Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
x86_64.elf

Overview

General Information

Sample name:x86_64.elf
Analysis ID:1589156
MD5:3d1e89d4e9c4f8238a413c4dbd6f00fb
SHA1:95eaca7e171b7247ad8a2df593b61825f7a84d8f
SHA256:72b4a118ec66895597bd9ed7f9f897818645f0893daed81f5398482d1a72cb96
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Machine Learning detection for sample
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589156
Start date and time:2025-01-11 14:22:13 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 26s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:x86_64.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@24/0
Command:/tmp/x86_64.elf
PID:5424
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • x86_64.elf (PID: 5424, Parent: 5351, MD5: 3d1e89d4e9c4f8238a413c4dbd6f00fb) Arguments: /tmp/x86_64.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
x86_64.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    x86_64.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      x86_64.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xb828:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb83c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb850:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb864:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb878:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb88c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb8a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb8b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb8c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb8dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb8f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb904:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb918:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb92c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb940:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb954:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb968:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb97c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb990:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb9a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb9b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      x86_64.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
      • 0x7f48:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
      x86_64.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
      • 0x8737:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
      Click to see the 9 entries
      SourceRuleDescriptionAuthorStrings
      5424.1.0000000000400000.000000000040e000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5424.1.0000000000400000.000000000040e000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5424.1.0000000000400000.000000000040e000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xb828:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb83c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb850:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb864:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb878:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb88c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb8a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb8b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb8c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb8dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb8f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb904:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb918:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb92c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb940:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb954:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb968:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb97c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb990:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb9a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb9b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5424.1.0000000000400000.000000000040e000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
          • 0x7f48:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
          5424.1.0000000000400000.000000000040e000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
          • 0x8737:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
          Click to see the 11 entries
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-11T14:23:03.747786+010020304911Malware Command and Control Activity Detected192.168.2.1345266154.213.187.1181314TCP
          2025-01-11T14:23:05.633206+010020304911Malware Command and Control Activity Detected192.168.2.1345268154.213.187.1181314TCP
          2025-01-11T14:23:10.245450+010020304911Malware Command and Control Activity Detected192.168.2.1345270154.213.187.1181314TCP
          2025-01-11T14:23:13.865513+010020304911Malware Command and Control Activity Detected192.168.2.1345272154.213.187.1181314TCP
          2025-01-11T14:23:19.684480+010020304911Malware Command and Control Activity Detected192.168.2.1345274154.213.187.1181314TCP
          2025-01-11T14:23:25.375837+010020304911Malware Command and Control Activity Detected192.168.2.1345276154.213.187.1181314TCP
          2025-01-11T14:23:30.161140+010020304911Malware Command and Control Activity Detected192.168.2.1345278154.213.187.1181314TCP
          2025-01-11T14:23:34.805873+010020304911Malware Command and Control Activity Detected192.168.2.1345280154.213.187.1181314TCP
          2025-01-11T14:23:42.205559+010020304911Malware Command and Control Activity Detected192.168.2.1345282154.213.187.1181314TCP
          2025-01-11T14:23:51.847892+010020304911Malware Command and Control Activity Detected192.168.2.1345284154.213.187.1181314TCP
          2025-01-11T14:24:02.485249+010020304911Malware Command and Control Activity Detected192.168.2.1345286154.213.187.1181314TCP
          2025-01-11T14:24:06.121027+010020304911Malware Command and Control Activity Detected192.168.2.1345288154.213.187.1181314TCP
          2025-01-11T14:24:09.759349+010020304911Malware Command and Control Activity Detected192.168.2.1345290154.213.187.1181314TCP
          2025-01-11T14:24:16.407137+010020304911Malware Command and Control Activity Detected192.168.2.1345292154.213.187.1181314TCP
          2025-01-11T14:24:18.045230+010020304911Malware Command and Control Activity Detected192.168.2.1345294154.213.187.1181314TCP
          2025-01-11T14:24:23.675095+010020304911Malware Command and Control Activity Detected192.168.2.1345296154.213.187.1181314TCP
          2025-01-11T14:24:32.289815+010020304911Malware Command and Control Activity Detected192.168.2.1345298154.213.187.1181314TCP
          2025-01-11T14:24:35.936951+010020304911Malware Command and Control Activity Detected192.168.2.1345300154.213.187.1181314TCP
          2025-01-11T14:24:46.546851+010020304911Malware Command and Control Activity Detected192.168.2.1345302154.213.187.1181314TCP
