0/0@10/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
Source: boatnet.arm7.elfSubmission file: segment LOAD with 7.9367 entropy (max. 8.0)
Source: /tmp/boatnet.arm7.elf (PID: 5434)Queries kernel information via 'uname': Jump to behavior
Source: boatnet.arm7.elf, 5434.1.00007ffee8429000.00007ffee844a000.rw-.sdmpBinary or memory string: y4x86_64/usr/bin/qemu-arm/tmp/boatnet.arm7.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/boatnet.arm7.elf
Source: boatnet.arm7.elf, 5434.1.00005569cac5e000.00005569cae0d000.rw-.sdmpBinary or memory string: iU!/etc/qemu-binfmt/arm
Source: boatnet.arm7.elf, 5434.1.00005569cac5e000.00005569cae0d000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: boatnet.arm7.elf, 5434.1.00007ffee8429000.00007ffee844a000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Obfuscated Files or Information
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588206 Sample: boatnet.arm7.elf Startdate: 10/01/2025 Architecture: LINUX Score: 56 14 infectedchink.pirate. [malformed] 2->14 16 hiakamai.dyn. [malformed] 2->16 18 7 other IPs or domains 2->18 20 Multi AV Scanner detection for submitted file 2->20 22 Sample is packed with UPX 2->22 8 boatnet.arm7.elf 2->8         started        signatures3 24 Sends malformed DNS queries 16->24 process4 process5 10 boatnet.arm7.elf 8->10         started        process6 12 boatnet.arm7.elf 10->12         started       
SourceDetectionScannerLabelLink
boatnet.arm7.elf25%VirustotalBrowse
boatnet.arm7.elf26%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
w3d0ntlikebot5.parody
172.104.165.127
truefalse
    unknown
    infectedchink.pirate
    unknown
    unknowntrue
      unknown
      hiakamai.dyn. [malformed]
      unknown
      unknowntrue
        unknown
        infectedchink.pirate. [malformed]
        unknown
        unknowntrue
          unknown
          yellowchink.pirate
          unknown
          unknownfalse
            unknown
            freethewind.parody. [malformed]
            unknown
            unknowntrue
              unknown
              infectedslurs.geek
              unknown
              unknownfalse
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://upx.sf.netboatnet.arm7.elffalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  104.237.135.249
                  unknownUnited States
                  63949LINODE-APLinodeLLCUSfalse
                  185.125.190.26
                  unknownUnited Kingdom
                  41231CANONICAL-ASGBfalse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  104.237.135.249boatnet.x86.elfGet hashmaliciousUnknownBrowse
                    185.125.190.26boatnet.m68k.elfGet hashmaliciousUnknownBrowse
                      ssh.elfGet hashmaliciousGafgytBrowse
                        gnjqwpc.elfGet hashmaliciousUnknownBrowse
                          Space.arm6.elfGet hashmaliciousUnknownBrowse
                            main_sh4.elfGet hashmaliciousMiraiBrowse
                              fenty.arm4.elfGet hashmaliciousMiraiBrowse
                                Space.x86.elfGet hashmaliciousUnknownBrowse
                                  boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                    wind.arm5.elfGet hashmaliciousMiraiBrowse
                                      main_ppc.elfGet hashmaliciousMiraiBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        w3d0ntlikebot5.parodyboatnet.m68k.elfGet hashmaliciousUnknownBrowse
                                        • 172.232.34.247
                                        boatnet.mpsl.elfGet hashmaliciousUnknownBrowse
                                        • 172.236.61.194
                                        j980HN1yJw.elfGet hashmaliciousUnknownBrowse
                                        • 204.76.203.19
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CANONICAL-ASGBSpace.arm5.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        boatnet.m68k.elfGet hashmaliciousUnknownBrowse
                                        • 185.125.190.26
                                        ssd.elfGet hashmaliciousGafgytBrowse
                                        • 91.189.91.42
                                        arm7.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        ssy.elfGet hashmaliciousGafgytBrowse
                                        • 91.189.91.42
                                        ssh.elfGet hashmaliciousGafgytBrowse
                                        • 185.125.190.26
                                        UnHAnaAW.mpsl.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        UnHAnaAW.arm7.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        UnHAnaAW.sh4.elfGet hashmaliciousMiraiBrowse
                                        • 91.189.91.42
                                        wrjkngh4.elfGet hashmaliciousUnknownBrowse
                                        • 91.189.91.42
                                        LINODE-APLinodeLLCUSboatnet.m68k.elfGet hashmaliciousUnknownBrowse
                                        • 172.105.120.101
                                        QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                        • 45.33.2.79
                                        QUOTATION#070125-ELITE MARINE .exeGet hashmaliciousFormBookBrowse
                                        • 198.58.118.167
                                        Benefit_401k_2025_Enrollment.pdfGet hashmaliciousUnknownBrowse
                                        • 198.58.122.131
                                        QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                        • 45.33.23.183
                                        ZipThis.exeGet hashmaliciousUnknownBrowse
                                        • 45.33.84.9
                                        miori.x86.elfGet hashmaliciousUnknownBrowse
                                        • 45.79.143.171
                                        https://creditunions.taplink.wsGet hashmaliciousHTMLPhisherBrowse
                                        • 198.58.107.108
                                        ZipThis.exeGet hashmaliciousUnknownBrowse
                                        • 45.33.84.9
                                        http://phothockey.chGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                        • 172.105.221.29
                                        No context
                                        No context
                                        No created / dropped files found
                                        File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (GNU/Linux), statically linked, no section header
                                        Entropy (8bit):7.967426799446302
