Edit tour

Linux Analysis Report
x86_64.elf

Overview

General Information

Sample name:x86_64.elf
Analysis ID:1646575
MD5:782ffe675b6b9ac6984c1151e9f23888
SHA1:821691e5903db1262110bec94f855b780539b635
SHA256:45a6bfd0bbf04e4eddbfd9b15ab25aef89448f888c3cb215336ca8620747cbcc
Tags:elfuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is packed with UPX
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Sample contains only a LOAD segment without any section mappings
Sample listens on a socket
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1646575
Start date and time:2025-03-24 06:10:44 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 18s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:x86_64.elf
Detection:MAL
Classification:mal60.evad.linELF@0/0@32/0
  • VT rate limit hit for: 198.98.51.68
Command:/tmp/x86_64.elf
PID:5486
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
skidmark botnet
Standard Error:
  • system is lnxubuntu20
  • x86_64.elf (PID: 5486, Parent: 5409, MD5: 782ffe675b6b9ac6984c1151e9f23888) Arguments: /tmp/x86_64.elf
  • cleanup
SourceRuleDescriptionAuthorStrings
x86_64.elfLinux_Trojan_Ircbot_bb204b81unknownunknown
  • 0x6f6a:$a: 0F 44 C8 4C 5E F8 8D EF 80 83 CD FF 31 DB 30 22
SourceRuleDescriptionAuthorStrings
5486.1.0000000000400000.000000000040d000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
  • 0x7a04:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
5486.1.0000000000400000.000000000040d000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
  • 0x81f3:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
5486.1.0000000000400000.000000000040d000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
  • 0x51c2:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
  • 0x52f8:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
5486.1.0000000000400000.000000000040d000.r-x.sdmpLinux_Trojan_Gafgyt_d996d335unknownunknown
  • 0xacba:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
5486.1.0000000000400000.000000000040d000.r-x.sdmpLinux_Trojan_Gafgyt_620087b9unknownunknown
  • 0x7db3:$a: 48 89 D8 48 83 C8 01 EB 04 48 8B 76 10 48 3B 46 08 72 F6 48 8B
Click to see the 11 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: x86_64.elfReversingLabs: Detection: 22%
Source: /tmp/x86_64.elf (PID: 5486)Socket: 127.0.0.1:47845Jump to behavior
Source: unknownDNS traffic detected: query: 198.98.51.68 replaycode: Name error (3)
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownUDP traffic detected without corresponding DNS query: 134.195.4.2
Source: unknownUDP traffic detected without corresponding DNS query: 134.195.4.2
Source: unknownUDP traffic detected without corresponding DNS query: 134.195.4.2
Source: unknownUDP traffic detected without corresponding DNS query: 134.195.4.2
Source: unknownUDP traffic detected without corresponding DNS query: 134.195.4.2
Source: unknownUDP traffic detected without corresponding DNS query: 185.181.61.24
Source: unknownUDP traffic detected without corresponding DNS query: 185.181.61.24
Source: unknownUDP traffic detected without corresponding DNS query: 185.181.61.24
Source: unknownUDP traffic detected without corresponding DNS query: 185.181.61.24
Source: unknownUDP traffic detected without corresponding DNS query: 185.181.61.24
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 91.217.137.37
Source: unknownUDP traffic detected without corresponding DNS query: 91.217.137.37
Source: unknownUDP traffic detected without corresponding DNS query: 91.217.137.37
Source: unknownUDP traffic detected without corresponding DNS query: 91.217.137.37
Source: unknownUDP traffic detected without corresponding DNS query: 91.217.137.37
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 194.36.144.87
Source: unknownUDP traffic detected without corresponding DNS query: 91.217.137.37
Source: global trafficDNS traffic detected: DNS query: 198.98.51.68
Source: x86_64.elfString found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Ircbot_bb204b81 Author: unknown
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
Source: LOAD without section mappingsProgram segment: 0x100000
Source: x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Ircbot_bb204b81 reference_sample = 6147481d083c707dc98905a1286827a6e7009e08490e7d7c280ed5a6356527ad, os = linux, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Ircbot, fingerprint = 66f9a8a31653a5e480f427d2d6a25b934c2c53752308eedb57eaa7b7cb7dde2e, id = bb204b81-db58-434f-b834-672cdc25e56c, last_modified = 2021-09-16
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
Source: 5486.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
Source: 5490.1.0000000000400000.000000000040d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
