Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
boatnet.x86.elf

Overview

General Information

Sample name:boatnet.x86.elf
Analysis ID:1589421
MD5:545dbe1d228295c958b5a3f6ec4d8278
SHA1:f8dff366ea07681be596cdb33911c3f4119d0763
SHA256:a8cbba23e7c866ccf3dc8b4d4e1cc5a51de83272cb6f8df8746a51a2817d8f7b
Tags:user-elfdigest
Infos:

Detection

Mirai
Score:76
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Machine Learning detection for sample
Sample is packed with UPX
Sample tries to kill multiple processes (SIGKILL)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Sample contains only a LOAD segment without any section mappings
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589421
Start date and time:2025-01-12 11:51:11 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 58s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:boatnet.x86.elf
Detection:MAL
Classification:mal76.spre.troj.evad.linELF@0/0@2/0
Command:/tmp/boatnet.x86.elf
PID:5483
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • wrapper-2.0 (PID: 5493, Parent: 3172, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
  • wrapper-2.0 (PID: 5494, Parent: 3172, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
  • wrapper-2.0 (PID: 5495, Parent: 3172, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
  • wrapper-2.0 (PID: 5496, Parent: 3172, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
    • xfpm-power-backlight-helper (PID: 5515, Parent: 5496, MD5: 3d221ad23f28ca3259f599b1664e2427) Arguments: /usr/sbin/xfpm-power-backlight-helper --get-max-brightness
  • wrapper-2.0 (PID: 5497, Parent: 3172, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
  • wrapper-2.0 (PID: 5498, Parent: 3172, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
  • xfconfd (PID: 5514, Parent: 5513, MD5: 4c7a0d6d258bb970905b19b84abcd8e9) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
  • systemd New Fork (PID: 5525, Parent: 2955)
  • xfce4-notifyd (PID: 5525, Parent: 2955, MD5: eee956f1b227c1d5031f9c61223255d1) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
5486.1.0000000008048000.000000000805a000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    5486.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0x10514:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x10528:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1053c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x10550:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x10564:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x10578:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1058c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x105a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x105b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x105c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x105dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x105f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x10604:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x10618:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1062c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x10640:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x10654:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x10668:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1067c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x10690:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x106a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    5486.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
    • 0x10a6c:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
    5486.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Mirai_fa3ad9d0unknownunknown
    • 0x11aa:$a: CB 08 C1 CB 10 66 C1 CB 08 31 C9 8A 4F 14 D3 E8 01 D8 66 C1
    5486.1.0000000008048000.000000000805a000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
    • 0xac00:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
    Click to see the 49 entries
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: boatnet.x86.elfVirustotal: Detection: 42%Perma Link
    Source: boatnet.x86.elfReversingLabs: Detection: 52%
    Source: boatnet.x86.elfJoe Sandbox ML: detected
    Source: global trafficTCP traffic: 192.168.2.14:39376 -> 94.158.245.27:3778
    Source: global trafficTCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.245.27
    Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
    Source: boatnet.x86.elfString found in binary or memory: http://upx.sf.net
    Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443

