Edit tour

Linux Analysis Report
pspc.elf

Overview

General Information

Sample name:pspc.elf
Analysis ID:1646334
MD5:1be67e8084f4102af05e2e4152f6c338
SHA1:c2b233f3ff302b7c02932c0dddfb9bff8bce3519
SHA256:9084996cb44d48b01e18242fff25cbfe87e47c8208b7315310c7c7a373927488
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai
Score:68
Range:0 - 100

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mirai
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1646334
Start date and time:2025-03-23 22:35:51 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:pspc.elf
Detection:MAL
Classification:mal68.troj.evad.linELF@0/0@2/0
Command:/tmp/pspc.elf
PID:5516
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
im in deep sorrow.
Standard Error:
  • system is lnxubuntu20
  • pspc.elf (PID: 5516, Parent: 5438, MD5: 7dc1c0e23cd5e102bb12e5c29403410e) Arguments: /tmp/pspc.elf
    • pspc.elf New Fork (PID: 5519, Parent: 5516)
      • pspc.elf New Fork (PID: 5521, Parent: 5519)
      • pspc.elf New Fork (PID: 5523, Parent: 5519)
      • pspc.elf New Fork (PID: 5625, Parent: 5519)
        • pspc.elf New Fork (PID: 5627, Parent: 5625)
  • dash New Fork (PID: 5592, Parent: 3674)
  • rm (PID: 5592, Parent: 3674, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.CslLoJ51ym /tmp/tmp.EDscIglqPx /tmp/tmp.vdXEG3DI2i
  • dash New Fork (PID: 5593, Parent: 3674)
  • rm (PID: 5593, Parent: 3674, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.CslLoJ51ym /tmp/tmp.EDscIglqPx /tmp/tmp.vdXEG3DI2i
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
pspc.elfJoeSecurity_Mirai_9Yara detected MiraiJoe Security
    SourceRuleDescriptionAuthorStrings
    5521.1.00007f696c011000.00007f696c024000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
      5516.1.00007f696c011000.00007f696c024000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
        5625.1.00007f696c011000.00007f696c024000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
          5627.1.00007f696c011000.00007f696c024000.r-x.sdmpJoeSecurity_Mirai_9Yara detected MiraiJoe Security
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: pspc.elfAvira: detected
            Source: pspc.elfReversingLabs: Detection: 36%
            Source: pspc.elfVirustotal: Detection: 38%Perma Link
            Source: global trafficTCP traffic: 192.168.2.15:48678 -> 193.32.162.27:18129
            Source: /tmp/pspc.elf (PID: 5516)Socket: 127.0.0.1:18129Jump to behavior
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: unknownTCP traffic detected without corresponding DNS query: 193.32.162.27
            Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49566 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49566
            Source: Initial sampleString containing 'busybox' found: busybox
            Source: Initial sampleString containing 'busybox' found: sys_monitor_cnrbusyboxadbddockerdBlink_Cloudsystemdhttpshsshdbashmsg_centerlte_mgrmain_mgrparm7parm5parmparm6pmipspmpslpx86/tmp/var/mnt/root/boot/sbin/home/dev/media/opt/../(deleted)x86mipssh4arm5arm6softbot.armsoftbot.mpsl/dev/watchdog/dev/misc/watchdog/im in deep sorrow.
            Source: ELF static info symbol of initial sample.symtab present: no
            Source: /tmp/pspc.elf (PID: 5521)SIGKILL sent: pid: 658, result: successfulJump to behavior
            Source: /tmp/pspc.elf (PID: 5627)SIGKILL sent: pid: 5625, result: successfulJump to behavior
            Source: classification engineClassification label: mal68.troj.evad.linELF@0/0@2/0
            Source: /usr/bin/dash (PID: 5592)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.CslLoJ51ym /tmp/tmp.EDscIglqPx /tmp/tmp.vdXEG3DI2iJump to behavior
            Source: /usr/bin/dash (PID: 5593)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.CslLoJ51ym /tmp/tmp.EDscIglqPx /tmp/tmp.vdXEG3DI2iJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: /tmp/pspc.elf (PID: 5516)File: /tmp/pspc.elfJump to behavior
