Edit tour

Linux Analysis Report
ppc.fkunigr.elf

Overview

General Information

Sample name:ppc.fkunigr.elf
Analysis ID:1646727
MD5:1963b50d82bef8fe72edebbefac8b2a7
SHA1:6aa93de754cf50221a4aa34915c23df16b56b666
SHA256:c62570051de8633149bda25edf2e9ec894401899d47faa6f3d12a5e0a434f690
Tags:elfMiraiuser-abuse_ch
Infos:

Detection

Mirai
Score:72
Range:0 - 100

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1646727
Start date and time:2025-03-24 08:49:58 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 28s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ppc.fkunigr.elf
Detection:MAL
Classification:mal72.troj.linELF@0/0@2/0
  • VT rate limit hit for: http://213.209.129.92/lickmynutsnigah.sh;
Command:/tmp/ppc.fkunigr.elf
PID:5525
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • ppc.fkunigr.elf (PID: 5525, Parent: 5443, MD5: ae65271c943d3451b7f026d1fadccea6) Arguments: /tmp/ppc.fkunigr.elf
  • dash New Fork (PID: 5557, Parent: 3672)
  • rm (PID: 5557, Parent: 3672, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.zx4s1qyQOC /tmp/tmp.opWc2xXqsu /tmp/tmp.w9brCX39Q6
  • dash New Fork (PID: 5558, Parent: 3672)
  • cat (PID: 5558, Parent: 3672, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.zx4s1qyQOC
  • dash New Fork (PID: 5559, Parent: 3672)
  • head (PID: 5559, Parent: 3672, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5560, Parent: 3672)
  • tr (PID: 5560, Parent: 3672, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5561, Parent: 3672)
  • cut (PID: 5561, Parent: 3672, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5562, Parent: 3672)
  • cat (PID: 5562, Parent: 3672, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.zx4s1qyQOC
  • dash New Fork (PID: 5563, Parent: 3672)
  • head (PID: 5563, Parent: 3672, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5564, Parent: 3672)
  • tr (PID: 5564, Parent: 3672, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5565, Parent: 3672)
  • cut (PID: 5565, Parent: 3672, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5566, Parent: 3672)
  • rm (PID: 5566, Parent: 3672, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.zx4s1qyQOC /tmp/tmp.opWc2xXqsu /tmp/tmp.w9brCX39Q6
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
ppc.fkunigr.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    ppc.fkunigr.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0x1c6bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c6d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c6e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c6f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c70c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c720:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c734:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c748:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c75c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c770:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c784:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c798:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c7ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c7c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c7d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c7e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c7fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c810:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c824:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c838:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1c84c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    ppc.fkunigr.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
    • 0x1c57c:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
    SourceRuleDescriptionAuthorStrings
    5525.1.00007f66f4001000.00007f66f4020000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      5525.1.00007f66f4001000.00007f66f4020000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x1c6bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c6d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c6e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c6f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c70c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c720:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c734:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c748:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c75c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c770:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c784:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c798:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c7ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c7c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c7d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c7e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c7fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c810:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c824:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c838:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1c84c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5525.1.00007f66f4001000.00007f66f4020000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
      • 0x1c57c:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
      Process Memory Space: ppc.fkunigr.elf PID: 5525JoeSecurity_Mirai_8Yara detected MiraiJoe Security
        Process Memory Space: ppc.fkunigr.elf PID: 5525Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0x1476:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x148a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x149e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x14b2:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x14c6:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x14da:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x14ee:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1502:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1516:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x152a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x153e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1552:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1566:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x157a:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x158e:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x15a2:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x15b6:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x15ca:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x15de:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x15f2:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1606:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        Click to see the 1 entries
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: ppc.fkunigr.elfAvira: detected
        Source: ppc.fkunigr.elfVirustotal: Detection: 45%Perma Link
        Source: ppc.fkunigr.elfReversingLabs: Detection: 55%
        Source: unknownHTTPS traffic detected: 34.243.160.129:443 -> 192.168.2.15:36180 version: TLS 1.2
        Source: /tmp/ppc.fkunigr.elf (PID: 5525)Socket: 127.0.0.1:57886Jump to behavior
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
        Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
        Source: ppc.fkunigr.elfString found in binary or memory: http://213.209.129.92/lickmynutsnigah.sh;
        Source: ppc.fkunigr.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
        Source: ppc.fkunigr.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
        Source: ppc.fkunigr.elfString found in binary or memory: https://i.imgur.com/0r0MYas.gif
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 36180
        Source: unknownNetwork traffic detected: HTTP traffic on port 36180 -> 443
        Source: unknownHTTPS traffic detected: 34.243.160.129:443 -> 192.168.2.15:36180 version: TLS 1.2