    System Summary

    barindex
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 Author: unknown
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 Author: unknown
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c Author: unknown
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 Author: unknown
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c Author: unknown
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Detects Mirai Botnet Malware Author: Florian Roth
    Source: Process Memory Space: boatnet.x86.elf PID: 5483, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
    Source: Process Memory Space: boatnet.x86.elf PID: 5483, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
    Source: Process Memory Space: boatnet.x86.elf PID: 5485, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
    Source: Process Memory Space: boatnet.x86.elf PID: 5485, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
    Source: Process Memory Space: boatnet.x86.elf PID: 5486, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
    Source: Process Memory Space: boatnet.x86.elf PID: 5486, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3129, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3184, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3187, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3188, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3189, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3190, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3193, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3207, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3215, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3235, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5486, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5493, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5494, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5495, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5496, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5497, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5498, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5514, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5525, result: successfulJump to behavior
    Source: LOAD without section mappingsProgram segment: 0xc01000
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3129, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3184, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3187, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3188, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3189, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3190, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3193, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3207, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3215, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 3235, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5486, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5493, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5494, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5495, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5496, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5497, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5498, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5514, result: successfulJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)SIGKILL sent: pid: 5525, result: successfulJump to behavior
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
    Source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
    Source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa3ad9d0 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = fe93a3552b72b107f95cc5a7e59da64fe84d31df833bf36c81d8f31d8d79d7ca, id = fa3ad9d0-7c55-4621-90fc-6b154c44a67b, last_modified = 2021-09-16
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_93fc3657 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d01a9e85a01fad913ca048b60bda1e5a2762f534e5308132c1d3098ac3f561ee, id = 93fc3657-fd21-4e93-a728-c084fc0a6a4a, last_modified = 2021-09-16
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_804f8e7c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 1080d8502848d532a0b38861437485d98a41d945acaf3cb676a7a2a2f6793ac6, id = 804f8e7c-4786-42bc-92e4-c68c24ca530e, last_modified = 2021-09-16
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_99d78950 reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3008edc4e7a099b64139a77d15ec0e2c3c1b55fc23ab156304571c4d14bc654c, id = 99d78950-ea23-4166-a85a-7a029209f5b1, last_modified = 2021-09-16
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_a68e498c reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 951c9dfcba531e5112c872395f6c144c4bc8b71c666d2c7d9d8574a23c163883, id = a68e498c-0768-4321-ab65-42dd6ef85323, last_modified = 2021-09-16
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
    Source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORYMatched rule: Mirai_Botnet_Malware date = 2016-10-04, hash5 = 420bf9215dfb04e5008c5e522eee9946599e2b323b17f17919cd802ebb012175, hash4 = 2efa09c124f277be2199bee58f49fc0ce6c64c0bef30079dfb3d94a6de492a69, hash3 = 20683ff7a5fec1237fc09224af40be029b9548c62c693844624089af568c89d4, hash2 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, hash1 = 05c78c3052b390435e53a87e3d31e9fb17f7c76bb4df2814313bca24735ce81c, author = Florian Roth, description = Detects Mirai Botnet Malware, hash10 = c61bf95146c68bfbbe01d7695337ed0e93ea759f59f651799f07eecdb339f83f, hash11 = d9573c3850e2ae35f371dff977fc3e5282a5e67db8e3274fd7818e8273fd5c89, hash12 = f1100c84abff05e0501e77781160d9815628e7fd2de9e53f5454dbcac7c84ca5, hash9 = bf0471b37dba7939524a30d7d5afc8fcfb8d4a7c9954343196737e72ea4e2dc4, hash8 = 89570ae59462e6472b6769545a999bde8457e47ae0d385caaa3499ab735b8147, hash7 = 70bb0ec35dd9afcfd52ec4e1d920e7045dc51dca0573cd4c753987c9d79405c0, hash6 = 62cdc8b7fffbaf5683a466f6503c03e68a15413a90f6afd5a13ba027631460c6, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/, hash13 = fb713ccf839362bf0fbe01aedd6796f4d74521b133011b408e42c1fd9ab8246b
    Source: Process Memory Space: boatnet.x86.elf PID: 5483, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
    Source: Process Memory Space: boatnet.x86.elf PID: 5483, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
    Source: Process Memory Space: boatnet.x86.elf PID: 5485, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
    Source: Process Memory Space: boatnet.x86.elf PID: 5485, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
    Source: Process Memory Space: boatnet.x86.elf PID: 5486, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
    Source: Process Memory Space: boatnet.x86.elf PID: 5486, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
    Source: classification engineClassification label: mal76.spre.troj.evad.linELF@0/0@2/0

