Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
ppc.elf

Overview

General Information

Sample name:ppc.elf
Analysis ID:1589166
MD5:b3d599e248dc77055c2b43756660cbe6
SHA1:448a8f13491f19ed94a391f5597db1c0e4df4a38
SHA256:779d005b4a5834d7c5020b5da5ed17332afc12d64fa7ce3e3bf0c39fa8efdda7
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589166
Start date and time:2025-01-11 14:36:24 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 34s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ppc.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@21/0
Command:/tmp/ppc.elf
PID:5530
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • ppc.elf (PID: 5530, Parent: 5448, MD5: ae65271c943d3451b7f026d1fadccea6) Arguments: /tmp/ppc.elf
    • ppc.elf New Fork (PID: 5532, Parent: 5530)
      • ppc.elf New Fork (PID: 5534, Parent: 5532)
      • ppc.elf New Fork (PID: 5536, Parent: 5532)
        • ppc.elf New Fork (PID: 5538, Parent: 5536)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
ppc.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    ppc.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      ppc.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xbddc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbdf0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbe04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbe18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbe2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbe40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbe54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbe68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbe7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbe90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbea4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbeb8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbecc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbee0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbef4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbf08:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbf1c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbf30:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbf44:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbf58:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xbf6c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      5530.1.00007f48ac001000.00007f48ac00f000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5530.1.00007f48ac001000.00007f48ac00f000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5530.1.00007f48ac001000.00007f48ac00f000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xbddc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbdf0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbe04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbe18:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbe2c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbe40:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbe54:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbe68:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbe7c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbe90:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbea4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbeb8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbecc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbee0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbef4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbf08:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbf1c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbf30:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbf44:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbf58:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xbf6c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Process Memory Space: ppc.elf PID: 5530JoeSecurity_MoobotYara detected MoobotJoe Security
            Process Memory Space: ppc.elf PID: 5530JoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Click to see the 1 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-11T14:37:20.144464+010020304911Malware Command and Control Activity Detected192.168.2.1549326154.213.187.1181314TCP
              2025-01-11T14:37:26.704239+010020304911Malware Command and Control Activity Detected192.168.2.1549328154.213.187.1181314TCP
              2025-01-11T14:37:29.340574+010020304911Malware Command and Control Activity Detected192.168.2.1549330154.213.187.1181314TCP
              2025-01-11T14:37:37.990228+010020304911Malware Command and Control Activity Detected192.168.2.1549332154.213.187.1181314TCP
              2025-01-11T14:37:39.626471+010020304911Malware Command and Control Activity Detected192.168.2.1549334154.213.187.1181314TCP
              2025-01-11T14:37:43.894748+010020304911Malware Command and Control Activity Detected192.168.2.1549336154.213.187.1181314TCP
              2025-01-11T14:37:50.503260+010020304911Malware Command and Control Activity Detected192.168.2.1549338154.213.187.1181314TCP
              2025-01-11T14:37:52.140446+010020304911Malware Command and Control Activity Detected192.168.2.1549340154.213.187.1181314TCP
              2025-01-11T14:37:56.788515+010020304911Malware Command and Control Activity Detected192.168.2.1549342154.213.187.1181314TCP
              2025-01-11T14:38:00.473363+010020304911Malware Command and Control Activity Detected192.168.2.1549344154.213.187.1181314TCP
              2025-01-11T14:38:11.094959+010020304911Malware Command and Control Activity Detected192.168.2.1549346154.213.187.1181314TCP
              2025-01-11T14:38:21.727694+010020304911Malware Command and Control Activity Detected192.168.2.1549348154.213.187.1181314TCP
              2025-01-11T14:38:32.374550+010020304911Malware Command and Control Activity Detected192.168.2.1549350154.213.187.1181314TCP
              2025-01-11T14:38:41.012926+010020304911Malware Command and Control Activity Detected192.168.2.1549352154.213.187.1181314TCP
              2025-01-11T14:38:45.622675+010020304911Malware Command and Control Activity Detected192.168.2.1549354154.213.187.1181314TCP
              2025-01-11T14:38:53.249835+010020304911Malware Command and Control Activity Detected192.168.2.1549356154.213.187.1181314TCP
              2025-01-11T14:39:00.921303+010020304911Malware Command and Control Activity Detected192.168.2.1549358154.213.187.1181314TCP
              2025-01-11T14:39:08.550940+010020304911Malware Command and Control Activity Detected192.168.2.1549360154.213.187.1181314TCP
              2025-01-11T14:39:13.190714+010020304911Malware Command and Control Activity Detected192.168.2.1549362154.213.187.1181314TCP
              2025-01-11T14:39:17.830656+010020304911Malware Command and Control Activity Detected192.168.2.1549364154.213.187.1181314TCP
              2025-01-11T14:39:21.461150+010020304911Malware Command and Control Activity Detected192.168.2.1549366154.213.187.1181314TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: ppc.elfAvira: detected
              Source: ppc.elfReversingLabs: Detection: 60%