        System Summary

        barindex
        Source: ppc.fkunigr.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: ppc.fkunigr.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
        Source: 5525.1.00007f66f4001000.00007f66f4020000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: 5525.1.00007f66f4001000.00007f66f4020000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
        Source: Process Memory Space: ppc.fkunigr.elf PID: 5525, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
        Source: Process Memory Space: ppc.fkunigr.elf PID: 5525, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
        Source: ELF static info symbol of initial sample.symtab present: no
        Source: ppc.fkunigr.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: ppc.fkunigr.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
        Source: 5525.1.00007f66f4001000.00007f66f4020000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: 5525.1.00007f66f4001000.00007f66f4020000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
        Source: Process Memory Space: ppc.fkunigr.elf PID: 5525, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
        Source: Process Memory Space: ppc.fkunigr.elf PID: 5525, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
        Source: classification engineClassification label: mal72.troj.linELF@0/0@2/0
        Source: /usr/bin/dash (PID: 5557)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.zx4s1qyQOC /tmp/tmp.opWc2xXqsu /tmp/tmp.w9brCX39Q6Jump to behavior
        Source: /usr/bin/dash (PID: 5566)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.zx4s1qyQOC /tmp/tmp.opWc2xXqsu /tmp/tmp.w9brCX39Q6Jump to behavior
        Source: /tmp/ppc.fkunigr.elf (PID: 5525)Queries kernel information via 'uname': Jump to behavior
        Source: ppc.fkunigr.elf, 5525.1.000055c4fa803000.000055c4fa8b3000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc11!hotpluggableq
        Source: ppc.fkunigr.elf, 5525.1.00007ffe031aa000.00007ffe031cb000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-ppc/tmp/ppc.fkunigr.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/ppc.fkunigr.elf
        Source: ppc.fkunigr.elf, 5525.1.000055c4fa803000.000055c4fa8b3000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
        Source: ppc.fkunigr.elf, 5525.1.00007ffe031aa000.00007ffe031cb000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
        Source: ppc.fkunigr.elf, 5525.1.00007ffe031aa000.00007ffe031cb000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: ppc.fkunigr.elf, type: SAMPLE
        Source: Yara matchFile source: 5525.1.00007f66f4001000.00007f66f4020000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ppc.fkunigr.elf PID: 5525, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: ppc.fkunigr.elf, type: SAMPLE
        Source: Yara matchFile source: 5525.1.00007f66f4001000.00007f66f4020000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ppc.fkunigr.elf PID: 5525, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
        File Deletion
        OS Credential Dumping11
        Security Software Discovery
        Remote ServicesData from Local System1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1646727 Sample: ppc.fkunigr.elf Startdate: 24/03/2025 Architecture: LINUX Score: 72 14 34.243.160.129, 36180, 443 AMAZON-02US United States 2->14 16 daisy.ubuntu.com 2->16 18 Malicious sample detected (through community Yara rule) 2->18 20 Antivirus / Scanner detection for submitted sample 2->20 22 Multi AV Scanner detection for submitted file 2->22 24 Yara detected Mirai 2->24 6 dash rm 2->6         started        8 dash head 2->8         started        10 dash tr 2->10         started        12 8 other processes 2->12 signatures3 process4

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        ppc.fkunigr.elf45%VirustotalBrowse
        ppc.fkunigr.elf56%ReversingLabsLinux.Backdoor.Mirai
        ppc.fkunigr.elf100%AviraEXP/ELF.Mirai.Z.A
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches

