Edit tour

Linux Analysis Report
x86.elf

Overview

General Information

Sample name:x86.elf
Analysis ID:1594471
MD5:d21f764b1f4c969d0dfd6870fcc5ffd8
SHA1:dd0cd39d2e0888d0c8661f78c18e289a8ebccafa
SHA256:8a89e230e9764be28afdd078a9345cb250eba74a29bd55745c911a80a2319f71
Tags:elfuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1594471
Start date and time:2025-01-19 02:47:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 32s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:x86.elf
Detection:MAL
Classification:mal60.linELF@0/0@2/0
Command:/tmp/x86.elf
PID:5518
Exit Code:1
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • x86.elf (PID: 5518, Parent: 5438, MD5: d21f764b1f4c969d0dfd6870fcc5ffd8) Arguments: /tmp/x86.elf
    • x86.elf New Fork (PID: 5519, Parent: 5518)
      • x86.elf New Fork (PID: 5520, Parent: 5519)
  • cleanup
SourceRuleDescriptionAuthorStrings
x86.elfLinux_Trojan_Mirai_122ff2e6unknownunknown
  • 0x493b:$a: 24 EB 15 89 F0 83 C8 01 EB 03 8B 5B 08 3B 43 04 72 F8 8B 4B 0C 89
x86.elfLinux_Trojan_Mirai_fa48b592unknownunknown
  • 0x7d79:$a: 31 C0 BA 01 00 00 00 B9 01 00 00 00 03 04 24 89 D7 31 D2 F7 F7 0F
x86.elfLinux_Trojan_Mirai_8aa7b5d3unknownunknown
  • 0x3be2:$a: 8B 4C 24 14 8B 74 24 0C 8B 5C 24 10 85 C9 74 0D 31 D2 8A 04 1A 88
SourceRuleDescriptionAuthorStrings
5520.1.0000000008048000.0000000008051000.r-x.sdmpLinux_Trojan_Mirai_122ff2e6unknownunknown
  • 0x493b:$a: 24 EB 15 89 F0 83 C8 01 EB 03 8B 5B 08 3B 43 04 72 F8 8B 4B 0C 89
5520.1.0000000008048000.0000000008051000.r-x.sdmpLinux_Trojan_Mirai_fa48b592unknownunknown
  • 0x7d79:$a: 31 C0 BA 01 00 00 00 B9 01 00 00 00 03 04 24 89 D7 31 D2 F7 F7 0F
5520.1.0000000008048000.0000000008051000.r-x.sdmpLinux_Trojan_Mirai_8aa7b5d3unknownunknown
  • 0x3be2:$a: 8B 4C 24 14 8B 74 24 0C 8B 5C 24 10 85 C9 74 0D 31 D2 8A 04 1A 88
5519.1.0000000008048000.0000000008051000.r-x.sdmpLinux_Trojan_Mirai_122ff2e6unknownunknown
  • 0x493b:$a: 24 EB 15 89 F0 83 C8 01 EB 03 8B 5B 08 3B 43 04 72 F8 8B 4B 0C 89
5519.1.0000000008048000.0000000008051000.r-x.sdmpLinux_Trojan_Mirai_fa48b592unknownunknown
  • 0x7d79:$a: 31 C0 BA 01 00 00 00 B9 01 00 00 00 03 04 24 89 D7 31 D2 F7 F7 0F
Click to see the 4 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: x86.elfVirustotal: Detection: 9%Perma Link
Source: x86.elfJoe Sandbox ML: detected
Source: global trafficTCP traffic: 192.168.2.14:45974 -> 85.239.34.134:5683
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownTCP traffic detected without corresponding DNS query: 85.239.34.134
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