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49346 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49338 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49358 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49330 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49336 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49366 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49334 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49342 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49356 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49340 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49348 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49352 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49364 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49328 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49344 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49362 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49332 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49354 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49326 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49350 -> 154.213.187.118:1314
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.15:49360 -> 154.213.187.118:1314
              Source: global trafficTCP traffic: 192.168.2.15:49326 -> 154.213.187.118:1314
              Source: global trafficDNS traffic detected: DNS query: webhorizon.icu

              System Summary

              barindex
              Source: ppc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5530.1.00007f48ac001000.00007f48ac00f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: ppc.elf PID: 5530, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: ppc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5530.1.00007f48ac001000.00007f48ac00f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: ppc.elf PID: 5530, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@21/0
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/231/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/233/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/1333/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/1695/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/911/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/914/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/19/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/1591/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/246/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/5/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/1585/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/7/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/129/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/8/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/3884/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/802/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/804/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/3407/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/1484/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/131/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/133/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/1479/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/378/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/931/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/1595/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/812/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/933/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/3419/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/35/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/3310/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/260/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/261/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/262/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/142/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/263/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/264/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/265/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/145/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/266/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/267/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/268/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/3303/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/269/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/1486/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/1806/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/3440/cmdlineJump to behavior
              Source: /tmp/ppc.elf (PID: 5534)File opened: /proc/270/cmdlineJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: /tmp/ppc.elf (PID: 5530)File: /tmp/ppc.elfJump to behavior
              Source: /tmp/ppc.elf (PID: 5530)Queries kernel information via 'uname': Jump to behavior
              Source: ppc.elf, 5530.1.0000561c25a1a000.0000561c25aca000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc11!hotpluggableq
              Source: ppc.elf, 5530.1.00007ffd783ca000.00007ffd783eb000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-ppc/tmp/ppc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/ppc.elf
              Source: ppc.elf, 5530.1.0000561c25a1a000.0000561c25aca000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
              Source: ppc.elf, 5530.1.00007ffd783ca000.00007ffd783eb000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: ppc.elf, type: SAMPLE