          2025-01-11T14:24:50.159696+010020304911Malware Command and Control Activity Detected192.168.2.1345304154.213.187.1181314TCP
          2025-01-11T14:24:53.798430+010020304911Malware Command and Control Activity Detected192.168.2.1345306154.213.187.1181314TCP
          2025-01-11T14:24:57.458875+010020304911Malware Command and Control Activity Detected192.168.2.1345308154.213.187.1181314TCP
          2025-01-11T14:25:07.088715+010020304911Malware Command and Control Activity Detected192.168.2.1345310154.213.187.1181314TCP
          2025-01-11T14:25:08.700772+010020304911Malware Command and Control Activity Detected192.168.2.1345312154.213.187.1181314TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: x86_64.elfAvira: detected
          Source: x86_64.elfReversingLabs: Detection: 55%
          Source: x86_64.elfJoe Sandbox ML: detected

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45278 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45282 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45274 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45290 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45286 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45306 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45294 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45272 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45296 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45270 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45288 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45298 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45292 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45302 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45268 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45280 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45310 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45276 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45312 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45266 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45300 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45284 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45308 -> 154.213.187.118:1314
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:45304 -> 154.213.187.118:1314
          Source: global trafficTCP traffic: 192.168.2.13:45266 -> 154.213.187.118:1314
          Source: global trafficDNS traffic detected: DNS query: webhorizon.icu

          System Summary

          barindex
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
          Source: Process Memory Space: x86_64.elf PID: 5424, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
          Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
          Source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
          Source: Process Memory Space: x86_64.elf PID: 5424, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@24/0
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/5268/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/230/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/110/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/231/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/111/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/232/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/112/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/233/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/113/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/234/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/114/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/235/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/115/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/236/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/116/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/237/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/117/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/238/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/118/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/239/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/119/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/914/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/10/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/917/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/11/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/12/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/13/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/14/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/15/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/16/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/17/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/18/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/19/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/240/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/3095/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/120/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/241/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/121/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/242/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/1/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/122/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/243/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/2/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/123/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/244/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/3/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/124/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/245/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/1588/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/125/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/4/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/246/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/126/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/5/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/247/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/127/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/6/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/248/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/128/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/7/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/249/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/129/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/8/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/800/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/9/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/1906/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/802/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/803/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/3644/