Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
sh4.elf

Overview

General Information

Sample name:sh4.elf
Analysis ID:1589164
MD5:e96aafc35c6092d55a3fdaf07f0879a2
SHA1:6e689389acd78e70cc749acbc99f91932226c69f
SHA256:7373f03e5841bfe3f7f7afb768b280235ccb2d369ba2da322bfab5b38f15b03f
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589164
Start date and time:2025-01-11 14:34:36 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 38s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:sh4.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@21/0
Command:/tmp/sh4.elf
PID:5510
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • sh4.elf (PID: 5510, Parent: 5428, MD5: 8943e5f8f8c280467b4472c15ae93ba9) Arguments: /tmp/sh4.elf
    • sh4.elf New Fork (PID: 5512, Parent: 5510)
      • sh4.elf New Fork (PID: 5514, Parent: 5512)
      • sh4.elf New Fork (PID: 5516, Parent: 5512)
        • sh4.elf New Fork (PID: 5518, Parent: 5516)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
sh4.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    sh4.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      sh4.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xac80:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xac94:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xaca8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xacbc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xacd0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xace4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xacf8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xad0c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xad20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xad34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xad48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xad5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xad70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xad84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xad98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xadac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xadc0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xadd4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xade8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xadfc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xae10:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      5510.1.00007ff27c400000.00007ff27c40d000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5510.1.00007ff27c400000.00007ff27c40d000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5510.1.00007ff27c400000.00007ff27c40d000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xac80:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xac94:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xaca8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xacbc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xacd0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xace4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xacf8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xad0c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xad20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xad34:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xad48:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xad5c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xad70:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xad84:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xad98:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xadac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xadc0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xadd4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xade8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xadfc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xae10:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Process Memory Space: sh4.elf PID: 5510JoeSecurity_MoobotYara detected MoobotJoe Security
            Process Memory Space: sh4.elf PID: 5510JoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Click to see the 1 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-11T14:35:31.961360+010020304911Malware Command and Control Activity Detected192.168.2.1435340154.213.187.1181314TCP
              2025-01-11T14:35:36.580907+010020304911Malware Command and Control Activity Detected192.168.2.1435342154.213.187.1181314TCP
              2025-01-11T14:35:43.199009+010020304911Malware Command and Control Activity Detected192.168.2.1435344154.213.187.1181314TCP
              2025-01-11T14:35:46.852974+010020304911Malware Command and Control Activity Detected192.168.2.1435346154.213.187.1181314TCP
              2025-01-11T14:35:52.472778+010020304911Malware Command and Control Activity Detected192.168.2.1435348154.213.187.1181314TCP
              2025-01-11T14:35:57.119534+010020304911Malware Command and Control Activity Detected192.168.2.1435350154.213.187.1181314TCP
              2025-01-11T14:36:07.735696+010020304911Malware Command and Control Activity Detected192.168.2.1435352154.213.187.1181314TCP
              2025-01-11T14:36:13.344848+010020304911Malware Command and Control Activity Detected192.168.2.1435354154.213.187.1181314TCP
              2025-01-11T14:36:22.964428+010020304911Malware Command and Control Activity Detected192.168.2.1435356154.213.187.1181314TCP
              2025-01-11T14:36:30.611135+010020304911Malware Command and Control Activity Detected192.168.2.1435358154.213.187.1181314TCP
              2025-01-11T14:36:40.240133+010020304911Malware Command and Control Activity Detected192.168.2.1435360154.213.187.1181314TCP
              2025-01-11T14:36:49.888387+010020304911Malware Command and Control Activity Detected192.168.2.1435362154.213.187.1181314TCP
              2025-01-11T14:36:56.511667+010020304911Malware Command and Control Activity Detected192.168.2.1435364154.213.187.1181314TCP
              2025-01-11T14:37:03.155203+010020304911Malware Command and Control Activity Detected192.168.2.1435366154.213.187.1181314TCP
              2025-01-11T14:37:05.780103+010020304911Malware Command and Control Activity Detected192.168.2.1435368154.213.187.1181314TCP
              2025-01-11T14:37:07.420224+010020304911Malware Command and Control Activity Detected192.168.2.1435370154.213.187.1181314TCP