              Source: Yara matchFile source: 5530.1.00007f48ac001000.00007f48ac00f000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: ppc.elf PID: 5530, type: MEMORYSTR
              Source: Yara matchFile source: ppc.elf, type: SAMPLE
              Source: Yara matchFile source: 5530.1.00007f48ac001000.00007f48ac00f000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: ppc.elf PID: 5530, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: Yara matchFile source: ppc.elf, type: SAMPLE
              Source: Yara matchFile source: 5530.1.00007f48ac001000.00007f48ac00f000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: ppc.elf PID: 5530, type: MEMORYSTR
              Source: Yara matchFile source: ppc.elf, type: SAMPLE
              Source: Yara matchFile source: 5530.1.00007f48ac001000.00007f48ac00f000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: ppc.elf PID: 5530, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
              File Deletion
              1
              OS Credential Dumping
              11
              Security Software Discovery
              Remote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589166 Sample: ppc.elf Startdate: 11/01/2025 Architecture: LINUX Score: 100 20 webhorizon.icu 154.213.187.118, 1314, 49326, 49328 DDOSING-BGP-NETWORKUS Seychelles 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 4 other signatures 2->28 9 ppc.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 ppc.elf 9->12         started        process6 process7 14 ppc.elf 12->14         started        16 ppc.elf 12->16         started        process8 18 ppc.elf 14->18         started       
              SourceDetectionScannerLabelLink
              ppc.elf61%ReversingLabsLinux.Trojan.Mirai
              ppc.elf100%AviraEXP/ELF.Mirai.Z.A
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              webhorizon.icu
              154.213.187.118
              truefalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                154.213.187.118
                webhorizon.icuSeychelles
                22769DDOSING-BGP-NETWORKUSfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                154.213.187.118sh4.elfGet hashmaliciousMirai, MoobotBrowse
                  arm.elfGet hashmaliciousMirai, MoobotBrowse
                    m68k.elfGet hashmaliciousMirai, MoobotBrowse
                      x86.elfGet hashmaliciousMirai, MoobotBrowse
                        mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                          mips.elfGet hashmaliciousMirai, MoobotBrowse
                            x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              webhorizon.icush4.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              arm.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              m68k.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              x86.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              mips.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              arm.elfGet hashmaliciousMirai, MoobotBrowse
                              • 38.55.246.3
                              m68k.elfGet hashmaliciousMirai, MoobotBrowse
                              • 38.55.246.3
                              ppc.elfGet hashmaliciousMirai, MoobotBrowse
                              • 38.55.246.3
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              DDOSING-BGP-NETWORKUSsh4.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              arm.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              m68k.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              x86.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              mips.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                              • 154.213.187.118
                              4.elfGet hashmaliciousUnknownBrowse
                              • 41.93.138.131
                              armv5l.elfGet hashmaliciousUnknownBrowse
                              • 41.93.222.47
                              gmpsl.elfGet hashmaliciousUnknownBrowse
                              • 154.213.187.125
                              No context
                              No context
                              No created / dropped files found
                              File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
                              Entropy (8bit):6.236003161813702
                              TrID:
                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                              File name:ppc.elf
                              File size:56'384 bytes
                              MD5:b3d599e248dc77055c2b43756660cbe6
                              SHA1:448a8f13491f19ed94a391f5597db1c0e4df4a38
                              SHA256:779d005b4a5834d7c5020b5da5ed17332afc12d64fa7ce3e3bf0c39fa8efdda7
                              SHA512:ec4ddfb0e20107670bdf3a718cc4c2d36ee89125793f7e8a5fd27ff9d7febed63c0f6ede49cfeedc3032f43451376ebad70e0a09c833c614e831c5d2c7a001f6
                              SSDEEP:768:JfsrmjuyuRP4R1I0mQC/N4IICBKepcC9NEIs9+m1HVOjvYggGK0FRxtrSEwnkIY:VsIuy80cI6Keacmf+MVyYgg5Ix5Ynk7
                              TLSH:B2434A02B31C0E47C0A35970263F5BD097BEA5E022E4F685351F9B969A72E371486FCD
                              File Content Preview:.ELF...........................4...`.....4. ...(.......................................................h..%0........dt.Q.............................!..|......$H...H......$8!. |...N.. .!..|.......?..........t..../...@..\?........+../...A..$8...})......N..

