Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
ub8ehJSePAfc9FYqZIT6.x86_64.elf

Overview

General Information

Sample name:ub8ehJSePAfc9FYqZIT6.x86_64.elf
Analysis ID:1591915
MD5:eadf195933f9d4ba0fc3687b56fcf912
SHA1:a0b4328d78fb5746529d2f5e1db26e1074013a58
SHA256:43d60410699abf69677eef78eed754d524b8cb8035e344d2ab24f7133ad0b34e
Tags:elfuser-abuse_ch
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Sample is packed with UPX
Sample tries to kill multiple processes (SIGKILL)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Sample contains only a LOAD segment without any section mappings
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1591915
Start date and time:2025-01-15 15:55:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 53s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ub8ehJSePAfc9FYqZIT6.x86_64.elf
Detection:MAL
Classification:mal68.spre.evad.linELF@0/0@2/0
Command:/tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf
PID:5538
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • wrapper-2.0 (PID: 5549, Parent: 3235, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
  • wrapper-2.0 (PID: 5550, Parent: 3235, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
  • wrapper-2.0 (PID: 5551, Parent: 3235, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
  • wrapper-2.0 (PID: 5552, Parent: 3235, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
    • xfpm-power-backlight-helper (PID: 5571, Parent: 5552, MD5: 3d221ad23f28ca3259f599b1664e2427) Arguments: /usr/sbin/xfpm-power-backlight-helper --get-max-brightness
  • wrapper-2.0 (PID: 5553, Parent: 3235, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
  • wrapper-2.0 (PID: 5554, Parent: 3235, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
  • xfconfd (PID: 5570, Parent: 5569, MD5: 4c7a0d6d258bb970905b19b84abcd8e9) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
  • systemd New Fork (PID: 5579, Parent: 3044)
  • xfce4-notifyd (PID: 5579, Parent: 3044, MD5: eee956f1b227c1d5031f9c61223255d1) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
  • cleanup
SourceRuleDescriptionAuthorStrings
ub8ehJSePAfc9FYqZIT6.x86_64.elfLinux_Trojan_Ircbot_bb204b81unknownunknown
  • 0x404a:$a: 0F 44 C8 4C 5E F8 8D EF 80 83 CD FF 31 DB 30 22
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ub8ehJSePAfc9FYqZIT6.x86_64.elfVirustotal: Detection: 20%Perma Link
Source: ub8ehJSePAfc9FYqZIT6.x86_64.elfReversingLabs: Detection: 15%
Source: ub8ehJSePAfc9FYqZIT6.x86_64.elfJoe Sandbox ML: detected
Source: global trafficTCP traffic: 192.168.2.15:51668 -> 94.154.35.185:3778
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownTCP traffic detected without corresponding DNS query: 94.154.35.185
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: ub8ehJSePAfc9FYqZIT6.x86_64.elfString found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: ub8ehJSePAfc9FYqZIT6.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Ircbot_bb204b81 Author: unknown
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3192, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3249, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3250, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3251, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3252, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3253, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3255, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3272, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3274, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3298, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5543, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5544, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5549, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5550, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5551, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5552, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5553, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5554, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5570, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5579, result: successfulJump to behavior
Source: LOAD without section mappingsProgram segment: 0x400000
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3192, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3249, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3250, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3251, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3252, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3253, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3255, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3272, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3274, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 3298, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5543, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5544, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5549, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5550, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5551, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5552, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5553, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5554, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5570, result: successfulJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)SIGKILL sent: pid: 5579, result: successfulJump to behavior
Source: ub8ehJSePAfc9FYqZIT6.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Ircbot_bb204b81 reference_sample = 6147481d083c707dc98905a1286827a6e7009e08490e7d7c280ed5a6356527ad, os = linux, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Ircbot, fingerprint = 66f9a8a31653a5e480f427d2d6a25b934c2c53752308eedb57eaa7b7cb7dde2e, id = bb204b81-db58-434f-b834-672cdc25e56c, last_modified = 2021-09-16
