Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
m68k.elf

Overview

General Information

Sample name:m68k.elf
Analysis ID:1589162
MD5:580ca18e5140ee547814f8377ee536f3
SHA1:3a00867a59798b9bee2b0efc145d3008c65ec087
SHA256:0d605f7d0ff62a3882e18d347d5a5cbd58f26aa047158b61a5f63fe9f15aa3e7
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589162
Start date and time:2025-01-11 14:30:31 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 32s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:m68k.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@19/0
Command:/tmp/m68k.elf
PID:5516
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • m68k.elf (PID: 5516, Parent: 5434, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/m68k.elf
    • m68k.elf New Fork (PID: 5518, Parent: 5516)
      • m68k.elf New Fork (PID: 5524, Parent: 5518)
      • m68k.elf New Fork (PID: 5525, Parent: 5518)
        • m68k.elf New Fork (PID: 5528, Parent: 5525)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
m68k.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    m68k.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      m68k.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xd717:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd72b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd73f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd753:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd767:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd77b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd78f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd7a3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd7b7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd7cb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd7df:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd7f3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd807:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd81b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd82f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd843:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd857:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd86b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd87f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd893:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd8a7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      5516.1.00007fe6c4001000.00007fe6c4010000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5516.1.00007fe6c4001000.00007fe6c4010000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5516.1.00007fe6c4001000.00007fe6c4010000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xd717:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd72b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd73f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd753:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd767:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd77b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd78f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd7a3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd7b7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd7cb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd7df:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd7f3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd807:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd81b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd82f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd843:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd857:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd86b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd87f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd893:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xd8a7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Process Memory Space: m68k.elf PID: 5516JoeSecurity_MoobotYara detected MoobotJoe Security
            Process Memory Space: m68k.elf PID: 5516JoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Click to see the 1 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-11T14:31:26.724420+010020304911Malware Command and Control Activity Detected192.168.2.1435340154.213.187.1181314TCP
              2025-01-11T14:31:30.342195+010020304911Malware Command and Control Activity Detected192.168.2.1435342154.213.187.1181314TCP
              2025-01-11T14:31:35.974840+010020304911Malware Command and Control Activity Detected192.168.2.1435344154.213.187.1181314TCP
              2025-01-11T14:31:46.595021+010020304911Malware Command and Control Activity Detected192.168.2.1435346154.213.187.1181314TCP
              2025-01-11T14:31:49.208191+010020304911Malware Command and Control Activity Detected192.168.2.1435348154.213.187.1181314TCP
              2025-01-11T14:31:53.840383+010020304911Malware Command and Control Activity Detected192.168.2.1435350154.213.187.1181314TCP
              2025-01-11T14:32:03.475573+010020304911Malware Command and Control Activity Detected192.168.2.1435352154.213.187.1181314TCP
              2025-01-11T14:32:10.104601+010020304911Malware Command and Control Activity Detected192.168.2.1435354154.213.187.1181314TCP
              2025-01-11T14:32:15.749991+010020304911Malware Command and Control Activity Detected192.168.2.1435356154.213.187.1181314TCP
              2025-01-11T14:32:26.394737+010020304911Malware Command and Control Activity Detected192.168.2.1435358154.213.187.1181314TCP
              2025-01-11T14:32:32.033745+010020304911Malware Command and Control Activity Detected192.168.2.1435360154.213.187.1181314TCP
              2025-01-11T14:32:38.665703+010020304911Malware Command and Control Activity Detected192.168.2.1435362154.213.187.1181314TCP
              2025-01-11T14:32:47.277335+010020304911Malware Command and Control Activity Detected192.168.2.1435364154.213.187.1181314TCP
              2025-01-11T14:32:53.911065+010020304911Malware Command and Control Activity Detected192.168.2.1435366154.213.187.1181314TCP
              2025-01-11T14:32:59.550507+010020304911Malware Command and Control Activity Detected192.168.2.1435368154.213.187.1181314TCP
              2025-01-11T14:33:07.428365+010020304911Malware Command and Control Activity Detected192.168.2.1435370154.213.187.1181314TCP
              2025-01-11T14:33:12.251891+010020304911Malware Command and Control Activity Detected192.168.2.1435372154.213.187.1181314TCP
              2025-01-11T14:33:18.154803+010020304911Malware Command and Control Activity Detected192.168.2.1435374154.213.187.1181314TCP
              2025-01-11T14:33:24.781914+010020304911Malware Command and Control Activity Detected192.168.2.1435376154.213.187.1181314TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: m68k.elfAvira: detected
              Source: m68k.elfReversingLabs: Detection: 60%

