Edit tour

Linux Analysis Report
SrkOMHKCUq.elf

Overview

General Information

Sample name:SrkOMHKCUq.elf
renamed because original name is a hash value
Original sample name:51e3f833985cfd9c2c96e4086bb2dbdaf36373c23d3b8f897c7076346b646be0.elf
Analysis ID:1645656
MD5:7ff2071eda093f78b9d2d53c7e927af9
SHA1:2afa082dc248daf59b39a5559b305a313bf1610d
SHA256:51e3f833985cfd9c2c96e4086bb2dbdaf36373c23d3b8f897c7076346b646be0
Tags:elfuser-mentality
Infos:

Detection

Score:56
Range:0 - 100

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Executes the "rm" command used to delete files or directories

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1645656
Start date and time:2025-03-22 03:39:11 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 45s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:SrkOMHKCUq.elf
renamed because original name is a hash value
Original Sample Name:51e3f833985cfd9c2c96e4086bb2dbdaf36373c23d3b8f897c7076346b646be0.elf
Detection:MAL
Classification:mal56.linELF@0/0@0/0
Command:/tmp/SrkOMHKCUq.elf
PID:6233
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • dash New Fork (PID: 6275, Parent: 4331)
  • rm (PID: 6275, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.gHAWeO6WWK /tmp/tmp.Un17Dk4DnZ /tmp/tmp.VEXU5ngIsc
  • dash New Fork (PID: 6276, Parent: 4331)
  • rm (PID: 6276, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.gHAWeO6WWK /tmp/tmp.Un17Dk4DnZ /tmp/tmp.VEXU5ngIsc
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SrkOMHKCUq.elfAvira: detected
Source: SrkOMHKCUq.elfReversingLabs: Detection: 55%
Source: SrkOMHKCUq.elfVirustotal: Detection: 57%Perma Link
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: SrkOMHKCUq.elfString found in binary or memory: http://inet-ip.info/iphttps://api.ipify.org/idna:
Source: SrkOMHKCUq.elfString found in binary or memory: http://ipgrab.io/https://ident.me/if-modified-sinceillegal
Source: SrkOMHKCUq.elfString found in binary or memory: http://ipinfo.io/ipif-unmodified-sinceillegal
Source: SrkOMHKCUq.elfString found in binary or memory: https://checkip.amazonaws.com/illegal
Source: SrkOMHKCUq.elfString found in binary or memory: https://discord.com/api/webhooks/960954050583613549/YAkGomn5eYtrPChuOPz87pIkS7WK2XpB5Y3ozZQXaAho2VCB
Source: SrkOMHKCUq.elfString found in binary or memory: https://ip.seeip.org/in
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 33606
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 33606 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: classification engineClassification label: mal56.linELF@0/0@0/0
Source: /usr/bin/dash (PID: 6275)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.gHAWeO6WWK /tmp/tmp.Un17Dk4DnZ /tmp/tmp.VEXU5ngIscJump to behavior
Source: /usr/bin/dash (PID: 6276)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.gHAWeO6WWK /tmp/tmp.Un17Dk4DnZ /tmp/tmp.VEXU5ngIscJump to behavior
Source: SrkOMHKCUq.elfBinary or memory string: apacheavx512centoscgroupchan<-closedcookiedebiandockerdomainefenceempty errno exec: expectgopherhangupheaderid_rsainternip+netkilledlistenminutendots:netdnsnumberobjectonlineopenvzpasswdpopcntqwertyrdrandrdseedrdtscpremovereturnrune1 secondselectserversocketsocks socks5splicestatusstringstructsweep sysmonsystemtelnettimersubuntuuint16uint32uint64unuseduptimevmwarewaitid{hash} %v=%v, (conn) (scan (scan) (trap MB in Value> allocs dying= flags= len=%d locks= m->g0= nmsys= pad1= pad2= s=nil
Source: SrkOMHKCUq.elfBinary or memory string: /dev/null/dev/ptmx/dev/pts/0.0.0.0/82001::/322002::/162441406253ffe::/16: status=AuthorityBassa_VahBhaiksukiBigEndianClassINETCuneiformDiacriticENCRYPTEDFIN_WAIT1FIN_WAIT2ForbiddenHOST_PROCHex_DigitInheritedInstMatchInstRune1InterfaceKhudawadiLINUX_2.6MalayalamMongolianNabataeanNot FoundPalmyreneParseUintProc-TypeSSH_FX_OKSamaritanSee OtherSeptemberSundaneseTIME_WAITToo EarlyTrailer: TypeCNAMETypeHINFOTypeMINFOUse ProxyWednesday[%v = %d][:^word:][:alnum:][:alpha:][:ascii:][:blank:][:cntrl:][:digit:][:graph:][:lower:][:print:][:punct:][:space:][:upper:]atomicor8attempts:bad indirbad prunebus errorchan sendcomplex64continuedcontrol_dcopystackcpu-totalctxt != 0d.nx != 0debugLockdns,filesempty urlfec0::/10files,dnsfork/execfuncargs(hchanLeafhmac-sha1image/gifimage/pnginittraceinterfaceinterruptinvalid nipv6-icmplocalhostlocaltimemSpanDeadmSpanFreenewosprocnil erroromitemptypanicwaitpclmulqdqportfoliopreemptedprotocol publickeyquestionsraspberryrecover: reflect: rwxrwxrwxscavtracesignal 32signal 33signal 34signal 35signal 36signal 37signal 38signal 39signal 40signal 41signal 42signal 43signal 44signal 45signal 46signal 47signal 48signal 49signal 50signal 51signal 52signal 53signal 54signal 55signal 56signal 57signal 58signal 59signal 60signal 61signal 62signal 63signal 64stackpoolsubsystemsucceededtracebackunderflowunhandledvboxguestwbufSpanswebsocket} stack=[ (deleted) MB goal, flushGen for type gfreecnt= pages at ptrSize= returned runqsize= runqueue= s.base()= spinning= stopwait= stream=%d sweepgen sweepgen= targetpc= throwing= until pc=%!Weekday(%s|%s%s|%s, bound = , limit = --nicehash.localhost/dev/stdin/etc/hosts/proc/stat/setgroups0.0.0.0:2210.0.0.0/812207031256103515625:authorityAdditionalBad varintCLOSE_WAITChorasmianClassCHAOSClassCSNETConnectionContent-IdDSA-SHA256DeprecatedDevanagariECDSA-SHA1END_STREAMGC forced