    Data Obfuscation

    barindex
    Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
    Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
    Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5493)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5494)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/local/share/fonts/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /home/saturnino/.local/share/fonts/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /home/saturnino/.fonts/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/X11/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/cMap/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/cmap/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/opentype/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/truetype/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/type1/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/X11/Type1/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/X11/encodings/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/X11/misc/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/X11/util/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/cmap/adobe-cns1/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/cmap/adobe-gb1/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/cmap/adobe-japan1/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/cmap/adobe-japan2/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/cmap/adobe-korea1/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/opentype/malayalam/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/opentype/mathjax/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/opentype/noto/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/opentype/urw-base35/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/truetype/Gargi/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/truetype/Gubbi/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/truetype/Nakula/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/truetype/Navilu/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/truetype/Sahadeva/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/truetype/Sarai/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/truetype/abyssinica/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/truetype/ancient-scripts/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/truetype/dejavu/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/truetype/droid/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Directory: /usr/share/fonts/truetype/fonts-beng-extra/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5496)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5497)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/local/share/fonts/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /home/saturnino/.local/share/fonts/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /home/saturnino/.fonts/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/X11/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/cMap/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/cmap/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/opentype/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/type1/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/X11/Type1/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/X11/encodings/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/X11/misc/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/X11/util/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/cmap/adobe-cns1/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/cmap/adobe-gb1/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/cmap/adobe-japan1/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/cmap/adobe-japan2/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/cmap/adobe-korea1/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/opentype/malayalam/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/opentype/mathjax/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/opentype/noto/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/opentype/urw-base35/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/Gargi/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/Gubbi/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/Nakula/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/Navilu/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/Sahadeva/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/Sarai/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/abyssinica/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/ancient-scripts/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/dejavu/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/droid/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/fonts-beng-extra/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/fonts-deva-extra/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/fonts-gujr-extra/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/fonts-guru-extra/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/fonts-kalapi/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/fonts-orya-extra/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/fonts-telu-extra/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/fonts-yrsa-rasa/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/freefont/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/kacst/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/kacst-one/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/lao/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/lato/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/liberation/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/liberation2/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/lohit-assamese/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/lohit-bengali/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/lohit-devanagari/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/lohit-gujarati/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/lohit-kannada/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/lohit-malayalam/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/lohit-oriya/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/lohit-punjabi/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/lohit-tamil/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/lohit-tamil-classical/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/lohit-telugu/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/malayalam/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/noto/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/openoffice/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/padauk/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/pagul/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/samyak/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/samyak-fonts/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/sinhala/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/tibetan-machine/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/tlwg/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/ttf-khmeros-core/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/truetype/ubuntu/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/type1/urw-base35/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /usr/share/fonts/X11/encodings/large/.uuidJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /home/saturnino/.cacheJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /home/saturnino/.localJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Directory: /home/saturnino/.configJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5514)Directory: /home/saturnino/.cacheJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5514)Directory: /home/saturnino/.localJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5514)Directory: /home/saturnino/.configJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5514)Directory: /home/saturnino/.configJump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5525)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3640/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/2672/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1583/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3244/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3120/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3361/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3239/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1577/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1610/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/512/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1299/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3235/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/514/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3751/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3752/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3753/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3754/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/519/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/2946/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/917/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/5430/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3134/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1593/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3011/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3094/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3406/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1589/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3129/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1588/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3402/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3125/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3246/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3245/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/767/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/800/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/888/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/801/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/769/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/803/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/806/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/807/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/928/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/2956/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3420/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/490/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3142/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1635/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3814/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1633/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1599/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3139/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1873/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1630/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3412/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/657/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/658/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/659/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/418/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/419/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1639/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1638/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3670/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3398/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1371/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3392/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/780/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/660/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/661/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/782/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1369/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3304/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3425/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/785/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1642/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/940/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/941/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1640/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3147/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3268/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1364/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/5324/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/548/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1647/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/2991/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1383/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1382/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1381/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/791/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/671/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/794/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1655/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/2986/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/795/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/674/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1653/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/797/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/2983/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3159/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/678/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1650/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3157/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/679/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/1659/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/5616/cmdlineJump to behavior
    Source: /tmp/boatnet.x86.elf (PID: 5484)File opened: /proc/3319/cmdlineJump to behavior
    Source: boatnet.x86.elfSubmission file: segment LOAD with 7.9447 entropy (max. 8.0)
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5493)Queries kernel information via 'uname': Jump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5494)Queries kernel information via 'uname': Jump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5495)Queries kernel information via 'uname': Jump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5496)Queries kernel information via 'uname': Jump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5497)Queries kernel information via 'uname': Jump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5498)Queries kernel information via 'uname': Jump to behavior
    Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5525)Queries kernel information via 'uname': Jump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: boatnet.x86.elf PID: 5483, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: boatnet.x86.elf PID: 5485, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: boatnet.x86.elf PID: 5486, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 5486.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5485.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5483.1.0000000008048000.000000000805a000.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: boatnet.x86.elf PID: 5483, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: boatnet.x86.elf PID: 5485, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: boatnet.x86.elf PID: 5486, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
    Hidden Files and Directories
    1
    OS Credential Dumping
    1
    Security Software Discovery
    Remote ServicesData from Local System1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    Service Stop
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
    Obfuscated Files or Information
    LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
    Application Layer Protocol
    Traffic DuplicationData Destruction
    No configs have been found
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589421 Sample: boatnet.x86.elf Startdate: 12/01/2025 Architecture: LINUX Score: 76 24 94.158.245.27, 3778, 39376, 39378 MIVOCLOUDMD Moldova Republic of 2->24 26 185.125.190.26, 443 CANONICAL-ASGB United Kingdom 2->26 28 daisy.ubuntu.com 2->28 30 Malicious sample detected (through community Yara rule) 2->30 32 Multi AV Scanner detection for submitted file 2->32 34 Yara detected Mirai 2->34 36 2 other signatures 2->36 7 boatnet.x86.elf 2->7         started        9 xfce4-panel wrapper-2.0 2->9         started        11 xfce4-panel wrapper-2.0 2->11         started        13 6 other processes 2->13 signatures3 process4 process5 15 boatnet.x86.elf 7->15         started        18 boatnet.x86.elf 7->18         started        20 boatnet.x86.elf 7->20         started        22 wrapper-2.0 xfpm-power-backlight-helper 9->22         started        signatures6 38 Sample tries to kill multiple processes (SIGKILL) 15->38