        Download Network PCAP: filteredfull

        NameIPActiveMaliciousAntivirus DetectionReputation
        daisy.ubuntu.com
        162.213.35.24
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://213.209.129.92/lickmynutsnigah.sh;ppc.fkunigr.elffalse
            unknown
            http://schemas.xmlsoap.org/soap/encoding/ppc.fkunigr.elffalse
              high
              https://i.imgur.com/0r0MYas.gifppc.fkunigr.elffalse
                high
                http://schemas.xmlsoap.org/soap/envelope/ppc.fkunigr.elffalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  34.243.160.129
                  unknownUnited States
                  16509AMAZON-02USfalse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  34.243.160.129mips.elfGet hashmaliciousMiraiBrowse
                    na.elfGet hashmaliciousPrometeiBrowse
                      wget.elfGet hashmaliciousGafgyt, MiraiBrowse
                        na.elfGet hashmaliciousPrometeiBrowse
                          miner.elfGet hashmaliciousUnknownBrowse
                            na.elfGet hashmaliciousPrometeiBrowse
                              linux_mipsel_softfloat.elfGet hashmaliciousChaosBrowse
                                boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                  na.elfGet hashmaliciousPrometeiBrowse
                                    main_sh4.elfGet hashmaliciousMiraiBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      daisy.ubuntu.comarm6.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 162.213.35.24
                                      sh4.elfGet hashmaliciousUnknownBrowse
                                      • 162.213.35.25
                                      aarch64.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.25
                                      arm7.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.24
                                      arm.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.25
                                      mips.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.25
                                      arm7.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.25
                                      mips.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.25
                                      sh4.elfGet hashmaliciousUnknownBrowse
                                      • 162.213.35.24
                                      arm5.elfGet hashmaliciousUnknownBrowse
                                      • 162.213.35.25
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      AMAZON-02USSWIFT MT103.Pdf.exeGet hashmaliciousFormBookBrowse
                                      • 13.248.169.48
                                      spc.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 18.251.232.4
                                      mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 13.225.135.58
                                      arm5.elfGet hashmaliciousMiraiBrowse
                                      • 34.249.145.219
                                      SHIPPING DOC.exeGet hashmaliciousFormBookBrowse
                                      • 13.248.169.48
                                      OvZRPCoQg7.exeGet hashmaliciousLokibotBrowse
                                      • 13.248.169.48
                                      B49pcKp4ey.exeGet hashmaliciousLokibotBrowse
                                      • 13.248.169.48
                                      1 (325).exeGet hashmaliciousUnknownBrowse
                                      • 13.213.51.196
                                      mpsl.fkunigr.elfGet hashmaliciousMiraiBrowse
                                      • 54.171.230.55
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      fb4726d465c5f28b84cd6d14cedd13a7armv5l.elfGet hashmaliciousMiraiBrowse
                                      • 34.243.160.129
                                      mips.elfGet hashmaliciousMiraiBrowse
                                      • 34.243.160.129
                                      resgod.arm.elfGet hashmaliciousMiraiBrowse
                                      • 34.243.160.129
                                      resgod.m68k.elfGet hashmaliciousMiraiBrowse
                                      • 34.243.160.129
                                      ppc.elfGet hashmaliciousMiraiBrowse
                                      • 34.243.160.129
                                      na.elfGet hashmaliciousPrometeiBrowse
                                      • 34.243.160.129
                                      updated.elfGet hashmaliciousUnknownBrowse
                                      • 34.243.160.129
                                      na.elfGet hashmaliciousPrometeiBrowse
                                      • 34.243.160.129
                                      na.elfGet hashmaliciousPrometeiBrowse
                                      • 34.243.160.129
                                      boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                      • 34.243.160.129
                                      No context
                                      No created / dropped files found
                                      File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
                                      Entropy (8bit):5.7433405480460324
                                      TrID:
                                      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                      File name:ppc.fkunigr.elf
                                      File size:146'100 bytes
                                      MD5:1963b50d82bef8fe72edebbefac8b2a7
                                      SHA1:6aa93de754cf50221a4aa34915c23df16b56b666
                                      SHA256:c62570051de8633149bda25edf2e9ec894401899d47faa6f3d12a5e0a434f690
                                      SHA512:d4f410142151b585f09c04df79f9400200631240f3ef0463745bc4440780b5f0d0596cb53b15dcd2be7806e13b6e007ca3a41306d34259df69e272bf30c39f2c
                                      SSDEEP:1536:nl//5qsgG5jOnSQcx1KCBKMMOYovAU5vUWtVNqPdqqffISCR5pUmGXf:rgaKSQcxEMMxUWJMn+f
                                      TLSH:ECE31905B30C0947E1632EB03A3F1BE197EFDAC121E4F641655FAA8A9272E335546ECD
                                      File Content Preview:.ELF...........................4..8......4. ...(.......................h...h..........................H.............dt.Q.............................!..|......$H...H......$8!. |...N.. .!..|.......?.........9...../...@..\?......$.+../...A..$8...}).....$N..

