Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
ppc.elf

Overview

General Information

Sample name:ppc.elf
Analysis ID:1589172
MD5:96a6a7e8bb5f6ac029f53108e8c192c2
SHA1:1fb712b1ad5e25c5ad3d2aaa99a1d7f40ec50c49
SHA256:dabce5d0089398dbd63a4e4b9a8e0359f3e22ca283938d4c194392178f9d4185
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Connects to many ports of the same IP (likely port scanning)
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589172
Start date and time:2025-01-11 14:46:40 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ppc.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@15/0
  • VT rate limit hit for: update.byeux.com
Command:/tmp/ppc.elf
PID:5494
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • ppc.elf (PID: 5494, Parent: 5417, MD5: ae65271c943d3451b7f026d1fadccea6) Arguments: /tmp/ppc.elf
    • ppc.elf New Fork (PID: 5496, Parent: 5494)
      • ppc.elf New Fork (PID: 5498, Parent: 5496)
      • ppc.elf New Fork (PID: 5499, Parent: 5496)
        • ppc.elf New Fork (PID: 5502, Parent: 5499)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
ppc.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    ppc.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      ppc.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xb44c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb460:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb474:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb488:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb49c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb4b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb4c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb4d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb4ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb500:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb514:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb528:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb53c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb550:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb564:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb578:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb58c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb5a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb5b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb5c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xb5dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      5494.1.00007ff9a4001000.00007ff9a400e000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5494.1.00007ff9a4001000.00007ff9a400e000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5494.1.00007ff9a4001000.00007ff9a400e000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xb44c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb460:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb474:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb488:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb49c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb4b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb4c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb4d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb4ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb500:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb514:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb528:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb53c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb550:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb564:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb578:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb58c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb5a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb5b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb5c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xb5dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Process Memory Space: ppc.elf PID: 5494JoeSecurity_Mirai_8Yara detected MiraiJoe Security
            Process Memory Space: ppc.elf PID: 5494Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
            • 0x1266c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x12680:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x12694:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x126a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x126bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x126d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x126e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x126f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x1270c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x12720:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x12734:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x12748:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x1275c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x12770:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x12784:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x12798:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x127ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x127c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x127d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x127e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0x127fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-11T14:47:50.756454+010020304911Malware Command and Control Activity Detected192.168.2.1344712107.189.4.20158431TCP
            2025-01-11T14:47:57.415151+010020304911Malware Command and Control Activity Detected192.168.2.1344714107.189.4.20158431TCP
            2025-01-11T14:48:03.106869+010020304911Malware Command and Control Activity Detected192.168.2.1344716107.189.4.20158431TCP
            2025-01-11T14:48:05.780077+010020304911Malware Command and Control Activity Detected192.168.2.1344718107.189.4.20158431TCP
            2025-01-11T14:48:09.446965+010020304911Malware Command and Control Activity Detected192.168.2.1344720107.189.4.20158431TCP
            2025-01-11T14:48:21.104812+010020304911Malware Command and Control Activity Detected192.168.2.1344722107.189.4.20158431TCP
            2025-01-11T14:48:29.772764+010020304911Malware Command and Control Activity Detected192.168.2.1344724107.189.4.20158431TCP
            2025-01-11T14:48:41.435134+010020304911Malware Command and Control Activity Detected192.168.2.1344726107.189.4.20158431TCP
            2025-01-11T14:48:53.089933+010020304911Malware Command and Control Activity Detected192.168.2.1344728107.189.4.20158431TCP
            2025-01-11T14:49:04.743111+010020304911Malware Command and Control Activity Detected192.168.2.1344730107.189.4.20158431TCP
            2025-01-11T14:49:13.405984+010020304911Malware Command and Control Activity Detected192.168.2.1344732107.189.4.20158431TCP
            2025-01-11T14:49:18.151186+010020304911Malware Command and Control Activity Detected192.168.2.1344734107.189.4.20158431TCP
            2025-01-11T14:49:28.814289+010020304911Malware Command and Control Activity Detected192.168.2.1344736107.189.4.20158431TCP
            2025-01-11T14:49:36.466803+010020304911Malware Command and Control Activity Detected192.168.2.1344738107.189.4.20158431TCP
            2025-01-11T14:49:45.119291+010020304911Malware Command and Control Activity Detected192.168.2.1344740107.189.4.20158431TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: ppc.elfAvira: detected
            Source: ppc.elfVirustotal: Detection: 64%Perma Link
            Source: ppc.elfReversingLabs: Detection: 65%