Source: SrkOMHKCUq.elfBinary or memory string: }\ufffdacceptactiveallowapacheavx512centoscgroupchan<-closedcookiedebiandockerdomainefenceempty errno exec: expectgopherhangupheaderid_rsainternip+netkilledlistenminutendots:netdnsnumberobjectonlineopenvzpasswdpopcntqwertyrdrandrdseedrdtscpremovereturnrune1 secondselectserversocketsocks socks5splicestatusstringstructsweep sysmonsystemtelnettimersubuntuuint16uint32uint64unuseduptimevmwarewaitid{hash} %v=%v, (conn) (scan (scan) (trap MB in Value> allocs dying= flags= len=%d locks= m->g0= nmsys= pad1= pad2= s=nil
Source: SrkOMHKCUq.elfBinary or memory string: , not a function. Reason was: %v.WithValue(type /etc/resolv.conf/proc/self/fd/%d0123456789ABCDEF0123456789abcdef2384185791015625: value of type Already ReportedContent-EncodingContent-LanguageContent-Length: Environment="ARGFRAME_SIZE_ERRORGC scavenge waitGC worker (idle)GODEBUG: value "Imperial_AramaicInstRuneAnyNotNLMeroitic_CursiveMultiple ChoicesOther_AlphabeticPayment RequiredProxy-ConnectionQEMU Virtual CPURCodeFormatErrorSETTINGS_TIMEOUTSIGNONE: no trapSSH_FXP_EXTENDEDSSH_FXP_FSETSTATSSH_FXP_READLINKSSH_FXP_REALPATHSignatureScheme(Upgrade RequiredUser-Agent: %s
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
File Deletion
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1645656 Sample: SrkOMHKCUq.elf Startdate: 22/03/2025 Architecture: LINUX Score: 56 10 109.202.202.202, 80 INIT7CH Switzerland 2->10 12 91.189.91.42, 443 CANONICAL-ASGB United Kingdom 2->12 14 2 other IPs or domains 2->14 16 Antivirus / Scanner detection for submitted sample 2->16 18 Multi AV Scanner detection for submitted file 2->18 6 dash rm 2->6         started        8 dash rm 2->8         started        signatures3 process4
SourceDetectionScannerLabelLink
SrkOMHKCUq.elf56%ReversingLabsLinux.Trojan.Multiverze
SrkOMHKCUq.elf58%VirustotalBrowse
SrkOMHKCUq.elf100%AviraEXP/ELF.Coinminer.A
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://ipinfo.io/ipif-unmodified-sinceillegalSrkOMHKCUq.elffalse
    high
    https://checkip.amazonaws.com/illegalSrkOMHKCUq.elffalse
      high
      http://ipgrab.io/https://ident.me/if-modified-sinceillegalSrkOMHKCUq.elffalse
        high
        https://ip.seeip.org/inSrkOMHKCUq.elffalse
          high
          http://inet-ip.info/iphttps://api.ipify.org/idna:SrkOMHKCUq.elffalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            54.171.230.55
            unknownUnited States
            16509AMAZON-02USfalse
            109.202.202.202
            unknownSwitzerland
            13030INIT7CHfalse
            91.189.91.43
            unknownUnited Kingdom
            41231CANONICAL-ASGBfalse
            91.189.91.42
            unknownUnited Kingdom
            41231CANONICAL-ASGBfalse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            54.171.230.55boatnet.arm6.elfGet hashmaliciousMiraiBrowse
              na.elfGet hashmaliciousPrometeiBrowse
                na.elfGet hashmaliciousPrometeiBrowse
                  wget.elfGet hashmaliciousGafgytBrowse
                    na.elfGet hashmaliciousPrometeiBrowse
                      jwyt4py98x.mips.elfGet hashmaliciousMiraiBrowse
                        na.elfGet hashmaliciousPrometeiBrowse
                          na.elfGet hashmaliciousPrometeiBrowse
                            na.elfGet hashmaliciousPrometeiBrowse
                              na.elfGet hashmaliciousPrometeiBrowse
                                109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                91.189.91.43na.elfGet hashmaliciousPrometeiBrowse
                                  na.elfGet hashmaliciousPrometeiBrowse
                                    boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                      na.elfGet hashmaliciousPrometeiBrowse
                                        boatnet.arc.elfGet hashmaliciousMiraiBrowse
                                          boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                            na.elfGet hashmaliciousPrometeiBrowse
                                              boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                                  boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                    91.189.91.42na.elfGet hashmaliciousPrometeiBrowse