              2025-01-11T14:37:12.059999+010020304911Malware Command and Control Activity Detected192.168.2.1435372154.213.187.1181314TCP
              2025-01-11T14:37:14.689376+010020304911Malware Command and Control Activity Detected192.168.2.1435374154.213.187.1181314TCP
              2025-01-11T14:37:22.312355+010020304911Malware Command and Control Activity Detected192.168.2.1435376154.213.187.1181314TCP
              2025-01-11T14:37:28.945736+010020304911Malware Command and Control Activity Detected192.168.2.1435378154.213.187.1181314TCP
              2025-01-11T14:37:34.654746+010020304911Malware Command and Control Activity Detected192.168.2.1435380154.213.187.1181314TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: sh4.elfAvira: detected
              Source: sh4.elfVirustotal: Detection: 60%Perma Link
              Source: sh4.elfReversingLabs: Detection: 57%

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35344 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35340 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35342 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35356 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35354 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35362 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35350 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35360 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35368 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35352 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35374 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35364 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35366 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35348 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35372 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35370 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35378 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35380 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35376 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35346 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:35358 -> 154.213.187.118:1314
              Source: global trafficTCP traffic: 192.168.2.14:35340 -> 154.213.187.118:1314
              Source: global trafficDNS traffic detected: DNS query: webhorizon.icu

              System Summary

              barindex
              Source: sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5510.1.00007ff27c400000.00007ff27c40d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: sh4.elf PID: 5510, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: sh4.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5510.1.00007ff27c400000.00007ff27c40d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: sh4.elf PID: 5510, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@21/0
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/3760/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/3761/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/1583/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/2672/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/3759/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/234/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/1577/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/19/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/1593/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/240/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/3094/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/242/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/3406/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/244/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/1589/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/245/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/246/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/3402/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/5/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/247/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/248/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/7/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/249/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/8/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/129/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/3762/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/801/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/806/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/807/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/928/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/3420/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/131/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/252/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/253/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/254/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/255/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/135/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/256/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/1599/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/257/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/378/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/3412/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/35/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/1371/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/260/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/261/cmdlineJump to behavior
              Source: /tmp/sh4.elf (PID: 5514)File opened: /proc/262/cmdlineJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: /tmp/sh4.elf (PID: 5510)File: /tmp/sh4.elfJump to behavior
              Source: /tmp/sh4.elf (PID: 5510)Queries kernel information via 'uname': Jump to behavior
              Source: sh4.elf, 5510.1.00007ffe039bf000.00007ffe039e0000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
              Source: sh4.elf, 5510.1.0000555ca518d000.0000555ca51f0000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4
              Source: sh4.elf, 5510.1.00007ffe039bf000.00007ffe039e0000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sh4/tmp/sh4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sh4.elf
              Source: sh4.elf, 5510.1.0000555ca518d000.0000555ca51f0000.rw-.sdmpBinary or memory string: \U5!/etc/qemu-binfmt/sh4

