Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
rbot.elf

Overview

General Information

Sample name:rbot.elf
Analysis ID:1591232
MD5:764da4a15d2881d0a782d07b9b582916
SHA1:aaef2831235833770567ab02f018f5b910480aa4
SHA256:5cdfe01ce92f6c063109a8263a34b8aa245f19854afcf06054cbfa7ffc3a5508
Tags:elfuser-abuse_ch
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Opens /proc/net/* files useful for finding connected devices and routers
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads system version information
Sample contains only a LOAD segment without any section mappings
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1591232
Start date and time:2025-01-14 20:40:26 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 43s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:rbot.elf
Detection:MAL
Classification:mal64.spre.linELF@0/0@2/0
Command:/tmp/rbot.elf
PID:5717
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
based and botpilled
Standard Error:
  • system is lnxubuntu20
  • rbot.elf (PID: 5717, Parent: 5521, MD5: 764da4a15d2881d0a782d07b9b582916) Arguments: /tmp/rbot.elf
    • rbot.elf New Fork (PID: 5718, Parent: 5717)
      • rbot.elf New Fork (PID: 5719, Parent: 5718)
  • systemd New Fork (PID: 5759, Parent: 1)
  • snap-failure (PID: 5759, Parent: 1, MD5: 69136a7d575731ce62349f2e4d3e5c36) Arguments: /usr/lib/snapd/snap-failure snapd
    • systemctl (PID: 5773, Parent: 5759, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl stop snapd.socket
  • cleanup
SourceRuleDescriptionAuthorStrings
5718.1.0000000008048000.0000000008054000.r-x.sdmpLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0x6074:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
5718.1.0000000008048000.0000000008054000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x49f3:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
5718.1.0000000008048000.0000000008054000.r-x.sdmpLinux_Trojan_Mirai_8aa7b5d3unknownunknown
  • 0x3602:$a: 8B 4C 24 14 8B 74 24 0C 8B 5C 24 10 85 C9 74 0D 31 D2 8A 04 1A 88
5717.1.0000000008048000.0000000008054000.r-x.sdmpLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0x6074:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
5717.1.0000000008048000.0000000008054000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x49f3:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
Click to see the 1 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: rbot.elfVirustotal: Detection: 26%Perma Link
Source: rbot.elfReversingLabs: Detection: 26%
Source: rbot.elfJoe Sandbox ML: detected

Spreading

barindex
Source: /tmp/rbot.elf (PID: 5717)Opens: /proc/net/routeJump to behavior
Source: global trafficTCP traffic: 192.168.2.13:54364 -> 109.71.252.26:3074
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: unknownTCP traffic detected without corresponding DNS query: 109.71.252.26
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