                                                      na.elfGet hashmaliciousPrometeiBrowse
                                                        boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                          na.elfGet hashmaliciousPrometeiBrowse
                                                            boatnet.arc.elfGet hashmaliciousMiraiBrowse
                                                              boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                                                na.elfGet hashmaliciousPrometeiBrowse
                                                                  boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                    boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                                                      boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                                        No context
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        CANONICAL-ASGBna.elfGet hashmaliciousPrometeiBrowse
                                                                        • 91.189.91.42
                                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                                        • 91.189.91.42
                                                                        boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                                        • 91.189.91.42
                                                                        boatnet.arc.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                                        • 91.189.91.42
                                                                        boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        CANONICAL-ASGBna.elfGet hashmaliciousPrometeiBrowse
                                                                        • 91.189.91.42
                                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                                        • 91.189.91.42
                                                                        boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                                        • 91.189.91.42
                                                                        boatnet.arc.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                                        • 91.189.91.42
                                                                        boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                                        • 91.189.91.42
                                                                        AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                                                                        • 52.212.150.54
                                                                        https://clickme.thryv.com/ls/click?upn=u001.Als7cfHaJU2yMdsJgpsIFguqKBJA-2BlCiR08w7qJIKltwWs1iwx4iDdKHxA5CYPlQURzm_OEO3HRIZ3eedLymwLhvJt9sqs3j4T3CqpVCO9A0ZKplqH1W1Ad1lCPdQBrRfbSauZPLLCLTYBsXDRt8yGG5FOZ7NK342oFTufTBA9n-2F9XZPtKM-2FoAva2x6XydS-2BQkAaQFLL0bTHd-2BvpXWEIQw9OO3bs7wPk5-2FNGT2lT8nlX5ZgLnybcv-2FqVaWsH3iKC3k-2FYDOulAWlkfFO-2F-2BgJKklGUh9CJuKEwyNd9zNdCIOytI452XQw-2B8x6xiJPAqHz27f1LkfRWUbtJdWgeQgZHjwMrUD5-2Bofn-2BpMejbkxPyCuPtUnwWOwh3Q69DcfaaJRyxPZ-2FuN-2FnCbycFi8LhnIQX7rSKvUsNy61FOnwomGAQ5UmVDc4-3D#Cjosh@ltvco.comGet hashmaliciousHTMLPhisher, Invisible JSBrowse
                                                                        • 3.168.73.8
                                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                                        • 34.249.145.219
                                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                                        • 52.212.150.54
                                                                        boatnet.arc.elfGet hashmaliciousMiraiBrowse
                                                                        • 34.249.145.219
                                                                        boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                                                        • 34.249.145.219
                                                                        boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                        • 34.249.145.219
