Edit tour

Linux Analysis Report
i686.elf

Overview

General Information

Sample name:i686.elf
Analysis ID:1616801
MD5:0b1cbc6bde812644aef2f7085912f7c4
SHA1:8881b3f1d6553c1f3ad42672daf6bdef7ebe1f72
SHA256:0f7e5ca786d80695eb678eac35cacaa6505330576bb6ed0368b0ed2fc70e368b
Tags:elfuser-abuse_ch
Infos:

Detection

Score:64
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Performs DNS TXT record lookups
Sample reads /proc/mounts (often used for finding a writable filesystem)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1616801
Start date and time:2025-02-17 08:36:22 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 9s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:i686.elf
Detection:MAL
Classification:mal64.troj.evad.linELF@0/0@3/0
  • VT rate limit hit for: lib.libre
Command:/tmp/i686.elf
PID:5527
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life
Standard Error:
  • system is lnxubuntu20
  • i686.elf (PID: 5527, Parent: 5444, MD5: 0b1cbc6bde812644aef2f7085912f7c4) Arguments: /tmp/i686.elf
    • i686.elf New Fork (PID: 5529, Parent: 5527)
    • i686.elf New Fork (PID: 5530, Parent: 5527)
    • i686.elf New Fork (PID: 5552, Parent: 5527)
  • cleanup
SourceRuleDescriptionAuthorStrings
i686.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0xb26c:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
i686.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0xba5b:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
i686.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x7d9e:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x7f00:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
i686.elfLinux_Trojan_Gafgyt_d996d335unknownunknown
  • 0xe04a:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
i686.elfLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0xb61b:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
Click to see the 2 entries
SourceRuleDescriptionAuthorStrings
5527.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0xb26c:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
5527.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0xba5b:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
5527.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x7d9e:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x7f00:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
5527.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_d996d335unknownunknown
  • 0xe04a:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
5527.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0xb61b:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
Click to see the 2 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: i686.elfVirustotal: Detection: 16%Perma Link
Source: i686.elfReversingLabs: Detection: 21%
Source: global trafficTCP traffic: 192.168.2.14:34346 -> 64.23.188.144:51012
Source: global trafficUDP traffic: 192.168.2.14:35618 -> 74.125.250.129:19302
Source: /tmp/i686.elf (PID: 5527)Socket: 127.0.0.1:43478Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownTCP traffic detected without corresponding DNS query: 64.23.188.144
Source: unknownUDP traffic detected without corresponding DNS query: 162.243.19.47
Source: unknownUDP traffic detected without corresponding DNS query: 74.125.250.129
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: lib.libre
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

System Summary

barindex
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1cb033f3 Author: unknown
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1cb033f3 Author: unknown
Source: ELF static info symbol of initial sample.symtab present: no
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1cb033f3 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 49201ab37ff0b5cdfa9b0b34b6faa170bd25f04df51c24b0b558b7534fecc358, id = 1cb033f3-68c1-4fe5-9cd1-b5d066c1d86e, last_modified = 2021-09-16
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5527.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1cb033f3 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 49201ab37ff0b5cdfa9b0b34b6faa170bd25f04df51c24b0b558b7534fecc358, id = 1cb033f3-68c1-4fe5-9cd1-b5d066c1d86e, last_modified = 2021-09-16
Source: classification engineClassification label: mal64.troj.evad.linELF@0/0@3/0

