Edit tour

Linux Analysis Report
Aqua.x86.elf

Overview

General Information

Sample name:Aqua.x86.elf
Analysis ID:1646303
MD5:ae403ef91f4a5a63f9fea903f5c2a598
SHA1:409ca9d7ea942a3eca0d81367ebf5d3843cd3a7a
SHA256:da92f6515014f5f4ca9d22cee708f921a0a2228fdc8220cb188e2b345d9b6e69
Tags:user-elfdigest
Infos:

Detection

Score:64
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample deletes itself
Sends malformed DNS queries
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1646303
Start date and time:2025-03-23 20:48:12 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 37s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:Aqua.x86.elf
Detection:MAL
Classification:mal64.troj.evad.linELF@0/0@6/0
  • VT rate limit hit for: kumalala.cloudboats.vip
Command:/tmp/Aqua.x86.elf
PID:6233
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
about to cum inside a femboy btw
Standard Error:
  • system is lnxubuntu20
  • Aqua.x86.elf (PID: 6233, Parent: 6160, MD5: ae403ef91f4a5a63f9fea903f5c2a598) Arguments: /tmp/Aqua.x86.elf
  • sh (PID: 6238, Parent: 1477, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
  • gsd-rfkill (PID: 6238, Parent: 1477, MD5: 88a16a3c0aba1759358c06215ecfb5cc) Arguments: /usr/libexec/gsd-rfkill
  • systemd New Fork (PID: 6243, Parent: 1)
  • systemd-hostnamed (PID: 6243, Parent: 1, MD5: 2cc8a5576629a2d5bd98e49a4b8bef65) Arguments: /lib/systemd/systemd-hostnamed
  • cleanup
SourceRuleDescriptionAuthorStrings
Aqua.x86.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x4000:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
Aqua.x86.elfLinux_Trojan_Mirai_88de437funknownunknown
  • 0x69b2:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
Aqua.x86.elfLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0xa1e8:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
Aqua.x86.elfLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x889c:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
Aqua.x86.elfLinux_Trojan_Mirai_8aa7b5d3unknownunknown
  • 0x6982:$a: 8B 4C 24 14 8B 74 24 0C 8B 5C 24 10 85 C9 74 0D 31 D2 8A 04 1A 88
SourceRuleDescriptionAuthorStrings
6233.1.0000000008048000.0000000008057000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x4000:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
6233.1.0000000008048000.0000000008057000.r-x.sdmpLinux_Trojan_Mirai_88de437funknownunknown
  • 0x69b2:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
6233.1.0000000008048000.0000000008057000.r-x.sdmpLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0xa1e8:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
6233.1.0000000008048000.0000000008057000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x889c:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
6233.1.0000000008048000.0000000008057000.r-x.sdmpLinux_Trojan_Mirai_8aa7b5d3unknownunknown
  • 0x6982:$a: 8B 4C 24 14 8B 74 24 0C 8B 5C 24 10 85 C9 74 0D 31 D2 8A 04 1A 88
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Aqua.x86.elfReversingLabs: Detection: 38%
Source: Aqua.x86.elfString: EOF/proc//proc/%s/cmdlinerwgetcurlftpechokillbashrebootshutdownhaltpoweroff/fdsocket/proc/%s/stat/proc/proc/%d/exe/proc/%d/stat%d %s %c %d/proc/%d/maps/var/run/mnt/root/var/tmp/boot/bin/sbin/../(deleted)/homedbgmpslmipselmipsarmarm4arm5arm6arm7sh4m68kx86x586x86_64i586i686ppcspc[locker] killed process: %s ;; pid: %d

Networking

barindex
Source: global trafficDNS traffic detected: malformed DNS query: kumalala.cloudboats.vip. [malformed]
Source: global trafficTCP traffic: 192.168.2.23:50014 -> 89.190.156.145:7733
Source: global trafficTCP traffic: 192.168.2.23:52806 -> 89.144.32.113:33966
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
Source: global trafficDNS traffic detected: DNS query: kumalala.cloudboats.vip
Source: global trafficDNS traffic detected: DNS query: kumalala.cloudboats.vip. [malformed]
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