                                                                        https://clickme.thryv.com/ls/click?upn=u001.Als7cfHaJU2yMdsJgpsIFguqKBJA-2BlCiR08w7qJIKltwWs1iwx4iDdKHxA5CYPlQURzm_OEO3HRIZ3eedLymwLhvJt9sqs3j4T3CqpVCO9A0ZKplqH1W1Ad1lCPdQBrRfbSauZPLLCLTYBsXDRt8yGG5FOZ7NK342oFTufTBA9n-2F9XZPtKM-2FoAva2x6XydS-2BQkAaQFLL0bTHd-2BvpXWEIQw9OO3bs7wPk5-2FNGT2lT8nlX5ZgLnybcv-2FqVaWsH3iKC3k-2FYDOulAWlkfFO-2F-2BgJKklGUh9CJuKEwyNd9zNdCIOytI452XQw-2B8x6xiJPAqHz27f1LkfRWUbtJdWgeQgZHjwMrUD5-2Bofn-2BpMejbkxPyCuPtUnwWOwh3Q69DcfaaJRyxPZ-2FuN-2FnCbycFi8LhnIQX7rSKvUsNy61FOnwomGAQ5UmVDc4-3D#Ctarget@att.netGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                                                        • 3.168.73.27
                                                                        boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                                                        • 54.171.230.55
                                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                                        • 34.249.145.219
                                                                        INIT7CHna.elfGet hashmaliciousPrometeiBrowse
                                                                        • 109.202.202.202
                                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                                        • 109.202.202.202
                                                                        boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                                        • 109.202.202.202
                                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                                        • 109.202.202.202
                                                                        boatnet.arc.elfGet hashmaliciousMiraiBrowse
                                                                        • 109.202.202.202
                                                                        boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                                                        • 109.202.202.202
                                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                                        • 109.202.202.202
                                                                        boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                        • 109.202.202.202
                                                                        boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                                                        • 109.202.202.202
                                                                        boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                                        • 109.202.202.202
                                                                        No context
                                                                        No context
                                                                        No created / dropped files found
                                                                        File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, missing section headers at 30304408
                                                                        Entropy (8bit):6.283664280507621
                                                                        TrID:
                                                                        • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                                                        • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                                                        File name:SrkOMHKCUq.elf
                                                                        File size:25'919'488 bytes
                                                                        MD5:7ff2071eda093f78b9d2d53c7e927af9
                                                                        SHA1:2afa082dc248daf59b39a5559b305a313bf1610d
                                                                        SHA256:51e3f833985cfd9c2c96e4086bb2dbdaf36373c23d3b8f897c7076346b646be0
                                                                        SHA512:88f0458f5520066978e82e07372989d9b25ff908115be599c4a9bbc6fc050c9051fcdf2ea5fe0939c1a074de1a6bfa2a42518b8d8ee28f4b62c69b11e5cef421
                                                                        SSDEEP:49152:c8nxDgC7g9rb/TBvO90dL3BmAFd4A64nsfJ7QQzjFHWkMNRCdQqzB0dSyG2VjMQa:cqYUQuVDt0TZE5
                                                                        TLSH:1547DF77814338E9E5A98DB4D11025426DAC388B5738A3C7BAC471F667EA7E48E3D730
                                                                        File Content Preview:.ELF..............>.....p4@.....@........`..........@.8...@.#.".........@.......@.@.....@.@...............................................@.......@...............................................@.......@......%.......%.......................0.......0@....

