Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
m68k.elf

Overview

General Information

Sample name:m68k.elf
Analysis ID:1589187
MD5:7ea1e8d5e83cae707069c6f382edefaa
SHA1:cdd438caef08bb197cb8ccc97a9c8320b475da60
SHA256:e92eb62cdecf1efef28275bb7fded326bc08ff0e78ab45d3dd0ba4bee02e4c99
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Connects to many ports of the same IP (likely port scanning)
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589187
Start date and time:2025-01-11 15:04:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 28s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:m68k.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@17/0
  • VT rate limit hit for: update.byeux.com
Command:/tmp/m68k.elf
PID:5430
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • m68k.elf (PID: 5430, Parent: 5354, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/m68k.elf
    • m68k.elf New Fork (PID: 5432, Parent: 5430)
      • m68k.elf New Fork (PID: 5434, Parent: 5432)
      • m68k.elf New Fork (PID: 5436, Parent: 5432)
        • m68k.elf New Fork (PID: 5438, Parent: 5436)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
m68k.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    m68k.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      m68k.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xce4b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xce5f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xce73:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xce87:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xce9b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xceaf:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcec3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xced7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xceeb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xceff:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcf13:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcf27:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcf3b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcf4f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcf63:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcf77:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcf8b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcf9f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcfb3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcfc7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xcfdb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      5430.1.00007f0828001000.00007f0828010000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5430.1.00007f0828001000.00007f0828010000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5430.1.00007f0828001000.00007f0828010000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0xce4b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xce5f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xce73:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xce87:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xce9b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xceaf:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcec3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xced7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xceeb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xceff:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcf13:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcf27:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcf3b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcf4f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcf63:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcf77:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcf8b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcf9f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcfb3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcfc7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0xcfdb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-11T15:04:56.534206+010020304911Malware Command and Control Activity Detected192.168.2.1344704107.189.4.20158431TCP
          2025-01-11T15:05:06.591513+010020304911Malware Command and Control Activity Detected192.168.2.1344706107.189.4.20158431TCP
          2025-01-11T15:05:15.418932+010020304911Malware Command and Control Activity Detected192.168.2.1344708107.189.4.20158431TCP
          2025-01-11T15:05:21.092873+010020304911Malware Command and Control Activity Detected192.168.2.1344710107.189.4.20158431TCP
          2025-01-11T15:05:24.763671+010020304911Malware Command and Control Activity Detected192.168.2.1344712107.189.4.20158431TCP
          2025-01-11T15:05:33.524801+010020304911Malware Command and Control Activity Detected192.168.2.1344714107.189.4.20158431TCP
          2025-01-11T15:05:44.354124+010020304911Malware Command and Control Activity Detected192.168.2.1344716107.189.4.20158431TCP
          2025-01-11T15:05:48.201415+010020304911Malware Command and Control Activity Detected192.168.2.1344718107.189.4.20158431TCP
          2025-01-11T15:05:56.958228+010020304911Malware Command and Control Activity Detected192.168.2.1344720107.189.4.20158431TCP
          2025-01-11T15:06:07.625804+010020304911Malware Command and Control Activity Detected192.168.2.1344722107.189.4.20158431TCP
          2025-01-11T15:06:14.301868+010020304911Malware Command and Control Activity Detected192.168.2.1344724107.189.4.20158431TCP
          2025-01-11T15:06:20.954126+010020304911Malware Command and Control Activity Detected192.168.2.1344726107.189.4.20158431TCP
          2025-01-11T15:06:24.645808+010020304911Malware Command and Control Activity Detected192.168.2.1344728107.189.4.20158431TCP
          2025-01-11T15:06:29.391898+010020304911Malware Command and Control Activity Detected192.168.2.1344730107.189.4.20158431TCP
          2025-01-11T15:06:39.197137+010020304911Malware Command and Control Activity Detected192.168.2.1344732107.189.4.20158431TCP
          2025-01-11T15:06:50.842614+010020304911Malware Command and Control Activity Detected192.168.2.1344734107.189.4.20158431TCP
          2025-01-11T15:06:58.711323+010020304911Malware Command and Control Activity Detected192.168.2.1344736107.189.4.20158431TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: m68k.elfAvira: detected