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 5510.1.00007ff27c400000.00007ff27c40d000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: sh4.elf PID: 5510, type: MEMORYSTR
              Source: Yara matchFile source: sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 5510.1.00007ff27c400000.00007ff27c40d000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: sh4.elf PID: 5510, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: Yara matchFile source: sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 5510.1.00007ff27c400000.00007ff27c40d000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: sh4.elf PID: 5510, type: MEMORYSTR
              Source: Yara matchFile source: sh4.elf, type: SAMPLE
              Source: Yara matchFile source: 5510.1.00007ff27c400000.00007ff27c40d000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: sh4.elf PID: 5510, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
              File Deletion
              1
              OS Credential Dumping
              11
              Security Software Discovery
              Remote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589164 Sample: sh4.elf Startdate: 11/01/2025 Architecture: LINUX Score: 100 20 webhorizon.icu 154.213.187.118, 1314, 35340, 35342 DDOSING-BGP-NETWORKUS Seychelles 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 4 other signatures 2->28 9 sh4.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 sh4.elf 9->12         started        process6 process7 14 sh4.elf 12->14         started        16 sh4.elf 12->16         started        process8 18 sh4.elf 14->18         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              sh4.elf60%VirustotalBrowse
              sh4.elf58%ReversingLabsLinux.Trojan.Mirai
              sh4.elf100%AviraEXP/ELF.Mirai.Z.A
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              webhorizon.icu
              154.213.187.118
              truefalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                154.213.187.118
                webhorizon.icuSeychelles
                22769DDOSING-BGP-NETWORKUSfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                154.213.187.118arm.elfGet hashmaliciousMirai, MoobotBrowse
                  m68k.elfGet hashmaliciousMirai, MoobotBrowse
                    x86.elfGet hashmaliciousMirai, MoobotBrowse
                      mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                        mips.elfGet hashmaliciousMirai, MoobotBrowse
                          x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            webhorizon.icuarm.elfGet hashmaliciousMirai, MoobotBrowse
                            • 154.213.187.118
                            m68k.elfGet hashmaliciousMirai, MoobotBrowse
                            • 154.213.187.118
                            x86.elfGet hashmaliciousMirai, MoobotBrowse
                            • 154.213.187.118
                            mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                            • 154.213.187.118
                            mips.elfGet hashmaliciousMirai, MoobotBrowse
                            • 154.213.187.118
                            x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                            • 154.213.187.118
                            arm.elfGet hashmaliciousMirai, MoobotBrowse
                            • 38.55.246.3
                            m68k.elfGet hashmaliciousMirai, MoobotBrowse
                            • 38.55.246.3
                            ppc.elfGet hashmaliciousMirai, MoobotBrowse
                            • 38.55.246.3
                            mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                            • 38.55.246.3
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            DDOSING-BGP-NETWORKUSarm.elfGet hashmaliciousMirai, MoobotBrowse
                            • 154.213.187.118
                            m68k.elfGet hashmaliciousMirai, MoobotBrowse
                            • 154.213.187.118
                            x86.elfGet hashmaliciousMirai, MoobotBrowse
                            • 154.213.187.118
                            mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                            • 154.213.187.118
                            mips.elfGet hashmaliciousMirai, MoobotBrowse
                            • 154.213.187.118
                            x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                            • 154.213.187.118
                            4.elfGet hashmaliciousUnknownBrowse
                            • 41.93.138.131
                            armv5l.elfGet hashmaliciousUnknownBrowse
                            • 41.93.222.47
                            gmpsl.elfGet hashmaliciousUnknownBrowse
                            • 154.213.187.125
                            garm5.elfGet hashmaliciousUnknownBrowse
                            • 154.213.187.125
                            No context
                            No context
                            No created / dropped files found
                            File type:ELF 32-bit LSB executable, Renesas SH, version 1 (SYSV), statically linked, stripped
                            Entropy (8bit):6.835229488394901
                            TrID:
                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                            File name:sh4.elf
                            File size:51'796 bytes
                            MD5:e96aafc35c6092d55a3fdaf07f0879a2
                            SHA1:6e689389acd78e70cc749acbc99f91932226c69f
                            SHA256:7373f03e5841bfe3f7f7afb768b280235ccb2d369ba2da322bfab5b38f15b03f
                            SHA512:3675ad0c368748d58ca2683da578ad298bb79a9f54b1ff189291c4987bd7cf6311369696859c25524a196d277b22b610fe23d977df567e2a83642d612e1b9cb6
                            SSDEEP:768:qIap1jeOYyLmAfxthLr5uhKeSR//CHIDLKX54KafzozVZuVCAa8RWfgJBdwnwI8:PaLj3/L/fxzEY3LKX549MzOVCAhJsnw
                            TLSH:AE338D66E81A6E18C0560170B9648F741F63F0C4934B2EFB19E9C2B95493EACF519FF8
                            File Content Preview:.ELF..............*.......@.4...........4. ...(...............@...@..................... ... .A. .A.d...8%..........Q.td............................././"O.n........#.*@........#.*@.....o&O.n...l..............................././.../.a"O.!...n...a.b("...q.