Source: classification engineClassification label: mal68.spre.evad.linELF@0/0@2/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5549)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5550)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5551)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5552)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/local/share/fonts/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /home/saturnino/.local/share/fonts/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /home/saturnino/.fonts/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/X11/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/cMap/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/cmap/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/opentype/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/truetype/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/type1/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/X11/Type1/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/X11/encodings/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/X11/misc/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/X11/util/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/cmap/adobe-cns1/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/cmap/adobe-gb1/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/cmap/adobe-japan1/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/cmap/adobe-japan2/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /usr/share/fonts/cmap/adobe-korea1/.uuidJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /home/saturnino/.cacheJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /home/saturnino/.localJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Directory: /home/saturnino/.configJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5554)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5570)Directory: /home/saturnino/.cacheJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5570)Directory: /home/saturnino/.localJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5570)Directory: /home/saturnino/.configJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd (PID: 5570)Directory: /home/saturnino/.configJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5579)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5579)Directory: /home/saturnino/.cacheJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5579)Directory: /home/saturnino/.localJump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5579)Directory: /home/saturnino/.configJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5543/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1185/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3241/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3483/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1732/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1730/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1333/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1695/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3235/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3234/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/911/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/515/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1617/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1615/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3757/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5550/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5551/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5672/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5552/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5673/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5553/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5554/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3255/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3253/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1591/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3252/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3251/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3250/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1623/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3249/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/764/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3368/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1585/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3488/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/766/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/888/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5544/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1509/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/804/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5549/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1867/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3407/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1484/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1514/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1634/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1479/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1875/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/654/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3379/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/655/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/656/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/777/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/931/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1595/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/657/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/812/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/779/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/658/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/933/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/418/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/419/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3419/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5570/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5571/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3310/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3275/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3274/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3273/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3394/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3272/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/782/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3303/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1762/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3027/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1486/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/789/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1806/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5569/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3700/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1660/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3440/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/793/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/794/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3316/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/674/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/796/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/675/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/676/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1498/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1497/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1496/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3157/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3278/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3399/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/5579/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/1659/cmdlineJump