System Summary

barindex
Source: 5718.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5718.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5718.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5717.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5717.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5717.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: LOAD without section mappingsProgram segment: 0x8048000
Source: 5718.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5718.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5718.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5717.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5717.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5717.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: classification engineClassification label: mal64.spre.linELF@0/0@2/0
Source: /usr/lib/snapd/snap-failure (PID: 5773)Systemctl executable: /usr/bin/systemctl -> systemctl stop snapd.socketJump to behavior
Source: /usr/lib/snapd/snap-failure (PID: 5759)Reads version info: /proc/versionJump to behavior
Source: rbot.elfSubmission file: segment LOAD with 7.9412 entropy (max. 8.0)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Systemd Service
1
Systemd Service
1
Obfuscated Files or Information
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
Remote System Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591232 Sample: rbot.elf Startdate: 14/01/2025 Architecture: LINUX Score: 64 21 109.71.252.26, 3074, 54364, 54366 ATLANTIACLOUDNL Germany 2->21 23 daisy.ubuntu.com 2->23 25 Malicious sample detected (through community Yara rule) 2->25 27 Multi AV Scanner detection for submitted file 2->27 29 Machine Learning detection for sample 2->29 8 rbot.elf 2->8         started        11 systemd snap-failure 2->11         started        signatures3 process4 signatures5 31 Opens /proc/net/* files useful for finding connected devices and routers 8->31 13 rbot.elf 8->13         started        15 snap-failure systemctl 11->15         started        17 snap-failure 11->17         started        process6 process7 19 rbot.elf 13->19         started       
SourceDetectionScannerLabelLink
rbot.elf27%VirustotalBrowse
rbot.elf26%ReversingLabsWin32.Trojan.Generic
rbot.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    109.71.252.26
    unknownGermany
    207770ATLANTIACLOUDNLfalse
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    daisy.ubuntu.comFantazy.arm4.elfGet hashmaliciousUnknownBrowse
    • 162.213.35.24
    Kloki.arm6.elfGet hashmaliciousUnknownBrowse
    • 162.213.35.25
    a-r.m-6.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 162.213.35.25
    arm6.elfGet hashmaliciousUnknownBrowse
    • 162.213.35.24
    rebirth.sh4.elfGet hashmaliciousGafgytBrowse
    • 162.213.35.24
    rebirth.arm4.elfGet hashmaliciousGafgytBrowse
    • 162.213.35.25
    s-h.4-.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 162.213.35.25
    rebirth.arm6.elfGet hashmaliciousGafgytBrowse
    • 162.213.35.25
    rebirth.spc.elfGet hashmaliciousGafgytBrowse
    • 162.213.35.25
    m-i.p-s.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 162.213.35.24
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    ATLANTIACLOUDNL109.71.252.43-boatnet.ppc-2024-12-28T20_30_37.elfGet hashmaliciousMiraiBrowse
    • 109.71.252.43
    109.71.252.43-boatnet.m68k-2024-12-28T20_30_38.elfGet hashmaliciousMiraiBrowse
    • 109.71.252.43
    boatnet.arm7.elfGet hashmaliciousMiraiBrowse
    • 109.71.252.43
    boatnet.spc.elfGet hashmaliciousMiraiBrowse
    • 109.71.252.43
    109.71.252.43-boatnet.sh4-2024-12-28T20_30_38.elfGet hashmaliciousMiraiBrowse
    • 109.71.252.43
    boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
    • 109.71.252.43
    boatnet.mips.elfGet hashmaliciousMiraiBrowse
    • 109.71.252.43
    boatnet.x86.elfGet hashmaliciousMiraiBrowse
    • 109.71.252.43
    109.71.252.43-boatnet.arm-2024-12-28T20_30_37.elfGet hashmaliciousMiraiBrowse
    • 109.71.252.43
    REQUEST FOR QUOTATION.docx.docGet hashmaliciousAgentTesla, PureLog StealerBrowse
    • 109.71.253.25
    No context
    No context
    No created / dropped files found
    File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
    Entropy (8bit):7.938142302846996
    TrID:
    • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
    • ELF Executable and Linkable format (generic) (4004/1) 49.84%
    File name:rbot.elf
    File size:28'884 bytes
    MD5:764da4a15d2881d0a782d07b9b582916
    SHA1:aaef2831235833770567ab02f018f5b910480aa4
    SHA256:5cdfe01ce92f6c063109a8263a34b8aa245f19854afcf06054cbfa7ffc3a5508
    SHA512:fb2a07dae06c08589de4a3a938c7f6ef916e6e804b0c081e392ac63943c509b009c6b9229b92bca0e7190b9636dc38cdc6ddcdf814646481cf4bbe9e6adb2b3f
    SSDEEP:768:3KNkRo43bpHlMyVj9FPwPwmnBH4DyvDDWSfJjnbcuyD7Uryqp:5xbpHlzj9FPwPwmBHk6DDfBnouy8mqp
    TLSH:BCD2E171A2978725D41634BE2F5D7CCB9050930EF1485AD8BFD89BB7BC62FA13A04217
    File Content Preview:.ELF........................4...........4. ...(......................o...o..........................................Q.td.............................4.IYTS.....................T..........?..k.I/.j....\.d*nlz.f..../:..5.KT7S..Rh........"...o..8.|.U.....Q4V