Persistence and Installation Behavior

barindex
Source: /tmp/i686.elf (PID: 5527)File: /proc/5527/mountsJump to behavior
Source: /tmp/i686.elf (PID: 5529)File: /proc/5529/mountsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6199/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6199/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6135/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6135/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6079/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6079/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6310/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6310/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6213/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6213/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6356/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6356/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6092/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6092/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6270/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6270/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5797/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5797/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5797/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5797/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5732/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5732/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5798/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5798/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5798/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5798/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6028/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6028/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5799/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5799/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5799/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5799/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6008/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6008/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5737/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5737/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5790/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5790/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5791/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5791/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6089/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6089/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5792/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5792/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6121/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6121/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5793/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5793/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5794/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5794/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5794/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5795/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5795/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5795/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5795/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6148/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6148/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5796/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5796/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5796/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5796/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6169/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6169/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6389/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6389/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6181/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/6181/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5805/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5805/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5805/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5805/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5806/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5806/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5806/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5806/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5807/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5807/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5807/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5807/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5788/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5788/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5800/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5800/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5800/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5800/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5789/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5789/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5801/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5801/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5801/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5801/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5802/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5802/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5802/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5802/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5868/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5868/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5803/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5803/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5803/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5803/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5804/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5804/cmdlineJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5804/mapsJump to behavior
Source: /tmp/i686.elf (PID: 5530)File opened: /proc/5804/cmdlineJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: TrafficDNS traffic detected: queries for: lib.libre
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
1
File and Directory Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1616801 Sample: i686.elf Startdate: 17/02/2025 Architecture: LINUX Score: 64 17 lib.libre 2->17 19 74.125.250.129, 19302, 35618 GOOGLEUS United States 2->19 21 2 other IPs or domains 2->21 23 Malicious sample detected (through community Yara rule) 2->23 25 Multi AV Scanner detection for submitted file 2->25 7 i686.elf 2->7         started        signatures3 27 Performs DNS TXT record lookups 17->27 process4 signatures5 29 Sample reads /proc/mounts (often used for finding a writable filesystem) 7->29 10 i686.elf 7->10         started        13 i686.elf 7->13         started        15 i686.elf 7->15         started        process6 signatures7 31 Sample reads /proc/mounts (often used for finding a writable filesystem) 10->31

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
i686.elf17%VirustotalBrowse
i686.elf22%ReversingLabsLinux.Backdoor.Gafgyt
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    high
    lib.libre
    unknown
    unknowntrue
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      64.23.188.144
      unknownUnited States
      3064AFFINITY-FTLUSfalse
      74.125.250.129
      unknownUnited States
      15169GOOGLEUSfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      64.23.188.144na.elfGet hashmaliciousUnknownBrowse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        daisy.ubuntu.coma-r.m-4.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.25
        m-6.8-k.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.25
        p-p.c-.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.24
        m-i.p-s.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.25
        m-p.s-l.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.24
        x-8.6-.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.24
        a-r.m-7.Sakura.elfGet hashmaliciousGafgyt, MiraiBrowse
        • 162.213.35.25
        arm6.elfGet hashmaliciousUnknownBrowse
        • 162.213.35.24
        powerpc.elfGet hashmaliciousUnknownBrowse
        • 162.213.35.24
        res.arm6.elfGet hashmaliciousUnknownBrowse
        • 162.213.35.25
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        AFFINITY-FTLUSna.elfGet hashmaliciousUnknownBrowse
        • 64.23.188.144
        arm7.elfGet hashmaliciousMirai, MoobotBrowse
        • 207.36.98.138
        arm7.elfGet hashmaliciousMirai, MoobotBrowse
        • 64.159.94.16
        https://gffd-5ru.pages.dev/?email=nobody@wp.pl&mail=wp.plGet hashmaliciousHTMLPhisherBrowse
        • 66.113.135.6
        sh4.elfGet hashmaliciousMirai, MoobotBrowse
        • 66.232.157.134
        telnet.x86.elfGet hashmaliciousUnknownBrowse
        • 216.219.155.110
        powerpc.elfGet hashmaliciousUnknownBrowse
        • 207.234.192.3
        3.elfGet hashmaliciousUnknownBrowse
        • 64.157.90.120
        https://eldivan.mx/?data=c2dlcmplc0BmaXJzdGFyLWJhbmsuY29tGet hashmaliciousHTMLPhisherBrowse
        • 64.23.136.73
        armv4l.elfGet hashmaliciousUnknownBrowse
        • 64.23.59.243
        No context
        No context
        No created / dropped files found
        File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
        Entropy (8bit):6.263541603782707
        TrID:
        • ELF Executable and Linkable format (generic) (4004/1) 100.00%
        File name:i686.elf
        File size:71'712 bytes
        MD5:0b1cbc6bde812644aef2f7085912f7c4
        SHA1:8881b3f1d6553c1f3ad42672daf6bdef7ebe1f72
        SHA256:0f7e5ca786d80695eb678eac35cacaa6505330576bb6ed0368b0ed2fc70e368b
        SHA512:142ff4bf6b0f8effd67a6d5de834b8cf03f7df9410b4932b53c56c0cd231c70045b0236fff6c5449135ff80c708d95067632ac90a09dd9b04dc153a2fc3ff54f
        SSDEEP:1536:ALH/vTYm3n80tFuSXyi+2yPyROThOLCyryuEDCikTywU+b1:ALHTYm3n8qFNyiyyYsGybEDCiPwU+b1
        TLSH:8B637C23A480C1FDC89AD2754B6EA62BDA33B07D2235B15D27D8BD2F7E5AD201F5B500
        File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@...............................................Q.......Q.....`........o..............Q.td....................................................H...._........H........