to behavior
Source: /tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf (PID: 5541)File opened: /proc/3691/cmdlineJump to behavior
Source: ub8ehJSePAfc9FYqZIT6.x86_64.elfSubmission file: segment LOAD with 7.8453 entropy (max. 8.0)
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5549)Queries kernel information via 'uname': Jump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5550)Queries kernel information via 'uname': Jump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5551)Queries kernel information via 'uname': Jump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5552)Queries kernel information via 'uname': Jump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5553)Queries kernel information via 'uname': Jump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 (PID: 5554)Queries kernel information via 'uname': Jump to behavior
Source: /usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd (PID: 5579)Queries kernel information via 'uname': Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Hidden Files and Directories
1
OS Credential Dumping
1
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network Medium1
Service Stop
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
Obfuscated Files or Information
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591915 Sample: ub8ehJSePAfc9FYqZIT6.x86_64.elf Startdate: 15/01/2025 Architecture: LINUX Score: 68 27 94.154.35.185, 3778, 51668, 51670 SELECTELRU Ukraine 2->27 29 daisy.ubuntu.com 2->29 33 Malicious sample detected (through community Yara rule) 2->33 35 Multi AV Scanner detection for submitted file 2->35 37 Machine Learning detection for sample 2->37 39 Sample is packed with UPX 2->39 8 ub8ehJSePAfc9FYqZIT6.x86_64.elf 2->8         started        10 xfce4-panel wrapper-2.0 2->10         started        12 xfce4-panel wrapper-2.0 2->12         started        14 6 other processes 2->14 signatures3 process4 process5 16 ub8ehJSePAfc9FYqZIT6.x86_64.elf 8->16         started        19 ub8ehJSePAfc9FYqZIT6.x86_64.elf 8->19         started        21 ub8ehJSePAfc9FYqZIT6.x86_64.elf 8->21         started        23 wrapper-2.0 xfpm-power-backlight-helper 10->23         started        signatures6 31 Sample tries to kill multiple processes (SIGKILL) 16->31 25 ub8ehJSePAfc9FYqZIT6.x86_64.elf 19->25         started        process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ub8ehJSePAfc9FYqZIT6.x86_64.elf21%VirustotalBrowse
ub8ehJSePAfc9FYqZIT6.x86_64.elf16%ReversingLabsLinux.Backdoor.Mirai
ub8ehJSePAfc9FYqZIT6.x86_64.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netub8ehJSePAfc9FYqZIT6.x86_64.elffalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      94.154.35.185
      unknownUkraine
      49505SELECTELRUfalse
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      daisy.ubuntu.comxd.arm6.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.25
      code1.png.elfGet hashmaliciousXmrigBrowse
      • 162.213.35.25
      Aqua.arm6.elfGet hashmaliciousUnknownBrowse
      • 162.213.35.25
      45.131.111.37-boatnet.m68k-2025-01-15T02_13_34.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.25
      45.131.111.37-boatnet.arm-2025-01-15T02_13_33.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.24
      45.131.111.37-boatnet.x86-2025-01-15T02_13_35.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.25
      Mozi.m.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.24
      la.bot.x86_64.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.24
      mpsl.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.24
      arm5.elfGet hashmaliciousMiraiBrowse
      • 162.213.35.25
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      SELECTELRUhttp://176.113.115.170/1/1.pngGet hashmaliciousUnknownBrowse
      • 176.113.115.170
      https://xafecio.top/Get hashmaliciousUnknownBrowse
      • 95.213.179.67
      87.247.158.212 (3).ps1Get hashmaliciousXWormBrowse
      • 87.247.158.212
      L7GNkeVm5e.exeGet hashmaliciousLummaCBrowse
      • 176.113.115.19
      NDWffRLk7z.exeGet hashmaliciousLummaCBrowse
      • 176.113.115.19
      g3toRYa6JE.exeGet hashmaliciousLummaCBrowse
      • 176.113.115.19
      lBb4XI4eGD.exeGet hashmaliciousLummaCBrowse
      • 176.113.115.19
      176.113.115.170.ps1Get hashmaliciousXWormBrowse
      • 176.113.115.170
      b0cQukXPAl.exeGet hashmaliciousLummaCBrowse
      • 176.113.115.19
      Mmm7GmDcR4.exeGet hashmaliciousLummaCBrowse
      • 176.113.115.19
      No context
      No context
      No created / dropped files found
      File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
      Entropy (8bit):7.836375024858882
      TrID:
      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
      File name:ub8ehJSePAfc9FYqZIT6.x86_64.elf
      File size:17'436 bytes
      MD5:eadf195933f9d4ba0fc3687b56fcf912
      SHA1:a0b4328d78fb5746529d2f5e1db26e1074013a58
      SHA256:43d60410699abf69677eef78eed754d524b8cb8035e344d2ab24f7133ad0b34e
      SHA512:dd8aefa57936685c0aca304777fb7cf8e20fe1760e0c795981e9091946a6c4928dc0416593e3ab831eca5db2e8b0b089f786ab74cef52c2a32f7d0373227ffb9
      SSDEEP:384:llWw+Jg28pCVYNFZIpU4RiRvmxPlPtAutTWcaiFqcJ0y:mw+VGZh4GvIWbsCy
      TLSH:5472D015837A11A2E1C6CAF0816708917D32B632CBEF5DB6FC80764A5E12D1EA7121F5
      File Content Preview:.ELF..............>..... ;@.....@...................@.8...@.......................@.......@......C.......C........ .......................`.......`.............................Q.td........................................................UPX!.........{...{.