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44728 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44718 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44722 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44714 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44734 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44712 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44736 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44720 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44730 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44732 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44726 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44740 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44738 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44716 -> 107.189.4.201:58431
            Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44724 -> 107.189.4.201:58431
            Source: global trafficTCP traffic: 107.189.4.201 ports 58431,1,3,4,5,8
            Source: global trafficTCP traffic: 192.168.2.13:44712 -> 107.189.4.201:58431
            Source: global trafficDNS traffic detected: DNS query: update.byeux.com

            System Summary

            barindex
            Source: ppc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: 5494.1.00007ff9a4001000.00007ff9a400e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: Process Memory Space: ppc.elf PID: 5494, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: ELF static info symbol of initial sample.symtab present: no
            Source: ppc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: 5494.1.00007ff9a4001000.00007ff9a400e000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: Process Memory Space: ppc.elf PID: 5494, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@15/0
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/230/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/110/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/231/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/111/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/232/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/112/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/233/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/113/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/234/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/114/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/235/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/115/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/236/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/116/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/237/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/117/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/238/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/118/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/239/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/119/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/914/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/10/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/917/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/11/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/12/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/13/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/14/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/15/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/16/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/17/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/18/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/19/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/240/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/3095/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/120/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/241/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/121/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/242/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/1/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/122/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/243/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/2/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/123/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/244/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/3/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/124/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/245/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/1588/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/125/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/4/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/246/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/126/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/5/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/247/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/127/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/6/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/248/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/128/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/7/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/249/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/129/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/8/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/800/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/9/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/1906/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/802/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/803/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/20/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/21/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/22/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/23/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/24/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/25/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/26/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/27/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/28/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/29/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/3420/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/1482/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/490/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/1480/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/250/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/371/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/130/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/251/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/131/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/252/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/132/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/253/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/254/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/1238/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/134/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/255/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/256/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/257/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/378/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/3413/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/258/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/259/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/1475/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/936/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/30/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/816/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/35/cmdlineJump to behavior