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    boatnet.x86.elf43%VirustotalBrowse
    boatnet.x86.elf53%ReversingLabsLinux.Backdoor.Mirai
    boatnet.x86.elf100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    daisy.ubuntu.com
    162.213.35.25
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://upx.sf.netboatnet.x86.elffalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        94.158.245.27
        unknownMoldova Republic of
        39798MIVOCLOUDMDfalse
        185.125.190.26
        unknownUnited Kingdom
        41231CANONICAL-ASGBfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        185.125.190.26sst.elfGet hashmaliciousGafgytBrowse
          ssi.elfGet hashmaliciousMirai, GafgytBrowse
            ssc.elfGet hashmaliciousGafgytBrowse
              mips.elfGet hashmaliciousUnknownBrowse
                boatnet.arm7.elfGet hashmaliciousUnknownBrowse
                  boatnet.m68k.elfGet hashmaliciousUnknownBrowse
                    ssh.elfGet hashmaliciousGafgytBrowse
                      gnjqwpc.elfGet hashmaliciousUnknownBrowse
                        Space.arm6.elfGet hashmaliciousUnknownBrowse
                          main_sh4.elfGet hashmaliciousMiraiBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            daisy.ubuntu.comarm6.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.25
                            camp.arm6.elfGet hashmaliciousMiraiBrowse
                            • 162.213.35.25
                            2.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.25
                            x86_64.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.24
                            mips.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.24
                            i686.elfGet hashmaliciousUnknownBrowse
                            • 162.213.35.25
                            ssx.elfGet hashmaliciousGafgytBrowse
                            • 162.213.35.24
                            sss.elfGet hashmaliciousGafgytBrowse
                            • 162.213.35.24
                            sst.elfGet hashmaliciousGafgytBrowse
                            • 162.213.35.25
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            CANONICAL-ASGBxmrig.elfGet hashmaliciousUnknownBrowse
                            • 91.189.91.42
                            yakuza.x32.elfGet hashmaliciousGafgyt, MiraiBrowse
                            • 91.189.91.42
                            yakuza.ppc.elfGet hashmaliciousGafgyt, MiraiBrowse
                            • 91.189.91.42
                            yakuza.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                            • 91.189.91.42
                            yakuza.m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                            • 91.189.91.42
                            camp.i686.elfGet hashmaliciousMiraiBrowse
                            • 91.189.91.42
                            camp.ppc.elfGet hashmaliciousMiraiBrowse
                            • 91.189.91.42
                            camp.arm.elfGet hashmaliciousMiraiBrowse
                            • 91.189.91.42
                            arm5.elfGet hashmaliciousUnknownBrowse
                            • 91.189.91.42
                            12.elfGet hashmaliciousUnknownBrowse
                            • 91.189.91.42
                            MIVOCLOUDMDcamp.x86_64.elfGet hashmaliciousMiraiBrowse
                            • 5.181.159.16
                            camp.arm7.elfGet hashmaliciousMiraiBrowse
                            • 5.181.159.16
                            camp.sh4.elfGet hashmaliciousMiraiBrowse
                            • 5.181.159.16
                            camp.i686.elfGet hashmaliciousMiraiBrowse
                            • 5.181.159.16
                            camp.m68k.elfGet hashmaliciousMiraiBrowse
                            • 5.181.159.16
                            camp.spc.elfGet hashmaliciousMiraiBrowse
                            • 5.181.159.16
                            camp.ppc.elfGet hashmaliciousMiraiBrowse
                            • 5.181.159.16
                            camp.mpsl.elfGet hashmaliciousMiraiBrowse
                            • 5.181.159.16
                            camp.arm.elfGet hashmaliciousMiraiBrowse
                            • 5.181.159.16
                            camp.mips.elfGet hashmaliciousMiraiBrowse
                            • 5.181.159.16
                            No context
                            No context
                            No created / dropped files found
                            File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
                            Entropy (8bit):7.941876445721221
                            TrID:
                            • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                            • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                            File name:boatnet.x86.elf
                            File size:30'412 bytes
                            MD5:545dbe1d228295c958b5a3f6ec4d8278
                            SHA1:f8dff366ea07681be596cdb33911c3f4119d0763
                            SHA256:a8cbba23e7c866ccf3dc8b4d4e1cc5a51de83272cb6f8df8746a51a2817d8f7b
                            SHA512:fe2115ad64b5755a4b4d71660d8de94c0a7f3f7d9eb3519a6e82216621f83d0855a32c41963b22dabac02e9d82c95cca8efce568d2fdafd8123e4f443c335a3f
                            SSDEEP:768:qzMioRCNCd781gwRrQaNn9TrTL94sNvPOuIWljnbcuyD7UoQRjk:ScD7kgCcoBfJ4sN+uIWNnouy8oyI
                            TLSH:55D2F18A61FA0755E1AA00BB1DDF7E0E1C51F3AD1144CDA6BAD4B3B77953F9461043C1
                            File Content Preview:.ELF.....................t..4...........4. ...(......................u...u..........................................Q.td.............................$.4UPX!........0#..0#......U..........?..k.I/.j....\.d*nlz.e.g s....4.0.N..9.....c...GO.$........U...yW.T<