System Summary

barindex
Source: Aqua.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: Aqua.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: Aqua.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: Aqua.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: Aqua.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 6233.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 6233.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 6233.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 6233.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 6233.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/Aqua.x86.elf (PID: 6235)SIGKILL sent: pid: 1638, result: successfulJump to behavior
Source: Aqua.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: Aqua.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: Aqua.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: Aqua.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: Aqua.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 6233.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 6233.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 6233.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 6233.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 6233.1.0000000008048000.0000000008057000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: classification engineClassification label: mal64.troj.evad.linELF@0/0@6/0
Source: /usr/libexec/gsd-rfkill (PID: 6238)Directory: <invalid fd (9)>/..Jump to behavior
Source: /usr/libexec/gsd-rfkill (PID: 6238)Directory: <invalid fd (8)>/..Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 6243)Directory: <invalid fd (10)>/..Jump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/910/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1594/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1349/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1344/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1465/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1586/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1463/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/491/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1477/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/379/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1476/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1475/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/936/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1494/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/141/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/262/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/263/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/264/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/144/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/265/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/266/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/267/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/1489/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/269/cmdlineJump to behavior
Source: /tmp/Aqua.x86.elf (PID: 6235)File opened: /proc/270/cmdlineJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/Aqua.x86.elf (PID: 6234)File: /tmp/Aqua.x86.elfJump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 6243)Queries kernel information via 'uname': Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
Path Interception1
Hidden Files and Directories
1
OS Credential Dumping
1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File Deletion
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1646303 Sample: Aqua.x86.elf Startdate: 23/03/2025 Architecture: LINUX Score: 64 19 kumalala.cloudboats.vip. [malformed] 2->19 21 kumalala.cloudboats.vip 89.144.32.113, 33966, 52806 ASGHOSTNETDE Germany 2->21 23 4 other IPs or domains 2->23 25 Malicious sample detected (through community Yara rule) 2->25 27 Multi AV Scanner detection for submitted file 2->27 8 Aqua.x86.elf 2->8         started        10 gnome-session-binary sh gsd-rfkill 2->10         started        12 systemd systemd-hostnamed 2->12         started        signatures3 29 Sends malformed DNS queries 19->29 process4 process5 14 Aqua.x86.elf 8->14         started        signatures6 31 Sample deletes itself 14->31 17 Aqua.x86.elf 14->17         started        process7
SourceDetectionScannerLabelLink
Aqua.x86.elf39%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
kumalala.cloudboats.vip
89.144.32.113
truetrue
    unknown
    kumalala.cloudboats.vip. [malformed]
    unknown
    unknowntrue
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      89.144.32.113
      kumalala.cloudboats.vipGermany
      12586ASGHOSTNETDEtrue
      89.190.156.145
      unknownUnited Kingdom
      7489HOSTUS-GLOBAL-ASHostUSHKfalse
      109.202.202.202
      unknownSwitzerland
      13030INIT7CHfalse
      91.189.91.43
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      91.189.91.42
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      89.190.156.145Aqua.arm7.elfGet hashmaliciousMiraiBrowse
        drea4.elfGet hashmaliciousUnknownBrowse
          vjwe68k.elfGet hashmaliciousUnknownBrowse
            efjepc.elfGet hashmaliciousUnknownBrowse
              Aqua.arm7.elfGet hashmaliciousMiraiBrowse
                Aqua.arm7.elfGet hashmaliciousMiraiBrowse
                  drea4.elfGet hashmaliciousUnknownBrowse
                    weje64.elfGet hashmaliciousUnknownBrowse
                      vjwe68k.elfGet hashmaliciousUnknownBrowse
                        rjfe686.elfGet hashmaliciousUnknownBrowse
                          109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                          • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                          91.189.91.43gigab.m68.elfGet hashmaliciousUnknownBrowse
                            gigab.ppc.elfGet hashmaliciousUnknownBrowse
                              gigab.arm6.elfGet hashmaliciousUnknownBrowse
                                na.elfGet hashmaliciousPrometeiBrowse
                                  gigab.arm5.elfGet hashmaliciousUnknownBrowse
                                    na.elfGet hashmaliciousPrometeiBrowse
                                      na.elfGet hashmaliciousPrometeiBrowse
                                        gigab.i686.elfGet hashmaliciousUnknownBrowse
                                          gigab.arm4.elfGet hashmaliciousUnknownBrowse
                                            na.elfGet hashmaliciousPrometeiBrowse
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              HOSTUS-GLOBAL-ASHostUSHKAqua.arm7.elfGet hashmaliciousMiraiBrowse
                                              • 89.190.156.145
                                              bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                              • 89.190.156.158
                                              bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                              • 89.190.156.158
                                              bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                              • 89.190.156.158
                                              bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                              • 89.190.156.158
                                              bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                              • 89.190.156.158
                                              bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                              • 89.190.156.158