                                        TrID:
                                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                        File name:boatnet.arm7.elf
                                        File size:40'072 bytes
                                        MD5:c896d8523ad1a572db4b8f21e949a646
                                        SHA1:8bda4459cea2d3ceb0d773711773a7f78809f15d
                                        SHA256:5140241e0171d971f2695b4af89420e8a8e5a8529c473ace969d6230cdb1f20b
                                        SHA512:c2edc13ded25004eb85d7bee457ef1f3672657156d95c577639c014733946abb0c47974cf48a5c8fffdbbcd1522eeae745f2adba5d95c12b8664a7a9898e2c05
                                        SSDEEP:768:tV6dftlrWXPaY64WO1F64H2RwkD2H9q3UELE0XD4qcb7v4PKbkAz1r4Vk:tV6ZHhPQ1F64H2R1LE0XDDI7vvzZF
                                        TLSH:5903F165702338728D741F31E90C9BCA55C5FBF6E4B9507B42103A7898CFA652BF2C86
                                        File Content Preview:.ELF..............(.........4...........4. ...(......................d...d...............r..........................Q.td............................=.%<UPX!....................g..........?.E.h;....#..$...o...._p.+......./..;...... ../...z.L.....`I..|.w..|

                                        ELF header

                                        Class:ELF32
                                        Data:2's complement, little endian
                                        Version:1 (current)
                                        Machine:ARM
                                        Version Number:0x1
                                        Type:EXEC (Executable file)
                                        OS/ABI:UNIX - Linux
                                        ABI Version:0
                                        Entry Point Address:0xd218
                                        Flags:0x4000002
                                        ELF Header Size:52
                                        Program Header Offset:52
                                        Program Header Size:32
                                        Number of Program Headers:3
                                        Section Header Offset:0
                                        Section Header Size:40
                                        Number of Section Headers:0
                                        Header String Table Index:0
                                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                        LOAD0x00x80000x80000x64050x64057.93670x5R E0x8000
                                        LOAD0x72bc0x1f2bc0x1f2bc0x00x00.00000x6RW 0x8000
                                        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 10, 2025 22:40:08.342894077 CET48202443192.168.2.13185.125.190.26
                                        Jan 10, 2025 22:40:17.240622997 CET3428425596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:40:17.247339010 CET2559634284104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:40:17.247457981 CET3428425596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:40:17.248924971 CET3428425596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:40:17.255604982 CET2559634284104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:40:17.255793095 CET3428425596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:40:17.262713909 CET2559634284104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:40:27.255096912 CET3428425596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:40:27.260067940 CET2559634284104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:40:38.616161108 CET2559634284104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:40:38.616993904 CET3428425596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:40:38.621853113 CET2559634284104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:40:39.646681070 CET3428625596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:40:39.651496887 CET2559634286104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:40:39.651689053 CET3428625596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:40:39.652694941 CET3428625596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:40:39.657469034 CET2559634286104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:40:39.657577038 CET3428625596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:40:39.662412882 CET2559634286104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:40:39.830925941 CET48202443192.168.2.13185.125.190.26
                                        Jan 10, 2025 22:41:01.018120050 CET2559634286104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:41:01.018461943 CET3428625596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:41:01.023256063 CET2559634286104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:41:07.027853012 CET3428825596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:41:07.032871962 CET2559634288104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:41:07.032980919 CET3428825596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:41:07.034157991 CET3428825596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:41:07.038918972 CET2559634288104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:41:07.038996935 CET3428825596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:41:07.043755054 CET2559634288104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:41:28.378895044 CET2559634288104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:41:28.379152060 CET3428825596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:41:28.384130955 CET2559634288104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:41:34.387151003 CET3429025596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:41:34.392326117 CET2559634290104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:41:34.392421961 CET3429025596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:41:34.393394947 CET3429025596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:41:34.398268938 CET2559634290104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:41:34.398376942 CET3429025596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:41:34.403203011 CET2559634290104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:41:44.403628111 CET3429025596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:41:44.408493042 CET2559634290104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:41:55.789751053 CET2559634290104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:41:55.790177107 CET3429025596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:41:55.795043945 CET2559634290104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:42:01.798834085 CET3429225596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:42:01.803697109 CET2559634292104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:42:01.803880930 CET3429225596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:42:01.804866076 CET3429225596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:42:01.809617043 CET2559634292104.237.135.249192.168.2.13