      ELF header

      Class:ELF64
      Data:2's complement, little endian
      Version:1 (current)
      Machine:Advanced Micro Devices X86-64
      Version Number:0x1
      Type:EXEC (Executable file)
      OS/ABI:UNIX - System V
      ABI Version:0
      Entry Point Address:0x403b20
      Flags:0x0
      ELF Header Size:64
      Program Header Offset:64
      Program Header Size:56
      Number of Program Headers:3
      Section Header Offset:0
      Section Header Size:64
      Number of Section Headers:0
      Header String Table Index:0
      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
      LOAD0x00x4000000x4000000x430a0x430a7.84530x5R E0x200000
      LOAD0x6a00x6086a00x6086a00x00x00.00000x6RW 0x1000
      GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
      TimestampSource PortDest PortSource IPDest IP
      Jan 15, 2025 15:55:56.168551922 CET516683778192.168.2.1594.154.35.185
      Jan 15, 2025 15:55:56.173626900 CET37785166894.154.35.185192.168.2.15
      Jan 15, 2025 15:55:56.173687935 CET516683778192.168.2.1594.154.35.185
      Jan 15, 2025 15:55:56.173715115 CET516683778192.168.2.1594.154.35.185
      Jan 15, 2025 15:55:56.178634882 CET37785166894.154.35.185192.168.2.15
      Jan 15, 2025 15:55:56.179178953 CET516703778192.168.2.1594.154.35.185
      Jan 15, 2025 15:55:56.184063911 CET37785167094.154.35.185192.168.2.15
      Jan 15, 2025 15:55:56.184115887 CET516703778192.168.2.1594.154.35.185
      Jan 15, 2025 15:55:56.184175968 CET516703778192.168.2.1594.154.35.185
      Jan 15, 2025 15:55:56.188971043 CET37785167094.154.35.185192.168.2.15
      Jan 15, 2025 15:55:57.067053080 CET37785166894.154.35.185192.168.2.15
      Jan 15, 2025 15:55:57.067126036 CET37785167094.154.35.185192.168.2.15
      Jan 15, 2025 15:55:57.067186117 CET516683778192.168.2.1594.154.35.185
      Jan 15, 2025 15:55:57.067186117 CET516703778192.168.2.1594.154.35.185
      Jan 15, 2025 15:55:57.067225933 CET516683778192.168.2.1594.154.35.185
      Jan 15, 2025 15:55:57.067225933 CET516703778192.168.2.1594.154.35.185
      Jan 15, 2025 15:55:57.072216034 CET37785166894.154.35.185192.168.2.15
      Jan 15, 2025 15:55:57.072276115 CET516683778192.168.2.1594.154.35.185
      Jan 15, 2025 15:55:57.077112913 CET37785167094.154.35.185192.168.2.15
      Jan 15, 2025 15:55:57.077163935 CET516703778192.168.2.1594.154.35.185
      Jan 15, 2025 15:55:57.078001022 CET37785166894.154.35.185192.168.2.15
      Jan 15, 2025 15:55:57.084253073 CET37785167094.154.35.185192.168.2.15
      Jan 15, 2025 15:56:01.784564972 CET516683778192.168.2.1594.154.35.185
      Jan 15, 2025 15:56:01.789792061 CET37785166894.154.35.185192.168.2.15
      Jan 15, 2025 15:56:01.789880037 CET516683778192.168.2.1594.154.35.185
      Jan 15, 2025 15:56:01.817507982 CET516703778192.168.2.1594.154.35.185
      Jan 15, 2025 15:56:01.822998047 CET37785167094.154.35.185192.168.2.15
      Jan 15, 2025 15:56:01.823051929 CET516703778192.168.2.1594.154.35.185
      TimestampSource PortDest PortSource IPDest IP
      Jan 15, 2025 15:58:39.719784975 CET5730453192.168.2.151.1.1.1
      Jan 15, 2025 15:58:39.720295906 CET3725253192.168.2.151.1.1.1
      Jan 15, 2025 15:58:39.952899933 CET53573041.1.1.1192.168.2.15
      Jan 15, 2025 15:58:39.952923059 CET53372521.1.1.1192.168.2.15
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Jan 15, 2025 15:58:39.719784975 CET192.168.2.151.1.1.10x6f0fStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
      Jan 15, 2025 15:58:39.720295906 CET192.168.2.151.1.1.10x54Standard query (0)daisy.ubuntu.com28IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Jan 15, 2025 15:58:39.952899933 CET1.1.1.1192.168.2.150x6f0fNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
      Jan 15, 2025 15:58:39.952899933 CET1.1.1.1192.168.2.150x6f0fNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

      System Behavior

      Start time (UTC):14:55:55
      Start date (UTC):15/01/2025
      Path:/tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf
      Arguments:/tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf
      File size:17436 bytes
      MD5 hash:eadf195933f9d4ba0fc3687b56fcf912

      Start time (UTC):14:55:55
      Start date (UTC):15/01/2025
      Path:/tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf
      Arguments:-
      File size:17436 bytes
      MD5 hash:eadf195933f9d4ba0fc3687b56fcf912

      Start time (UTC):14:55:55
      Start date (UTC):15/01/2025
      Path:/tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf
      Arguments:-
      File size:17436 bytes
      MD5 hash:eadf195933f9d4ba0fc3687b56fcf912

      Start time (UTC):14:55:55
      Start date (UTC):15/01/2025
      Path:/tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf
      Arguments:-
      File size:17436 bytes
      MD5 hash:eadf195933f9d4ba0fc3687b56fcf912