System Summary

barindex
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_122ff2e6 Author: unknown
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_fa48b592 Author: unknown
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5520.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_122ff2e6 Author: unknown
Source: 5520.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa48b592 Author: unknown
Source: 5520.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5519.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_122ff2e6 Author: unknown
Source: 5519.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa48b592 Author: unknown
Source: 5519.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5518.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_122ff2e6 Author: unknown
Source: 5518.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa48b592 Author: unknown
Source: 5518.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: ELF static info symbol of initial sample.symtab present: no
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_122ff2e6 reference_sample = c7dd999a033fa3edc1936785b87cd69ce2f5cac5a084ddfaf527a1094e718bc4, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3c9ffd7537e30a21eefa6c174f801264b92a85a1bc73e34e6dc9e29f84658348, id = 122ff2e6-56e6-4aa8-a3ec-c19d31eb1f80, last_modified = 2021-09-16
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_fa48b592 reference_sample = c9e33befeec133720b3ba40bb3cd7f636aad80f72f324c5fe65ac7af271c49ee, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8838d2752b310dbf7d12f6cf023244aaff4fdf5b55cf1e3b71843210df0fcf88, id = fa48b592-8d80-45af-a3e4-232695b8f5dd, last_modified = 2021-09-16
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5520.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_122ff2e6 reference_sample = c7dd999a033fa3edc1936785b87cd69ce2f5cac5a084ddfaf527a1094e718bc4, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3c9ffd7537e30a21eefa6c174f801264b92a85a1bc73e34e6dc9e29f84658348, id = 122ff2e6-56e6-4aa8-a3ec-c19d31eb1f80, last_modified = 2021-09-16
Source: 5520.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa48b592 reference_sample = c9e33befeec133720b3ba40bb3cd7f636aad80f72f324c5fe65ac7af271c49ee, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8838d2752b310dbf7d12f6cf023244aaff4fdf5b55cf1e3b71843210df0fcf88, id = fa48b592-8d80-45af-a3e4-232695b8f5dd, last_modified = 2021-09-16
Source: 5520.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5519.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_122ff2e6 reference_sample = c7dd999a033fa3edc1936785b87cd69ce2f5cac5a084ddfaf527a1094e718bc4, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3c9ffd7537e30a21eefa6c174f801264b92a85a1bc73e34e6dc9e29f84658348, id = 122ff2e6-56e6-4aa8-a3ec-c19d31eb1f80, last_modified = 2021-09-16
Source: 5519.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa48b592 reference_sample = c9e33befeec133720b3ba40bb3cd7f636aad80f72f324c5fe65ac7af271c49ee, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8838d2752b310dbf7d12f6cf023244aaff4fdf5b55cf1e3b71843210df0fcf88, id = fa48b592-8d80-45af-a3e4-232695b8f5dd, last_modified = 2021-09-16
Source: 5519.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5518.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_122ff2e6 reference_sample = c7dd999a033fa3edc1936785b87cd69ce2f5cac5a084ddfaf527a1094e718bc4, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3c9ffd7537e30a21eefa6c174f801264b92a85a1bc73e34e6dc9e29f84658348, id = 122ff2e6-56e6-4aa8-a3ec-c19d31eb1f80, last_modified = 2021-09-16
Source: 5518.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_fa48b592 reference_sample = c9e33befeec133720b3ba40bb3cd7f636aad80f72f324c5fe65ac7af271c49ee, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8838d2752b310dbf7d12f6cf023244aaff4fdf5b55cf1e3b71843210df0fcf88, id = fa48b592-8d80-45af-a3e4-232695b8f5dd, last_modified = 2021-09-16
Source: 5518.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: classification engineClassification label: mal60.linELF@0/0@2/0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1594471 Sample: x86.elf Startdate: 19/01/2025 Architecture: LINUX Score: 60 14 85.239.34.134, 45974, 5683 RAINBOW-HKRainbownetworklimitedHK Russian Federation 2->14 16 daisy.ubuntu.com 2->16 18 Malicious sample detected (through community Yara rule) 2->18 20 Multi AV Scanner detection for submitted file 2->20 22 Machine Learning detection for sample 2->22 8 x86.elf 2->8         started        signatures3 process4 process5 10 x86.elf 8->10         started        process6 12 x86.elf 10->12         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