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/20/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/21/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/22/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/23/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/24/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/25/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/26/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/27/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/28/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/29/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/3420/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/1482/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/490/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/1480/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/250/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/371/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/130/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/251/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/131/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/252/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/132/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/253/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/254/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/1238/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/134/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/255/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/256/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/257/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/378/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/3413/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/258/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/259/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/1475/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/936/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/30/cmdlineJump to behavior
          Source: /tmp/x86_64.elf (PID: 5426)File opened: /proc/816/cmdlineJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: /tmp/x86_64.elf (PID: 5424)File: /tmp/x86_64.elfJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: x86_64.elf, type: SAMPLE
          Source: Yara matchFile source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: x86_64.elf PID: 5424, type: MEMORYSTR
          Source: Yara matchFile source: x86_64.elf, type: SAMPLE
          Source: Yara matchFile source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: Yara matchFile source: x86_64.elf, type: SAMPLE
          Source: Yara matchFile source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: x86_64.elf PID: 5424, type: MEMORYSTR
          Source: Yara matchFile source: x86_64.elf, type: SAMPLE
          Source: Yara matchFile source: 5424.1.0000000000400000.000000000040e000.r-x.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          File Deletion
          1
          OS Credential Dumping
          System Service DiscoveryRemote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589156 Sample: x86_64.elf Startdate: 11/01/2025 Architecture: LINUX Score: 100 20 webhorizon.icu 154.213.187.118, 1314, 45266, 45268 DDOSING-BGP-NETWORKUS Seychelles 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 5 other signatures 2->28 9 x86_64.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 x86_64.elf 9->12         started        process6 process7 14 x86_64.elf 12->14         started        16 x86_64.elf 12->16         started        process8 18 x86_64.elf 14->18         started       
          SourceDetectionScannerLabelLink
          x86_64.elf55%ReversingLabsLinux.Backdoor.Mirai
          x86_64.elf100%AviraEXP/ELF.Mirai.Z.A
          x86_64.elf100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          webhorizon.icu
          154.213.187.118
          truefalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            154.213.187.118
            webhorizon.icuSeychelles
            22769DDOSING-BGP-NETWORKUSfalse
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            webhorizon.icuarm.elfGet hashmaliciousMirai, MoobotBrowse
            • 38.55.246.3
            m68k.elfGet hashmaliciousMirai, MoobotBrowse
            • 38.55.246.3
            ppc.elfGet hashmaliciousMirai, MoobotBrowse
            • 38.55.246.3
            mpsl.elfGet hashmaliciousMirai, MoobotBrowse
            • 38.55.246.3
            debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
            • 38.55.246.3
            x86_64.elfGet hashmaliciousMirai, MoobotBrowse
            • 38.55.246.3
            arm7.elfGet hashmaliciousMirai, MoobotBrowse
            • 38.55.246.3
            sh4.elfGet hashmaliciousMirai, MoobotBrowse
            • 38.55.246.3
            mips.elfGet hashmaliciousMirai, MoobotBrowse
            • 38.55.246.3
            spc.elfGet hashmaliciousMirai, MoobotBrowse
            • 38.55.246.3
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            DDOSING-BGP-NETWORKUS4.elfGet hashmaliciousUnknownBrowse
            • 41.93.138.131
            armv5l.elfGet hashmaliciousUnknownBrowse
            • 41.93.222.47
            gmpsl.elfGet hashmaliciousUnknownBrowse
            • 154.213.187.125
            garm5.elfGet hashmaliciousUnknownBrowse
            • 154.213.187.125
            garm7.elfGet hashmaliciousMiraiBrowse
            • 154.213.187.125
            garm.elfGet hashmaliciousUnknownBrowse
            • 154.213.187.125
            gmips.elfGet hashmaliciousUnknownBrowse
            • 154.213.187.125
            byte.x86.elfGet hashmaliciousMirai, OkiruBrowse
            • 154.213.190.254
            byte.ppc.elfGet hashmaliciousMirai, OkiruBrowse
            • 154.213.190.254
            byte.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
            • 154.213.190.246
            No context
            No context
            No created / dropped files found
            File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
            Entropy (8bit):6.032430508792288
            TrID:
            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
            File name:x86_64.elf
            File size:59'200 bytes
            MD5:3d1e89d4e9c4f8238a413c4dbd6f00fb
            SHA1:95eaca7e171b7247ad8a2df593b61825f7a84d8f
            SHA256:72b4a118ec66895597bd9ed7f9f897818645f0893daed81f5398482d1a72cb96
            SHA512:af3b4b973a3aca45c5bb9475a34f509829488024379b0f9900bc97c0c5826e3ef9bef71d944f3f5b96ce59eeaafdfbe62d6eddc9eeafdf5e30cd1bb338e056b0
            SSDEEP:1536:fzYOpW1Jq+n5BKforamopHEHJa8f66YfuTeDR7CY2:7YQW1JqyPKgraDIPrY6eDR7CY2
            TLSH:9643181BF581C1FDC09AC174466ABA3EAD3371FD0238F2A677E4EA222D96E215D1DC44
            File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@...............................................P.......P.............(...............Q.td....................................................H...._........H........