      Start time (UTC):14:55:55
      Start date (UTC):15/01/2025
      Path:/tmp/ub8ehJSePAfc9FYqZIT6.x86_64.elf
      Arguments:-
      File size:17436 bytes
      MD5 hash:eadf195933f9d4ba0fc3687b56fcf912

      Start time (UTC):14:56:00
      Start date (UTC):15/01/2025
      Path:/usr/bin/xfce4-panel
      Arguments:-
      File size:375768 bytes
      MD5 hash:a15b657c7d54ac1385f1f15004ea6784

      Start time (UTC):14:56:00
      Start date (UTC):15/01/2025
      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
      File size:35136 bytes
      MD5 hash:ac0b8a906f359a8ae102244738682e76

      Start time (UTC):14:56:00
      Start date (UTC):15/01/2025
      Path:/usr/bin/xfce4-panel
      Arguments:-
      File size:375768 bytes
      MD5 hash:a15b657c7d54ac1385f1f15004ea6784

      Start time (UTC):14:56:00
      Start date (UTC):15/01/2025
      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
      File size:35136 bytes
      MD5 hash:ac0b8a906f359a8ae102244738682e76

      Start time (UTC):14:56:00
      Start date (UTC):15/01/2025
      Path:/usr/bin/xfce4-panel
      Arguments:-
      File size:375768 bytes
      MD5 hash:a15b657c7d54ac1385f1f15004ea6784

      Start time (UTC):14:56:00
      Start date (UTC):15/01/2025
      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
      File size:35136 bytes
      MD5 hash:ac0b8a906f359a8ae102244738682e76

      Start time (UTC):14:56:00
      Start date (UTC):15/01/2025
      Path:/usr/bin/xfce4-panel
      Arguments:-
      File size:375768 bytes
      MD5 hash:a15b657c7d54ac1385f1f15004ea6784

      Start time (UTC):14:56:00
      Start date (UTC):15/01/2025
      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
      File size:35136 bytes
      MD5 hash:ac0b8a906f359a8ae102244738682e76

      Start time (UTC):14:56:07
      Start date (UTC):15/01/2025
      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
      Arguments:-
      File size:35136 bytes
      MD5 hash:ac0b8a906f359a8ae102244738682e76

      Start time (UTC):14:56:07
      Start date (UTC):15/01/2025
      Path:/usr/sbin/xfpm-power-backlight-helper
      Arguments:/usr/sbin/xfpm-power-backlight-helper --get-max-brightness
      File size:14656 bytes
      MD5 hash:3d221ad23f28ca3259f599b1664e2427

      Start time (UTC):14:56:00
      Start date (UTC):15/01/2025
      Path:/usr/bin/xfce4-panel
      Arguments:-
      File size:375768 bytes
      MD5 hash:a15b657c7d54ac1385f1f15004ea6784

      Start time (UTC):14:56:00
      Start date (UTC):15/01/2025
      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
      File size:35136 bytes
      MD5 hash:ac0b8a906f359a8ae102244738682e76

      Start time (UTC):14:56:00
      Start date (UTC):15/01/2025
      Path:/usr/bin/xfce4-panel
      Arguments:-
      File size:375768 bytes
      MD5 hash:a15b657c7d54ac1385f1f15004ea6784

      Start time (UTC):14:56:00
      Start date (UTC):15/01/2025
      Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
      File size:35136 bytes
      MD5 hash:ac0b8a906f359a8ae102244738682e76

      Start time (UTC):14:56:07
      Start date (UTC):15/01/2025
      Path:/usr/bin/dbus-daemon
      Arguments:-
      File size:249032 bytes
      MD5 hash:3089d47e3f3ab84cd81c48fd406d7a8c

      Start time (UTC):14:56:07
      Start date (UTC):15/01/2025
      Path:/usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
      File size:112880 bytes
      MD5 hash:4c7a0d6d258bb970905b19b84abcd8e9

      Start time (UTC):14:56:13
      Start date (UTC):15/01/2025
      Path:/usr/lib/systemd/systemd
      Arguments:-
      File size:1620224 bytes
      MD5 hash:9b2bec7092a40488108543f9334aab75

      Start time (UTC):14:56:13
      Start date (UTC):15/01/2025
      Path:/usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
      Arguments:/usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifyd
      File size:112872 bytes
      MD5 hash:eee956f1b227c1d5031f9c61223255d1