                                              bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                              • 89.190.156.158
                                              bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                              • 89.190.156.158
                                              bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                              • 89.190.156.158
                                              CANONICAL-ASGBgigab.m68.elfGet hashmaliciousUnknownBrowse
                                              • 91.189.91.42
                                              gigab.ppc.elfGet hashmaliciousUnknownBrowse
                                              • 91.189.91.42
                                              gigab.arm6.elfGet hashmaliciousUnknownBrowse
                                              • 91.189.91.42
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 91.189.91.42
                                              gigab.arm5.elfGet hashmaliciousUnknownBrowse
                                              • 91.189.91.42
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 91.189.91.42
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 91.189.91.42
                                              gigab.i686.elfGet hashmaliciousUnknownBrowse
                                              • 91.189.91.42
                                              gigab.arm4.elfGet hashmaliciousUnknownBrowse
                                              • 91.189.91.42
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 91.189.91.42
                                              CANONICAL-ASGBgigab.m68.elfGet hashmaliciousUnknownBrowse
                                              • 91.189.91.42
                                              gigab.ppc.elfGet hashmaliciousUnknownBrowse
                                              • 91.189.91.42
                                              gigab.arm6.elfGet hashmaliciousUnknownBrowse
                                              • 91.189.91.42
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 91.189.91.42
                                              gigab.arm5.elfGet hashmaliciousUnknownBrowse
                                              • 91.189.91.42
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 91.189.91.42
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 91.189.91.42
                                              gigab.i686.elfGet hashmaliciousUnknownBrowse
                                              • 91.189.91.42
                                              gigab.arm4.elfGet hashmaliciousUnknownBrowse
                                              • 91.189.91.42
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 91.189.91.42
                                              ASGHOSTNETDEjklspc.elfGet hashmaliciousUnknownBrowse
                                              • 193.187.23.221
                                              x86.elfGet hashmaliciousMiraiBrowse
                                              • 5.175.146.223
                                              CP07E1clp1.exeGet hashmaliciousFormBookBrowse
                                              • 5.83.145.167
                                              https://antiphishing.vadesecure.com/v4?f=MjMzYkQ1dkpnTmpjenZpZYUV4oe6VG46PiXs8NC-GUZfZIrO3RYwH86PdkkkedK4uMk885aV1InZf7EjajOVvQ&i=T2dqTk1tVTZvQjBuUWNQb05yExJL-_0iDVLAyK2pB_4&k=ryMR&r=UDFPSGJmRE5ZVVpYdThwNbgd2TqQYYyYTyptNQfci42yuGia0oe4wTv5CuHe0lfachoPwP17uVJmztzAkTiHiw&s=38092273b8d5078b67e4d735846fd94c4c4220df04b8a39ef4a367fe6da31025&u=https%3A%2F%2Faqixav.s3.ap-northeast-3.amazonaws.com%2F3rudeaq3b%2F%2Ax%2Findex.html%3Fb4BA32ejyon0jean-luc.marzioux6bdcbda12fa32ca092ced51e074c47dc67e10e0c92cddf48eee61b1b92ea93%23amVhbi1sdWMubWFyemlvdUBjaGFudGllcnMtYXRsYW50aXF1ZS5jb20%3DGet hashmaliciousUnknownBrowse
                                              • 5.231.29.87
                                              mipsel64.elfGet hashmaliciousUnknownBrowse
                                              • 5.230.227.30
                                              ppc.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 94.249.212.230
                                              mips.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 94.249.212.230
                                              arm.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 94.249.212.230
                                              arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 94.249.212.230
                                              m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 94.249.212.230
                                              INIT7CHgigab.m68.elfGet hashmaliciousUnknownBrowse
                                              • 109.202.202.202
                                              gigab.ppc.elfGet hashmaliciousUnknownBrowse
                                              • 109.202.202.202
                                              gigab.arm6.elfGet hashmaliciousUnknownBrowse
                                              • 109.202.202.202
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 109.202.202.202
                                              gigab.arm5.elfGet hashmaliciousUnknownBrowse
                                              • 109.202.202.202
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 109.202.202.202
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 109.202.202.202
                                              gigab.i686.elfGet hashmaliciousUnknownBrowse
                                              • 109.202.202.202
                                              gigab.arm4.elfGet hashmaliciousUnknownBrowse
                                              • 109.202.202.202
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 109.202.202.202
                                              No context
                                              No context
                                              No created / dropped files found
                                              File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                              Entropy (8bit):6.519488052525415
                                              TrID:
                                              • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                              • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                              File name:Aqua.x86.elf
                                              File size:62'772 bytes
                                              MD5:ae403ef91f4a5a63f9fea903f5c2a598
                                              SHA1:409ca9d7ea942a3eca0d81367ebf5d3843cd3a7a
                                              SHA256:da92f6515014f5f4ca9d22cee708f921a0a2228fdc8220cb188e2b345d9b6e69
                                              SHA512:5982ee2a78b44b85e1b9c13f613683d0c4ecefe3305e69a289c6691caa7c5f1e6a16d19b2a2593b72e92d87f723bb85144efd4f249717a8c4294d22811a928c1
                                              SSDEEP:1536:hsJzVTBEV6t+sJ9b6Vc53mr/OyucnIA3Bda9X81OwoO7R:uJBVEV6tZ2c9mr/OyfnZBaM1F
                                              TLSH:6B535AC1B683D8F5F96A01315137EB375632E43A013DDA87C7A9A836EC62901F71A39C
                                              File Content Preview:.ELF....................d...4...........4. ...(..............................................p...p..d....(..........Q.td............................U..S.......w....h....c...[]...$.............U......=.s...t..5....$p.....$p......u........t....h.n..........