                            ELF header

                            Class:ELF32
                            Data:2's complement, little endian
                            Version:1 (current)
                            Machine:<unknown>
                            Version Number:0x1
                            Type:EXEC (Executable file)
                            OS/ABI:UNIX - System V
                            ABI Version:0
                            Entry Point Address:0x4001a0
                            Flags:0x9
                            ELF Header Size:52
                            Program Header Offset:52
                            Program Header Size:32
                            Number of Program Headers:3
                            Section Header Offset:51396
                            Section Header Size:40
                            Number of Section Headers:10
                            Header String Table Index:9
                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                            NULL0x00x00x00x00x0000
                            .initPROGBITS0x4000940x940x300x00x6AX004
                            .textPROGBITS0x4000e00xe00xaaa00x00x6AX0032
                            .finiPROGBITS0x40ab800xab800x240x00x6AX004
                            .rodataPROGBITS0x40aba40xaba40x19780x00x2A004
                            .ctorsPROGBITS0x41c5200xc5200x80x00x3WA004
                            .dtorsPROGBITS0x41c5280xc5280x80x00x3WA004
                            .dataPROGBITS0x41c5340xc5340x3500x00x3WA004
                            .bssNOBITS0x41c8840xc8840x21d40x00x3WA004
                            .shstrtabSTRTAB0x00xc8840x3e0x00x0001
                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                            LOAD0x00x4000000x4000000xc51c0xc51c6.89410x5R E0x10000.init .text .fini .rodata
                            LOAD0xc5200x41c5200x41c5200x3640x25382.71860x6RW 0x10000.ctors .dtors .data .bss
                            GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2025-01-11T14:35:31.961360+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435340154.213.187.1181314TCP
                            2025-01-11T14:35:36.580907+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435342154.213.187.1181314TCP
                            2025-01-11T14:35:43.199009+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435344154.213.187.1181314TCP
                            2025-01-11T14:35:46.852974+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435346154.213.187.1181314TCP
                            2025-01-11T14:35:52.472778+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435348154.213.187.1181314TCP
                            2025-01-11T14:35:57.119534+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435350154.213.187.1181314TCP
                            2025-01-11T14:36:07.735696+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435352154.213.187.1181314TCP
                            2025-01-11T14:36:13.344848+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435354154.213.187.1181314TCP
                            2025-01-11T14:36:22.964428+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435356154.213.187.1181314TCP
                            2025-01-11T14:36:30.611135+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435358154.213.187.1181314TCP
                            2025-01-11T14:36:40.240133+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435360154.213.187.1181314TCP
                            2025-01-11T14:36:49.888387+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435362154.213.187.1181314TCP
                            2025-01-11T14:36:56.511667+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435364154.213.187.1181314TCP
                            2025-01-11T14:37:03.155203+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435366154.213.187.1181314TCP
                            2025-01-11T14:37:05.780103+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435368154.213.187.1181314TCP
                            2025-01-11T14:37:07.420224+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435370154.213.187.1181314TCP
                            2025-01-11T14:37:12.059999+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435372154.213.187.1181314TCP
                            2025-01-11T14:37:14.689376+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435374154.213.187.1181314TCP
                            2025-01-11T14:37:22.312355+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435376154.213.187.1181314TCP
                            2025-01-11T14:37:28.945736+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435378154.213.187.1181314TCP
                            2025-01-11T14:37:34.654746+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1435380154.213.187.1181314TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 11, 2025 14:35:31.948781013 CET353401314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:31.953722000 CET131435340154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:31.953792095 CET353401314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:31.961359978 CET353401314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:31.966259003 CET131435340154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:32.563252926 CET131435340154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:32.563565016 CET353401314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:32.568447113 CET131435340154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:36.574668884 CET353421314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:36.580277920 CET131435342154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:36.580337048 CET353421314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:36.580907106 CET353421314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:36.585680962 CET131435342154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:37.180454969 CET131435342154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:37.180665016 CET353421314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:37.185581923 CET131435342154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:43.193295002 CET353441314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:43.198086023 CET131435344154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:43.198142052 CET353441314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:43.199008942 CET353441314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:43.203823090 CET131435344154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:43.837937117 CET131435344154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:43.838180065 CET353441314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:43.843024969 CET131435344154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:46.847384930 CET353461314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:46.852257967 CET131435346154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:46.852332115 