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35350 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35342 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35348 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35364 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35358 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35362 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35366 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35354 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35346 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35360 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35340 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35352 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35372 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35376 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35370 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35374 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35344 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35356 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35368 -> 154.213.187.118:1314
              Source: global trafficTCP traffic: 192.168.2.14:35340 -> 154.213.187.118:1314
              Source: global trafficDNS traffic detected: DNS query: webhorizon.icu

              System Summary

              barindex
              Source: m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5516.1.00007fe6c4001000.00007fe6c4010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: m68k.elf PID: 5516, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5516.1.00007fe6c4001000.00007fe6c4010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: m68k.elf PID: 5516, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@19/0
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/3760/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/3761/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/1583/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/2672/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/234/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/1577/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/19/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/1593/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/240/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/3094/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/242/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/3406/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/244/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/1589/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/245/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/246/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/3402/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/5/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/247/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/248/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/7/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/249/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/8/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/129/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/3762/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/801/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/3763/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/806/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/807/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/928/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/3420/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/131/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/252/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/253/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/254/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/255/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/135/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/256/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/1599/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/257/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/378/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/3412/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/35/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/1371/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/260/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/261/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5524)File opened: /proc/262/cmdlineJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: /tmp/m68k.elf (PID: 5516)File: /tmp/m68k.elfJump to behavior
              Source: /tmp/m68k.elf (PID: 5516)Queries kernel information via 'uname': Jump to behavior
              Source: m68k.elf, 5516.1.0000559bf6d48000.0000559bf6dcd000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/m68k
              Source: m68k.elf, 5516.1.00007ffd279c7000.00007ffd279e8000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
              Source: m68k.elf, 5516.1.0000559bf6d48000.0000559bf6dcd000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
              Source: m68k.elf, 5516.1.00007ffd279c7000.00007ffd279e8000.rw-.sdmpBinary or memory string: ?x86_64/usr/bin/qemu-m68k/tmp/m68k.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/m68k.elf