          Source: m68k.elfReversingLabs: Detection: 65%
          Source: m68k.elfVirustotal: Detection: 65%Perma Link

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44720 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44710 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44712 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44714 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44708 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44706 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44704 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44716 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44724 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44734 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44718 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44736 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44730 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44722 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44726 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44732 -> 107.189.4.201:58431
          Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.13:44728 -> 107.189.4.201:58431
          Source: global trafficTCP traffic: 107.189.4.201 ports 58431,1,3,4,5,8
          Source: global trafficTCP traffic: 192.168.2.13:44704 -> 107.189.4.201:58431
          Source: global trafficDNS traffic detected: DNS query: update.byeux.com

          System Summary

          barindex
          Source: m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: 5430.1.00007f0828001000.00007f0828010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
          Source: ELF static info symbol of initial sample.symtab present: no
          Source: m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: 5430.1.00007f0828001000.00007f0828010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
          Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@17/0
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/230/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/110/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/231/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/111/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/232/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/112/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/233/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/113/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/234/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/114/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/235/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/115/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/236/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/116/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/237/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/117/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/238/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/118/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/239/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/119/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/3633/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/914/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/10/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/917/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/11/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/12/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/5273/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/13/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/14/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/15/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/16/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/17/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/3771/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/18/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/19/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/240/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/3095/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/120/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/241/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/121/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/242/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/1/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/122/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/243/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/2/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/123/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/244/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/3/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/124/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/245/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/1588/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/125/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/4/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/246/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/126/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/5/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/247/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/127/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/6/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/248/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/128/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/7/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/249/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/129/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/8/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/800/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/9/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/1906/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/802/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/803/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/20/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/21/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/22/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/23/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/24/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/25/