            ELF header

            Class:ELF64
            Data:2's complement, little endian
            Version:1 (current)
            Machine:Advanced Micro Devices X86-64
            Version Number:0x1
            Type:EXEC (Executable file)
            OS/ABI:UNIX - System V
            ABI Version:0
            Entry Point Address:0x400194
            Flags:0x0
            ELF Header Size:64
            Program Header Offset:64
            Program Header Size:56
            Number of Program Headers:3
            Section Header Offset:58560
            Section Header Size:64
            Number of Section Headers:10
            Header String Table Index:9
            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
            NULL0x00x00x00x00x0000
            .initPROGBITS0x4000e80xe80x130x00x6AX001
            .textPROGBITS0x4001000x1000xb2460x00x6AX0016
            .finiPROGBITS0x40b3460xb3460xe0x00x6AX001
            .rodataPROGBITS0x40b3600xb3600x1f300x00x2A0032
            .ctorsPROGBITS0x50e0000xe0000x100x00x3WA008
            .dtorsPROGBITS0x50e0100xe0100x100x00x3WA008
            .dataPROGBITS0x50e0400xe0400x4400x00x3WA0032
            .bssNOBITS0x50e4800xe4800x29a80x00x3WA0032
            .shstrtabSTRTAB0x00xe4800x3e0x00x0001
            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
            LOAD0x00x4000000x4000000xd2900xd2906.35600x5R E0x100000.init .text .fini .rodata
            LOAD0xe0000x50e0000x50e0000x4800x2e282.15870x6RW 0x100000.ctors .dtors .data .bss
            GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
            2025-01-11T14:23:03.747786+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345266154.213.187.1181314TCP
            2025-01-11T14:23:05.633206+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345268154.213.187.1181314TCP
            2025-01-11T14:23:10.245450+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345270154.213.187.1181314TCP
            2025-01-11T14:23:13.865513+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345272154.213.187.1181314TCP
            2025-01-11T14:23:19.684480+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345274154.213.187.1181314TCP
            2025-01-11T14:23:25.375837+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345276154.213.187.1181314TCP
            2025-01-11T14:23:30.161140+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345278154.213.187.1181314TCP
            2025-01-11T14:23:34.805873+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345280154.213.187.1181314TCP
            2025-01-11T14:23:42.205559+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345282154.213.187.1181314TCP
            2025-01-11T14:23:51.847892+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345284154.213.187.1181314TCP
            2025-01-11T14:24:02.485249+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345286154.213.187.1181314TCP
            2025-01-11T14:24:06.121027+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345288154.213.187.1181314TCP
            2025-01-11T14:24:09.759349+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345290154.213.187.1181314TCP
            2025-01-11T14:24:16.407137+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345292154.213.187.1181314TCP
            2025-01-11T14:24:18.045230+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345294154.213.187.1181314TCP
            2025-01-11T14:24:23.675095+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345296154.213.187.1181314TCP
            2025-01-11T14:24:32.289815+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345298154.213.187.1181314TCP
            2025-01-11T14:24:35.936951+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345300154.213.187.1181314TCP
            2025-01-11T14:24:46.546851+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345302154.213.187.1181314TCP
            2025-01-11T14:24:50.159696+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345304154.213.187.1181314TCP
            2025-01-11T14:24:53.798430+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345306154.213.187.1181314TCP
            2025-01-11T14:24:57.458875+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345308154.213.187.1181314TCP
            2025-01-11T14:25:07.088715+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345310154.213.187.1181314TCP
            2025-01-11T14:25:08.700772+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1345312154.213.187.1181314TCP
            TimestampSource PortDest PortSource IPDest IP
            Jan 11, 2025 14:23:03.741437912 CET452661314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:03.746248960 CET131445266154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:03.746321917 CET452661314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:03.747786045 CET452661314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:03.752598047 CET131445266154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:04.341582060 CET131445266154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:04.341851950 CET452661314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:04.346637011 CET131445266154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:05.627645969 CET452681314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:05.632488012 CET131445268154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:05.632543087 CET452681314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:05.633205891 CET452681314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:05.638040066 CET131445268154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:06.229233980 CET131445268154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:06.229604959 CET452681314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:06.234545946 CET131445268154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:10.239573956 CET452701314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:10.244784117 