                            ELF header

                            Class:ELF32
                            Data:2's complement, little endian
                            Version:1 (current)
                            Machine:Intel 80386
                            Version Number:0x1
                            Type:EXEC (Executable file)
                            OS/ABI:UNIX - Linux
                            ABI Version:0
                            Entry Point Address:0xc07400
                            Flags:0x0
                            ELF Header Size:52
                            Program Header Offset:52
                            Program Header Size:32
                            Number of Program Headers:3
                            Section Header Offset:0
                            Section Header Size:40
                            Number of Section Headers:0
                            Header String Table Index:0
                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                            LOAD0x00xc010000xc010000x75dc0x75dc7.94470x5R E0x1000
                            LOAD0x9000x805b9000x805b9000x00x00.00000x6RW 0x1000
                            GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 12, 2025 11:51:56.938510895 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:56.943572998 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:56.943633080 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:56.943681002 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:56.948628902 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:56.948684931 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:56.953496933 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.645252943 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.645307064 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.645343065 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.645376921 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.645442009 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.645442009 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.645442009 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.645442963 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.645442963 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.645503998 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.645558119 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.645593882 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.645617008 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.645638943 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.645668983 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.645704031 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.645723104 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.645750999 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.645780087 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.645804882 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.645823956 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.645916939 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.650695086 CET37783937694.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.650767088 CET393763778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.650831938 CET37783937894.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.650928974 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.650968075 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.655807972 CET37783937894.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:57.655881882 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:57.660737038 CET37783937894.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:58.333488941 CET37783937894.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:58.333622932 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.333686113 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.333741903 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.333754063 CET37783937894.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:58.333771944 CET37783937894.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:58.333789110 CET37783937894.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:58.333816051 CET37783937894.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:58.333831072 CET37783937894.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:58.333842993 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.333858013 CET37783937894.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:58.333875895 CET37783937894.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:58.333884001 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.333884001 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.333901882 CET37783937894.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:58.333915949 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.333915949 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.333915949 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.333915949 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.333940029 CET37783937894.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:58.333950043 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.333995104 CET393783778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.340038061 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:58.340131044 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.340219975 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.345015049 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:58.345087051 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:58.349909067 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.050786018 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.050802946 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.050815105 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.050826073 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.051043987 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.051048994 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.051054001 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.051117897 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.051116943 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.051116943 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.051116943 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.051116943 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.051117897 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.051117897 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.051117897 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.051131010 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.051146984 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.051163912 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.051201105 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.051201105 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.051201105 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.051201105 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.056168079 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.056215048 CET37783938094.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.056263924 CET393803778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.056263924 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.056282043 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.061156988 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.061252117 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.066114902 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.754909039 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.755028009 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.755067110 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.755103111 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.755220890 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.755255938 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.755255938 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.755256891 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.755256891 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.755285025 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.755290031 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.755301952 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.755301952 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.755366087 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.755722046 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.755758047 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.755769968 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.755795002 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.755825043 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.755845070 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.760154009 CET37783938294.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.760204077 CET393823778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.760268927 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.760368109 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.760368109 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.765166044 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:51:59.765347004 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:51:59.770268917 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.463109016 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.463289022 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.463335037 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.463335037 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.463411093 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.463454962 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.463504076 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.463504076 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.463519096 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.463555098 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.463572979 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.463591099 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.463603973 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.463624954 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.463640928 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.463660002 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.463675976 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.463696003 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.463716984 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.463736057 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.463747025 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.463779926 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.469475985 CET37783938494.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.469523907 CET393843778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.469567060 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.469671965 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.469687939 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.475847960 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:00.475939989 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:00.481020927 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.174093962 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.174211979 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.174246073 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.174284935 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.174324989 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.174338102 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.174339056 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.174359083 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.174364090 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.174372911 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.174372911 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.174372911 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.174396038 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.174401045 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.174408913 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.174437046 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.174447060 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.174473047 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.174487114 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.174518108 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.174571991 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.174617052 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.179337978 CET37783938694.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.179400921 CET393863778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.179506063 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.179572105 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.179598093 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.184452057 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.184520960 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.189419031 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.863333941 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.863377094 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.863435030 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.863471031 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.863502979 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.863538027 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.863565922 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.863565922 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.863565922 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.863565922 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.863565922 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.863565922 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.863574028 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.863599062 CET393903778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.863599062 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.863605976 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.863631010 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.863642931 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.863646030 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.863681078 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.863687038 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.863729000 CET393883778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.868726969 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.868760109 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.868788958 CET37783938894.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.868972063 CET37783939094.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.869106054 CET393903778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.869119883 CET393903778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.874182940 CET37783939094.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:01.874327898 CET393903778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:01.879462004 CET37783939094.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:02.198803902 CET393903778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:02.247351885 CET37783939094.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:02.356056929 CET37783939094.158.245.27192.168.2.14
                            Jan 12, 2025 11:52:02.356192112 CET393903778192.168.2.1494.158.245.27
                            Jan 12, 2025 11:52:06.027120113 CET46540443192.168.2.14185.125.190.26
                            Jan 12, 2025 11:52:37.002213001 CET46540443192.168.2.14185.125.190.26
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 12, 2025 11:54:41.085539103 CET3771153192.168.2.141.1.1.1
                            Jan 12, 2025 11:54:41.085686922 CET4082853192.168.2.141.1.1.1
                            Jan 12, 2025 11:54:41.093704939 CET53408281.1.1.1192.168.2.14
                            Jan 12, 2025 11:54:41.093750954 CET53377111.1.1.1192.168.2.14
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 12, 2025 11:54:41.085539103 CET192.168.2.141.1.1.10xcb1bStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                            Jan 12, 2025 11:54:41.085686922 CET192.168.2.141.1.1.10xc436Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 12, 2025 11:54:41.093750954 CET1.1.1.1192.168.2.140xcb1bNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                            Jan 12, 2025 11:54:41.093750954 CET1.1.1.1192.168.2.140xcb1bNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                            System Behavior