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/26/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/27/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/28/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/29/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/3420/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/1482/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/490/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/1480/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/250/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/371/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/130/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/251/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/131/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/252/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/132/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/253/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/254/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/1238/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/134/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/255/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/256/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/257/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/378/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/3413/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/258/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/259/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/1475/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/936/cmdlineJump to behavior
          Source: /tmp/m68k.elf (PID: 5434)File opened: /proc/30/cmdlineJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: /tmp/m68k.elf (PID: 5430)File: /tmp/m68k.elfJump to behavior
          Source: /tmp/m68k.elf (PID: 5430)Queries kernel information via 'uname': Jump to behavior
          Source: m68k.elf, 5430.1.00007ffc637e8000.00007ffc63809000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
          Source: m68k.elf, 5430.1.00007ffc637e8000.00007ffc63809000.rw-.sdmpBinary or memory string: 0wkx86_64/usr/bin/qemu-m68k/tmp/m68k.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/m68k.elf
          Source: m68k.elf, 5430.1.000056366ba65000.000056366baea000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
          Source: m68k.elf, 5430.1.000056366ba65000.000056366baea000.rw-.sdmpBinary or memory string: k6V!/etc/qemu-binfmt/m68k

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: m68k.elf, type: SAMPLE
          Source: Yara matchFile source: 5430.1.00007f0828001000.00007f0828010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: m68k.elf, type: SAMPLE
          Source: Yara matchFile source: 5430.1.00007f0828001000.00007f0828010000.r-x.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
          Source: Yara matchFile source: m68k.elf, type: SAMPLE
          Source: Yara matchFile source: 5430.1.00007f0828001000.00007f0828010000.r-x.sdmp, type: MEMORY
          Source: Yara matchFile source: m68k.elf, type: SAMPLE
          Source: Yara matchFile source: 5430.1.00007f0828001000.00007f0828010000.r-x.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
          File Deletion
          1
          OS Credential Dumping
          11
          Security Software Discovery
          Remote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          No configs have been found
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Number of created Files
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589187 Sample: m68k.elf Startdate: 11/01/2025 Architecture: LINUX Score: 100 20 update.byeux.com 107.189.4.201, 44704, 44706, 44708 PONYNETUS United States 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 5 other signatures 2->28 9 m68k.elf 2->9         started        signatures3 process4 signatures5 30 Sample deletes itself 9->30 12 m68k.elf 9->12         started        process6 process7 14 m68k.elf 12->14         started        16 m68k.elf 12->16         started        process8 18 m68k.elf 14->18         started       
          SourceDetectionScannerLabelLink
          m68k.elf66%ReversingLabsLinux.Trojan.Mirai
          m68k.elf65%VirustotalBrowse
          m68k.elf100%AviraEXP/ELF.Mirai.Z.A
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          update.byeux.com
          107.189.4.201
          truetrue
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            107.189.4.201
            update.byeux.comUnited States
            53667PONYNETUStrue
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            107.189.4.201ppc.elfGet hashmaliciousMirai, MoobotBrowse
              spc.elfGet hashmaliciousMirai, MoobotBrowse
                sh4.elfGet hashmaliciousMirai, MoobotBrowse
                  mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                    x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                      x86.elfGet hashmaliciousMirai, MoobotBrowse
                        JVL2bXW1ch.elfGet hashmaliciousMirai, MoobotBrowse
                          arm7.elfGet hashmaliciousMirai, MoobotBrowse
                            mips.elfGet hashmaliciousMirai, MoobotBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              update.byeux.comppc.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              spc.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              sh4.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              x86.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              JVL2bXW1ch.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              arm7.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              mips.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              PONYNETUSppc.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              spc.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              sh4.elfGet hashmaliciousMirai, MoobotBrowse
                              • 107.189.4.201
                              uShK30bvrV.exeGet hashmaliciousRemcosBrowse
                              • 172.86.115.221
                              miori.spc.elfGet hashmaliciousUnknownBrowse
                              • 107.189.6.73
                              cZO.exeGet hashmaliciousUnknownBrowse