            Source: /tmp/pspc.elf (PID: 5516)Queries kernel information via 'uname': Jump to behavior
            Source: pspc.elf, 5516.1.00005595e3328000.00005595e338d000.rw-.sdmp, pspc.elf, 5521.1.00005595e3328000.00005595e338d000.rw-.sdmp, pspc.elf, 5625.1.00005595e3328000.00005595e338d000.rw-.sdmp, pspc.elf, 5627.1.00005595e3328000.00005595e338d000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sparc
            Source: pspc.elf, 5516.1.00005595e3328000.00005595e338d000.rw-.sdmp, pspc.elf, 5521.1.00005595e3328000.00005595e338d000.rw-.sdmp, pspc.elf, 5625.1.00005595e3328000.00005595e338d000.rw-.sdmp, pspc.elf, 5627.1.00005595e3328000.00005595e338d000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/sparc
            Source: pspc.elf, 5516.1.00007ffe5d595000.00007ffe5d5b6000.rw-.sdmp, pspc.elf, 5521.1.00007ffe5d595000.00007ffe5d5b6000.rw-.sdmp, pspc.elf, 5625.1.00007ffe5d595000.00007ffe5d5b6000.rw-.sdmp, pspc.elf, 5627.1.00007ffe5d595000.00007ffe5d5b6000.rw-.sdmpBinary or memory string: zx86_64/usr/bin/qemu-sparc/tmp/pspc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/pspc.elf
            Source: pspc.elf, 5516.1.00007ffe5d595000.00007ffe5d5b6000.rw-.sdmp, pspc.elf, 5521.1.00007ffe5d595000.00007ffe5d5b6000.rw-.sdmp, pspc.elf, 5625.1.00007ffe5d595000.00007ffe5d5b6000.rw-.sdmp, pspc.elf, 5627.1.00007ffe5d595000.00007ffe5d5b6000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: pspc.elf, type: SAMPLE
            Source: Yara matchFile source: 5521.1.00007f696c011000.00007f696c024000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: 5516.1.00007f696c011000.00007f696c024000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: 5625.1.00007f696c011000.00007f696c024000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: 5627.1.00007f696c011000.00007f696c024000.r-x.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: pspc.elf, type: SAMPLE
            Source: Yara matchFile source: 5521.1.00007f696c011000.00007f696c024000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: 5516.1.00007f696c011000.00007f696c024000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: 5625.1.00007f696c011000.00007f696c024000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: 5627.1.00007f696c011000.00007f696c024000.r-x.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
            File Deletion
            OS Credential Dumping11
            Security Software Discovery
            Remote ServicesData from Local System1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
            Application Layer Protocol
            Traffic DuplicationData Destruction
            No configs have been found
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Number of created Files
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1646334 Sample: pspc.elf Startdate: 23/03/2025 Architecture: LINUX Score: 68 26 193.32.162.27, 18129, 48678 DATACENTERRO Romania 2->26 28 54.217.10.153, 443, 49566 AMAZON-02US United States 2->28 30 daisy.ubuntu.com 2->30 32 Antivirus / Scanner detection for submitted sample 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 Yara detected Mirai 2->36 9 pspc.elf 2->9         started        12 dash rm 2->12         started        14 dash rm 2->14         started        signatures3 process4 signatures5 38 Sample deletes itself 9->38 16 pspc.elf 9->16         started        process6 process7 18 pspc.elf 16->18         started        20 pspc.elf 16->20         started        22 pspc.elf 16->22         started        process8 24 pspc.elf 18->24         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            pspc.elf36%ReversingLabsLinux.Trojan.Mirai
            pspc.elf38%VirustotalBrowse
            pspc.elf100%AviraEXP/ELF.Mirai.W
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches

            Download Network PCAP: filteredfull

            NameIPActiveMaliciousAntivirus DetectionReputation
            daisy.ubuntu.com
            162.213.35.25
            truefalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              54.217.10.153
              unknownUnited States
              16509AMAZON-02USfalse
              193.32.162.27
              unknownRomania
              35478DATACENTERROfalse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              54.217.10.153sh4.elfGet hashmaliciousMiraiBrowse
                wget.elfGet hashmaliciousGafgyt, MiraiBrowse
                  wget.elfGet hashmaliciousGafgytBrowse
                    main_x86_64.elfGet hashmaliciousUnknownBrowse
                      arm7.elfGet hashmaliciousMiraiBrowse
                        46.19.143.26-mips-2025-03-01T06_09_25.elfGet hashmaliciousUnknownBrowse
                          dlr.sh4.elfGet hashmaliciousUnknownBrowse
                            i686.elfGet hashmaliciousGafgyt, MiraiBrowse
                              miner.elfGet hashmaliciousUnknownBrowse
                                psmips.elfGet hashmaliciousUnknownBrowse
                                  193.32.162.27pmpsl.elfGet hashmaliciousMiraiBrowse
                                    px86.elfGet hashmaliciousMiraiBrowse
                                      pmips.elfGet hashmaliciousMiraiBrowse
                                        parm.elfGet hashmaliciousMiraiBrowse
                                          parm7.elfGet hashmaliciousMiraiBrowse
                                            parm6.elfGet hashmaliciousMiraiBrowse
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              daisy.ubuntu.compmpsl.elfGet hashmaliciousMiraiBrowse
                                              • 162.213.35.25
                                              px86.elfGet hashmaliciousMiraiBrowse
                                              • 162.213.35.24
                                              parm.elfGet hashmaliciousMiraiBrowse
                                              • 162.213.35.24
                                              parm7.elfGet hashmaliciousMiraiBrowse
                                              • 162.213.35.25
                                              sshd.elfGet hashmaliciousUnknownBrowse
                                              • 162.213.35.25
                                              killua.x86.elfGet hashmaliciousUnknownBrowse
                                              • 162.213.35.24
                                              gigab.sh4.elfGet hashmaliciousUnknownBrowse
                                              • 162.213.35.24
                                              yakuza.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 162.213.35.24
                                              yakuza.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 162.213.35.24
                                              yakuza.i586.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 162.213.35.24
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              DATACENTERROpmpsl.elfGet hashmaliciousMiraiBrowse
                                              • 193.32.162.27
                                              px86.elfGet hashmaliciousMiraiBrowse
                                              • 193.32.162.27
                                              pmips.elfGet hashmaliciousMiraiBrowse
                                              • 193.32.162.27
                                              parm.elfGet hashmaliciousMiraiBrowse
                                              • 193.32.162.27
                                              parm7.elfGet hashmaliciousMiraiBrowse
                                              • 193.32.162.27
                                              parm6.elfGet hashmaliciousMiraiBrowse
                                              • 193.32.162.27
                                              phantom.arm.elfGet hashmaliciousUnknownBrowse
                                              • 194.85.251.76
                                              boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                              • 193.32.162.38
                                              boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                              • 193.32.162.38
                                              boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                              • 193.32.162.38
                                              AMAZON-02USparm5.elfGet hashmaliciousUnknownBrowse
                                              • 34.249.145.219
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 34.249.145.219
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 52.43.119.120
                                              reverseshell bash64.batGet hashmaliciousQuasarBrowse
                                              • 34.217.253.146
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 54.171.230.55
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 52.43.119.120
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 52.43.119.120
                                              gigab.arm5.elfGet hashmaliciousUnknownBrowse
                                              • 54.171.230.55
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 52.43.119.120
                                              na.elfGet hashmaliciousPrometeiBrowse
                                              • 52.43.119.120
                                              No context
                                              No context
                                              No created / dropped files found
                                              File type:ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, stripped
                                              Entropy (8bit):6.095585825267132
                                              TrID:
                                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                              File name:pspc.elf
                                              File size:76'448 bytes
                                              MD5:1be67e8084f4102af05e2e4152f6c338
                                              SHA1:c2b233f3ff302b7c02932c0dddfb9bff8bce3519
                                              SHA256:9084996cb44d48b01e18242fff25cbfe87e47c8208b7315310c7c7a373927488
                                              SHA512:38bc03894851785343f858604319c4cf15a4192481d79d0caacb047c34bca974e591885453a3ab0b0a92a213444d8aefa0a687da0d9ca4e868ce5f2451744637
                                              SSDEEP:1536:mQMSZZm4fVFd9BPzzJCHQ7jtEeCNM5UeWzQSkWtgWG:DpzHzjjmpN8UeIjG
                                              TLSH:1A735B22BA751D2BC4D4A87A22F30725F2F2479B25AC8A1A7D710D8DBF3165032477F5
                                              File Content Preview:.ELF...........................4..)......4. ...(......................$...$...............$...$...$.......&.........dt.Q................................@..(....@.B.................#.....`...`.....!..... ...@.....".........`......$ ... ...@...........`....