        ELF header

        Class:ELF64
        Data:2's complement, little endian
        Version:1 (current)
        Machine:Advanced Micro Devices X86-64
        Version Number:0x1
        Type:EXEC (Executable file)
        OS/ABI:UNIX - System V
        ABI Version:0
        Entry Point Address:0x400194
        Flags:0x0
        ELF Header Size:64
        Program Header Offset:64
        Program Header Size:56
        Number of Program Headers:3
        Section Header Offset:71072
        Section Header Size:64
        Number of Section Headers:10
        Header String Table Index:9
        NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
        NULL0x00x00x00x00x0000
        .initPROGBITS0x4000e80xe80x130x00x6AX001
        .textPROGBITS0x4001000x1000xe3c60x00x6AX0016
        .finiPROGBITS0x40e4c60xe4c60xe0x00x6AX001
        .rodataPROGBITS0x40e4e00xe4e00x27d00x00x2A0032
        .ctorsPROGBITS0x5110000x110000x100x00x3WA008
        .dtorsPROGBITS0x5110100x110100x100x00x3WA008
        .dataPROGBITS0x5110400x110400x5200x00x3WA0032
        .bssNOBITS0x5115600x115600x6a880x00x3WA0032
        .shstrtabSTRTAB0x00x115600x3e0x00x0001
        TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
        LOAD0x00x4000000x4000000x10cb00x10cb06.38910x5R E0x100000.init .text .fini .rodata
        LOAD0x110000x5110000x5110000x5600x6fe82.34680x6RW 0x100000.ctors .dtors .data .bss
        GNU_STACK0x00x00x00x00x00.00000x6RW 0x8