    ELF header

    Class:ELF32
    Data:2's complement, little endian
    Version:1 (current)
    Machine:Intel 80386
    Version Number:0x1
    Type:EXEC (Executable file)
    OS/ABI:UNIX - Linux
    ABI Version:0
    Entry Point Address:0x804dde8
    Flags:0x0
    ELF Header Size:52
    Program Header Offset:52
    Program Header Size:32
    Number of Program Headers:3
    Section Header Offset:0
    Section Header Size:40
    Number of Section Headers:0
    Header String Table Index:0
    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
    LOAD0x00x80480000x80480000x6fdc0x6fdc7.94120x5R E0x1000
    LOAD0x00x804f0000x804f0000x00xb9a40.00000x6RW 0x1000
    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
    TimestampSource PortDest PortSource IPDest IP
    Jan 14, 2025 20:42:05.037775040 CET543643074192.168.2.13109.71.252.26
    Jan 14, 2025 20:42:05.042649031 CET307454364109.71.252.26192.168.2.13
    Jan 14, 2025 20:42:05.042701960 CET543643074192.168.2.13109.71.252.26
    Jan 14, 2025 20:42:05.042836905 CET543643074192.168.2.13109.71.252.26
    Jan 14, 2025 20:42:05.047632933 CET307454364109.71.252.26192.168.2.13
    Jan 14, 2025 20:42:26.415904045 CET307454364109.71.252.26192.168.2.13
    Jan 14, 2025 20:42:26.416286945 CET543643074192.168.2.13109.71.252.26
    Jan 14, 2025 20:42:26.416341066 CET543663074192.168.2.13109.71.252.26
    Jan 14, 2025 20:42:26.421251059 CET307454364109.71.252.26192.168.2.13
    Jan 14, 2025 20:42:26.421273947 CET307454366109.71.252.26192.168.2.13
    Jan 14, 2025 20:42:26.421401978 CET543663074192.168.2.13109.71.252.26
    Jan 14, 2025 20:42:26.421463013 CET543663074192.168.2.13109.71.252.26
    Jan 14, 2025 20:42:26.426243067 CET307454366109.71.252.26192.168.2.13
    Jan 14, 2025 20:42:47.775640011 CET307454366109.71.252.26192.168.2.13
    Jan 14, 2025 20:42:47.775947094 CET543663074192.168.2.13109.71.252.26
    Jan 14, 2025 20:42:47.775976896 CET543683074192.168.2.13109.71.252.26
    Jan 14, 2025 20:42:47.780824900 CET307454366109.71.252.26192.168.2.13
    Jan 14, 2025 20:42:47.780855894 CET307454368109.71.252.26192.168.2.13
    Jan 14, 2025 20:42:47.780987024 CET543683074192.168.2.13109.71.252.26
    Jan 14, 2025 20:42:47.780987024 CET543683074192.168.2.13109.71.252.26
    Jan 14, 2025 20:42:47.785819054 CET307454368109.71.252.26192.168.2.13
    Jan 14, 2025 20:43:09.153069973 CET307454368109.71.252.26192.168.2.13
    Jan 14, 2025 20:43:09.153556108 CET543683074192.168.2.13109.71.252.26
    Jan 14, 2025 20:43:09.153557062 CET543703074192.168.2.13109.71.252.26
    Jan 14, 2025 20:43:09.158524036 CET307454368109.71.252.26192.168.2.13
    Jan 14, 2025 20:43:09.158560038 CET307454370109.71.252.26192.168.2.13
    Jan 14, 2025 20:43:09.158663988 CET543703074192.168.2.13109.71.252.26
    Jan 14, 2025 20:43:09.158747911 CET543703074192.168.2.13109.71.252.26
    Jan 14, 2025 20:43:09.163688898 CET307454370109.71.252.26192.168.2.13
    Jan 14, 2025 20:43:30.574928045 CET307454370109.71.252.26192.168.2.13
    Jan 14, 2025 20:43:30.575352907 CET543703074192.168.2.13109.71.252.26
    Jan 14, 2025 20:43:30.575433016 CET543723074192.168.2.13109.71.252.26
    Jan 14, 2025 20:43:30.580337048 CET307454370109.71.252.26192.168.2.13
    Jan 14, 2025 20:43:30.580373049 CET307454372109.71.252.26192.168.2.13
    Jan 14, 2025 20:43:30.580563068 CET543723074192.168.2.13109.71.252.26
    Jan 14, 2025 20:43:30.580563068 CET543723074192.168.2.13109.71.252.26
    Jan 14, 2025 20:43:30.585441113 CET307454372109.71.252.26192.168.2.13
    Jan 14, 2025 20:43:51.981829882 CET307454372109.71.252.26192.168.2.13
    Jan 14, 2025 20:43:51.982110023 CET543723074192.168.2.13109.71.252.26
    Jan 14, 2025 20:43:51.982304096 CET543743074192.168.2.13109.71.252.26
    Jan 14, 2025 20:43:51.987437963 CET307454372109.71.252.26192.168.2.13
    Jan 14, 2025 20:43:51.987474918 CET307454374109.71.252.26192.168.2.13
    Jan 14, 2025 20:43:51.987597942 CET543743074192.168.2.13109.71.252.26
    Jan 14, 2025 20:43:51.987700939 CET543743074192.168.2.13109.71.252.26
    Jan 14, 2025 20:43:51.992804050 CET307454374109.71.252.26192.168.2.13
    Jan 14, 2025 20:44:13.392394066 CET307454374109.71.252.26192.168.2.13