                                              ELF header

                                              Class:ELF32
                                              Data:2's complement, big endian
                                              Version:1 (current)
                                              Machine:Sparc
                                              Version Number:0x1
                                              Type:EXEC (Executable file)
                                              OS/ABI:UNIX - System V
                                              ABI Version:0
                                              Entry Point Address:0x101a4
                                              Flags:0x0
                                              ELF Header Size:52
                                              Program Header Offset:52
                                              Program Header Size:32
                                              Number of Program Headers:3
                                              Section Header Offset:76048
                                              Section Header Size:40
                                              Number of Section Headers:10
                                              Header String Table Index:9
                                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                              NULL0x00x00x00x00x0000
                                              .initPROGBITS0x100940x940x1c0x00x6AX004
                                              .textPROGBITS0x100b00xb00x10ba40x00x6AX004
                                              .finiPROGBITS0x20c540x10c540x140x00x6AX004
                                              .rodataPROGBITS0x20c680x10c680x18480x00x2A008
                                              .ctorsPROGBITS0x324b40x124b40x80x00x3WA004
                                              .dtorsPROGBITS0x324bc0x124bc0x80x00x3WA004
                                              .dataPROGBITS0x324c80x124c80x4080x00x3WA008
                                              .bssNOBITS0x328d00x128d00x21f80x00x3WA008
                                              .shstrtabSTRTAB0x00x128d00x3e0x00x0001
                                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                              LOAD0x00x100000x100000x124b00x124b06.12720x5R E0x10000.init .text .fini .rodata
                                              LOAD0x124b40x324b40x324b40x41c0x26143.12850x6RW 0x10000.ctors .dtors .data .bss
                                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