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: m68k.elf, type: SAMPLE
              Source: Yara matchFile source: 5516.1.00007fe6c4001000.00007fe6c4010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5516, type: MEMORYSTR
              Source: Yara matchFile source: m68k.elf, type: SAMPLE
              Source: Yara matchFile source: 5516.1.00007fe6c4001000.00007fe6c4010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5516, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: Yara matchFile source: m68k.elf, type: SAMPLE
              Source: Yara matchFile source: 5516.1.00007fe6c4001000.00007fe6c4010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5516, type: MEMORYSTR
              Source: Yara matchFile source: m68k.elf, type: SAMPLE
              Source: Yara matchFile source: 5516.1.00007fe6c4001000.00007fe6c4010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5516, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
              File Deletion
              1
              OS Credential Dumping
              11
              Security Software Discovery
              Remote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589162 Sample: m68k.elf Startdate: 11/01/2025 Architecture: LINUX Score: 100 20 webhorizon.icu 154.213.187.118, 1314, 35340, 35342 DDOSING-BGP-NETWORKUS Seychelles 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 4 other signatures 2->28 9 m68k.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 m68k.elf 9->12         started        process6 process7 14 m68k.elf 12->14         started        16 m68k.elf 12->16         started        process8 18 m68k.elf 14->18         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              m68k.elf61%ReversingLabsLinux.Trojan.Mirai
              m68k.elf100%AviraEXP/ELF.Mirai.Z.A
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              webhorizon.icu
              154.213.187.118
              truefalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                154.213.187.118
                webhorizon.icuSeychelles
                22769DDOSING-BGP-NETWORKUSfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                154.213.187.118x86.elfGet hashmaliciousMirai, MoobotBrowse
                  mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                    mips.elfGet hashmaliciousMirai, MoobotBrowse
                      x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        webhorizon.icux86.elfGet hashmaliciousMirai, MoobotBrowse
                        • 154.213.187.118
                        mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                        • 154.213.187.118
                        mips.elfGet hashmaliciousMirai, MoobotBrowse
                        • 154.213.187.118
                        x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                        • 154.213.187.118
                        arm.elfGet hashmaliciousMirai, MoobotBrowse
                        • 38.55.246.3
                        m68k.elfGet hashmaliciousMirai, MoobotBrowse
                        • 38.55.246.3
                        ppc.elfGet hashmaliciousMirai, MoobotBrowse
                        • 38.55.246.3
                        mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                        • 38.55.246.3
                        debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                        • 38.55.246.3
                        x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                        • 38.55.246.3
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        DDOSING-BGP-NETWORKUSx86.elfGet hashmaliciousMirai, MoobotBrowse
                        • 154.213.187.118
                        mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                        • 154.213.187.118
                        mips.elfGet hashmaliciousMirai, MoobotBrowse
                        • 154.213.187.118
                        x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                        • 154.213.187.118
                        4.elfGet hashmaliciousUnknownBrowse
                        • 41.93.138.131
                        armv5l.elfGet hashmaliciousUnknownBrowse
                        • 41.93.222.47
                        gmpsl.elfGet hashmaliciousUnknownBrowse
                        • 154.213.187.125
                        garm5.elfGet hashmaliciousUnknownBrowse
                        • 154.213.187.125
                        garm7.elfGet hashmaliciousMiraiBrowse
                        • 154.213.187.125
                        garm.elfGet hashmaliciousUnknownBrowse
                        • 154.213.187.125
                        No context
                        No context
                        No created / dropped files found
                        File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):6.213815777610397
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:m68k.elf
                        File size:62'732 bytes
                        MD5:580ca18e5140ee547814f8377ee536f3
                        SHA1:3a00867a59798b9bee2b0efc145d3008c65ec087
                        SHA256:0d605f7d0ff62a3882e18d347d5a5cbd58f26aa047158b61a5f63fe9f15aa3e7
                        SHA512:f70753253a2746be75300a66aa66aa4ddaaef9d6858b0fcaa615dead51f7abf354566f8b3a8b0e903ad28fceaea229ab8d95bb54e8cfa95d97ac0b41f1910566
                        SSDEEP:1536:1Zdzr2WROpGA83ynq+nzWZ77DfDWFCASE8YC1:1Zd/2W8pGtQzM7f+x8YC1
                        TLSH:52531B99F801CD7DF81BD77F4457090ABA71A3D152831B36239BF9A3BC721A91923E81
                        File Content Preview:.ELF.......................D...4...|.....4. ...(.................................. ....................d..%$...... .dt.Q............................NV..a....da....hN^NuNV..J9...<f>"y.... QJ.g.X.#.....N."y.... QJ.f.A.....J.g.Hy....N.X........<N^NuNV..N^NuN