CET131445270154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:10.244860888 CET452701314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:10.245450020 CET452701314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:10.250296116 CET131445270154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:10.847973108 CET131445270154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:10.848216057 CET452701314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:10.853579998 CET131445270154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:13.859203100 CET452721314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:13.864152908 CET131445272154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:13.864258051 CET452721314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:13.865513086 CET452721314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:13.870399952 CET131445272154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:14.496088028 CET131445272154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:14.496184111 CET452721314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:14.501065016 CET131445272154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:19.678880930 CET452741314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:19.683818102 CET131445274154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:19.683885098 CET452741314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:19.684479952 CET452741314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:19.689327955 CET131445274154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:20.294775963 CET131445274154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:20.294986963 CET452741314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:20.299947023 CET131445274154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:25.369442940 CET452761314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:25.374361992 CET131445276154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:25.374440908 CET452761314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:25.375837088 CET452761314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:25.380686045 CET131445276154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:25.978771925 CET131445276154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:25.979001045 CET452761314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:25.984000921 CET131445276154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:30.155394077 CET452781314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:30.160340071 CET131445278154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:30.160418987 CET452781314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:30.161139965 CET452781314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:30.166028976 CET131445278154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:30.787367105 CET131445278154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:30.787600040 CET452781314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:30.792512894 CET131445278154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:34.799654961 CET452801314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:34.804558992 CET131445280154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:34.804645061 CET452801314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:34.805872917 CET452801314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:34.810667992 CET131445280154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:36.188568115 CET131445280154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:36.188589096 CET131445280154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:36.188601971 CET131445280154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:36.188765049 CET452801314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:36.188765049 CET452801314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:36.188765049 CET452801314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:36.193582058 CET131445280154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:42.199532986 CET452821314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:42.204597950 CET131445282154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:42.204698086 CET452821314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:42.205559015 CET452821314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:42.210417032 CET131445282154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:42.830388069 CET131445282154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:42.830900908 CET452821314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:42.835833073 CET131445282154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:51.842334986 CET452841314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:51.847157955 CET131445284154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:51.847229004 CET452841314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:51.847892046 CET452841314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:51.852653027 CET131445284154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:52.468518019 CET131445284154.213.187.118192.168.2.13
            Jan 11, 2025 14:23:52.468677998 CET452841314192.168.2.13154.213.187.118