                                              Download Network PCAP: filteredfull

                                              • Total Packets: 26
                                              • 18129 undefined
                                              • 443 (HTTPS)
                                              • 53 (DNS)
                                              TimestampSource PortDest PortSource IPDest IP
                                              Mar 23, 2025 22:36:34.572022915 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:36:34.770911932 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:36:34.770978928 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:36:34.776201963 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:36:34.972389936 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:36:34.972436905 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:36:35.171458960 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:36:38.905311108 CET49566443192.168.2.1554.217.10.153
                                              Mar 23, 2025 22:36:44.785336971 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:36:44.993678093 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:36:44.993695021 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:36:44.993731976 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:36:45.978421926 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:36:45.979118109 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:37:01.198221922 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:37:01.198276997 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:37:09.368792057 CET49566443192.168.2.1554.217.10.153
                                              Mar 23, 2025 22:37:09.507354021 CET49566443192.168.2.1554.217.10.153
                                              Mar 23, 2025 22:37:09.599490881 CET4434956654.217.10.153192.168.2.15
                                              Mar 23, 2025 22:37:09.829755068 CET4434956654.217.10.153192.168.2.15
                                              Mar 23, 2025 22:37:14.152858973 CET4434956654.217.10.153192.168.2.15
                                              Mar 23, 2025 22:37:14.152877092 CET4434956654.217.10.153192.168.2.15
                                              Mar 23, 2025 22:37:14.152884960 CET4434956654.217.10.153192.168.2.15
                                              Mar 23, 2025 22:37:14.153135061 CET49566443192.168.2.1554.217.10.153
                                              Mar 23, 2025 22:37:14.153135061 CET49566443192.168.2.1554.217.10.153
                                              Mar 23, 2025 22:37:14.153135061 CET49566443192.168.2.1554.217.10.153
                                              Mar 23, 2025 22:37:14.154009104 CET4434956654.217.10.153192.168.2.15
                                              Mar 23, 2025 22:37:14.154073000 CET49566443192.168.2.1554.217.10.153
                                              Mar 23, 2025 22:37:16.409195900 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:37:16.409435987 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:37:31.616102934 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:37:31.616302013 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:37:38.998994112 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:37:38.999171019 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:37:49.014669895 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:37:49.243350983 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:37:49.243632078 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:37:50.016271114 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:37:50.016688108 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:38:05.258800983 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:38:05.258999109 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:38:20.466783047 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:38:20.466999054 CET4867818129192.168.2.15193.32.162.27
                                              Mar 23, 2025 22:38:35.676373005 CET1812948678193.32.162.27192.168.2.15
                                              Mar 23, 2025 22:38:35.676491976 CET4867818129192.168.2.15193.32.162.27
                                              TimestampSource PortDest PortSource IPDest IP
                                              Mar 23, 2025 22:36:36.711173058 CET5079953192.168.2.158.8.8.8
                                              Mar 23, 2025 22:36:36.711247921 CET6038653192.168.2.158.8.8.8
                                              Mar 23, 2025 22:36:36.801701069 CET53603868.8.8.8192.168.2.15
                                              Mar 23, 2025 22:36:36.807723045 CET53507998.8.8.8192.168.2.15
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Mar 23, 2025 22:36:36.711173058 CET192.168.2.158.8.8.80xce0dStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                              Mar 23, 2025 22:36:36.711247921 CET192.168.2.158.8.8.80xe049Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Mar 23, 2025 22:36:36.807723045 CET8.8.8.8192.168.2.150xce0dNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                                              Mar 23, 2025 22:36:36.807723045 CET8.8.8.8192.168.2.150xce0dNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                                              System Behavior

                                              Start time (UTC):21:36:33
                                              Start date (UTC):23/03/2025
                                              Path:/tmp/pspc.elf
                                              Arguments:/tmp/pspc.elf
                                              File size:4379400 bytes
                                              MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                              Start time (UTC):21:36:33
                                              Start date (UTC):23/03/2025
                                              Path:/tmp/pspc.elf
                                              Arguments:-
                                              File size:4379400 bytes
                                              MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                              Start time (UTC):21:36:33
                                              Start date (UTC):23/03/2025
                                              Path:/tmp/pspc.elf
                                              Arguments:-
                                              File size:4379400 bytes
                                              MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                              Start time (UTC):21:36:33
                                              Start date (UTC):23/03/2025
                                              Path:/tmp/pspc.elf
                                              Arguments:-
                                              File size:4379400 bytes
                                              MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                              Start time (UTC):21:37:38
                                              Start date (UTC):23/03/2025
                                              Path:/tmp/pspc.elf
                                              Arguments:-
                                              File size:4379400 bytes
                                              MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                              Start time (UTC):21:37:38
                                              Start date (UTC):23/03/2025
                                              Path:/tmp/pspc.elf
                                              Arguments:-
                                              File size:4379400 bytes
                                              MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                                              Start time (UTC):21:37:08
                                              Start date (UTC):23/03/2025
                                              Path:/usr/bin/dash
                                              Arguments:-
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time (UTC):21:37:08
                                              Start date (UTC):23/03/2025
                                              Path:/usr/bin/rm
                                              Arguments:rm -f /tmp/tmp.CslLoJ51ym /tmp/tmp.EDscIglqPx /tmp/tmp.vdXEG3DI2i
                                              File size:72056 bytes
                                              MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                              Start time (UTC):21:37:08
                                              Start date (UTC):23/03/2025
                                              Path:/usr/bin/dash
                                              Arguments:-
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time (UTC):21:37:08
                                              Start date (UTC):23/03/2025
                                              Path:/usr/bin/rm
                                              Arguments:rm -f /tmp/tmp.CslLoJ51ym /tmp/tmp.EDscIglqPx /tmp/tmp.vdXEG3DI2i
                                              File size:72056 bytes
                                              MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b