Source: classification engineClassification label: mal60.evad.linELF@0/0@32/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/1583/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/2672/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/1577/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/1593/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/3094/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/3406/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/1589/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/3402/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/806/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/807/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/928/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/135/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/3412/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/30/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/35/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/3790/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/3791/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/3792/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/3793/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/1371/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5489)File opened: /proc/262/cmdlineJump to behavior
Source: x86_64.elfSubmission file: segment LOAD with 7.8856 entropy (max. 8.0)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Obfuscated Files or Information
1
OS Credential Dumping
System Service DiscoveryRemote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1646575 Sample: x86_64.elf Startdate: 24/03/2025 Architecture: LINUX Score: 60 18 198.98.51.68 2->18 20 175.30.53.20, 23 CHINANET-BACKBONENo31Jin-rongStreetCN China 2->20 22 Malicious sample detected (through community Yara rule) 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Sample is packed with UPX 2->26 8 x86_64.elf 2->8         started        signatures3 process4 process5 10 x86_64.elf 8->10         started        process6 12 x86_64.elf 10->12         started        14 x86_64.elf 10->14         started        16 x86_64.elf 10->16         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
x86_64.elf22%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
198.98.51.68
unknown
unknowntrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netx86_64.elffalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      175.30.53.20
      unknownChina
      4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      175.30.53.20arm.elfGet hashmaliciousUnknownBrowse
        mpsl.elfGet hashmaliciousUnknownBrowse
          gjsoX84ZOy.elfGet hashmaliciousMiraiBrowse
            skwXrj6q72.elfGet hashmaliciousUnknownBrowse
              VqY324s7TO.elfGet hashmaliciousUnknownBrowse
                1v1A4KluJp.elfGet hashmaliciousUnknownBrowse
                  fI2JqkDmZj.elfGet hashmaliciousUnknownBrowse
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    CHINANET-BACKBONENo31Jin-rongStreetCNarm.elfGet hashmaliciousUnknownBrowse
                    • 175.30.53.20
                    mpsl.elfGet hashmaliciousUnknownBrowse
                    • 175.30.53.20
                    resgod.arm.elfGet hashmaliciousMiraiBrowse
                    • 223.8.175.23
                    resgod.arm5.elfGet hashmaliciousMiraiBrowse
                    • 223.8.175.35
                    resgod.sh4.elfGet hashmaliciousMiraiBrowse
                    • 223.8.175.39
                    resgod.mips.elfGet hashmaliciousMiraiBrowse
                    • 223.8.175.35
                    resgod.arm7.elfGet hashmaliciousMiraiBrowse
                    • 223.8.175.38
                    resgod.ppc.elfGet hashmaliciousMiraiBrowse
                    • 223.8.175.37
                    resgod.spc.elfGet hashmaliciousMiraiBrowse
                    • 223.8.175.23
                    resgod.mpsl.elfGet hashmaliciousMiraiBrowse
                    • 223.8.175.24
                    No context
                    No context
                    No created / dropped files found
                    File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
                    Entropy (8bit):7.880985249508648
                    TrID:
                    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                    File name:x86_64.elf
                    File size:29'500 bytes
                    MD5:782ffe675b6b9ac6984c1151e9f23888
                    SHA1:821691e5903db1262110bec94f855b780539b635
                    SHA256:45a6bfd0bbf04e4eddbfd9b15ab25aef89448f888c3cb215336ca8620747cbcc
                    SHA512:46d8c3e66917abb4a95285149d51db3669ba352c74030ee79b9834b5146a3dd3a8b670b978d4e44519acd688e5b8d206af6e8d017b799f2bf8d0136a4204dc6a
                    SSDEEP:768:Xc05PipH4lbsTGgpT8UPQ5hZKP9B23S/JMJsG9:XDIp+bniT8uu8VYiWOU
                    TLSH:BCD2F1619352215FFBEE94B08B116EADCDA68881DF463DCC1114EC8632AD5E0C3B1373
                    File Content Preview:.ELF..............>.....@j......@...................@.8...@.....................................*r......*r................................Q.......Q.............................Q.td....................................................N.[.UPX!...............