CET353461314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:46.852973938 CET353461314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:46.857791901 CET131435346154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:47.455552101 CET131435346154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:47.455881119 CET353461314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:47.461968899 CET131435346154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:52.466648102 CET353481314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:52.471621037 CET131435348154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:52.471683025 CET353481314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:52.472778082 CET353481314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:52.477653980 CET131435348154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:53.101459026 CET131435348154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:53.101761103 CET353481314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:53.106565952 CET131435348154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:57.111979961 CET353501314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:57.118716002 CET131435350154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:57.118818045 CET353501314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:57.119534016 CET353501314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:57.125511885 CET131435350154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:57.718980074 CET131435350154.213.187.118192.168.2.14
                            Jan 11, 2025 14:35:57.719392061 CET353501314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:35:57.724312067 CET131435350154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:07.728807926 CET353521314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:07.734791994 CET131435352154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:07.734860897 CET353521314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:07.735696077 CET353521314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:07.740564108 CET131435352154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:08.329767942 CET131435352154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:08.330321074 CET353521314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:08.335269928 CET131435352154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:13.339293003 CET353541314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:13.344229937 CET131435354154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:13.344379902 CET353541314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:13.344847918 CET353541314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:13.349649906 CET131435354154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:13.942714930 CET131435354154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:13.943166971 CET353541314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:13.948077917 CET131435354154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:22.955635071 CET353561314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:22.962260962 CET131435356154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:22.962342978 CET353561314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:22.964427948 CET353561314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:22.971182108 CET131435356154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:23.595060110 CET131435356154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:23.595505953 CET353561314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:23.600425959 CET131435356154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:30.605438948 CET353581314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:30.610318899 CET131435358154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:30.610390902 CET353581314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:30.611135006 CET353581314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:30.615926981 CET131435358154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:31.224200010 CET131435358154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:31.224489927 CET353581314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:31.229406118 CET131435358154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:40.234392881 CET353601314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:40.239276886 CET131435360154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:40.239373922 CET353601314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:40.240133047 CET353601314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:40.245019913 CET131435360154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:40.870270014 CET131435360154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:40.870640039 CET353601314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:40.875508070 CET131435360154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:49.882303953 CET353621314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:49.887238026 CET131435362154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:49.887322903 CET353621314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:49.888386965 CET353621314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:49.893630981 CET131435362154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:50.490061998 CET131435362154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:50.490437984 CET353621314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:50.495249987 CET131435362154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:56.503789902 CET353641314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:56.510859013 CET131435364154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:56.511070967 CET353641314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:56.511667013 CET353641314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:56.520988941 CET131435364154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:57.136831045 CET131435364154.213.187.118192.168.2.14