x86.elf11%ReversingLabsLinux.Trojan.Mirai
x86.elf9%VirustotalBrowse
x86.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    85.239.34.134
    unknownRussian Federation
    134121RAINBOW-HKRainbownetworklimitedHKfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    85.239.34.134ppc.elfGet hashmaliciousUnknownBrowse
      arm.elfGet hashmaliciousUnknownBrowse
        mips.elfGet hashmaliciousUnknownBrowse
          arm6.elfGet hashmaliciousUnknownBrowse
            arm7.elfGet hashmaliciousUnknownBrowse
              ppc.elfGet hashmaliciousUnknownBrowse
                mips.elfGet hashmaliciousUnknownBrowse
                  m68k.elfGet hashmaliciousUnknownBrowse
                    sh4.elfGet hashmaliciousUnknownBrowse
                      x86.elfGet hashmaliciousUnknownBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        daisy.ubuntu.comYboats.mpsl.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        Yboats.ppc.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        Yboats.arm7.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        Yboats.arc.elfGet hashmaliciousMirai, OkiruBrowse
                        • 162.213.35.25
                        Yboats.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                        • 162.213.35.25
                        Yboats.i686.elfGet hashmaliciousMirai, OkiruBrowse
                        • 162.213.35.24
                        Yboats.arm.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        Yboats.mips.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        loki.arm6.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.24
                        dbg.x86.elfGet hashmaliciousUnknownBrowse
                        • 162.213.35.25
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        RAINBOW-HKRainbownetworklimitedHKppc.elfGet hashmaliciousUnknownBrowse
                        • 85.239.34.134
                        arm.elfGet hashmaliciousUnknownBrowse
                        • 85.239.34.134
                        mips.elfGet hashmaliciousUnknownBrowse
                        • 85.239.34.134
                        arm6.elfGet hashmaliciousUnknownBrowse
                        • 85.239.34.134
                        arm7.elfGet hashmaliciousUnknownBrowse
                        • 85.239.34.134
                        ppc.elfGet hashmaliciousUnknownBrowse
                        • 85.239.34.134
                        mips.elfGet hashmaliciousUnknownBrowse
                        • 85.239.34.134
                        m68k.elfGet hashmaliciousUnknownBrowse
                        • 85.239.34.134
                        sh4.elfGet hashmaliciousUnknownBrowse
                        • 85.239.34.134
                        x86.elfGet hashmaliciousUnknownBrowse
                        • 85.239.34.134
                        No context
                        No context
                        No created / dropped files found
                        File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                        Entropy (8bit):6.185820590637398
                        TrID:
                        • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                        • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                        File name:x86.elf
                        File size:39'492 bytes
                        MD5:d21f764b1f4c969d0dfd6870fcc5ffd8
                        SHA1:dd0cd39d2e0888d0c8661f78c18e289a8ebccafa
                        SHA256:8a89e230e9764be28afdd078a9345cb250eba74a29bd55745c911a80a2319f71
                        SHA512:56656caefe98af2f74e1234a778ab7250b883b7ad3b40bff58e69a5a2fb3417b708765bb19966dcce10ac432283816a923803c3d35e05e89dbc83781c55dd409
                        SSDEEP:768:e1wOvypW8lQOzdgoWXxAILrCCP6V6Z4i1X38adqgAXYRfZ:e1TEhFmXrrCM6QZv1XMqmYRf
                        TLSH:630329C1E6E3D7F9CC1A12F80063F37A6335E05F22F5CA8FE3E46596B842660184B246
                        File Content Preview:.ELF........................4...........4. ...(.....................|...|................................6..............L...L...L...................Q.td............................U..S............h....#...[]...$.............U......=.....t..5..............