                              • 107.189.28.6
                              file.exeGet hashmaliciousUnknownBrowse
                              • 205.185.126.56
                              file.exeGet hashmaliciousUnknownBrowse
                              • 205.185.126.56
                              file.exeGet hashmaliciousGhostRat, NitolBrowse
                              • 198.98.57.188
                              lx64.elfGet hashmaliciousUnknownBrowse
                              • 205.185.126.56
                              No context
                              No context
                              No created / dropped files found
                              File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                              Entropy (8bit):6.2029512023558615
                              TrID:
                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                              File name:m68k.elf
                              File size:60'476 bytes
                              MD5:7ea1e8d5e83cae707069c6f382edefaa
                              SHA1:cdd438caef08bb197cb8ccc97a9c8320b475da60
                              SHA256:e92eb62cdecf1efef28275bb7fded326bc08ff0e78ab45d3dd0ba4bee02e4c99
                              SHA512:5bca3949a91d3245a380b619c48061bd714e84f061d095b7180a01a93b93d8ff4cf5d070bcb158ec4ba92299f0ed2f01fe09bf93bbf0e12311e146bb4149f5ec
                              SSDEEP:1536:Zr+hfkubHZEg8vMlB+25Gz7D3fz5fP7I8YDQ:Zr+hfkubZElP24zftE8YDQ
                              TLSH:60432B9AF801C97DF40BD77B4457490AB671A3D112931B3623ABBA93BC721A91D23F81
                              File Content Preview:.ELF.......................D...4.........4. ...(.................................. ....................`..% ...... .dt.Q............................NV..a....da.....N^NuNV..J9...lf>"y...$ QJ.g.X.#....$N."y...$ QJ.f.A.....J.g.Hy....N.X........lN^NuNV..N^NuN

                              ELF header

                              Class:ELF32
                              Data:2's complement, big endian
                              Version:1 (current)
                              Machine:MC68000
                              Version Number:0x1
                              Type:EXEC (Executable file)
                              OS/ABI:UNIX - System V
                              ABI Version:0
                              Entry Point Address:0x80000144
                              Flags:0x0
                              ELF Header Size:52
                              Program Header Offset:52
                              Program Header Size:32
                              Number of Program Headers:3
                              Section Header Offset:60076
                              Section Header Size:40
                              Number of Section Headers:10
                              Header String Table Index:9
                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                              NULL0x00x00x00x00x0000
                              .initPROGBITS0x800000940x940x140x00x6AX002
                              .textPROGBITS0x800000a80xa80xccc60x00x6AX004
                              .finiPROGBITS0x8000cd6e0xcd6e0xe0x00x6AX002
                              .rodataPROGBITS0x8000cd7c0xcd7c0x198c0x00x2A002
                              .ctorsPROGBITS0x8001070c0xe70c0x80x00x3WA004
                              .dtorsPROGBITS0x800107140xe7140x80x00x3WA004
                              .dataPROGBITS0x800107200xe7200x34c0x00x3WA004
                              .bssNOBITS0x80010a6c0xea6c0x21c00x00x3WA004
                              .shstrtabSTRTAB0x00xea6c0x3e0x00x0001
                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                              LOAD0x00x800000000x800000000xe7080xe7086.24360x5R E0x2000.init .text .fini .rodata
                              LOAD0xe70c0x8001070c0x8001070c0x3600x25202.82290x6RW 0x2000.ctors .dtors .data .bss
                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2025-01-11T15:04:56.534206+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344704107.189.4.20158431TCP
                              2025-01-11T15:05:06.591513+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344706107.189.4.20158431TCP
                              2025-01-11T15:05:15.418932+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344708107.189.4.20158431TCP
                              2025-01-11T15:05:21.092873+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344710107.189.4.20158431TCP
                              2025-01-11T15:05:24.763671+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344712107.189.4.20158431TCP
                              2025-01-11T15:05:33.524801+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344714107.189.4.20158431TCP
                              2025-01-11T15:05:44.354124+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344716107.189.4.20158431TCP
                              2025-01-11T15:05:48.201415+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344718107.189.4.20158431TCP
                              2025-01-11T15:05:56.958228+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344720107.189.4.20158431TCP
                              2025-01-11T15:06:07.625804+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344722107.189.4.20158431TCP
                              2025-01-11T15:06:14.301868+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344724107.189.4.20158431TCP
                              2025-01-11T15:06:20.954126+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344726107.189.4.20158431TCP
                              2025-01-11T15:06:24.645808+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344728107.189.4.20158431TCP
                              2025-01-11T15:06:29.391898+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344730107.189.4.20158431TCP
                              2025-01-11T15:06:39.197137+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344732107.189.4.20158431TCP
                              2025-01-11T15:06:50.842614+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344734107.189.4.20158431TCP