            Jan 11, 2025 14:23:52.473433971 CET131445284154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:02.479159117 CET452861314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:02.484114885 CET131445286154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:02.484241962 CET452861314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:02.485249043 CET452861314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:02.490094900 CET131445286154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:03.104593992 CET131445286154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:03.104835987 CET452861314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:03.109662056 CET131445286154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:06.115015984 CET452881314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:06.119957924 CET131445288154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:06.120065928 CET452881314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:06.121026993 CET452881314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:06.125916958 CET131445288154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:06.741290092 CET131445288154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:06.741611958 CET452881314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:06.746531963 CET131445288154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:09.753154993 CET452901314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:09.758022070 CET131445290154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:09.758100986 CET452901314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:09.759349108 CET452901314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:09.764197111 CET131445290154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:10.388897896 CET131445290154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:10.389386892 CET452901314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:10.394196033 CET131445290154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:16.400815964 CET452921314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:16.405735016 CET131445292154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:16.405852079 CET452921314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:16.407136917 CET452921314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:16.412008047 CET131445292154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:17.027287006 CET131445292154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:17.027642012 CET452921314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:17.032514095 CET131445292154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:18.038944960 CET452941314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:18.043842077 CET131445294154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:18.043930054 CET452941314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:18.045229912 CET452941314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:18.050081015 CET131445294154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:18.656099081 CET131445294154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:18.656575918 CET452941314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:18.661484003 CET131445294154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:23.668822050 CET452961314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:23.673712015 CET131445296154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:23.673795938 CET452961314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:23.675095081 CET452961314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:23.679971933 CET131445296154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:24.269144058 CET131445296154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:24.269568920 CET452961314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:24.274519920 CET131445296154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:32.283226013 CET452981314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:32.288196087 CET131445298154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:32.288310051 CET452981314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:32.289814949 CET452981314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:32.294656992 CET131445298154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:32.918766975 CET131445298154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:32.919058084 CET452981314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:32.924005032 CET131445298154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:35.930771112 CET453001314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:35.935997009 CET131445300154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:35.936069012 CET453001314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:35.936950922 CET453001314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:35.941792011 CET131445300154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:36.528861046 CET131445300154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:36.529442072 CET453001314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:36.534719944 CET131445300154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:46.540585041 CET453021314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:46.545571089 CET131445302154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:46.545648098 CET453021314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:46.546850920 CET453021314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:46.551737070 CET131445302154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:47.142016888 CET131445302154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:47.142254114 CET453021314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:47.147193909 CET131445302154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:50.153184891 CET453041314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:50.158334970 CET131445304154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:50.158442020 CET453041314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:50.159696102 CET453041314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:50.164491892 CET131445304154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:50.781331062 CET131445304154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:50.781591892 CET453041314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:50.786580086 CET131445304154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:53.792510033 