            Source: /tmp/ppc.elf (PID: 5498)File opened: /proc/3310/cmdlineJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: /tmp/ppc.elf (PID: 5494)File: /tmp/ppc.elfJump to behavior
            Source: /tmp/ppc.elf (PID: 5494)Queries kernel information via 'uname': Jump to behavior
            Source: ppc.elf, 5494.1.0000562a61693000.0000562a61743000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc11!hotpluggableq
            Source: ppc.elf, 5494.1.00007ffeedb89000.00007ffeedbaa000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-ppc/tmp/ppc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/ppc.elf
            Source: ppc.elf, 5494.1.0000562a61693000.0000562a61743000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
            Source: ppc.elf, 5494.1.00007ffeedb89000.00007ffeedbaa000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: ppc.elf, type: SAMPLE
            Source: Yara matchFile source: 5494.1.00007ff9a4001000.00007ff9a400e000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: ppc.elf PID: 5494, type: MEMORYSTR
            Source: Yara matchFile source: ppc.elf, type: SAMPLE
            Source: Yara matchFile source: 5494.1.00007ff9a4001000.00007ff9a400e000.r-x.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
            Source: Yara matchFile source: ppc.elf, type: SAMPLE
            Source: Yara matchFile source: 5494.1.00007ff9a4001000.00007ff9a400e000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: ppc.elf PID: 5494, type: MEMORYSTR
            Source: Yara matchFile source: ppc.elf, type: SAMPLE
            Source: Yara matchFile source: 5494.1.00007ff9a4001000.00007ff9a400e000.r-x.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
            File Deletion
            1
            OS Credential Dumping
            11
            Security Software Discovery
            Remote ServicesData from Local System1
            Non-Standard Port
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            No configs have been found
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Number of created Files
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589172 Sample: ppc.elf Startdate: 11/01/2025 Architecture: LINUX Score: 100 20 update.byeux.com 107.189.4.201, 44712, 44714, 44716 PONYNETUS United States 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 5 other signatures 2->28 9 ppc.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 ppc.elf 9->12         started        process6 process7 14 ppc.elf 12->14         started        16 ppc.elf 12->16         started        process8 18 ppc.elf 14->18         started       
            SourceDetectionScannerLabelLink
            ppc.elf65%VirustotalBrowse
            ppc.elf66%ReversingLabsLinux.Trojan.Mirai
            ppc.elf100%AviraEXP/ELF.Mirai.Z.A
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            update.byeux.com
            107.189.4.201
            truetrue
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              107.189.4.201
              update.byeux.comUnited States
              53667PONYNETUStrue
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              107.189.4.201spc.elfGet hashmaliciousMirai, MoobotBrowse
                sh4.elfGet hashmaliciousMirai, MoobotBrowse
                  mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                    x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                      x86.elfGet hashmaliciousMirai, MoobotBrowse
                        JVL2bXW1ch.elfGet hashmaliciousMirai, MoobotBrowse
                          arm7.elfGet hashmaliciousMirai, MoobotBrowse
                            mips.elfGet hashmaliciousMirai, MoobotBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              update.byeux.comspc.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              sh4.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              x86.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              JVL2bXW1ch.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              arm7.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              mips.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              PONYNETUSspc.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              sh4.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              uShK30bvrV.exeGet hashmaliciousRemcosBrowse
                              • 172.86.115.221
                              miori.spc.elfGet hashmaliciousUnknownBrowse
                              • 107.189.6.73
                              cZO.exeGet hashmaliciousUnknownBrowse
                              • 107.189.28.6
                              file.exeGet hashmaliciousUnknownBrowse
                              • 205.185.126.56
                              file.exeGet hashmaliciousUnknownBrowse
                              • 205.185.126.56
                              file.exeGet hashmaliciousGhostRat, NitolBrowse
                              • 198.98.57.188
                              lx64.elfGet hashmaliciousUnknownBrowse
                              • 205.185.126.56
                              https://u48917305.ct.sendgrid.net/ls/click?upn=u001.ztQPJiWtq2gO8V-2Ftd7SxY9UCAq3VScTPSloeIw5UEMPd6e3nbPRvJ98moPTqmrdQ1eNbvwZHJ-2BEb4HrooVFNCTltmXW6SgRONKSmPzdFoWfDQT97cczFZ0vj7M2xBd2izDTi-2BL-2BoVqB8yVzV2GW7vOPvy3s9yVghrOS5vs-2BSnWyzJMkXQxVEReq4oLCDet7QAOvo_JkpSD-2Bg6VoLAQppUKMb-2BxDh4v4nbOeQFT31aoN-2FLkhvFCzY6wdlGM7RTNIi47OKR1tTaghG8tTKssArDNPSXAfX9wO6nsZ2FHn-2FunyaOti-2FaII-2FnbKYDXJOImW-2Bs9f4tYnWj8rqO7L0kp4KNRHBDo0iHoL8DEOGc8GMtzqzsIqERel6-2FxJyY4DBnsnUTOc2I4HCPKA6lxcCEXMtxEA1-2FnQ-3D-3DGet hashmaliciousHTMLPhisherBrowse
                              • 198.251.89.144
                              No context
                              No context
                              No created / dropped files found
                              File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
                              Entropy (8bit):6.167371133956945
                              TrID:
                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                              File name:ppc.elf
                              File size:54'676 bytes
                              MD5:96a6a7e8bb5f6ac029f53108e8c192c2
                              SHA1:1fb712b1ad5e25c5ad3d2aaa99a1d7f40ec50c49
                              SHA256:dabce5d0089398dbd63a4e4b9a8e0359f3e22ca283938d4c194392178f9d4185
                              SHA512:7a10ecb6266a734da4379bfed9a2dce9745ab29fb0620eff44957abf290d06dfa3ba1315ddea57444b49fb67fb88e0bef601238dc4127a967d9662ef651e7e69
                              SSDEEP:768:gxvLpkAJEtRMH8F1492zxy4dUh2e9+mIVKgjw09RgyOYFRxtJS1wnhIUW:gZWLLj4ixp2hX+PKc9RgxMxrnnhS
                              TLSH:19334B02B21C0E57C0A35A70253F5BD0D7BEAAD022E4F685351F9B9A96B1E335486FCD
                              File Content Preview:.ELF...........................4.........4. ...(.......................................................h..%0........dt.Q.............................!..|......$H...H..A...$8!. |...N.. .!..|.......?.............../...@..\?........+../...A..$8...})......N..