        Download Network PCAP: filteredfull

        • Total Packets: 39
        • 51012 undefined
        • 19302 undefined
        • 53 (DNS)
        TimestampSource PortDest PortSource IPDest IP
        Feb 17, 2025 08:37:23.564630985 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:37:23.569509029 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:37:23.569571972 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:37:24.123549938 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:37:24.123625040 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:37:24.211760044 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:37:24.211847067 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:37:29.709458113 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:37:29.714462996 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:37:39.715622902 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:37:39.720772028 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:37:39.720849037 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:37:39.725750923 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:37:54.414742947 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:37:54.419837952 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:37:54.420005083 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:37:54.424963951 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:38:07.208173037 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:38:07.213294029 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:38:07.213370085 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:38:07.218288898 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:38:20.614057064 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:38:20.620621920 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:38:20.620685101 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:38:20.627274036 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:38:27.050738096 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:38:27.050805092 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:38:37.057517052 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:38:37.062587023 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:38:37.062657118 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:38:37.067631006 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:38:50.172871113 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:38:50.178292990 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:38:50.178366899 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:38:50.183401108 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:39:04.968450069 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:39:04.973426104 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:39:04.973503113 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:39:04.978502989 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:39:18.027121067 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:39:18.034776926 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:39:18.034832954 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:39:18.042140961 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:39:32.143352032 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:39:32.148250103 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:39:32.148319006 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:39:32.153143883 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:39:45.962744951 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:39:45.967530012 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:39:45.967592955 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:39:45.973862886 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:39:54.065079927 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:39:54.065223932 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:40:04.074029922 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:40:04.078885078 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:40:04.078938007 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:40:04.083759069 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:40:18.877628088 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:40:18.882589102 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:40:18.882668018 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:40:18.887552977 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:40:32.820991039 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:40:32.826189995 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:40:32.826282978 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:40:32.831108093 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:40:47.540354967 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:40:47.546355009 CET510123434664.23.188.144192.168.2.14
        Feb 17, 2025 08:40:47.546416044 CET3434651012192.168.2.1464.23.188.144
        Feb 17, 2025 08:40:47.554313898 CET510123434664.23.188.144192.168.2.14
        TimestampSource PortDest PortSource IPDest IP
        Feb 17, 2025 08:37:23.475841999 CET4197353192.168.2.14162.243.19.47
        Feb 17, 2025 08:37:23.562381983 CET5341973162.243.19.47192.168.2.14
        Feb 17, 2025 08:37:24.571866989 CET3561819302192.168.2.1474.125.250.129
        Feb 17, 2025 08:37:25.021573067 CET193023561874.125.250.129192.168.2.14
        Feb 17, 2025 08:40:06.049935102 CET4244953192.168.2.141.1.1.1
        Feb 17, 2025 08:40:06.050003052 CET3869253192.168.2.141.1.1.1
        Feb 17, 2025 08:40:06.057106018 CET53386921.1.1.1192.168.2.14
        Feb 17, 2025 08:40:06.057271004 CET53424491.1.1.1192.168.2.14
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Feb 17, 2025 08:37:23.475841999 CET192.168.2.14162.243.19.470xef00Standard query (0)lib.libre16IN (0x0001)false
        Feb 17, 2025 08:40:06.049935102 CET192.168.2.141.1.1.10x59e8Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
        Feb 17, 2025 08:40:06.050003052 CET192.168.2.141.1.1.10x5a87Standard query (0)daisy.ubuntu.com28IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Feb 17, 2025 08:37:23.562381983 CET162.243.19.47192.168.2.140xef00No error (0)lib.libreTXT (Text strings)IN (0x0001)false
        Feb 17, 2025 08:40:06.057271004 CET1.1.1.1192.168.2.140x59e8No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
        Feb 17, 2025 08:40:06.057271004 CET1.1.1.1192.168.2.140x59e8No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

        System Behavior

        Start time (UTC):07:37:21
        Start date (UTC):17/02/2025
        Path:/tmp/i686.elf
        Arguments:/tmp/i686.elf
        File size:71712 bytes
        MD5 hash:0b1cbc6bde812644aef2f7085912f7c4

        Start time (UTC):07:37:22
        Start date (UTC):17/02/2025
        Path:/tmp/i686.elf
        Arguments:-
        File size:71712 bytes
        MD5 hash:0b1cbc6bde812644aef2f7085912f7c4

        Start time (UTC):07:37:22
        Start date (UTC):17/02/2025
        Path:/tmp/i686.elf
        Arguments:-
        File size:71712 bytes
        MD5 hash:0b1cbc6bde812644aef2f7085912f7c4

        Start time (UTC):07:37:22
        Start date (UTC):17/02/2025
        Path:/tmp/i686.elf
        Arguments:-
        File size:71712 bytes
        MD5 hash:0b1cbc6bde812644aef2f7085912f7c4