                        ELF header

                        Class:ELF32
                        Data:2's complement, big endian
                        Version:1 (current)
                        Machine:MC68000
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x80000144
                        Flags:0x0
                        ELF Header Size:52
                        Program Header Offset:52
                        Program Header Size:32
                        Number of Program Headers:3
                        Section Header Offset:62332
                        Section Header Size:40
                        Number of Section Headers:10
                        Header String Table Index:9
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x800000940x940x140x00x6AX002
                        .textPROGBITS0x800000a80xa80xd5920x00x6AX004
                        .finiPROGBITS0x8000d63a0xd63a0xe0x00x6AX002
                        .rodataPROGBITS0x8000d6480xd6480x198a0x00x2A002
                        .ctorsPROGBITS0x80010fd80xefd80x80x00x3WA004
                        .dtorsPROGBITS0x80010fe00xefe00x80x00x3WA004
                        .dataPROGBITS0x80010fec0xefec0x3500x00x3WA004
                        .bssNOBITS0x8001133c0xf33c0x21c00x00x3WA004
                        .shstrtabSTRTAB0x00xf33c0x3e0x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x800000000x800000000xefd20xefd26.25350x5R E0x2000.init .text .fini .rodata
                        LOAD0xefd80x80010fd80x80010fd80x3640x25242.81570x6RW 0x2000.ctors .dtors .data .bss
                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2025-01-11T14:31:26.724420+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435340154.213.187.1181314TCP
                        2025-01-11T14:31:30.342195+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435342154.213.187.1181314TCP
                        2025-01-11T14:31:35.974840+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435344154.213.187.1181314TCP
                        2025-01-11T14:31:46.595021+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435346154.213.187.1181314TCP
                        2025-01-11T14:31:49.208191+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435348154.213.187.1181314TCP
                        2025-01-11T14:31:53.840383+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435350154.213.187.1181314TCP
                        2025-01-11T14:32:03.475573+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435352154.213.187.1181314TCP
                        2025-01-11T14:32:10.104601+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435354154.213.187.1181314TCP
                        2025-01-11T14:32:15.749991+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435356154.213.187.1181314TCP
                        2025-01-11T14:32:26.394737+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435358154.213.187.1181314TCP
                        2025-01-11T14:32:32.033745+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435360154.213.187.1181314TCP
                        2025-01-11T14:32:38.665703+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435362154.213.187.1181314TCP
                        2025-01-11T14:32:47.277335+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435364154.213.187.1181314TCP
                        2025-01-11T14:32:53.911065+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435366154.213.187.1181314TCP
                        2025-01-11T14:32:59.550507+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435368154.213.187.1181314TCP
                        2025-01-11T14:33:07.428365+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435370154.213.187.1181314TCP
                        2025-01-11T14:33:12.251891+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435372154.213.187.1181314TCP
                        2025-01-11T14:33:18.154803+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435374154.213.187.1181314TCP
                        2025-01-11T14:33:24.781914+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435376154.213.187.1181314TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 11, 2025 14:31:26.715287924 CET353401314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:26.720274925 CET131435340154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:26.720366955 CET353401314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:26.724420071 CET353401314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:26.729823112 CET131435340154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:27.325391054 CET131435340154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:27.326037884 CET353401314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:27.331037045 CET131435340154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:30.336466074 CET353421314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:30.341336966 CET131435342154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:30.341413975 CET353421314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:30.342195034 CET353421314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:30.347013950 CET131435342154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:30.956653118 CET131435342154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:30.957036018 CET353421314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:30.962055922 CET131435342154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:35.968081951 CET353441314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:35.973340034 CET131435344154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:35.973416090 CET353441314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:35.974839926 CET353441314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:35.979665041 CET131435344154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:36.577120066 CET131435344154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:36.577631950 CET353441314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:36.582475901 CET131435344154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:46.589023113 CET353461314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:46.593825102 CET131435346154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:46.593883991 