                              ELF header

                              Class:ELF32
                              Data:2's complement, big endian
                              Version:1 (current)
                              Machine:PowerPC
                              Version Number:0x1
                              Type:EXEC (Executable file)
                              OS/ABI:UNIX - System V
                              ABI Version:0
                              Entry Point Address:0x100001f0
                              Flags:0x0
                              ELF Header Size:52
                              Program Header Offset:52
                              Program Header Size:32
                              Number of Program Headers:3
                              Section Header Offset:54196
                              Section Header Size:40
                              Number of Section Headers:12
                              Header String Table Index:11
                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                              NULL0x00x00x00x00x0000
                              .initPROGBITS0x100000940x940x240x00x6AX004
                              .textPROGBITS0x100000b80xb80xb2980x00x6AX004
                              .finiPROGBITS0x1000b3500xb3500x200x00x6AX004
                              .rodataPROGBITS0x1000b3700xb3700x19a80x00x2A008
                              .ctorsPROGBITS0x1001d0000xd0000x80x00x3WA004
                              .dtorsPROGBITS0x1001d0080xd0080x80x00x3WA004
                              .dataPROGBITS0x1001d0180xd0180x3140x00x3WA008
                              .sdataPROGBITS0x1001d32c0xd32c0x3c0x00x3WA004
                              .sbssNOBITS0x1001d3680xd3680x600x00x3WA004
                              .bssNOBITS0x1001d3c80xd3680x21680x00x3WA004
                              .shstrtabSTRTAB0x00xd3680x4b0x00x0001
                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                              LOAD0x00x100000000x100000000xcd180xcd186.27950x5R E0x10000.init .text .fini .rodata
                              LOAD0xd0000x1001d0000x1001d0000x3680x25302.79340x6RW 0x10000.ctors .dtors .data .sdata .sbss .bss
                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2025-01-11T14:47:50.756454+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344712107.189.4.20158431TCP
                              2025-01-11T14:47:57.415151+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344714107.189.4.20158431TCP
                              2025-01-11T14:48:03.106869+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344716107.189.4.20158431TCP
                              2025-01-11T14:48:05.780077+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344718107.189.4.20158431TCP
                              2025-01-11T14:48:09.446965+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344720107.189.4.20158431TCP
                              2025-01-11T14:48:21.104812+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344722107.189.4.20158431TCP
                              2025-01-11T14:48:29.772764+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344724107.189.4.20158431TCP
                              2025-01-11T14:48:41.435134+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344726107.189.4.20158431TCP
                              2025-01-11T14:48:53.089933+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344728107.189.4.20158431TCP
                              2025-01-11T14:49:04.743111+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344730107.189.4.20158431TCP
                              2025-01-11T14:49:13.405984+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344732107.189.4.20158431TCP
                              2025-01-11T14:49:18.151186+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344734107.189.4.20158431TCP
                              2025-01-11T14:49:28.814289+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344736107.189.4.20158431TCP
                              2025-01-11T14:49:36.466803+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344738107.189.4.20158431TCP
                              2025-01-11T14:49:45.119291+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344740107.189.4.20158431TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 11, 2025 14:47:50.748212099 CET4471258431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:47:50.753190994 CET5843144712107.189.4.201192.168.2.13
                              Jan 11, 2025 14:47:50.753243923 CET4471258431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:47:50.756453991 CET4471258431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:47:50.761302948 CET5843144712107.189.4.201192.168.2.13
                              Jan 11, 2025 14:47:52.398989916 CET5843144712107.189.4.201192.168.2.13
                              Jan 11, 2025 14:47:52.399487019 CET4471258431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:47:52.406678915 CET5843144712107.189.4.201192.168.2.13
                              Jan 11, 2025 14:47:57.409357071 CET4471458431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:47:57.414261103 CET5843144714107.189.4.201192.168.2.13