                            Jan 11, 2025 14:36:57.137161970 CET353641314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:36:57.142132044 CET131435364154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:03.148793936 CET353661314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:03.153852940 CET131435366154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:03.153933048 CET353661314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:03.155203104 CET353661314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:03.160074949 CET131435366154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:03.757961035 CET131435366154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:03.758230925 CET353661314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:03.763086081 CET131435366154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:05.769264936 CET353681314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:05.778690100 CET131435368154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:05.778800964 CET353681314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:05.780102968 CET353681314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:05.784876108 CET131435368154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:06.402537107 CET131435368154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:06.403201103 CET353681314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:06.408097029 CET131435368154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:07.414407015 CET353701314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:07.419352055 CET131435370154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:07.419418097 CET353701314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:07.420223951 CET353701314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:07.425035954 CET131435370154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:08.040343046 CET131435370154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:08.040626049 CET353701314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:08.045499086 CET131435370154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:12.053653002 CET353721314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:12.058578968 CET131435372154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:12.058661938 CET353721314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:12.059998989 CET353721314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:12.064867020 CET131435372154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:12.670722961 CET131435372154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:12.670972109 CET353721314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:12.675878048 CET131435372154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:14.682776928 CET353741314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:14.688200951 CET131435374154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:14.688345909 CET353741314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:14.689376116 CET353741314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:14.694555998 CET131435374154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:15.295388937 CET131435374154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:15.295515060 CET353741314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:15.300631046 CET131435374154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:22.306546926 CET353761314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:22.311358929 CET131435376154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:22.311436892 CET353761314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:22.312355042 CET353761314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:22.317138910 CET131435376154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:22.928112984 CET131435376154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:22.928319931 CET353761314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:22.933130980 CET131435376154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:28.939481020 CET353781314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:28.944370031 CET131435378154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:28.944524050 CET353781314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:28.945735931 CET353781314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:28.950469971 CET131435378154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:29.636012077 CET131435378154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:29.636430025 CET353781314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:29.641304970 CET131435378154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:34.648252964 CET353801314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:34.653275013 CET131435380154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:34.653461933 CET353801314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:34.654746056 CET353801314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:34.659615040 CET131435380154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:35.259673119 CET131435380154.213.187.118192.168.2.14
                            Jan 11, 2025 14:37:35.259923935 CET353801314192.168.2.14154.213.187.118
                            Jan 11, 2025 14:37:35.264810085 CET131435380154.213.187.118192.168.2.14
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 11, 2025 14:35:31.935192108 CET3334553192.168.2.148.8.8.8
                            Jan 11, 2025 14:35:31.942370892 CET53333458.8.8.8192.168.2.14
                            Jan 11, 2025 14:35:36.566879988 CET4755353192.168.2.148.8.8.8
                            Jan 11, 2025 14:35:36.574259996 CET53475538.8.8.8192.168.2.14
                            Jan 11, 2025 14:35:43.182403088 CET4482853192.168.2.148.8.8.8
                            Jan 11, 2025 14:35:43.192728996 CET53448288.8.8.8192.168.2.14
                            Jan 11, 2025 14:35:46.839849949 CET6034453192.168.2.148.8.8.8
                            Jan 11, 2025 14:35:46.847029924 CET53603448.8.8.8192.168.2.14
                            Jan 11, 2025 14:35:52.458425045 CET4492553192.168.2.148.8.8.8
                            Jan 11, 2025 14:35:52.466031075 CET53449258.8.8.8192.168.2.14
                            Jan 11, 2025 14:35:57.103904009 CET4131853192.168.2.148.8.8.8
                            Jan 11, 2025 14:35:57.111346006 CET53413188.8.8.8192.168.2.14
                            Jan 11, 2025 14:36:07.720966101 CET3417553192.168.2.148.8.8.8
                            Jan 11, 2025 14:36:07.728163004 CET53341758.8.8.8192.168.2.14
                            Jan 11, 2025 14:36:13.331721067 CET3889953192.168.2.148.8.8.8
                            Jan 11, 2025 14:36:13.338638067 CET53388998.8.8.8192.168.2.14
                            Jan 11, 2025 14:36:22.946063995 CET4979853192.168.2.148.8.8.8
                            Jan 11, 2025 14:36:22.954870939 CET53497988.8.8.8192.168.2.14
                            Jan 11, 2025 14:36:30.597470045 CET5897853192.168.2.148.8.8.8
                            Jan 11, 2025 14:36:30.604836941 CET53589788.8.8.8192.168.2.14
                            Jan 11, 2025 14:36:40.226635933 CET3842653192.168.2.148.8.8.8
                            Jan 11, 2025 14:36:40.233839989 CET53384268.8.8.8192.168.2.14
                            Jan 11, 2025 14:36:49.874506950 CET4656653192.168.2.148.8.8.8
                            Jan 11, 2025 14:36:49.881719112 CET53465668.8.8.8192.168.2.14
                            Jan 11, 2025 14:36:56.492189884 CET5470653192.168.2.148.8.8.8
                            Jan 11, 2025 14:36:56.503216982 CET53547068.8.8.8192.168.2.14
                            Jan 11, 2025 14:37:03.140463114 CET4708353192.168.2.148.8.8.8
                            Jan 11, 2025 14:37:03.147994041 CET53470838.8.8.8192.168.2.14
                            Jan 11, 2025 14:37:05.761117935 CET3386353192.168.2.148.8.8.8