CET353461314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:46.595021009 CET353461314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:46.599747896 CET131435346154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:47.189166069 CET131435346154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:47.189390898 CET353461314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:47.194206953 CET131435346154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:49.201364994 CET353481314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:49.206425905 CET131435348154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:49.206502914 CET353481314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:49.208190918 CET353481314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:49.213244915 CET131435348154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:49.820204973 CET131435348154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:49.820689917 CET353481314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:49.825611115 CET131435348154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:53.833518028 CET353501314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:53.839068890 CET131435350154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:53.839346886 CET353501314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:53.840383053 CET353501314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:53.845539093 CET131435350154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:54.458456993 CET131435350154.213.187.118192.168.2.14
                        Jan 11, 2025 14:31:54.458822966 CET353501314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:31:54.463818073 CET131435350154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:03.469221115 CET353521314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:03.474550962 CET131435352154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:03.474638939 CET353521314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:03.475573063 CET353521314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:03.480437040 CET131435352154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:04.087503910 CET131435352154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:04.087711096 CET353521314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:04.092732906 CET131435352154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:10.097979069 CET353541314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:10.103080034 CET131435354154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:10.103141069 CET353541314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:10.104600906 CET353541314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:10.109603882 CET131435354154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:10.732642889 CET131435354154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:10.733052969 CET353541314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:10.738542080 CET131435354154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:15.743614912 CET353561314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:15.748950958 CET131435356154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:15.749032021 CET353561314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:15.749990940 CET353561314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:15.755031109 CET131435356154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:16.379045010 CET131435356154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:16.379303932 CET353561314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:16.384144068 CET131435356154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:26.389143944 CET353581314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:26.393937111 CET131435358154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:26.394030094 CET353581314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:26.394737005 CET353581314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:26.399492979 CET131435358154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:27.017585039 CET131435358154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:27.018030882 CET353581314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:27.023216009 CET131435358154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:32.027894974 CET353601314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:32.032829046 CET131435360154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:32.032912016 CET353601314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:32.033745050 CET353601314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:32.038574934 CET131435360154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:32.646900892 CET131435360154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:32.647253036 CET353601314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:32.652184010 CET131435360154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:38.659096956 CET353621314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:38.664078951 CET131435362154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:38.664191961 CET353621314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:38.665703058 CET353621314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:38.670509100 CET131435362154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:39.259341955 CET131435362154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:39.259892941 CET353621314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:39.264844894 CET131435362154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:47.270952940 CET353641314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:47.276221037 CET131435364154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:47.276294947 CET353641314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:47.277334929 CET353641314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:47.282191992 CET131435364154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:47.888602018 CET131435364154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:47.888914108 CET353641314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:47.893841028 CET131435364154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:53.902076006 CET353661314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:53.907130957 CET131435366154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:53.907419920 CET353661314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:53.911065102 CET353661314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:53.916225910 CET131435366154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:54.530618906 CET131435366154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:54.530972958 CET353661314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:54.535918951 CET131435366154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:59.543428898 CET353681314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:59.548360109 CET131435368154.213.187.118192.168.2.14