CET453061314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:53.797369003 CET131445306154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:53.797429085 CET453061314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:53.798429966 CET453061314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:53.803304911 CET131445306154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:54.440690994 CET131445306154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:54.441142082 CET453061314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:54.446005106 CET131445306154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:57.452692986 CET453081314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:57.457515001 CET131445308154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:57.457619905 CET453081314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:57.458874941 CET453081314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:57.463644028 CET131445308154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:58.069899082 CET131445308154.213.187.118192.168.2.13
            Jan 11, 2025 14:24:58.070175886 CET453081314192.168.2.13154.213.187.118
            Jan 11, 2025 14:24:58.074978113 CET131445308154.213.187.118192.168.2.13
            Jan 11, 2025 14:25:07.082477093 CET453101314192.168.2.13154.213.187.118
            Jan 11, 2025 14:25:07.087383032 CET131445310154.213.187.118192.168.2.13
            Jan 11, 2025 14:25:07.087466955 CET453101314192.168.2.13154.213.187.118
            Jan 11, 2025 14:25:07.088715076 CET453101314192.168.2.13154.213.187.118
            Jan 11, 2025 14:25:07.093519926 CET131445310154.213.187.118192.168.2.13
            Jan 11, 2025 14:25:07.682271004 CET131445310154.213.187.118192.168.2.13
            Jan 11, 2025 14:25:07.682652950 CET453101314192.168.2.13154.213.187.118
            Jan 11, 2025 14:25:07.687602997 CET131445310154.213.187.118192.168.2.13
            Jan 11, 2025 14:25:08.694715977 CET453121314192.168.2.13154.213.187.118
            Jan 11, 2025 14:25:08.699698925 CET131445312154.213.187.118192.168.2.13
            Jan 11, 2025 14:25:08.699795008 CET453121314192.168.2.13154.213.187.118
            Jan 11, 2025 14:25:08.700772047 CET453121314192.168.2.13154.213.187.118
            Jan 11, 2025 14:25:08.705586910 CET131445312154.213.187.118192.168.2.13
            TimestampSource PortDest PortSource IPDest IP
            Jan 11, 2025 14:23:03.733398914 CET4815553192.168.2.138.8.8.8
            Jan 11, 2025 14:23:03.740788937 CET53481558.8.8.8192.168.2.13
            Jan 11, 2025 14:23:05.344530106 CET4753053192.168.2.138.8.8.8
            Jan 11, 2025 14:23:05.626878977 CET53475308.8.8.8192.168.2.13
            Jan 11, 2025 14:23:10.231683016 CET3696153192.168.2.138.8.8.8
            Jan 11, 2025 14:23:10.239015102 CET53369618.8.8.8192.168.2.13
            Jan 11, 2025 14:23:13.851329088 CET5749153192.168.2.138.8.8.8
            Jan 11, 2025 14:23:13.858490944 CET53574918.8.8.8192.168.2.13
            Jan 11, 2025 14:23:19.498308897 CET3570053192.168.2.138.8.8.8
            Jan 11, 2025 14:23:19.678087950 CET53357008.8.8.8192.168.2.13
            Jan 11, 2025 14:23:25.297987938 CET5323053192.168.2.138.8.8.8
            Jan 11, 2025 14:23:25.368694067 CET53532308.8.8.8192.168.2.13
            Jan 11, 2025 14:23:29.982752085 CET5876753192.168.2.138.8.8.8
            Jan 11, 2025 14:23:30.154383898 CET53587678.8.8.8192.168.2.13
            Jan 11, 2025 14:23:34.791212082 CET5128253192.168.2.138.8.8.8
            Jan 11, 2025 14:23:34.798930883 CET53512828.8.8.8192.168.2.13
            Jan 11, 2025 14:23:42.191333055 CET4358053192.168.2.138.8.8.8
            Jan 11, 2025 14:23:42.198965073 CET53435808.8.8.8192.168.2.13
            Jan 11, 2025 14:23:51.834335089 CET4408953192.168.2.138.8.8.8
            Jan 11, 2025 14:23:51.841820955 CET53440898.8.8.8192.168.2.13
            Jan 11, 2025 14:24:02.471662045 CET4339753192.168.2.138.8.8.8
            Jan 11, 2025 14:24:02.478619099 CET53433978.8.8.8192.168.2.13
            Jan 11, 2025 14:24:06.107449055 CET6075553192.168.2.138.8.8.8
            Jan 11, 2025 14:24:06.114434958 CET53607558.8.8.8192.168.2.13
            Jan 11, 2025 14:24:09.745404959 CET5829553192.168.2.138.8.8.8
            Jan 11, 2025 14:24:09.752415895 CET53582958.8.8.8192.168.2.13
            Jan 11, 2025 14:24:16.392898083 CET3829853192.168.2.138.8.8.8
            Jan 11, 2025 14:24:16.400022984 CET53382988.8.8.8192.168.2.13
            Jan 11, 2025 14:24:18.031021118 CET4322653192.168.2.138.8.8.8
            Jan 11, 2025 14:24:18.038100004 CET53432268.8.8.8192.168.2.13
            Jan 11, 2025 14:24:23.660531044 CET5042853192.168.2.138.8.8.8
            Jan 11, 2025 14:24:23.668091059 CET53504288.8.8.8192.168.2.13
            Jan 11, 2025 14:24:32.272890091 CET4633153192.168.2.138.8.8.8
            Jan 11, 2025 14:24:32.282505035 CET53463318.8.8.8192.168.2.13
            Jan 11, 2025 14:24:35.922589064 CET4332453192.168.2.138.8.8.8
            Jan 11, 2025 14:24:35.930088997 CET53433248.8.8.8192.168.2.13
            Jan 11, 2025 14:24:46.532954931 CET5867453192.168.2.138.8.8.8
            Jan 11, 2025 14:24:46.539894104 CET53586748.8.8.8192.168.2.13
            Jan 11, 2025 14:24:50.145639896 CET3404853192.168.2.138.8.8.8
            Jan 11, 2025 14:24:50.152487993 CET53340488.8.8.8192.168.2.13
            Jan 11, 2025 14:24:53.784797907 CET4680853192.168.2.138.8.8.8
            Jan 11, 2025 14:24:53.791938066 CET53468088.8.8.8192.168.2.13
            Jan 11, 2025 14:24:57.444931030 CET3551353192.168.2.138.8.8.8
            Jan 11, 2025 14:24:57.451945066 CET53355138.8.8.8192.168.2.13
            Jan 11, 2025 14:25:07.074151993 CET3907953192.168.2.138.8.8.8
            Jan 11, 2025 14:25:07.081666946 CET53390798.8.8.8192.168.2.13
            Jan 11, 2025 14:25:08.686001062 CET4524453192.168.2.138.8.8.8
            Jan 11, 2025 14:25:08.693300962 CET53452448.8.8.8192.168.2.13