                            Jan 11, 2025 14:37:05.768507004 CET53338638.8.8.8192.168.2.14
                            Jan 11, 2025 14:37:07.406563997 CET3952553192.168.2.148.8.8.8
                            Jan 11, 2025 14:37:07.413889885 CET53395258.8.8.8192.168.2.14
                            Jan 11, 2025 14:37:12.043967962 CET5972253192.168.2.148.8.8.8
                            Jan 11, 2025 14:37:12.051507950 CET53597228.8.8.8192.168.2.14
                            Jan 11, 2025 14:37:14.674379110 CET5033753192.168.2.148.8.8.8
                            Jan 11, 2025 14:37:14.681870937 CET53503378.8.8.8192.168.2.14
                            Jan 11, 2025 14:37:22.298444033 CET4214453192.168.2.148.8.8.8
                            Jan 11, 2025 14:37:22.305850983 CET53421448.8.8.8192.168.2.14
                            Jan 11, 2025 14:37:28.932192087 CET5777353192.168.2.148.8.8.8
                            Jan 11, 2025 14:37:28.938663960 CET53577738.8.8.8192.168.2.14
                            Jan 11, 2025 14:37:34.640110970 CET3640053192.168.2.148.8.8.8
                            Jan 11, 2025 14:37:34.647562027 CET53364008.8.8.8192.168.2.14
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 11, 2025 14:35:31.935192108 CET192.168.2.148.8.8.80xb575Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:35:36.566879988 CET192.168.2.148.8.8.80x1d84Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:35:43.182403088 CET192.168.2.148.8.8.80xb824Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:35:46.839849949 CET192.168.2.148.8.8.80xa5aaStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:35:52.458425045 CET192.168.2.148.8.8.80x7ec7Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:35:57.103904009 CET192.168.2.148.8.8.80x1a52Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:07.720966101 CET192.168.2.148.8.8.80xb86fStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:13.331721067 CET192.168.2.148.8.8.80xda4Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:22.946063995 CET192.168.2.148.8.8.80x30c4Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:30.597470045 CET192.168.2.148.8.8.80xe287Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:40.226635933 CET192.168.2.148.8.8.80x6900Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:49.874506950 CET192.168.2.148.8.8.80x2d93Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:56.492189884 CET192.168.2.148.8.8.80x1bbStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:03.140463114 CET192.168.2.148.8.8.80x7129Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:05.761117935 CET192.168.2.148.8.8.80xbc4bStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:07.406563997 CET192.168.2.148.8.8.80x9fa3Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:12.043967962 CET192.168.2.148.8.8.80xd968Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:14.674379110 CET192.168.2.148.8.8.80xf6feStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:22.298444033 CET192.168.2.148.8.8.80x5bb2Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:28.932192087 CET192.168.2.148.8.8.80x1824Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:34.640110970 CET192.168.2.148.8.8.80x93a3Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 11, 2025 14:35:31.942370892 CET8.8.8.8192.168.2.140xb575No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:35:36.574259996 CET8.8.8.8192.168.2.140x1d84No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:35:43.192728996 CET8.8.8.8192.168.2.140xb824No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:35:46.847029924 CET8.8.8.8192.168.2.140xa5aaNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:35:52.466031075 CET8.8.8.8192.168.2.140x7ec7No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:35:57.111346006 CET8.8.8.8192.168.2.140x1a52No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:07.728163004 CET8.8.8.8192.168.2.140xb86fNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:13.338638067 CET8.8.8.8192.168.2.140xda4No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:22.954870939 CET8.8.8.8192.168.2.140x30c4No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:30.604836941 CET8.8.8.8192.168.2.140xe287No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:40.233839989 CET8.8.8.8192.168.2.140x6900No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:49.881719112 CET8.8.8.8192.168.2.140x2d93No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:36:56.503216982 CET8.8.8.8192.168.2.140x1bbNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:03.147994041 CET8.8.8.8192.168.2.140x7129No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:05.768507004 CET8.8.8.8192.168.2.140xbc4bNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:07.413889885 CET8.8.8.8192.168.2.140x9fa3No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:12.051507950 CET8.8.8.8192.168.2.140xd968No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:14.681870937 CET8.8.8.8192.168.2.140xf6feNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:22.305850983 CET8.8.8.8192.168.2.140x5bb2No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:28.938663960 CET8.8.8.8192.168.2.140x1824No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                            Jan 11, 2025 14:37:34.647562027 CET8.8.8.8192.168.2.140x93a3No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false

                            System Behavior

                            Start time (UTC):13:35:31
                            Start date (UTC):11/01/2025
                            Path:/tmp/sh4.elf
                            Arguments:/tmp/sh4.elf
                            File size:4139976 bytes
                            MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                            Start time (UTC):13:35:31
                            Start date (UTC):11/01/2025
                            Path:/tmp/sh4.elf
                            Arguments:-
                            File size:4139976 bytes
                            MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                            Start time (UTC):13:35:31
                            Start date (UTC):11/01/2025
                            Path:/tmp/sh4.elf
                            Arguments:-
                            File size:4139976 bytes
                            MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                            Start time (UTC):13:35:31
                            Start date (UTC):11/01/2025
                            Path:/tmp/sh4.elf
                            Arguments:-
                            File size:4139976 bytes
                            MD5 hash:8943e5f8f8c280467b4472c15ae93ba9

                            Start time (UTC):13:35:31
                            Start date (UTC):11/01/2025
                            Path:/tmp/sh4.elf
                            Arguments:-
                            File size:4139976 bytes
                            MD5 hash:8943e5f8f8c280467b4472c15ae93ba9