                              ELF header

                              Class:ELF32
                              Data:2's complement, big endian
                              Version:1 (current)
                              Machine:PowerPC
                              Version Number:0x1
                              Type:EXEC (Executable file)
                              OS/ABI:UNIX - System V
                              ABI Version:0
                              Entry Point Address:0x100001f0
                              Flags:0x0
                              ELF Header Size:52
                              Program Header Offset:52
                              Program Header Size:32
                              Number of Program Headers:3
                              Section Header Offset:55904
                              Section Header Size:40
                              Number of Section Headers:12
                              Header String Table Index:11
                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                              NULL0x00x00x00x00x0000
                              .initPROGBITS0x100000940x940x240x00x6AX004
                              .textPROGBITS0x100000b80xb80xbc280x00x6AX004
                              .finiPROGBITS0x1000bce00xbce00x200x00x6AX004
                              .rodataPROGBITS0x1000bd000xbd000x19a80x00x2A008
                              .ctorsPROGBITS0x1001d6ac0xd6ac0x80x00x3WA004
                              .dtorsPROGBITS0x1001d6b40xd6b40x80x00x3WA004
                              .dataPROGBITS0x1001d6c00xd6c00x3140x00x3WA008
                              .sdataPROGBITS0x1001d9d40xd9d40x400x00x3WA004
                              .sbssNOBITS0x1001da140xda140x600x00x3WA004
                              .bssNOBITS0x1001da740xda140x21680x00x3WA004
                              .shstrtabSTRTAB0x00xda140x4b0x00x0001
                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                              LOAD0x00x100000000x100000000xd6a80xd6a86.29050x5R E0x10000.init .text .fini .rodata
                              LOAD0xd6ac0x1001d6ac0x1001d6ac0x3680x25302.82820x6RW 0x10000.ctors .dtors .data .sdata .sbss .bss
                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2025-01-11T14:37:20.144464+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549326154.213.187.1181314TCP
                              2025-01-11T14:37:26.704239+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549328154.213.187.1181314TCP
                              2025-01-11T14:37:29.340574+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549330154.213.187.1181314TCP
                              2025-01-11T14:37:37.990228+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549332154.213.187.1181314TCP
                              2025-01-11T14:37:39.626471+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549334154.213.187.1181314TCP
                              2025-01-11T14:37:43.894748+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549336154.213.187.1181314TCP
                              2025-01-11T14:37:50.503260+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549338154.213.187.1181314TCP
                              2025-01-11T14:37:52.140446+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549340154.213.187.1181314TCP
                              2025-01-11T14:37:56.788515+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549342154.213.187.1181314TCP
                              2025-01-11T14:38:00.473363+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549344154.213.187.1181314TCP
                              2025-01-11T14:38:11.094959+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549346154.213.187.1181314TCP
                              2025-01-11T14:38:21.727694+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549348154.213.187.1181314TCP
                              2025-01-11T14:38:32.374550+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549350154.213.187.1181314TCP
                              2025-01-11T14:38:41.012926+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549352154.213.187.1181314TCP
                              2025-01-11T14:38:45.622675+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549354154.213.187.1181314TCP
                              2025-01-11T14:38:53.249835+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549356154.213.187.1181314TCP
                              2025-01-11T14:39:00.921303+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549358154.213.187.1181314TCP
                              2025-01-11T14:39:08.550940+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549360154.213.187.1181314TCP
                              2025-01-11T14:39:13.190714+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549362154.213.187.1181314TCP
                              2025-01-11T14:39:17.830656+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549364154.213.187.1181314TCP
                              2025-01-11T14:39:21.461150+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1549366154.213.187.1181314TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 11, 2025 14:37:20.071774006 CET493261314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:20.076643944 CET131449326154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:20.076706886 CET493261314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:20.144464016 CET493261314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:20.149369955 CET131449326154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:20.683222055 CET131449326154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:20.683521032 CET493261314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:20.688441992 CET131449326154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:26.698184013 CET493281314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:26.703165054 CET131449328154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:26.703283072 CET493281314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:26.704238892 CET493281314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:26.709168911 CET131449328154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:27.324722052 CET131449328154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:27.325026035 CET493281314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:27.329883099 CET131449328154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:29.334644079 CET493301314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:29.339472055 CET131449330154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:29.339524031 CET493301314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:29.340574026 CET493301314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:29.345335960 CET131449330154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:29.973100901 CET131449330154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:29.973387957 CET493301314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:29.978311062 