                              Jan 11, 2025 14:47:57.414351940 CET4471458431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:47:57.415150881 CET4471458431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:47:57.420062065 CET5843144714107.189.4.201192.168.2.13
                              Jan 11, 2025 14:47:59.091437101 CET5843144714107.189.4.201192.168.2.13
                              Jan 11, 2025 14:47:59.091772079 CET4471458431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:47:59.096784115 CET5843144714107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:03.101322889 CET4471658431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:03.106234074 CET5843144716107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:03.106293917 CET4471658431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:03.106868982 CET4471658431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:03.111716032 CET5843144716107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:04.764197111 CET5843144716107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:04.764406919 CET4471658431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:04.769315958 CET5843144716107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:05.774379969 CET4471858431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:05.779289961 CET5843144718107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:05.779383898 CET4471858431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:05.780076981 CET4471858431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:05.784965992 CET5843144718107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:07.430361032 CET5843144718107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:07.430577040 CET4471858431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:07.439554930 CET5843144718107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:09.441163063 CET4472058431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:09.446115971 CET5843144720107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:09.446233988 CET4472058431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:09.446964979 CET4472058431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:09.452559948 CET5843144720107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:11.086679935 CET5843144720107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:11.087014914 CET4472058431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:11.092030048 CET5843144720107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:21.098697901 CET4472258431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:21.103637934 CET5843144722107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:21.103740931 CET4472258431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:21.104811907 CET4472258431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:21.109755039 CET5843144722107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:22.757636070 CET5843144722107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:22.757833958 CET4472258431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:22.762732983 CET5843144722107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:29.766992092 CET4472458431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:29.771944046 CET5843144724107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:29.772044897 CET4472458431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:29.772763968 CET4472458431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:29.777611971 CET5843144724107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:31.417846918 CET5843144724107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:31.418137074 CET4472458431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:31.423033953 CET5843144724107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:41.428988934 CET4472658431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:41.433787107 CET5843144726107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:41.433857918 CET4472658431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:41.435133934 CET4472658431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:41.439919949 CET5843144726107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:43.071744919 CET5843144726107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:43.072098970 CET4472658431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:43.076920986 CET5843144726107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:53.083525896 CET4472858431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:53.088536978 CET5843144728107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:53.088615894 CET4472858431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:53.089932919 CET4472858431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:53.094799995 CET5843144728107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:54.726560116 CET5843144728107.189.4.201192.168.2.13