                                      ELF header

                                      Class:ELF32
                                      Data:2's complement, big endian
                                      Version:1 (current)
                                      Machine:PowerPC
                                      Version Number:0x1
                                      Type:EXEC (Executable file)
                                      OS/ABI:UNIX - System V
                                      ABI Version:0
                                      Entry Point Address:0x100001f0
                                      Flags:0x0
                                      ELF Header Size:52
                                      Program Header Offset:52
                                      Program Header Size:32
                                      Number of Program Headers:3
                                      Section Header Offset:145620
                                      Section Header Size:40
                                      Number of Section Headers:12
                                      Header String Table Index:11
                                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                      NULL0x00x00x00x00x0000
                                      .initPROGBITS0x100000940x940x240x00x6AX004
                                      .textPROGBITS0x100000b80xb80x1ba540x00x6AX004
                                      .finiPROGBITS0x1001bb0c0x1bb0c0x200x00x6AX004
                                      .rodataPROGBITS0x1001bb300x1bb300x34380x00x2A008
                                      .ctorsPROGBITS0x1002f0000x1f0000xc0x00x3WA004
                                      .dtorsPROGBITS0x1002f00c0x1f00c0x80x00x3WA004
                                      .dataPROGBITS0x1002f0200x1f0200x47e00x00x3WA0032
                                      .sdataPROGBITS0x100338000x238000x880x00x3WA004
                                      .sbssNOBITS0x100338880x238880x1200x00x3WA004
                                      .bssNOBITS0x100339a80x238880x46200x00x3WA008
                                      .shstrtabSTRTAB0x00x238880x4b0x00x0001
                                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                      LOAD0x00x100000000x100000000x1ef680x1ef686.27170x5R E0x10000.init .text .fini .rodata
                                      LOAD0x1f0000x1002f0000x1002f0000x48880x8fc80.34630x6RW 0x10000.ctors .dtors .data .sdata .sbss .bss
                                      GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