CET131449330154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:37.984225035 CET493321314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:37.989126921 CET131449332154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:37.989232063 CET493321314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:37.990227938 CET493321314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:37.995058060 CET131449332154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:38.609203100 CET131449332154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:38.609500885 CET493321314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:38.614435911 CET131449332154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:39.620393038 CET493341314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:39.625315905 CET131449334154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:39.625397921 CET493341314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:39.626471043 CET493341314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:39.631282091 CET131449334154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:40.233290911 CET131449334154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:40.233583927 CET493341314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:40.238497972 CET131449334154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:43.889040947 CET493361314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:43.893873930 CET131449336154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:43.893928051 CET493361314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:43.894747972 CET493361314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:43.899544001 CET131449336154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:44.486515045 CET131449336154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:44.486712933 CET493361314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:44.491687059 CET131449336154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:50.497199059 CET493381314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:50.502137899 CET131449338154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:50.502209902 CET493381314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:50.503259897 CET493381314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:50.508121014 CET131449338154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:51.122910976 CET131449338154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:51.123188972 CET493381314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:51.128129959 CET131449338154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:52.133912086 CET493401314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:52.139131069 CET131449340154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:52.139219999 CET493401314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:52.140445948 CET493401314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:52.145550013 CET131449340154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:52.770495892 CET131449340154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:52.770616055 CET493401314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:52.775578022 CET131449340154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:56.782438040 CET493421314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:56.787343025 CET131449342154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:56.787425995 CET493421314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:56.788515091 CET493421314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:56.793330908 CET131449342154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:57.456350088 CET131449342154.213.187.118192.168.2.15
                              Jan 11, 2025 14:37:57.456681013 CET493421314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:37:57.461585999 CET131449342154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:00.467171907 CET493441314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:00.472193956 CET131449344154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:00.472279072 CET493441314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:00.473362923 CET493441314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:00.478176117 CET131449344154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:01.076854944 CET131449344154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:01.077092886 CET493441314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:01.077142000 CET493441314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:01.082298040 CET131449344154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:11.088641882 CET493461314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:11.093595028 CET131449346154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:11.093684912 CET493461314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:11.094959021 CET493461314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:11.099818945 CET131449346154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:11.708081961 CET131449346154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:11.708565950 CET493461314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:11.713563919 CET131449346154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:21.721528053 CET493481314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:21.726394892 CET131449348154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:21.726481915 CET493481314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:21.727694035 CET493481314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:21.732546091 CET131449348154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:22.357040882 CET131449348154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:22.357491016 CET493481314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:22.362406015 CET131449348154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:32.368401051 CET493501314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:32.373295069 CET131449350154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:32.373399019 CET493501314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:32.374550104 CET493501314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:32.379371881 CET131449350154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:32.994812012 CET131449350154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:32.995089054 CET493501314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:33.000303030 CET131449350154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:41.006342888 CET493521314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:41.011820078 CET131449352154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:41.011894941 CET493521314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:41.012926102 CET493521314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:41.017762899 CET131449352154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:41.606625080 CET131449352154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:41.606908083 