                        Jan 11, 2025 14:32:59.548604012 CET353681314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:59.550507069 CET353681314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:32:59.555360079 CET131435368154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:00.155198097 CET131435368154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:00.155715942 CET353681314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:00.160573006 CET131435368154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:07.422804117 CET353701314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:07.427619934 CET131435370154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:07.427684069 CET353701314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:07.428364992 CET353701314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:07.433149099 CET131435370154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:08.057938099 CET131435370154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:08.058228970 CET353701314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:08.063200951 CET131435370154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:12.245083094 CET353721314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:12.249985933 CET131435372154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:12.250142097 CET353721314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:12.251890898 CET353721314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:12.256773949 CET131435372154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:12.845422029 CET131435372154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:12.845699072 CET353721314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:12.850557089 CET131435372154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:18.148422956 CET353741314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:18.153295994 CET131435374154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:18.153390884 CET353741314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:18.154803038 CET353741314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:18.161153078 CET131435374154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:18.764723063 CET131435374154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:18.765134096 CET353741314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:18.770015955 CET131435374154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:24.776110888 CET353761314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:24.780989885 CET131435376154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:24.781095028 CET353761314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:24.781913996 CET353761314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:24.786732912 CET131435376154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:25.399689913 CET131435376154.213.187.118192.168.2.14
                        Jan 11, 2025 14:33:25.400079966 CET353761314192.168.2.14154.213.187.118
                        Jan 11, 2025 14:33:25.405082941 CET131435376154.213.187.118192.168.2.14
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 11, 2025 14:31:26.694506884 CET5550553192.168.2.148.8.8.8
                        Jan 11, 2025 14:31:26.702002048 CET53555058.8.8.8192.168.2.14
                        Jan 11, 2025 14:31:30.328550100 CET4171153192.168.2.148.8.8.8
                        Jan 11, 2025 14:31:30.335910082 CET53417118.8.8.8192.168.2.14
                        Jan 11, 2025 14:31:35.959889889 CET3496953192.168.2.148.8.8.8
                        Jan 11, 2025 14:31:35.967206001 CET53349698.8.8.8192.168.2.14
                        Jan 11, 2025 14:31:46.580929995 CET5921753192.168.2.148.8.8.8
                        Jan 11, 2025 14:31:46.588429928 CET53592178.8.8.8192.168.2.14
                        Jan 11, 2025 14:31:49.193145990 CET3409853192.168.2.148.8.8.8
                        Jan 11, 2025 14:31:49.200542927 CET53340988.8.8.8192.168.2.14
                        Jan 11, 2025 14:31:53.824636936 CET4173453192.168.2.148.8.8.8
                        Jan 11, 2025 14:31:53.832489014 CET53417348.8.8.8192.168.2.14
                        Jan 11, 2025 14:32:03.461461067 CET4167253192.168.2.148.8.8.8
                        Jan 11, 2025 14:32:03.468595982 CET53416728.8.8.8192.168.2.14
                        Jan 11, 2025 14:32:10.089854002 CET3292353192.168.2.148.8.8.8
                        Jan 11, 2025 14:32:10.097119093 CET53329238.8.8.8192.168.2.14
                        Jan 11, 2025 14:32:15.735846043 CET5586053192.168.2.148.8.8.8
                        Jan 11, 2025 14:32:15.742995977 CET53558608.8.8.8192.168.2.14
                        Jan 11, 2025 14:32:26.381282091 CET4263053192.168.2.148.8.8.8
                        Jan 11, 2025 14:32:26.388660908 CET53426308.8.8.8192.168.2.14
                        Jan 11, 2025 14:32:32.020850897 CET5287753192.168.2.148.8.8.8
                        Jan 11, 2025 14:32:32.027348042 CET53528778.8.8.8192.168.2.14
                        Jan 11, 2025 14:32:38.651340961 CET5679853192.168.2.148.8.8.8
                        Jan 11, 2025 14:32:38.658257008 CET53567988.8.8.8192.168.2.14
                        Jan 11, 2025 14:32:47.262797117 CET3825253192.168.2.148.8.8.8
                        Jan 11, 2025 14:32:47.270318031 CET53382528.8.8.8192.168.2.14
                        Jan 11, 2025 14:32:53.893358946 CET4355453192.168.2.148.8.8.8