                            Start time (UTC):10:51:56
                            Start date (UTC):12/01/2025
                            Path:/tmp/boatnet.x86.elf
                            Arguments:/tmp/boatnet.x86.elf
                            File size:30412 bytes
                            MD5 hash:545dbe1d228295c958b5a3f6ec4d8278

                            Start time (UTC):10:51:56
                            Start date (UTC):12/01/2025
                            Path:/tmp/boatnet.x86.elf
                            Arguments:-
                            File size:30412 bytes
                            MD5 hash:545dbe1d228295c958b5a3f6ec4d8278

                            Start time (UTC):10:51:56
                            Start date (UTC):12/01/2025
                            Path:/tmp/boatnet.x86.elf
                            Arguments:-
                            File size:30412 bytes
                            MD5 hash:545dbe1d228295c958b5a3f6ec4d8278

                            Start time (UTC):10:51:56
                            Start date (UTC):12/01/2025
                            Path:/tmp/boatnet.x86.elf
                            Arguments:-
                            File size:30412 bytes
                            MD5 hash:545dbe1d228295c958b5a3f6ec4d8278
                            Start time (UTC):10:52:01
                            Start date (UTC):12/01/2025
                            Path:/usr/bin/xfce4-panel
                            Arguments:-
                            File size:375768 bytes
                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                            Start time (UTC):10:52:01
                            Start date (UTC):12/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
                            File size:35136 bytes
                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                            Start time (UTC):10:52:01
                            Start date (UTC):12/01/2025
                            Path:/usr/bin/xfce4-panel
                            Arguments:-
                            File size:375768 bytes
                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                            Start time (UTC):10:52:01
                            Start date (UTC):12/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
                            File size:35136 bytes
                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                            Start time (UTC):10:52:01
                            Start date (UTC):12/01/2025
                            Path:/usr/bin/xfce4-panel
                            Arguments:-
                            File size:375768 bytes
                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                            Start time (UTC):10:52:01
                            Start date (UTC):12/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
                            File size:35136 bytes
                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                            Start time (UTC):10:52:01
                            Start date (UTC):12/01/2025
                            Path:/usr/bin/xfce4-panel
                            Arguments:-
                            File size:375768 bytes
                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                            Start time (UTC):10:52:01
                            Start date (UTC):12/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
                            File size:35136 bytes
                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                            Start time (UTC):10:52:07
                            Start date (UTC):12/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                            Arguments:-
                            File size:35136 bytes
                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                            Start time (UTC):10:52:07
                            Start date (UTC):12/01/2025
                            Path:/usr/sbin/xfpm-power-backlight-helper
                            Arguments:/usr/sbin/xfpm-power-backlight-helper --get-max-brightness
                            File size:14656 bytes
                            MD5 hash:3d221ad23f28ca3259f599b1664e2427

                            Start time (UTC):10:52:01
                            Start date (UTC):12/01/2025
                            Path:/usr/bin/xfce4-panel
                            Arguments:-
                            File size:375768 bytes
                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                            Start time (UTC):10:52:01
                            Start date (UTC):12/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
                            File size:35136 bytes
                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                            Start time (UTC):10:52:01
                            Start date (UTC):12/01/2025
                            Path:/usr/bin/xfce4-panel
                            Arguments:-
                            File size:375768 bytes
                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                            Start time (UTC):10:52:01
                            Start date (UTC):12/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
                            File size:35136 bytes
                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                            Start time (UTC):10:52:06
                            Start date (UTC):12/01/2025
                            Path:/usr/bin/dbus-daemon
                            Arguments:-
                            File size:249032 bytes
                            MD5 hash:3089d47e3f3ab84cd81c48fd406d7a8c

                            Start time (UTC):10:52:06
                            Start date (UTC):12/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
                            File size:112880 bytes
                            MD5 hash:4c7a0d6d258bb970905b19b84abcd8e9

                            Start time (UTC):10:52:12
                            Start date (UTC):12/01/2025
                            Path:/usr/lib/systemd/systemd
                            Arguments:-
                            File size:1620224 bytes
                            MD5 hash:9b2bec7092a40488108543f9334aab75

                            Start time (UTC):10:52:12
                            Start date (UTC):12/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
                            File size:112872 bytes
                            MD5 hash:eee956f1b227c1d5031f9c61223255d1