                              Jan 11, 2025 14:48:54.726825953 CET4472858431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:48:54.731714964 CET5843144728107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:04.737195969 CET4473058431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:04.742146015 CET5843144730107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:04.742279053 CET4473058431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:04.743110895 CET4473058431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:04.747951984 CET5843144730107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:06.387995958 CET5843144730107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:06.388269901 CET4473058431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:06.393179893 CET5843144730107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:13.399641991 CET4473258431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:13.404649019 CET5843144732107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:13.404738903 CET4473258431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:13.405983925 CET4473258431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:13.410854101 CET5843144732107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:15.040697098 CET5843144732107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:15.040900946 CET4473258431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:15.045829058 CET5843144732107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:18.145020008 CET4473458431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:18.150007010 CET5843144734107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:18.150167942 CET4473458431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:18.151185989 CET4473458431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:18.156009912 CET5843144734107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:19.796386957 CET5843144734107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:19.796821117 CET4473458431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:19.806337118 CET5843144734107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:28.808099031 CET4473658431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:28.812944889 CET5843144736107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:28.813041925 CET4473658431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:28.814289093 CET4473658431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:28.819087982 CET5843144736107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:30.450310946 CET5843144736107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:30.450786114 CET4473658431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:30.455599070 CET5843144736107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:36.460300922 CET4473858431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:36.466100931 CET5843144738107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:36.466161966 CET4473858431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:36.466803074 CET4473858431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:36.471743107 CET5843144738107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:38.102782011 CET5843144738107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:38.103096008 CET4473858431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:38.108105898 CET5843144738107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:45.113358974 CET4474058431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:45.118288994 CET5843144740107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:45.118422985 CET4474058431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:45.119291067 CET4474058431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:45.124118090 CET5843144740107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:46.775260925 CET5843144740107.189.4.201192.168.2.13
                              Jan 11, 2025 14:49:46.775505066 CET4474058431192.168.2.13107.189.4.201
                              Jan 11, 2025 14:49:46.780435085 CET5843144740107.189.4.201192.168.2.13
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 11, 2025 14:47:50.738857031 CET5228353192.168.2.138.8.8.8
                              Jan 11, 2025 14:47:50.746119022 CET53522838.8.8.8192.168.2.13
                              Jan 11, 2025 14:47:57.401819944 CET5398653192.168.2.138.8.8.8
                              Jan 11, 2025 14:47:57.408950090 CET53539868.8.8.8192.168.2.13
                              Jan 11, 2025 14:48:03.093674898 CET3668253192.168.2.138.8.8.8
                              Jan 11, 2025 14:48:03.100938082 CET53366828.8.8.8192.168.2.13
                              Jan 11, 2025 14:48:05.766726971 CET4139053192.168.2.138.8.8.8
                              Jan 11, 2025 14:48:05.773916960 CET53413908.8.8.8192.168.2.13
                              Jan 11, 2025 14:48:09.432985067 CET5314053192.168.2.138.8.8.8
                              Jan 11, 2025 14:48:09.440673113 CET53531408.8.8.8192.168.2.13
                              Jan 11, 2025 14:48:21.090466976 CET3897753192.168.2.138.8.8.8
                              Jan 11, 2025 14:48:21.097857952 CET53389778.8.8.8192.168.2.13
                              Jan 11, 2025 14:48:29.759924889 CET3547753192.168.2.138.8.8.8
                              Jan 11, 2025 14:48:29.766587973 CET53354778.8.8.8192.168.2.13
                              Jan 11, 2025 14:48:41.421608925 CET4787453192.168.2.138.8.8.8
                              Jan 11, 2025 14:48:41.428287983 CET53478748.8.8.8192.168.2.13
                              Jan 11, 2025 14:48:53.075578928 CET5302553192.168.2.138.8.8.8
                              Jan 11, 2025 14:48:53.082776070 CET53530258.8.8.8192.168.2.13
                              Jan 11, 2025 14:49:04.730035067 CET3490653192.168.2.138.8.8.8
                              Jan 11, 2025 14:49:04.736582994 CET53349068.8.8.8192.168.2.13