                                                                        Download Network PCAP: filteredfull

                                                                        • Total Packets: 11
                                                                        • 443 (HTTPS)
                                                                        • 80 (HTTP)
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Mar 22, 2025 03:39:57.730290890 CET43928443192.168.2.2391.189.91.42
                                                                        Mar 22, 2025 03:40:02.337447882 CET33606443192.168.2.2354.171.230.55
                                                                        Mar 22, 2025 03:40:03.361413956 CET42836443192.168.2.2391.189.91.43
                                                                        Mar 22, 2025 03:40:04.129434109 CET4251680192.168.2.23109.202.202.202
                                                                        Mar 22, 2025 03:40:13.855927944 CET33606443192.168.2.2354.171.230.55
                                                                        Mar 22, 2025 03:40:19.487184048 CET43928443192.168.2.2391.189.91.42
                                                                        Mar 22, 2025 03:40:29.725656986 CET42836443192.168.2.2391.189.91.43
                                                                        Mar 22, 2025 03:40:33.821105003 CET4251680192.168.2.23109.202.202.202
                                                                        Mar 22, 2025 03:40:37.916610003 CET33606443192.168.2.2354.171.230.55
                                                                        Mar 22, 2025 03:40:50.534843922 CET33606443192.168.2.2354.171.230.55
                                                                        Mar 22, 2025 03:40:50.704272985 CET4433360654.171.230.55192.168.2.23
                                                                        Mar 22, 2025 03:41:00.441402912 CET43928443192.168.2.2391.189.91.42

                                                                        System Behavior

                                                                        Start time (UTC):02:40:49
                                                                        Start date (UTC):22/03/2025
                                                                        Path:/usr/bin/dash
                                                                        Arguments:-
                                                                        File size:129816 bytes
                                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                        Start time (UTC):02:40:49
                                                                        Start date (UTC):22/03/2025
                                                                        Path:/usr/bin/rm
                                                                        Arguments:rm -f /tmp/tmp.gHAWeO6WWK /tmp/tmp.Un17Dk4DnZ /tmp/tmp.VEXU5ngIsc
                                                                        File size:72056 bytes
                                                                        MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                                        Start time (UTC):02:40:49
                                                                        Start date (UTC):22/03/2025
                                                                        Path:/usr/bin/dash
                                                                        Arguments:-
                                                                        File size:129816 bytes
                                                                        MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                                        Start time (UTC):02:40:49
                                                                        Start date (UTC):22/03/2025
                                                                        Path:/usr/bin/rm
                                                                        Arguments:rm -f /tmp/tmp.gHAWeO6WWK /tmp/tmp.Un17Dk4DnZ /tmp/tmp.VEXU5ngIsc
                                                                        File size:72056 bytes
                                                                        MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b