                                      Download Network PCAP: filteredfull

                                      • Total Packets: 22
                                      • 443 (HTTPS)
                                      • 53 (DNS)
                                      TimestampSource PortDest PortSource IPDest IP
                                      Mar 24, 2025 08:50:41.789666891 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:41.977828026 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:41.977983952 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:41.978951931 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:42.557610035 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:43.133583069 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:44.285527945 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:44.534307957 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:49.166651011 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:49.166668892 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:49.166749954 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:49.166763067 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:49.166769981 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:49.166769981 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:49.166775942 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:49.166790009 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:49.166873932 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:49.166889906 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:49.166889906 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:49.166889906 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:49.167737961 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:49.427274942 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:50.931653023 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:50.932048082 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:50.932048082 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:51.170977116 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:51.181210041 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:51.181346893 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:51.181370974 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:51.181407928 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:51.182379007 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:51.481276989 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:51.482983112 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:51.483042002 CET4433618034.243.160.129192.168.2.15
                                      Mar 24, 2025 08:50:51.483084917 CET36180443192.168.2.1534.243.160.129
                                      Mar 24, 2025 08:50:51.483084917 CET36180443192.168.2.1534.243.160.129
                                      TimestampSource PortDest PortSource IPDest IP
                                      Mar 24, 2025 08:50:45.043919086 CET5287953192.168.2.158.8.8.8
                                      Mar 24, 2025 08:50:45.043962002 CET4618353192.168.2.158.8.8.8
                                      Mar 24, 2025 08:50:45.138695002 CET53461838.8.8.8192.168.2.15
                                      Mar 24, 2025 08:50:45.138715982 CET53528798.8.8.8192.168.2.15
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Mar 24, 2025 08:50:45.043919086 CET192.168.2.158.8.8.80xbf13Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                      Mar 24, 2025 08:50:45.043962002 CET192.168.2.158.8.8.80xa4beStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Mar 24, 2025 08:50:45.138715982 CET8.8.8.8192.168.2.150xbf13No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                      Mar 24, 2025 08:50:45.138715982 CET8.8.8.8192.168.2.150xbf13No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                                      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                      Mar 24, 2025 08:50:49.166790009 CET34.243.160.129443192.168.2.1536180CN=motd.ubuntu.com CN=R10, O=Let's Encrypt, C=USCN=R10, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USSat Mar 22 09:18:05 CET 2025 Wed Mar 13 01:00:00 CET 2024Fri Jun 20 10:18:04 CEST 2025 Sat Mar 13 00:59:59 CET 2027771,4866-4867-4865-49196-49200-163-159-52393-52392-52394-49327-49325-49315-49311-49245-49249-49239-49235-49195-49199-162-158-49326-49324-49314-49310-49244-49248-49238-49234-49188-49192-107-106-49267-49271-196-195-49187-49191-103-64-49266-49270-190-189-49162-49172-57-56-136-135-49161-49171-51-50-69-68-157-49313-49309-49233-156-49312-49308-49232-61-192-60-186-53-132-47-65-255,0-11-10-35-22-23-13-43-45-51,29-23-30-25-24,0-1-2fb4726d465c5f28b84cd6d14cedd13a7
                                      CN=R10, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USWed Mar 13 01:00:00 CET 2024Sat Mar 13 00:59:59 CET 2027

                                      System Behavior

                                      Start time (UTC):07:50:43
                                      Start date (UTC):24/03/2025
                                      Path:/tmp/ppc.fkunigr.elf
                                      Arguments:/tmp/ppc.fkunigr.elf
                                      File size:5388968 bytes
                                      MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/dash
                                      Arguments:-
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/rm
                                      Arguments:rm -f /tmp/tmp.zx4s1qyQOC /tmp/tmp.opWc2xXqsu /tmp/tmp.w9brCX39Q6
                                      File size:72056 bytes
                                      MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/dash
                                      Arguments:-
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/cat
                                      Arguments:cat /tmp/tmp.zx4s1qyQOC
                                      File size:43416 bytes
                                      MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/dash
                                      Arguments:-
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/head
                                      Arguments:head -n 10
                                      File size:47480 bytes
                                      MD5 hash:fd96a67145172477dd57131396fc9608

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/dash
                                      Arguments:-
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/tr
                                      Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                                      File size:51544 bytes
                                      MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/dash
                                      Arguments:-
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/cut
                                      Arguments:cut -c -80
                                      File size:47480 bytes
                                      MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/dash
                                      Arguments:-
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/cat
                                      Arguments:cat /tmp/tmp.zx4s1qyQOC
                                      File size:43416 bytes
                                      MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/dash
                                      Arguments:-
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/head
                                      Arguments:head -n 10
                                      File size:47480 bytes
                                      MD5 hash:fd96a67145172477dd57131396fc9608

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/dash
                                      Arguments:-
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/tr
                                      Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                                      File size:51544 bytes
                                      MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/dash
                                      Arguments:-
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/cut
                                      Arguments:cut -c -80
                                      File size:47480 bytes
                                      MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/dash
                                      Arguments:-
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):07:50:50
                                      Start date (UTC):24/03/2025
                                      Path:/usr/bin/rm
                                      Arguments:rm -f /tmp/tmp.zx4s1qyQOC /tmp/tmp.opWc2xXqsu /tmp/tmp.w9brCX39Q6
                                      File size:72056 bytes
                                      MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b