                        ELF header

                        Class:ELF32
                        Data:2's complement, little endian
                        Version:1 (current)
                        Machine:Intel 80386
                        Version Number:0x1
                        Type:EXEC (Executable file)
                        OS/ABI:UNIX - System V
                        ABI Version:0
                        Entry Point Address:0x8048184
                        Flags:0x0
                        ELF Header Size:52
                        Program Header Offset:52
                        Program Header Size:32
                        Number of Program Headers:4
                        Section Header Offset:38932
                        Section Header Size:40
                        Number of Section Headers:14
                        Header String Table Index:13
                        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                        NULL0x00x00x00x00x0000
                        .initPROGBITS0x80480b40xb40x1c0x00x6AX001
                        .textPROGBITS0x80480d00xd00x81470x00x6AX0016
                        .finiPROGBITS0x80502170x82170x170x00x6AX001
                        .rodataPROGBITS0x80502300x82300x74c0x00x2A004
                        .eh_framePROGBITS0x80510000x90000x54c0x00x3WA004
                        .tbssNOBITS0x805154c0x954c0x80x00x403WAT004
                        .ctorsPROGBITS0x805154c0x954c0x80x00x3WA004
                        .dtorsPROGBITS0x80515540x95540x80x00x3WA004
                        .jcrPROGBITS0x805155c0x955c0x40x00x3WA004
                        .got.pltPROGBITS0x80515600x95600xc0x40x3WA004
                        .dataPROGBITS0x80515800x95800x2380x00x3WA0032
                        .bssNOBITS0x80517c00x97b80x2ee80x00x3WA0032
                        .shstrtabSTRTAB0x00x97b80x5c0x00x0001
                        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                        LOAD0x00x80480000x80480000x897c0x897c6.40090x5R E0x1000.init .text .fini .rodata
                        LOAD0x90000x80510000x80510000x7b80x36a84.66430x6RW 0x1000.eh_frame .tbss .ctors .dtors .jcr .got.plt .data .bss
                        TLS0x954c0x805154c0x805154c0x00x80.00000x4R 0x4.tbss
                        GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

                        Download Network PCAP: filteredfull

                        • Total Packets: 6
                        • 5683 undefined
                        • 53 (DNS)
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 19, 2025 02:48:02.830785036 CET459745683192.168.2.1485.239.34.134
                        Jan 19, 2025 02:48:02.836180925 CET56834597485.239.34.134192.168.2.14
                        Jan 19, 2025 02:48:02.836247921 CET459745683192.168.2.1485.239.34.134
                        Jan 19, 2025 02:48:03.446397066 CET56834597485.239.34.134192.168.2.14
                        Jan 19, 2025 02:48:03.446727991 CET459745683192.168.2.1485.239.34.134
                        Jan 19, 2025 02:48:03.658085108 CET459745683192.168.2.1485.239.34.134
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 19, 2025 02:48:04.225507975 CET5219653192.168.2.141.1.1.1
                        Jan 19, 2025 02:48:04.225605011 CET4515153192.168.2.141.1.1.1
                        Jan 19, 2025 02:48:04.233231068 CET53451511.1.1.1192.168.2.14
                        Jan 19, 2025 02:48:04.233814955 CET53521961.1.1.1192.168.2.14
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 19, 2025 02:48:04.225507975 CET192.168.2.141.1.1.10x9007Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                        Jan 19, 2025 02:48:04.225605011 CET192.168.2.141.1.1.10x545dStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 19, 2025 02:48:04.233814955 CET1.1.1.1192.168.2.140x9007No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                        Jan 19, 2025 02:48:04.233814955 CET1.1.1.1192.168.2.140x9007No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                        System Behavior

                        Start time (UTC):01:48:02
                        Start date (UTC):19/01/2025
                        Path:/tmp/x86.elf
                        Arguments:/tmp/x86.elf
                        File size:39492 bytes
                        MD5 hash:d21f764b1f4c969d0dfd6870fcc5ffd8

                        Start time (UTC):01:48:02
                        Start date (UTC):19/01/2025
                        Path:/tmp/x86.elf
                        Arguments:-
                        File size:39492 bytes
                        MD5 hash:d21f764b1f4c969d0dfd6870fcc5ffd8

                        Start time (UTC):01:48:02
                        Start date (UTC):19/01/2025
                        Path:/tmp/x86.elf
                        Arguments:-
                        File size:39492 bytes
                        MD5 hash:d21f764b1f4c969d0dfd6870fcc5ffd8