                                              ELF header

                                              Class:ELF32
                                              Data:2's complement, little endian
                                              Version:1 (current)
                                              Machine:Intel 80386
                                              Version Number:0x1
                                              Type:EXEC (Executable file)
                                              OS/ABI:UNIX - System V
                                              ABI Version:0
                                              Entry Point Address:0x8048164
                                              Flags:0x0
                                              ELF Header Size:52
                                              Program Header Offset:52
                                              Program Header Size:32
                                              Number of Program Headers:3
                                              Section Header Offset:62372
                                              Section Header Size:40
                                              Number of Section Headers:10
                                              Header String Table Index:9
                                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                              NULL0x00x00x00x00x0000
                                              .initPROGBITS0x80480940x940x1c0x00x6AX001
                                              .textPROGBITS0x80480b00xb00xd3860x00x6AX0016
                                              .finiPROGBITS0x80554360xd4360x170x00x6AX001
                                              .rodataPROGBITS0x80554600xd4600x1a650x00x2A0032
                                              .ctorsPROGBITS0x80570000xf0000x80x00x3WA004
                                              .dtorsPROGBITS0x80570080xf0080x80x00x3WA004
                                              .dataPROGBITS0x80570200xf0200x3440x00x3WA0032
                                              .bssNOBITS0x80573800xf3640x25600x00x3WA0032
                                              .shstrtabSTRTAB0x00xf3640x3e0x00x0001
                                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                              LOAD0x00x80480000x80480000xeec50xeec56.56910x5R E0x1000.init .text .fini .rodata
                                              LOAD0xf0000x80570000x80570000x3640x28e04.27430x6RW 0x1000.ctors .dtors .data .bss
                                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