                    ELF header

                    Class:ELF64
                    Data:2's complement, little endian
                    Version:1 (current)
                    Machine:Advanced Micro Devices X86-64
                    Version Number:0x1
                    Type:EXEC (Executable file)
                    OS/ABI:UNIX - System V
                    ABI Version:0
                    Entry Point Address:0x106a40
                    Flags:0x0
                    ELF Header Size:64
                    Program Header Offset:64
                    Program Header Size:56
                    Number of Program Headers:3
                    Section Header Offset:0
                    Section Header Size:64
                    Number of Section Headers:0
                    Header String Table Index:0
                    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                    LOAD0x00x1000000x1000000x722a0x722a7.88560x5R E0x100000
                    LOAD0xe080x510e080x510e080x00x00.00000x6RW 0x1000
                    GNU_STACK0x00x00x00x00x00.00000x6RW 0x8

                    Download Network PCAP: filteredfull

                    • Total Packets: 56
                    • 53 (DNS)
                    • 23 (Telnet)
                    TimestampSource PortDest PortSource IPDest IP
                    Mar 24, 2025 06:11:25.534778118 CET5469223192.168.2.14175.30.53.20
                    Mar 24, 2025 06:11:26.566454887 CET5469223192.168.2.14175.30.53.20
                    Mar 24, 2025 06:11:28.582988977 CET5469223192.168.2.14175.30.53.20
                    Mar 24, 2025 06:11:32.712368965 CET5469223192.168.2.14175.30.53.20
                    Mar 24, 2025 06:11:41.352091074 CET5469423192.168.2.14175.30.53.20
                    Mar 24, 2025 06:11:42.379337072 CET5469423192.168.2.14175.30.53.20
                    Mar 24, 2025 06:11:44.396120071 CET5469423192.168.2.14175.30.53.20
                    Mar 24, 2025 06:11:48.589365959 CET5469423192.168.2.14175.30.53.20
                    Mar 24, 2025 06:11:52.275846004 CET5469623192.168.2.14175.30.53.20
                    Mar 24, 2025 06:11:53.294797897 CET5469623192.168.2.14175.30.53.20
                    Mar 24, 2025 06:11:55.311439991 CET5469623192.168.2.14175.30.53.20
                    Mar 24, 2025 06:11:59.344770908 CET5469623192.168.2.14175.30.53.20
                    Mar 24, 2025 06:12:27.324592113 CET5469823192.168.2.14175.30.53.20
                    Mar 24, 2025 06:12:28.345884085 CET5469823192.168.2.14175.30.53.20
                    Mar 24, 2025 06:12:30.362565994 CET5469823192.168.2.14175.30.53.20
                    Mar 24, 2025 06:12:34.427817106 CET5469823192.168.2.14175.30.53.20
                    Mar 24, 2025 06:12:38.331322908 CET5470023192.168.2.14175.30.53.20
                    Mar 24, 2025 06:12:39.361362934 CET5470023192.168.2.14175.30.53.20
                    Mar 24, 2025 06:12:41.374095917 CET5470023192.168.2.14175.30.53.20
                    Mar 24, 2025 06:12:45.439413071 CET5470023192.168.2.14175.30.53.20
                    Mar 24, 2025 06:13:13.384669065 CET5470223192.168.2.14175.30.53.20
                    Mar 24, 2025 06:13:14.412682056 CET5470223192.168.2.14175.30.53.20
                    Mar 24, 2025 06:13:16.425246000 CET5470223192.168.2.14175.30.53.20
                    Mar 24, 2025 06:13:20.522433043 CET5470223192.168.2.14175.30.53.20
                    TimestampSource PortDest PortSource IPDest IP
                    Mar 24, 2025 06:11:25.034584999 CET3384953192.168.2.14134.195.4.2
                    Mar 24, 2025 06:11:25.134345055 CET5333849134.195.4.2192.168.2.14
                    Mar 24, 2025 06:11:25.136209011 CET6014253192.168.2.14134.195.4.2
                    Mar 24, 2025 06:11:25.234746933 CET5360142134.195.4.2192.168.2.14
                    Mar 24, 2025 06:11:25.236613035 CET5387853192.168.2.14134.195.4.2
                    Mar 24, 2025 06:11:25.334769011 CET5353878134.195.4.2192.168.2.14
                    Mar 24, 2025 06:11:25.336991072 CET4697553192.168.2.14134.195.4.2
                    Mar 24, 2025 06:11:25.434053898 CET5346975134.195.4.2192.168.2.14
                    Mar 24, 2025 06:11:25.436017990 CET4507053192.168.2.14134.195.4.2
                    Mar 24, 2025 06:11:25.533813000 CET5345070134.195.4.2192.168.2.14
                    Mar 24, 2025 06:11:35.550836086 CET4463453192.168.2.14185.181.61.24
                    Mar 24, 2025 06:11:35.747632027 CET5344634185.181.61.24192.168.2.14
                    Mar 24, 2025 06:11:35.749397993 CET4841553192.168.2.14185.181.61.24
                    Mar 24, 2025 06:11:35.946481943 CET5348415185.181.61.24192.168.2.14
                    Mar 24, 2025 06:11:35.948523045 CET4825953192.168.2.14185.181.61.24
                    Mar 24, 2025 06:11:40.956161976 CET3394253192.168.2.14185.181.61.24
                    Mar 24, 2025 06:11:41.153479099 CET5333942185.181.61.24192.168.2.14
                    Mar 24, 2025 06:11:41.154627085 CET5519553192.168.2.14185.181.61.24
                    Mar 24, 2025 06:11:41.351164103 CET5355195185.181.61.24192.168.2.14
                    Mar 24, 2025 06:11:51.360347986 CET3297553192.168.2.14194.36.144.87
                    Mar 24, 2025 06:11:51.542870998 CET5332975194.36.144.87192.168.2.14
                    Mar 24, 2025 06:11:51.544044018 CET5892153192.168.2.14194.36.144.87
                    Mar 24, 2025 06:11:51.740086079 CET5358921194.36.144.87192.168.2.14
                    Mar 24, 2025 06:11:51.741502047 CET4113653192.168.2.14194.36.144.87
                    Mar 24, 2025 06:11:51.920114994 CET5341136194.36.144.87192.168.2.14
                    Mar 24, 2025 06:11:51.921578884 CET4932253192.168.2.14194.36.144.87
                    Mar 24, 2025 06:11:52.097975969 CET5349322194.36.144.87192.168.2.14
                    Mar 24, 2025 06:11:52.098994970 CET3836253192.168.2.14194.36.144.87
                    Mar 24, 2025 06:11:52.275387049 CET5338362194.36.144.87192.168.2.14
                    Mar 24, 2025 06:12:02.286360025 CET3592453192.168.2.1491.217.137.37
                    Mar 24, 2025 06:12:07.294364929 CET3629353192.168.2.1491.217.137.37
                    Mar 24, 2025 06:12:12.302130938 CET4806453192.168.2.1491.217.137.37
                    Mar 24, 2025 06:12:17.309910059 CET6087153192.168.2.1491.217.137.37
                    Mar 24, 2025 06:12:22.317410946 CET5435653192.168.2.1491.217.137.37
                    Mar 24, 2025 06:12:37.331150055 CET5133453192.168.2.14194.36.144.87
                    Mar 24, 2025 06:12:37.598212004 CET5351334194.36.144.87192.168.2.14
                    Mar 24, 2025 06:12:37.599522114 CET4008253192.168.2.14194.36.144.87