CET493521314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:41.611826897 CET131449352154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:45.616902113 CET493541314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:45.621723890 CET131449354154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:45.621794939 CET493541314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:45.622674942 CET493541314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:45.627440929 CET131449354154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:46.232922077 CET131449354154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:46.233125925 CET493541314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:46.238086939 CET131449354154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:53.243833065 CET493561314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:53.248760939 CET131449356154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:53.248871088 CET493561314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:53.249835014 CET493561314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:53.254667997 CET131449356154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:53.902228117 CET131449356154.213.187.118192.168.2.15
                              Jan 11, 2025 14:38:53.902499914 CET493561314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:38:53.907361031 CET131449356154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:00.914891005 CET493581314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:00.919878960 CET131449358154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:00.919990063 CET493581314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:00.921303034 CET493581314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:00.926151991 CET131449358154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:01.531404972 CET131449358154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:01.531711102 CET493581314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:01.536672115 CET131449358154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:08.544578075 CET493601314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:08.549509048 CET131449360154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:08.549592972 CET493601314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:08.550940037 CET493601314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:08.555809975 CET131449360154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:09.171919107 CET131449360154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:09.172346115 CET493601314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:09.177390099 CET131449360154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:13.184186935 CET493621314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:13.189105034 CET131449362154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:13.189177990 CET493621314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:13.190713882 CET493621314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:13.195549965 CET131449362154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:13.811981916 CET131449362154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:13.812437057 CET493621314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:13.817452908 CET131449362154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:17.824249029 CET493641314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:17.829185963 CET131449364154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:17.829307079 CET493641314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:17.830656052 CET493641314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:17.835570097 CET131449364154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:18.444502115 CET131449364154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:18.444684982 CET493641314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:18.449598074 CET131449364154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:21.454878092 CET493661314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:21.459747076 CET131449366154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:21.459878922 CET493661314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:21.461149931 CET493661314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:21.465975046 CET131449366154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:22.063462019 CET131449366154.213.187.118192.168.2.15
                              Jan 11, 2025 14:39:22.063739061 CET493661314192.168.2.15154.213.187.118
                              Jan 11, 2025 14:39:22.068603992 CET131449366154.213.187.118192.168.2.15
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 11, 2025 14:37:20.063010931 CET3321153192.168.2.158.8.8.8
                              Jan 11, 2025 14:37:20.070044041 CET53332118.8.8.8192.168.2.15
                              Jan 11, 2025 14:37:26.689985991 CET5238553192.168.2.158.8.8.8
                              Jan 11, 2025 14:37:26.697346926 CET53523858.8.8.8192.168.2.15
                              Jan 11, 2025 14:37:29.327631950 CET5583953192.168.2.158.8.8.8
                              Jan 11, 2025 14:37:29.334098101 CET53558398.8.8.8192.168.2.15
                              Jan 11, 2025 14:37:37.976552963 CET5311753192.168.2.158.8.8.8
                              Jan 11, 2025 14:37:37.983664036 CET53531178.8.8.8192.168.2.15
                              Jan 11, 2025 14:37:39.612909079 CET4743653192.168.2.158.8.8.8
                              Jan 11, 2025 14:37:39.619802952 CET53474368.8.8.8192.168.2.15
                              Jan 11, 2025 14:37:43.236082077 CET5104153192.168.2.158.8.8.8
                              Jan 11, 2025 14:37:43.888150930 CET53510418.8.8.8192.168.2.15
                              Jan 11, 2025 14:37:50.489368916 CET4600553192.168.2.158.8.8.8
                              Jan 11, 2025 14:37:50.496637106 CET53460058.8.8.8192.168.2.15
                              Jan 11, 2025 14:37:52.126135111 CET5475453192.168.2.158.8.8.8
                              Jan 11, 2025 14:37:52.133254051 CET53547548.8.8.8192.168.2.15
                              Jan 11, 2025 14:37:56.773171902 CET4566053192.168.2.158.8.8.8
                              Jan 11, 2025 14:37:56.781805038 CET53456608.8.8.8192.168.2.15
                              Jan 11, 2025 14:38:00.459737062 CET3304753192.168.2.158.8.8.8
                              Jan 11, 2025 14:38:00.466514111 CET53330478.8.8.8192.168.2.15
                              Jan 11, 2025 14:38:11.080262899 CET4920553192.168.2.158.8.8.8
                              Jan 11, 2025 14:38:11.087889910 CET53492058.8.8.8192.168.2.15
                              Jan 11, 2025 14:38:21.712114096 CET3615553192.168.2.158.8.8.8
                              Jan 11, 2025 14:38:21.720881939 CET53361558.8.8.8192.168.2.15
                              Jan 11, 2025 14:38:32.360654116 CET3414453192.168.2.158.8.8.8