                                              Download Network PCAP: filteredfull

                                              • Total Packets: 31
                                              • 33966 undefined
                                              • 7733 undefined
                                              • 443 (HTTPS)
                                              • 80 (HTTP)
                                              • 53 (DNS)
                                              TimestampSource PortDest PortSource IPDest IP
                                              Mar 23, 2025 20:49:01.391483068 CET43928443192.168.2.2391.189.91.42
                                              Mar 23, 2025 20:49:03.055109024 CET500147733192.168.2.2389.190.156.145
                                              Mar 23, 2025 20:49:03.224930048 CET5280633966192.168.2.2389.144.32.113
                                              Mar 23, 2025 20:49:03.460091114 CET339665280689.144.32.113192.168.2.23
                                              Mar 23, 2025 20:49:03.460298061 CET5280633966192.168.2.2389.144.32.113
                                              Mar 23, 2025 20:49:03.460298061 CET5280633966192.168.2.2389.144.32.113
                                              Mar 23, 2025 20:49:04.079178095 CET500147733192.168.2.2389.190.156.145
                                              Mar 23, 2025 20:49:04.143049002 CET5280633966192.168.2.2389.144.32.113
                                              Mar 23, 2025 20:49:04.403879881 CET339665280689.144.32.113192.168.2.23
                                              Mar 23, 2025 20:49:06.094675064 CET500147733192.168.2.2389.190.156.145
                                              Mar 23, 2025 20:49:06.766721964 CET42836443192.168.2.2391.189.91.43
                                              Mar 23, 2025 20:49:07.534605980 CET4251680192.168.2.23109.202.202.202
                                              Mar 23, 2025 20:49:10.350065947 CET500147733192.168.2.2389.190.156.145
                                              Mar 23, 2025 20:49:18.541091919 CET500147733192.168.2.2389.190.156.145
                                              Mar 23, 2025 20:49:19.427093029 CET339665280689.144.32.113192.168.2.23
                                              Mar 23, 2025 20:49:19.427269936 CET5280633966192.168.2.2389.144.32.113
                                              Mar 23, 2025 20:49:22.636353970 CET43928443192.168.2.2391.189.91.42
                                              Mar 23, 2025 20:49:32.874872923 CET42836443192.168.2.2391.189.91.43
                                              Mar 23, 2025 20:49:34.666611910 CET500147733192.168.2.2389.190.156.145
                                              Mar 23, 2025 20:49:36.970140934 CET4251680192.168.2.23109.202.202.202
                                              Mar 23, 2025 20:50:03.590431929 CET43928443192.168.2.2391.189.91.42
                                              Mar 23, 2025 20:50:04.999197006 CET339665280689.144.32.113192.168.2.23
                                              Mar 23, 2025 20:50:04.999403954 CET5280633966192.168.2.2389.144.32.113
                                              Mar 23, 2025 20:50:07.685837030 CET500147733192.168.2.2389.190.156.145
                                              Mar 23, 2025 20:50:13.520783901 CET5280633966192.168.2.2389.144.32.113
                                              Mar 23, 2025 20:50:13.779094934 CET339665280689.144.32.113192.168.2.23
                                              Mar 23, 2025 20:50:13.779119015 CET339665280689.144.32.113192.168.2.23
                                              Mar 23, 2025 20:50:13.779249907 CET5280633966192.168.2.2389.144.32.113
                                              Mar 23, 2025 20:50:23.784399033 CET5280633966192.168.2.2389.144.32.113
                                              Mar 23, 2025 20:50:24.055941105 CET339665280689.144.32.113192.168.2.23
                                              Mar 23, 2025 20:50:24.055958986 CET339665280689.144.32.113192.168.2.23
                                              Mar 23, 2025 20:50:24.056178093 CET5280633966192.168.2.2389.144.32.113
                                              Mar 23, 2025 20:50:54.663074970 CET339665280689.144.32.113192.168.2.23
                                              Mar 23, 2025 20:50:54.663296938 CET5280633966192.168.2.2389.144.32.113
                                              TimestampSource PortDest PortSource IPDest IP
                                              Mar 23, 2025 20:49:02.658667088 CET5844553192.168.2.238.8.8.8
                                              Mar 23, 2025 20:49:02.767165899 CET53584458.8.8.8192.168.2.23
                                              Mar 23, 2025 20:49:02.767244101 CET5489253192.168.2.238.8.8.8
                                              Mar 23, 2025 20:49:02.861696959 CET53548928.8.8.8192.168.2.23
                                              Mar 23, 2025 20:49:02.861762047 CET4980353192.168.2.238.8.8.8
                                              Mar 23, 2025 20:49:02.954057932 CET53498038.8.8.8192.168.2.23
                                              Mar 23, 2025 20:49:02.954140902 CET3338053192.168.2.238.8.8.8
                                              Mar 23, 2025 20:49:03.044245005 CET53333808.8.8.8192.168.2.23
                                              Mar 23, 2025 20:49:03.044336081 CET3580353192.168.2.238.8.8.8
                                              Mar 23, 2025 20:49:03.134197950 CET53358038.8.8.8192.168.2.23
                                              Mar 23, 2025 20:49:03.134303093 CET5752353192.168.2.238.8.8.8
                                              Mar 23, 2025 20:49:03.224773884 CET53575238.8.8.8192.168.2.23
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Mar 23, 2025 20:49:02.658667088 CET192.168.2.238.8.8.80x9325Standard query (0)kumalala.cloudboats.vipA (IP address)IN (0x0001)false
                                              Mar 23, 2025 20:49:02.767244101 CET192.168.2.238.8.8.80x93efStandard query (0)kumalala.cloudboats.vip. [malformed]256430false
                                              Mar 23, 2025 20:49:02.861762047 CET192.168.2.238.8.8.80x93efStandard query (0)kumalala.cloudboats.vip. [malformed]256430false
                                              Mar 23, 2025 20:49:02.954140902 CET192.168.2.238.8.8.80x93efStandard query (0)kumalala.cloudboats.vip. [malformed]256431false
                                              Mar 23, 2025 20:49:03.044336081 CET192.168.2.238.8.8.80x93efStandard query (0)kumalala.cloudboats.vip. [malformed]256431false
                                              Mar 23, 2025 20:49:03.134303093 CET192.168.2.238.8.8.80x93efStandard query (0)kumalala.cloudboats.vip. [malformed]256431false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Mar 23, 2025 20:49:02.767165899 CET8.8.8.8192.168.2.230x9325No error (0)kumalala.cloudboats.vip89.144.32.113A (IP address)IN (0x0001)false