                              2025-01-11T15:06:58.711323+01002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1344736107.189.4.20158431TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 11, 2025 15:04:56.527437925 CET4470458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:04:56.532530069 CET5843144704107.189.4.201192.168.2.13
                              Jan 11, 2025 15:04:56.532593966 CET4470458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:04:56.534205914 CET4470458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:04:56.539017916 CET5843144704107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:03.574503899 CET5843144704107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:03.575227976 CET4470458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:03.581051111 CET5843144704107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:06.585849047 CET4470658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:06.590703011 CET5843144706107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:06.590770006 CET4470658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:06.591512918 CET4470658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:06.596299887 CET5843144706107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:08.251036882 CET5843144706107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:08.251290083 CET4470658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:08.256947041 CET5843144706107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:15.413212061 CET4470858431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:15.418051004 CET5843144708107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:15.418133020 CET4470858431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:15.418931961 CET4470858431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:15.423743010 CET5843144708107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:17.076194048 CET5843144708107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:17.076581001 CET4470858431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:17.081459999 CET5843144708107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:21.087136984 CET4471058431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:21.091983080 CET5843144710107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:21.092052937 CET4471058431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:21.092873096 CET4471058431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:21.097677946 CET5843144710107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:22.747699976 CET5843144710107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:22.748025894 CET4471058431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:22.752834082 CET5843144710107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:24.757880926 CET4471258431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:24.762828112 CET5843144712107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:24.762919903 CET4471258431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:24.763670921 CET4471258431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:24.768546104 CET5843144712107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:26.404375076 CET5843144712107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:26.404550076 CET4471258431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:26.409470081 CET5843144712107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:33.518655062 CET4471458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:33.523566961 CET5843144714107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:33.523638010 CET4471458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:33.524801016 CET4471458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:33.529598951 CET5843144714107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:35.186259031 CET5843144714107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:35.186480045 CET4471458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:35.191260099 CET5843144714107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:44.348329067 CET4471658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:44.353223085 CET5843144716107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:44.353281021 CET4471658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:44.354124069 CET4471658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:44.359234095 CET5843144716107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:46.060488939 CET5843144716107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:46.060679913 CET4471658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:46.065538883 CET5843144716107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:48.195552111 CET4471858431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:48.200428963 CET5843144718107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:48.200503111 CET4471858431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:48.201415062 CET4471858431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:48.206165075 CET5843144718107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:49.840147972 CET5843144718107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:49.840286016 CET4471858431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:49.845187902 CET5843144718107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:56.952552080 CET4472058431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:56.957427025 CET5843144720107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:56.957509995 CET4472058431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:56.958228111 CET4472058431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:56.963069916 CET5843144720107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:58.607295036 CET5843144720107.189.4.201192.168.2.13