                                        Jan 10, 2025 22:42:01.809664965 CET3429225596192.168.2.13104.237.135.249
                                        Jan 10, 2025 22:42:01.814450026 CET2559634292104.237.135.249192.168.2.13
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 10, 2025 22:39:59.123913050 CET3556053192.168.2.13185.232.68.212
                                        Jan 10, 2025 22:39:59.141338110 CET5335560185.232.68.212192.168.2.13
                                        Jan 10, 2025 22:40:00.150407076 CET6092353192.168.2.13185.232.68.212
                                        Jan 10, 2025 22:40:00.167712927 CET5360923185.232.68.212192.168.2.13
                                        Jan 10, 2025 22:40:02.170684099 CET5714353192.168.2.13139.84.165.176
                                        Jan 10, 2025 22:40:09.179244995 CET5140853192.168.2.13194.36.144.87
                                        Jan 10, 2025 22:40:09.196048975 CET5351408194.36.144.87192.168.2.13
                                        Jan 10, 2025 22:40:10.199691057 CET4696753192.168.2.1364.176.6.48
                                        Jan 10, 2025 22:40:17.208833933 CET4681853192.168.2.1381.169.136.222
                                        Jan 10, 2025 22:40:17.238398075 CET534681881.169.136.222192.168.2.13
                                        Jan 10, 2025 22:40:39.619699001 CET5767453192.168.2.1395.216.99.249
                                        Jan 10, 2025 22:40:39.645924091 CET535767495.216.99.249192.168.2.13
                                        Jan 10, 2025 22:41:02.021703005 CET3332853192.168.2.135.161.109.23
                                        Jan 10, 2025 22:41:29.381239891 CET5986153192.168.2.135.161.109.23
                                        Jan 10, 2025 22:41:56.793009996 CET4254053192.168.2.135.161.109.23
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jan 10, 2025 22:39:59.123913050 CET192.168.2.13185.232.68.2120x8286Standard query (0)infectedslurs.geekA (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:00.150407076 CET192.168.2.13185.232.68.2120x31f1Standard query (0)yellowchink.pirateA (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:02.170684099 CET192.168.2.13139.84.165.1760x4a64Standard query (0)infectedslurs.geekA (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:09.179244995 CET192.168.2.13194.36.144.870x7f47Standard query (0)infectedchink.pirate. [malformed]256441false
                                        Jan 10, 2025 22:40:10.199691057 CET192.168.2.1364.176.6.480xec71Standard query (0)hiakamai.dyn. [malformed]256449false
                                        Jan 10, 2025 22:40:17.208833933 CET192.168.2.1381.169.136.2220x8987Standard query (0)w3d0ntlikebot5.parodyA (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:39.619699001 CET192.168.2.1395.216.99.2490xc974Standard query (0)freethewind.parody. [malformed]256471false
                                        Jan 10, 2025 22:41:02.021703005 CET192.168.2.135.161.109.230x1269Standard query (0)infectedchink.pirateA (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:41:29.381239891 CET192.168.2.135.161.109.230x5fc1Standard query (0)hiakamai.dyn. [malformed]256270false
                                        Jan 10, 2025 22:41:56.793009996 CET192.168.2.135.161.109.230x3466Standard query (0)freethewind.parody. [malformed]256297false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jan 10, 2025 22:39:59.141338110 CET185.232.68.212192.168.2.130x8286Refused (5)infectedslurs.geeknonenoneA (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:00.167712927 CET185.232.68.212192.168.2.130x31f1Refused (5)yellowchink.piratenonenoneA (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:09.196048975 CET194.36.144.87192.168.2.130x7f47Format error (1)infectedchink.pirate. [malformed]nonenone256442false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody172.104.165.127A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody45.79.236.13A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody172.236.61.194A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody172.236.11.132A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody172.232.34.247A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody74.207.230.91A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody192.46.236.113A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody104.237.135.249A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody172.236.28.137A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody172.105.120.101A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody172.234.20.31A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody172.233.66.46A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody172.105.109.175A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody104.237.135.234A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:17.238398075 CET81.169.136.222192.168.2.130x8987No error (0)w3d0ntlikebot5.parody170.187.181.188A (IP address)IN (0x0001)false
                                        Jan 10, 2025 22:40:39.645924091 CET95.216.99.249192.168.2.130xc974Format error (1)freethewind.parody. [malformed]nonenone256471false

                                        System Behavior

                                        Start time (UTC):21:39:57
                                        Start date (UTC):10/01/2025
                                        Path:/tmp/boatnet.arm7.elf
                                        Arguments:/tmp/boatnet.arm7.elf
                                        File size:4956856 bytes
                                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                        Start time (UTC):21:39:58
                                        Start date (UTC):10/01/2025
                                        Path:/tmp/boatnet.arm7.elf
                                        Arguments:-
                                        File size:4956856 bytes
                                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                        Start time (UTC):21:39:58
                                        Start date (UTC):10/01/2025
                                        Path:/tmp/boatnet.arm7.elf
                                        Arguments:-
                                        File size:4956856 bytes
                                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1