                                              System Behavior

                                              Start time (UTC):19:49:01
                                              Start date (UTC):23/03/2025
                                              Path:/tmp/Aqua.x86.elf
                                              Arguments:/tmp/Aqua.x86.elf
                                              File size:62772 bytes
                                              MD5 hash:ae403ef91f4a5a63f9fea903f5c2a598

                                              Start time (UTC):19:49:01
                                              Start date (UTC):23/03/2025
                                              Path:/tmp/Aqua.x86.elf
                                              Arguments:-
                                              File size:62772 bytes
                                              MD5 hash:ae403ef91f4a5a63f9fea903f5c2a598

                                              Start time (UTC):19:49:01
                                              Start date (UTC):23/03/2025
                                              Path:/tmp/Aqua.x86.elf
                                              Arguments:-
                                              File size:62772 bytes
                                              MD5 hash:ae403ef91f4a5a63f9fea903f5c2a598

                                              Start time (UTC):19:49:02
                                              Start date (UTC):23/03/2025
                                              Path:/usr/libexec/gnome-session-binary
                                              Arguments:-
                                              File size:334664 bytes
                                              MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                              Start time (UTC):19:49:02
                                              Start date (UTC):23/03/2025
                                              Path:/bin/sh
                                              Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time (UTC):19:49:02
                                              Start date (UTC):23/03/2025
                                              Path:/usr/libexec/gsd-rfkill
                                              Arguments:/usr/libexec/gsd-rfkill
                                              File size:51808 bytes
                                              MD5 hash:88a16a3c0aba1759358c06215ecfb5cc

                                              Start time (UTC):19:49:02
                                              Start date (UTC):23/03/2025
                                              Path:/usr/lib/systemd/systemd
                                              Arguments:-
                                              File size:1620224 bytes
                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                              Start time (UTC):19:49:02
                                              Start date (UTC):23/03/2025
                                              Path:/lib/systemd/systemd-hostnamed
                                              Arguments:/lib/systemd/systemd-hostnamed
                                              File size:35040 bytes
                                              MD5 hash:2cc8a5576629a2d5bd98e49a4b8bef65