                              Jan 11, 2025 15:05:58.607574940 CET4472058431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:05:58.612410069 CET5843144720107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:07.619343996 CET4472258431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:07.624331951 CET5843144722107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:07.624450922 CET4472258431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:07.625803947 CET4472258431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:07.630631924 CET5843144722107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:09.283382893 CET5843144722107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:09.283679008 CET4472258431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:09.288672924 CET5843144722107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:14.295414925 CET4472458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:14.300298929 CET5843144724107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:14.300419092 CET4472458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:14.301867962 CET4472458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:14.306701899 CET5843144724107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:15.936496973 CET5843144724107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:15.937261105 CET4472458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:15.942070007 CET5843144724107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:20.948105097 CET4472658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:20.952936888 CET5843144726107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:20.953027010 CET4472658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:20.954125881 CET4472658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:20.958882093 CET5843144726107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:22.627756119 CET5843144726107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:22.628133059 CET4472658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:22.633097887 CET5843144726107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:24.639575958 CET4472858431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:24.644409895 CET5843144728107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:24.644475937 CET4472858431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:24.645807981 CET4472858431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:24.650607109 CET5843144728107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:26.278908968 CET5843144728107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:26.279309988 CET4472858431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:26.284393072 CET5843144728107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:29.385096073 CET4473058431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:29.390069008 CET5843144730107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:29.390188932 CET4473058431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:29.391897917 CET4473058431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:29.396841049 CET5843144730107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:31.028788090 CET5843144730107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:31.029100895 CET4473058431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:31.034109116 CET5843144730107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:39.191272974 CET4473258431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:39.196154118 CET5843144732107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:39.196213961 CET4473258431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:39.197137117 CET4473258431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:39.201953888 CET5843144732107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:40.825781107 CET5843144732107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:40.826204062 CET4473258431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:40.831053019 CET5843144732107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:50.836774111 CET4473458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:50.841614962 CET5843144734107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:50.841682911 CET4473458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:50.842613935 CET4473458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:50.847429991 CET5843144734107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:52.544863939 CET5843144734107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:52.545160055 CET4473458431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:52.549992085 CET5843144734107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:58.704747915 CET4473658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:58.709661961 CET5843144736107.189.4.201192.168.2.13
                              Jan 11, 2025 15:06:58.709788084 CET4473658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:58.711323023 CET4473658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:06:58.716186047 CET5843144736107.189.4.201192.168.2.13
                              Jan 11, 2025 15:07:00.361516953 CET5843144736107.189.4.201192.168.2.13
                              Jan 11, 2025 15:07:00.361666918 CET4473658431192.168.2.13107.189.4.201
                              Jan 11, 2025 15:07:00.366473913 CET5843144736107.189.4.201192.168.2.13
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 11, 2025 15:04:56.367736101 CET4757953192.168.2.138.8.8.8
                              Jan 11, 2025 15:04:56.526252985 CET53475798.8.8.8192.168.2.13
                              Jan 11, 2025 15:05:06.578111887 CET4717653192.168.2.138.8.8.8
                              Jan 11, 2025 15:05:06.585412025 CET53471768.8.8.8192.168.2.13
                              Jan 11, 2025 15:05:15.253607988 CET5564553192.168.2.138.8.8.8
                              Jan 11, 2025 15:05:15.412507057 CET53556458.8.8.8192.168.2.13
                              Jan 11, 2025 15:05:21.079417944 CET5578053192.168.2.138.8.8.8
                              Jan 11, 2025 15:05:21.086591959 CET53557808.8.8.8192.168.2.13
                              Jan 11, 2025 15:05:24.750507116 CET5387453192.168.2.138.8.8.8
                              Jan 11, 2025 15:05:24.757359982 CET53538748.8.8.8192.168.2.13
                              Jan 11, 2025 15:05:33.407243967 CET3853353192.168.2.138.8.8.8
                              Jan 11, 2025 15:05:33.517860889 CET53385338.8.8.8192.168.2.13
                              Jan 11, 2025 15:05:44.188978910 CET4254353192.168.2.138.8.8.8
                              Jan 11, 2025 15:05:44.347345114 CET53425438.8.8.8192.168.2.13
                              Jan 11, 2025 15:05:48.064510107 CET5850653192.168.2.138.8.8.8
                              Jan 11, 2025 15:05:48.193964005 CET53585068.8.8.8192.168.2.13
                              Jan 11, 2025 15:05:56.842287064 CET5397353192.168.2.138.8.8.8