                              Jan 11, 2025 14:38:32.367649078 CET53341448.8.8.8192.168.2.15
                              Jan 11, 2025 14:38:40.998327971 CET3941553192.168.2.158.8.8.8
                              Jan 11, 2025 14:38:41.005542040 CET53394158.8.8.8192.168.2.15
                              Jan 11, 2025 14:38:45.609468937 CET5943753192.168.2.158.8.8.8
                              Jan 11, 2025 14:38:45.616348982 CET53594378.8.8.8192.168.2.15
                              Jan 11, 2025 14:38:53.236015081 CET4821453192.168.2.158.8.8.8
                              Jan 11, 2025 14:38:53.243232012 CET53482148.8.8.8192.168.2.15
                              Jan 11, 2025 14:39:00.906372070 CET5472353192.168.2.158.8.8.8
                              Jan 11, 2025 14:39:00.914084911 CET53547238.8.8.8192.168.2.15
                              Jan 11, 2025 14:39:08.536173105 CET3325753192.168.2.158.8.8.8
                              Jan 11, 2025 14:39:08.543513060 CET53332578.8.8.8192.168.2.15
                              Jan 11, 2025 14:39:13.176162004 CET4172753192.168.2.158.8.8.8
                              Jan 11, 2025 14:39:13.183348894 CET53417278.8.8.8192.168.2.15
                              Jan 11, 2025 14:39:17.816025972 CET4384253192.168.2.158.8.8.8
                              Jan 11, 2025 14:39:17.823520899 CET53438428.8.8.8192.168.2.15
                              Jan 11, 2025 14:39:21.447763920 CET5577353192.168.2.158.8.8.8
                              Jan 11, 2025 14:39:21.454197884 CET53557738.8.8.8192.168.2.15
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 11, 2025 14:37:20.063010931 CET192.168.2.158.8.8.80xd547Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:26.689985991 CET192.168.2.158.8.8.80xe28bStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:29.327631950 CET192.168.2.158.8.8.80x52e6Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:37.976552963 CET192.168.2.158.8.8.80x4799Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:39.612909079 CET192.168.2.158.8.8.80x2052Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:43.236082077 CET192.168.2.158.8.8.80x7b47Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:50.489368916 CET192.168.2.158.8.8.80x1043Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:52.126135111 CET192.168.2.158.8.8.80x9cbaStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:56.773171902 CET192.168.2.158.8.8.80xa940Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:00.459737062 CET192.168.2.158.8.8.80x4c0cStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:11.080262899 CET192.168.2.158.8.8.80x534fStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:21.712114096 CET192.168.2.158.8.8.80x4992Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:32.360654116 CET192.168.2.158.8.8.80x432dStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:40.998327971 CET192.168.2.158.8.8.80x954bStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:45.609468937 CET192.168.2.158.8.8.80x3680Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:53.236015081 CET192.168.2.158.8.8.80x8f0dStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:39:00.906372070 CET192.168.2.158.8.8.80x95f3Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:39:08.536173105 CET192.168.2.158.8.8.80x901fStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:39:13.176162004 CET192.168.2.158.8.8.80xac2Standard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:39:17.816025972 CET192.168.2.158.8.8.80x912bStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:39:21.447763920 CET192.168.2.158.8.8.80x301bStandard query (0)webhorizon.icuA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 11, 2025 14:37:20.070044041 CET8.8.8.8192.168.2.150xd547No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:26.697346926 CET8.8.8.8192.168.2.150xe28bNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:29.334098101 CET8.8.8.8192.168.2.150x52e6No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:37.983664036 CET8.8.8.8192.168.2.150x4799No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:39.619802952 CET8.8.8.8192.168.2.150x2052No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:43.888150930 CET8.8.8.8192.168.2.150x7b47No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:50.496637106 CET8.8.8.8192.168.2.150x1043No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:52.133254051 CET8.8.8.8192.168.2.150x9cbaNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:37:56.781805038 CET8.8.8.8192.168.2.150xa940No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:00.466514111 CET8.8.8.8192.168.2.150x4c0cNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:11.087889910 CET8.8.8.8192.168.2.150x534fNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:21.720881939 CET8.8.8.8192.168.2.150x4992No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:32.367649078 CET8.8.8.8192.168.2.150x432dNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:41.005542040 CET8.8.8.8192.168.2.150x954bNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:45.616348982 CET8.8.8.8192.168.2.150x3680No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:38:53.243232012 CET8.8.8.8192.168.2.150x8f0dNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:39:00.914084911 CET8.8.8.8192.168.2.150x95f3No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:39:08.543513060 CET8.8.8.8192.168.2.150x901fNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:39:13.183348894 CET8.8.8.8192.168.2.150xac2No error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:39:17.823520899 CET8.8.8.8192.168.2.150x912bNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:39:21.454197884 CET8.8.8.8192.168.2.150x301bNo error (0)webhorizon.icu154.213.187.118A (IP address)IN (0x0001)false

                              System Behavior

                              Start time (UTC):13:37:19
                              Start date (UTC):11/01/2025
                              Path:/tmp/ppc.elf
                              Arguments:/tmp/ppc.elf
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6

                              Start time (UTC):13:37:19
                              Start date (UTC):11/01/2025
                              Path:/tmp/ppc.elf
                              Arguments:-
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6

                              Start time (UTC):13:37:19
                              Start date (UTC):11/01/2025
                              Path:/tmp/ppc.elf
                              Arguments:-
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6

                              Start time (UTC):13:37:19
                              Start date (UTC):11/01/2025
                              Path:/tmp/ppc.elf
                              Arguments:-
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6

                              Start time (UTC):13:37:19
                              Start date (UTC):11/01/2025
                              Path:/tmp/ppc.elf
                              Arguments:-
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6