                    Mar 24, 2025 06:12:37.793144941 CET5340082194.36.144.87192.168.2.14
                    Mar 24, 2025 06:12:37.794384956 CET4333453192.168.2.14194.36.144.87
                    Mar 24, 2025 06:12:37.970537901 CET5343334194.36.144.87192.168.2.14
                    Mar 24, 2025 06:12:37.971514940 CET3814853192.168.2.14194.36.144.87
                    Mar 24, 2025 06:12:38.149961948 CET5338148194.36.144.87192.168.2.14
                    Mar 24, 2025 06:12:38.151350021 CET5804853192.168.2.14194.36.144.87
                    Mar 24, 2025 06:12:38.330676079 CET5358048194.36.144.87192.168.2.14
                    Mar 24, 2025 06:12:48.346551895 CET5933153192.168.2.1491.217.137.37
                    Mar 24, 2025 06:12:53.355118990 CET4338553192.168.2.1491.217.137.37
                    Mar 24, 2025 06:12:58.363590002 CET5600253192.168.2.1491.217.137.37
                    Mar 24, 2025 06:13:03.370649099 CET4480453192.168.2.1491.217.137.37
                    Mar 24, 2025 06:13:08.376152992 CET5593653192.168.2.1491.217.137.37
                    Mar 24, 2025 06:13:23.397069931 CET3597653192.168.2.1494.16.114.254
                    Mar 24, 2025 06:13:28.405303955 CET3856453192.168.2.1494.16.114.254
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Mar 24, 2025 06:11:25.034584999 CET192.168.2.14134.195.4.20xf5e5Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:25.136209011 CET192.168.2.14134.195.4.20xf5e5Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:25.236613035 CET192.168.2.14134.195.4.20xf5e5Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:25.336991072 CET192.168.2.14134.195.4.20xf5e5Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:25.436017990 CET192.168.2.14134.195.4.20xf5e5Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:35.550836086 CET192.168.2.14185.181.61.240x9ac2Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:35.749397993 CET192.168.2.14185.181.61.240x9ac2Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:35.948523045 CET192.168.2.14185.181.61.240x9ac2Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:40.956161976 CET192.168.2.14185.181.61.240x9ac2Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:41.154627085 CET192.168.2.14185.181.61.240x9ac2Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:51.360347986 CET192.168.2.14194.36.144.870x80fStandard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:51.544044018 CET192.168.2.14194.36.144.870x80fStandard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:51.741502047 CET192.168.2.14194.36.144.870x80fStandard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:51.921578884 CET192.168.2.14194.36.144.870x80fStandard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:52.098994970 CET192.168.2.14194.36.144.870x80fStandard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:02.286360025 CET192.168.2.1491.217.137.370xcd81Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:07.294364929 CET192.168.2.1491.217.137.370xcd81Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:12.302130938 CET192.168.2.1491.217.137.370xcd81Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:17.309910059 CET192.168.2.1491.217.137.370xcd81Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:22.317410946 CET192.168.2.1491.217.137.370xcd81Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:37.331150055 CET192.168.2.14194.36.144.870xdb59Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:37.599522114 CET192.168.2.14194.36.144.870xdb59Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:37.794384956 CET192.168.2.14194.36.144.870xdb59Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:37.971514940 CET192.168.2.14194.36.144.870xdb59Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:38.151350021 CET192.168.2.14194.36.144.870xdb59Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:48.346551895 CET192.168.2.1491.217.137.370xa1c4Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:53.355118990 CET192.168.2.1491.217.137.370xa1c4Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:58.363590002 CET192.168.2.1491.217.137.370xa1c4Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:13:03.370649099 CET192.168.2.1491.217.137.370xa1c4Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:13:08.376152992 CET192.168.2.1491.217.137.370xa1c4Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:13:23.397069931 CET192.168.2.1494.16.114.2540x9764Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    Mar 24, 2025 06:13:28.405303955 CET192.168.2.1494.16.114.2540x9764Standard query (0)198.98.51.68A (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Mar 24, 2025 06:11:25.134345055 CET134.195.4.2192.168.2.140xf5e5Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:25.234746933 CET134.195.4.2192.168.2.140xf5e5Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:25.334769011 CET134.195.4.2192.168.2.140xf5e5Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:25.434053898 CET134.195.4.2192.168.2.140xf5e5Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:25.533813000 CET134.195.4.2192.168.2.140xf5e5Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:35.747632027 CET185.181.61.24192.168.2.140x9ac2Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:35.946481943 CET185.181.61.24192.168.2.140x9ac2Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:41.153479099 CET185.181.61.24192.168.2.140x9ac2Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:41.351164103 CET185.181.61.24192.168.2.140x9ac2Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:51.542870998 CET194.36.144.87192.168.2.140x80fName error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:51.740086079 CET194.36.144.87192.168.2.140x80fName error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:51.920114994 CET194.36.144.87192.168.2.140x80fName error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:52.097975969 CET194.36.144.87192.168.2.140x80fName error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:11:52.275387049 CET194.36.144.87192.168.2.140x80fName error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:37.598212004 CET194.36.144.87192.168.2.140xdb59Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:37.793144941 CET194.36.144.87192.168.2.140xdb59Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:37.970537901 CET194.36.144.87192.168.2.140xdb59Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:38.149961948 CET194.36.144.87192.168.2.140xdb59Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false
                    Mar 24, 2025 06:12:38.330676079 CET194.36.144.87192.168.2.140xdb59Name error (3)198.98.51.68nonenoneA (IP address)IN (0x0001)false