    Jan 14, 2025 20:44:13.392622948 CET543743074192.168.2.13109.71.252.26
    Jan 14, 2025 20:44:13.392695904 CET543763074192.168.2.13109.71.252.26
    Jan 14, 2025 20:44:13.397511959 CET307454374109.71.252.26192.168.2.13
    Jan 14, 2025 20:44:13.397572994 CET307454376109.71.252.26192.168.2.13
    Jan 14, 2025 20:44:13.397644997 CET543763074192.168.2.13109.71.252.26
    Jan 14, 2025 20:44:13.397727966 CET543763074192.168.2.13109.71.252.26
    Jan 14, 2025 20:44:13.402517080 CET307454376109.71.252.26192.168.2.13
    Jan 14, 2025 20:44:34.795017004 CET307454376109.71.252.26192.168.2.13
    Jan 14, 2025 20:44:34.795254946 CET543763074192.168.2.13109.71.252.26
    Jan 14, 2025 20:44:34.795346975 CET543783074192.168.2.13109.71.252.26
    Jan 14, 2025 20:44:34.800268888 CET307454376109.71.252.26192.168.2.13
    Jan 14, 2025 20:44:34.800313950 CET307454378109.71.252.26192.168.2.13
    Jan 14, 2025 20:44:34.800383091 CET543783074192.168.2.13109.71.252.26
    Jan 14, 2025 20:44:34.800466061 CET543783074192.168.2.13109.71.252.26
    Jan 14, 2025 20:44:34.805341959 CET307454378109.71.252.26192.168.2.13
    Jan 14, 2025 20:44:49.158636093 CET3481853192.168.2.138.8.8.8
    Jan 14, 2025 20:44:49.163510084 CET53348188.8.8.8192.168.2.13
    Jan 14, 2025 20:44:49.163575888 CET3481853192.168.2.138.8.8.8
    Jan 14, 2025 20:44:49.163597107 CET3481853192.168.2.138.8.8.8
    Jan 14, 2025 20:44:49.163613081 CET3481853192.168.2.138.8.8.8
    Jan 14, 2025 20:44:49.168462992 CET53348188.8.8.8192.168.2.13
    Jan 14, 2025 20:44:49.168473959 CET53348188.8.8.8192.168.2.13
    Jan 14, 2025 20:44:49.658366919 CET53348188.8.8.8192.168.2.13
    Jan 14, 2025 20:44:49.658773899 CET3481853192.168.2.138.8.8.8
    Jan 14, 2025 20:44:51.658550024 CET53348188.8.8.8192.168.2.13
    Jan 14, 2025 20:44:51.658767939 CET3481853192.168.2.138.8.8.8
    Jan 14, 2025 20:44:51.663650990 CET53348188.8.8.8192.168.2.13
    Jan 14, 2025 20:44:56.187689066 CET307454378109.71.252.26192.168.2.13
    Jan 14, 2025 20:44:56.188311100 CET543823074192.168.2.13109.71.252.26
    Jan 14, 2025 20:44:56.188317060 CET543783074192.168.2.13109.71.252.26
    Jan 14, 2025 20:44:56.193139076 CET307454378109.71.252.26192.168.2.13
    Jan 14, 2025 20:44:56.193151951 CET307454382109.71.252.26192.168.2.13
    Jan 14, 2025 20:44:56.193242073 CET543823074192.168.2.13109.71.252.26
    Jan 14, 2025 20:44:56.193314075 CET543823074192.168.2.13109.71.252.26
    Jan 14, 2025 20:44:56.198075056 CET307454382109.71.252.26192.168.2.13
    Jan 14, 2025 20:45:17.623727083 CET307454382109.71.252.26192.168.2.13
    Jan 14, 2025 20:45:17.623986006 CET543823074192.168.2.13109.71.252.26
    Jan 14, 2025 20:45:17.624182940 CET543843074192.168.2.13109.71.252.26
    Jan 14, 2025 20:45:17.628791094 CET307454382109.71.252.26192.168.2.13
    Jan 14, 2025 20:45:17.628977060 CET307454384109.71.252.26192.168.2.13
    Jan 14, 2025 20:45:17.629069090 CET543843074192.168.2.13109.71.252.26
    Jan 14, 2025 20:45:17.629127979 CET543843074192.168.2.13109.71.252.26
    Jan 14, 2025 20:45:17.633920908 CET307454384109.71.252.26192.168.2.13
    Jan 14, 2025 20:45:38.983084917 CET307454384109.71.252.26192.168.2.13
    Jan 14, 2025 20:45:38.983364105 CET543843074192.168.2.13109.71.252.26
    Jan 14, 2025 20:45:38.983472109 CET543863074192.168.2.13109.71.252.26
    Jan 14, 2025 20:45:38.988218069 CET307454384109.71.252.26192.168.2.13
    Jan 14, 2025 20:45:38.988255024 CET307454386109.71.252.26192.168.2.13
    Jan 14, 2025 20:45:38.988301992 CET543863074192.168.2.13109.71.252.26
    Jan 14, 2025 20:45:38.988343000 CET543863074192.168.2.13109.71.252.26
    Jan 14, 2025 20:45:38.993169069 CET307454386109.71.252.26192.168.2.13
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jan 14, 2025 20:44:49.163597107 CET192.168.2.138.8.8.80xdc1Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
    Jan 14, 2025 20:44:49.163613081 CET192.168.2.138.8.8.80xd375Standard query (0)daisy.ubuntu.com28IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jan 14, 2025 20:44:49.658366919 CET8.8.8.8192.168.2.130xdc1No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
    Jan 14, 2025 20:44:49.658366919 CET8.8.8.8192.168.2.130xdc1No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