                              Jan 11, 2025 14:49:13.391833067 CET5857053192.168.2.138.8.8.8
                              Jan 11, 2025 14:49:13.398890972 CET53585708.8.8.8192.168.2.13
                              Jan 11, 2025 14:49:18.043915033 CET5503153192.168.2.138.8.8.8
                              Jan 11, 2025 14:49:18.144231081 CET53550318.8.8.8192.168.2.13
                              Jan 11, 2025 14:49:28.800621986 CET5170753192.168.2.138.8.8.8
                              Jan 11, 2025 14:49:28.807410002 CET53517078.8.8.8192.168.2.13
                              Jan 11, 2025 14:49:36.452876091 CET4808653192.168.2.138.8.8.8
                              Jan 11, 2025 14:49:36.459903955 CET53480868.8.8.8192.168.2.13
                              Jan 11, 2025 14:49:45.105977058 CET4325153192.168.2.138.8.8.8
                              Jan 11, 2025 14:49:45.112725973 CET53432518.8.8.8192.168.2.13
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 11, 2025 14:47:50.738857031 CET192.168.2.138.8.8.80x91f6Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:47:57.401819944 CET192.168.2.138.8.8.80x878bStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:03.093674898 CET192.168.2.138.8.8.80x45b0Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:05.766726971 CET192.168.2.138.8.8.80x960cStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:09.432985067 CET192.168.2.138.8.8.80xd045Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:21.090466976 CET192.168.2.138.8.8.80x8cb8Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:29.759924889 CET192.168.2.138.8.8.80xcf64Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:41.421608925 CET192.168.2.138.8.8.80x4da3Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:53.075578928 CET192.168.2.138.8.8.80xeca9Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:49:04.730035067 CET192.168.2.138.8.8.80x45dStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:49:13.391833067 CET192.168.2.138.8.8.80x1595Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:49:18.043915033 CET192.168.2.138.8.8.80x9e2bStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:49:28.800621986 CET192.168.2.138.8.8.80x9fffStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:49:36.452876091 CET192.168.2.138.8.8.80x8195Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 14:49:45.105977058 CET192.168.2.138.8.8.80xb760Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 11, 2025 14:47:50.746119022 CET8.8.8.8192.168.2.130x91f6No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:47:57.408950090 CET8.8.8.8192.168.2.130x878bNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:03.100938082 CET8.8.8.8192.168.2.130x45b0No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:05.773916960 CET8.8.8.8192.168.2.130x960cNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:09.440673113 CET8.8.8.8192.168.2.130xd045No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:21.097857952 CET8.8.8.8192.168.2.130x8cb8No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:29.766587973 CET8.8.8.8192.168.2.130xcf64No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:41.428287983 CET8.8.8.8192.168.2.130x4da3No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:48:53.082776070 CET8.8.8.8192.168.2.130xeca9No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:49:04.736582994 CET8.8.8.8192.168.2.130x45dNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:49:13.398890972 CET8.8.8.8192.168.2.130x1595No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:49:18.144231081 CET8.8.8.8192.168.2.130x9e2bNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:49:28.807410002 CET8.8.8.8192.168.2.130x9fffNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:49:36.459903955 CET8.8.8.8192.168.2.130x8195No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 14:49:45.112725973 CET8.8.8.8192.168.2.130xb760No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false

                              System Behavior

                              Start time (UTC):13:47:49
                              Start date (UTC):11/01/2025
                              Path:/tmp/ppc.elf
                              Arguments:/tmp/ppc.elf
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6

                              Start time (UTC):13:47:49
                              Start date (UTC):11/01/2025
                              Path:/tmp/ppc.elf
                              Arguments:-
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6

                              Start time (UTC):13:47:49
                              Start date (UTC):11/01/2025
                              Path:/tmp/ppc.elf
                              Arguments:-
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6

                              Start time (UTC):13:47:49
                              Start date (UTC):11/01/2025
                              Path:/tmp/ppc.elf
                              Arguments:-
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6

                              Start time (UTC):13:47:50
                              Start date (UTC):11/01/2025
                              Path:/tmp/ppc.elf
                              Arguments:-
                              File size:5388968 bytes
                              MD5 hash:ae65271c943d3451b7f026d1fadccea6