                    System Behavior

                    Start time (UTC):05:11:24
                    Start date (UTC):24/03/2025
                    Path:/tmp/x86_64.elf
                    Arguments:/tmp/x86_64.elf
                    File size:29500 bytes
                    MD5 hash:782ffe675b6b9ac6984c1151e9f23888

                    Start time (UTC):05:11:24
                    Start date (UTC):24/03/2025
                    Path:/tmp/x86_64.elf
                    Arguments:-
                    File size:29500 bytes
                    MD5 hash:782ffe675b6b9ac6984c1151e9f23888

                    Start time (UTC):05:11:24
                    Start date (UTC):24/03/2025
                    Path:/tmp/x86_64.elf
                    Arguments:-
                    File size:29500 bytes
                    MD5 hash:782ffe675b6b9ac6984c1151e9f23888

                    Start time (UTC):05:11:24
                    Start date (UTC):24/03/2025
                    Path:/tmp/x86_64.elf
                    Arguments:-
                    File size:29500 bytes
                    MD5 hash:782ffe675b6b9ac6984c1151e9f23888

                    Start time (UTC):05:11:24
                    Start date (UTC):24/03/2025
                    Path:/tmp/x86_64.elf
                    Arguments:-
                    File size:29500 bytes
                    MD5 hash:782ffe675b6b9ac6984c1151e9f23888