                              Jan 11, 2025 15:05:56.951917887 CET53539738.8.8.8192.168.2.13
                              Jan 11, 2025 15:06:07.611401081 CET5016653192.168.2.138.8.8.8
                              Jan 11, 2025 15:06:07.618535042 CET53501668.8.8.8192.168.2.13
                              Jan 11, 2025 15:06:14.287568092 CET3287153192.168.2.138.8.8.8
                              Jan 11, 2025 15:06:14.294650078 CET53328718.8.8.8192.168.2.13
                              Jan 11, 2025 15:06:20.940422058 CET4063253192.168.2.138.8.8.8
                              Jan 11, 2025 15:06:20.947477102 CET53406328.8.8.8192.168.2.13
                              Jan 11, 2025 15:06:24.631778002 CET5783553192.168.2.138.8.8.8
                              Jan 11, 2025 15:06:24.638917923 CET53578358.8.8.8192.168.2.13
                              Jan 11, 2025 15:06:29.283811092 CET5706353192.168.2.138.8.8.8
                              Jan 11, 2025 15:06:29.383610964 CET53570638.8.8.8192.168.2.13
                              Jan 11, 2025 15:06:39.032675982 CET5701253192.168.2.138.8.8.8
                              Jan 11, 2025 15:06:39.190301895 CET53570128.8.8.8192.168.2.13
                              Jan 11, 2025 15:06:50.829427958 CET4117253192.168.2.138.8.8.8
                              Jan 11, 2025 15:06:50.836186886 CET53411728.8.8.8192.168.2.13
                              Jan 11, 2025 15:06:58.548646927 CET4851953192.168.2.138.8.8.8
                              Jan 11, 2025 15:06:58.703275919 CET53485198.8.8.8192.168.2.13
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 11, 2025 15:04:56.367736101 CET192.168.2.138.8.8.80xd44bStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:06.578111887 CET192.168.2.138.8.8.80xe2faStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:15.253607988 CET192.168.2.138.8.8.80x4558Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:21.079417944 CET192.168.2.138.8.8.80xc5cdStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:24.750507116 CET192.168.2.138.8.8.80x414dStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:33.407243967 CET192.168.2.138.8.8.80x9e4bStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:44.188978910 CET192.168.2.138.8.8.80xcb19Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:48.064510107 CET192.168.2.138.8.8.80xb15Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:56.842287064 CET192.168.2.138.8.8.80x742aStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:07.611401081 CET192.168.2.138.8.8.80x358aStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:14.287568092 CET192.168.2.138.8.8.80x4b9eStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:20.940422058 CET192.168.2.138.8.8.80xfdc3Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:24.631778002 CET192.168.2.138.8.8.80x1971Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:29.283811092 CET192.168.2.138.8.8.80x115bStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:39.032675982 CET192.168.2.138.8.8.80x329aStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:50.829427958 CET192.168.2.138.8.8.80x2a62Standard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:58.548646927 CET192.168.2.138.8.8.80xb7bbStandard query (0)update.byeux.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 11, 2025 15:04:56.526252985 CET8.8.8.8192.168.2.130xd44bNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:06.585412025 CET8.8.8.8192.168.2.130xe2faNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:15.412507057 CET8.8.8.8192.168.2.130x4558No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:21.086591959 CET8.8.8.8192.168.2.130xc5cdNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:24.757359982 CET8.8.8.8192.168.2.130x414dNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:33.517860889 CET8.8.8.8192.168.2.130x9e4bNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:44.347345114 CET8.8.8.8192.168.2.130xcb19No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:48.193964005 CET8.8.8.8192.168.2.130xb15No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:05:56.951917887 CET8.8.8.8192.168.2.130x742aNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:07.618535042 CET8.8.8.8192.168.2.130x358aNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:14.294650078 CET8.8.8.8192.168.2.130x4b9eNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:20.947477102 CET8.8.8.8192.168.2.130xfdc3No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:24.638917923 CET8.8.8.8192.168.2.130x1971No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:29.383610964 CET8.8.8.8192.168.2.130x115bNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:39.190301895 CET8.8.8.8192.168.2.130x329aNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:50.836186886 CET8.8.8.8192.168.2.130x2a62No error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false
                              Jan 11, 2025 15:06:58.703275919 CET8.8.8.8192.168.2.130xb7bbNo error (0)update.byeux.com107.189.4.201A (IP address)IN (0x0001)false

                              System Behavior

                              Start time (UTC):14:04:55
                              Start date (UTC):11/01/2025
                              Path:/tmp/m68k.elf
                              Arguments:/tmp/m68k.elf
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):14:04:55
                              Start date (UTC):11/01/2025
                              Path:/tmp/m68k.elf
                              Arguments:-
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):14:04:55
                              Start date (UTC):11/01/2025
                              Path:/tmp/m68k.elf
                              Arguments:-
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):14:04:55
                              Start date (UTC):11/01/2025
                              Path:/tmp/m68k.elf
                              Arguments:-
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc

                              Start time (UTC):14:04:55
                              Start date (UTC):11/01/2025
                              Path:/tmp/m68k.elf
                              Arguments:-
                              File size:4463432 bytes
                              MD5 hash:cd177594338c77b895ae27c33f8f86cc