    System Behavior

    Start time (UTC):19:42:03
    Start date (UTC):14/01/2025
    Path:/tmp/rbot.elf
    Arguments:/tmp/rbot.elf
    File size:28884 bytes
    MD5 hash:764da4a15d2881d0a782d07b9b582916

    Start time (UTC):19:42:04
    Start date (UTC):14/01/2025
    Path:/tmp/rbot.elf
    Arguments:-
    File size:28884 bytes
    MD5 hash:764da4a15d2881d0a782d07b9b582916

    Start time (UTC):19:42:04
    Start date (UTC):14/01/2025
    Path:/tmp/rbot.elf
    Arguments:-
    File size:28884 bytes
    MD5 hash:764da4a15d2881d0a782d07b9b582916
    Start time (UTC):19:42:43
    Start date (UTC):14/01/2025
    Path:/usr/lib/systemd/systemd
    Arguments:-
    File size:1620224 bytes
    MD5 hash:9b2bec7092a40488108543f9334aab75

    Start time (UTC):19:42:43
    Start date (UTC):14/01/2025
    Path:/usr/lib/snapd/snap-failure
    Arguments:/usr/lib/snapd/snap-failure snapd
    File size:4764904 bytes
    MD5 hash:69136a7d575731ce62349f2e4d3e5c36

    Start time (UTC):19:42:43
    Start date (UTC):14/01/2025
    Path:/usr/lib/snapd/snap-failure
    Arguments:-
    File size:4764904 bytes
    MD5 hash:69136a7d575731ce62349f2e4d3e5c36

    Start time (UTC):19:42:43
    Start date (UTC):14/01/2025
    Path:/usr/bin/systemctl
    Arguments:systemctl stop snapd.socket
    File size:996584 bytes
    MD5 hash:4deddfb6741481f68aeac522cc26ff4b

    Start time (UTC):19:42:43
    Start date (UTC):14/01/2025
    Path:/usr/lib/snapd/snap-failure
    Arguments:-
    File size:4764904 bytes
    MD5 hash:69136a7d575731ce62349f2e4d3e5c36