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Jan 11, 2025 14:23:03.733398914 CET192.168.2.138.8.8.80x153bStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:05.344530106 CET192.168.2.138.8.8.80xa33cStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:10.231683016 CET192.168.2.138.8.8.80x7ffeStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:13.851329088 CET192.168.2.138.8.8.80x8d7aStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:19.498308897 CET192.168.2.138.8.8.80x3974Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:25.297987938 CET192.168.2.138.8.8.80x52f0Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:29.982752085 CET192.168.2.138.8.8.80x671aStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:34.791212082 CET192.168.2.138.8.8.80x4776Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:42.191333055 CET192.168.2.138.8.8.80x4e1aStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:51.834335089 CET192.168.2.138.8.8.80x2f25Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:02.471662045 CET192.168.2.138.8.8.80xfe27Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:06.107449055 CET192.168.2.138.8.8.80xcdcfStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:09.745404959 CET192.168.2.138.8.8.80xc609Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:16.392898083 CET192.168.2.138.8.8.80xb3fcStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:18.031021118 CET192.168.2.138.8.8.80xb5dfStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:23.660531044 CET192.168.2.138.8.8.80xcf8eStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:32.272890091 CET192.168.2.138.8.8.80xed19Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:35.922589064 CET192.168.2.138.8.8.80xb5fdStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:46.532954931 CET192.168.2.138.8.8.80x9b52Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:50.145639896 CET192.168.2.138.8.8.80x9264Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:53.784797907 CET192.168.2.138.8.8.80x41c4Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:57.444931030 CET192.168.2.138.8.8.80x806bStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:25:07.074151993 CET192.168.2.138.8.8.80x1813Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            Jan 11, 2025 14:25:08.686001062 CET192.168.2.138.8.8.80x23c1Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jan 11, 2025 14:23:03.740788937 CET8.8.8.8192.168.2.130x153bNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:05.626878977 CET8.8.8.8192.168.2.130xa33cNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:10.239015102 CET8.8.8.8192.168.2.130x7ffeNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:13.858490944 CET8.8.8.8192.168.2.130x8d7aNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:19.678087950 CET8.8.8.8192.168.2.130x3974No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:25.368694067 CET8.8.8.8192.168.2.130x52f0No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:30.154383898 CET8.8.8.8192.168.2.130x671aNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:34.798930883 CET8.8.8.8192.168.2.130x4776No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:42.198965073 CET8.8.8.8192.168.2.130x4e1aNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:23:51.841820955 CET8.8.8.8192.168.2.130x2f25No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:02.478619099 CET8.8.8.8192.168.2.130xfe27No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:06.114434958 CET8.8.8.8192.168.2.130xcdcfNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:09.752415895 CET8.8.8.8192.168.2.130xc609No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:16.400022984 CET8.8.8.8192.168.2.130xb3fcNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:18.038100004 CET8.8.8.8192.168.2.130xb5dfNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:23.668091059 CET8.8.8.8192.168.2.130xcf8eNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:32.282505035 CET8.8.8.8192.168.2.130xed19No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:35.930088997 CET8.8.8.8192.168.2.130xb5fdNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:46.539894104 CET8.8.8.8192.168.2.130x9b52No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:50.152487993 CET8.8.8.8192.168.2.130x9264No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:53.791938066 CET8.8.8.8192.168.2.130x41c4No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:24:57.451945066 CET8.8.8.8192.168.2.130x806bNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:25:07.081666946 CET8.8.8.8192.168.2.130x1813No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
            Jan 11, 2025 14:25:08.693300962 CET8.8.8.8192.168.2.130x23c1No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false

            System Behavior

            Start time (UTC):13:23:02
            Start date (UTC):11/01/2025
            Path:/tmp/x86_64.elf
            Arguments:/tmp/x86_64.elf
            File size:59200 bytes
            MD5 hash:3d1e89d4e9c4f8238a413c4dbd6f00fb

            Start time (UTC):13:23:02
            Start date (UTC):11/01/2025
            Path:/tmp/x86_64.elf
            Arguments:-
            File size:59200 bytes
            MD5 hash:3d1e89d4e9c4f8238a413c4dbd6f00fb

            Start time (UTC):13:23:02
            Start date (UTC):11/01/2025
            Path:/tmp/x86_64.elf
            Arguments:-
            File size:59200 bytes
            MD5 hash:3d1e89d4e9c4f8238a413c4dbd6f00fb

            Start time (UTC):13:23:02
            Start date (UTC):11/01/2025
            Path:/tmp/x86_64.elf
            Arguments:-
            File size:59200 bytes
            MD5 hash:3d1e89d4e9c4f8238a413c4dbd6f00fb

            Start time (UTC):13:23:02
            Start date (UTC):11/01/2025
            Path:/tmp/x86_64.elf
            Arguments:-
            File size:59200 bytes
            MD5 hash:3d1e89d4e9c4f8238a413c4dbd6f00fb