                        Jan 11, 2025 14:32:53.899903059 CET53435548.8.8.8192.168.2.14
                        Jan 11, 2025 14:32:59.535151958 CET6083253192.168.2.148.8.8.8
                        Jan 11, 2025 14:32:59.542027950 CET53608328.8.8.8192.168.2.14
                        Jan 11, 2025 14:33:07.159187078 CET5443353192.168.2.148.8.8.8
                        Jan 11, 2025 14:33:07.421677113 CET53544338.8.8.8192.168.2.14
                        Jan 11, 2025 14:33:12.061525106 CET5908453192.168.2.148.8.8.8
                        Jan 11, 2025 14:33:12.243071079 CET53590848.8.8.8192.168.2.14
                        Jan 11, 2025 14:33:17.849251032 CET5099353192.168.2.148.8.8.8
                        Jan 11, 2025 14:33:18.147176981 CET53509938.8.8.8192.168.2.14
                        Jan 11, 2025 14:33:24.768189907 CET3800453192.168.2.148.8.8.8
                        Jan 11, 2025 14:33:24.775582075 CET53380048.8.8.8192.168.2.14
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 11, 2025 14:31:26.694506884 CET192.168.2.148.8.8.80x9e74Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:31:30.328550100 CET192.168.2.148.8.8.80x991dStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:31:35.959889889 CET192.168.2.148.8.8.80x1f23Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:31:46.580929995 CET192.168.2.148.8.8.80x62fStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:31:49.193145990 CET192.168.2.148.8.8.80xc19dStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:31:53.824636936 CET192.168.2.148.8.8.80xbbb1Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:03.461461067 CET192.168.2.148.8.8.80x83a1Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:10.089854002 CET192.168.2.148.8.8.80x9a0dStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:15.735846043 CET192.168.2.148.8.8.80x3346Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:26.381282091 CET192.168.2.148.8.8.80x1af5Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:32.020850897 CET192.168.2.148.8.8.80xed1aStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:38.651340961 CET192.168.2.148.8.8.80x43f9Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:47.262797117 CET192.168.2.148.8.8.80x8ac6Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:53.893358946 CET192.168.2.148.8.8.80x3cdfStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:59.535151958 CET192.168.2.148.8.8.80xb90eStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:33:07.159187078 CET192.168.2.148.8.8.80x46d2Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:33:12.061525106 CET192.168.2.148.8.8.80x7f23Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:33:17.849251032 CET192.168.2.148.8.8.80xf2d3Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        Jan 11, 2025 14:33:24.768189907 CET192.168.2.148.8.8.80xcdceStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 11, 2025 14:31:26.702002048 CET8.8.8.8192.168.2.140x9e74No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:31:30.335910082 CET8.8.8.8192.168.2.140x991dNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:31:35.967206001 CET8.8.8.8192.168.2.140x1f23No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:31:46.588429928 CET8.8.8.8192.168.2.140x62fNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:31:49.200542927 CET8.8.8.8192.168.2.140xc19dNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:31:53.832489014 CET8.8.8.8192.168.2.140xbbb1No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:03.468595982 CET8.8.8.8192.168.2.140x83a1No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:10.097119093 CET8.8.8.8192.168.2.140x9a0dNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:15.742995977 CET8.8.8.8192.168.2.140x3346No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:26.388660908 CET8.8.8.8192.168.2.140x1af5No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:32.027348042 CET8.8.8.8192.168.2.140xed1aNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:38.658257008 CET8.8.8.8192.168.2.140x43f9No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:47.270318031 CET8.8.8.8192.168.2.140x8ac6No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:53.899903059 CET8.8.8.8192.168.2.140x3cdfNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:32:59.542027950 CET8.8.8.8192.168.2.140xb90eNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:33:07.421677113 CET8.8.8.8192.168.2.140x46d2No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:33:12.243071079 CET8.8.8.8192.168.2.140x7f23No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:33:18.147176981 CET8.8.8.8192.168.2.140xf2d3No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                        Jan 11, 2025 14:33:24.775582075 CET8.8.8.8192.168.2.140xcdceNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):13:31:25
                        Start date (UTC):11/01/2025
                        Path:/tmp/m68k.elf
                        Arguments:/tmp/m68k.elf
                        File size:4463432 bytes
                        MD5 hash:cd177594338c77b895ae27c33f8f86cc

                        Start time (UTC):13:31:25
                        Start date (UTC):11/01/2025
                        Path:/tmp/m68k.elf
                        Arguments:-
                        File size:4463432 bytes
                        MD5 hash:cd177594338c77b895ae27c33f8f86cc

                        Start time (UTC):13:31:25
                        Start date (UTC):11/01/2025
                        Path:/tmp/m68k.elf
                        Arguments:-
                        File size:4463432 bytes
                        MD5 hash:cd177594338c77b895ae27c33f8f86cc

                        Start time (UTC):13:31:25
                        Start date (UTC):11/01/2025
                        Path:/tmp/m68k.elf
                        Arguments:-
                        File size:4463432 bytes
                        MD5 hash:cd177594338c77b895ae27c33f8f86cc

                        Start time (UTC):13:31:25
                        Start date (UTC):11/01/2025
                        Path:/tmp/m68k.elf
                        Arguments:-
                        File size:4463432 bytes
                        MD5 hash:cd177594338c77b895ae27c33f8f86cc