Linux
Analysis Report
bot.x86.elf
Overview
General Information
Detection
Mirai, Okiru
Score: | 100 |
Range: | 0 - 100 |
Signatures
Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Okiru
Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1647202 |
Start date and time: | 2025-03-24 16:14:04 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 26s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | bot.x86.elf |
Detection: | MAL |
Classification: | mal100.troj.linELF@0/0@22/0 |
Command: | /tmp/bot.x86.elf |
PID: | 5512 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | done. |
Standard Error: |
- system is lnxubuntu20
- bot.x86.elf New Fork (PID: 5513, Parent: 5512)
- bot.x86.elf New Fork (PID: 5514, Parent: 5513)
- dash New Fork (PID: 5515, Parent: 3671)
- dash New Fork (PID: 5516, Parent: 3671)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_3 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Linux_Trojan_Gafgyt_28a2fe0c | unknown | unknown |
| |
Linux_Trojan_Gafgyt_ea92cca8 | unknown | unknown |
| |
Click to see the 7 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_3 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Linux_Trojan_Gafgyt_28a2fe0c | unknown | unknown |
| |
Linux_Trojan_Gafgyt_ea92cca8 | unknown | unknown |
| |
Click to see the 12 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-24T16:14:47.673611+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40056 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:14:51.122709+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40058 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:14:52.576107+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40060 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:14:58.030903+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40062 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:08.501000+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40064 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:15.957011+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40066 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:21.402268+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40068 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:25.864397+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40070 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:32.322883+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40072 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:41.792681+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40074 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:43.254609+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40076 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:51.723904+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40078 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:55.221133+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40080 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:00.695117+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40082 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:16.174675+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40084 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:25.677143+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40086 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:34.231819+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40088 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:34.871859+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40088 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:43.435101+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40090 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:48.991264+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40092 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:49.631250+0100 | 2030490 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 40092 | 103.135.45.110 | 47925 | TCP |
- • AV Detection
- • Spreading
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | String: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | TCP traffic: |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: |
Source: | .symtab present: |
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Rm executable: | Jump to behavior | ||
Source: | Rm executable: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | Windows Management Instrumentation | 1 Scripting | Path Interception | 1 File Deletion | 1 OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 2 Application Layer Protocol | Traffic Duplication | Data Destruction |
⊘No configs have been found
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
62% | Virustotal | Browse | ||
67% | ReversingLabs | Linux.Backdoor.Mirai | ||
100% | Avira | EXP/ELF.Mirai.Z.A |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bot.dstats.org | 103.135.45.110 | true | false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
103.135.45.110 | bot.dstats.org | Pakistan | 138640 | IISPL-AS-APIJInternetServicesPVTLimitedPK | false | |
34.243.160.129 | unknown | United States | 16509 | AMAZON-02US | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
103.135.45.110 | Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
34.243.160.129 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Prometei | Browse | |||
Get hash | malicious | Prometei | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Prometei | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Prometei | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
bot.dstats.org | Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| |
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AMAZON-02US | Get hash | malicious | HTMLPhisher, Mamba2FA | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
IISPL-AS-APIJInternetServicesPVTLimitedPK | Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| |
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
⊘No context
⊘No context
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 5.7722422595198895 |
TrID: |
|
File name: | bot.x86.elf |
File size: | 93'768 bytes |
MD5: | 16eedcd50d268dc0649de66d7c5d9a51 |
SHA1: | 3caf59c6f4b10619b9227399ca118fb5901620ae |
SHA256: | e7582daa9ae1cf7d9ead083ddd932a3222265a28156cb4fc43f0741987e5a562 |
SHA512: | 89c155ab26b0fc8fc009613b0bb6e284e2e363c967bf967a9f20548d81fc299f0211eb75e78f7fa7e1a1dcfa66ab1f4422840f4455a8d148a6f91bae98ae9c44 |
SSDEEP: | 1536:oFd1IRgCXUzx7t0fMqlmgQEiyhcg+7ju72wPZnWhZS5xtY+c:oFdmR9XUzxh0fMgmgQEimEjLAdew5bc |
TLSH: | 6E936BC4F643E5F1EC8709B16137EB374B32F0BA111AEA43C76999729CA2541DA06B9C |
File Content Preview: | .ELF....................d...4....l......4. ...(......................$...$...............$...........G..8...........Q.td............................U..S.......o4...h....c...[]...$.............U......=.....t..5....$......$.......u........t....h............ |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 93368 |
Section Header Size: | 40 |
Number of Section Headers: | 10 |
Header String Table Index: | 9 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x8048094 | 0x94 | 0x1c | 0x0 | 0x6 | AX | 0 | 0 | 1 |
.text | PROGBITS | 0x80480b0 | 0xb0 | 0xfe86 | 0x0 | 0x6 | AX | 0 | 0 | 16 |
.fini | PROGBITS | 0x8057f36 | 0xff36 | 0x17 | 0x0 | 0x6 | AX | 0 | 0 | 1 |
.rodata | PROGBITS | 0x8057f60 | 0xff60 | 0x2590 | 0x0 | 0x2 | A | 0 | 0 | 32 |
.ctors | PROGBITS | 0x805b4f4 | 0x124f4 | 0xc | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.dtors | PROGBITS | 0x805b500 | 0x12500 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x805b520 | 0x12520 | 0x4758 | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.bss | NOBITS | 0x805fc80 | 0x16c78 | 0x49ac | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.shstrtab | STRTAB | 0x0 | 0x16c78 | 0x3e | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x8048000 | 0x8048000 | 0x124f0 | 0x124f0 | 6.6050 | 0x5 | R E | 0x1000 | .init .text .fini .rodata | |
LOAD | 0x124f4 | 0x805b4f4 | 0x805b4f4 | 0x4784 | 0x9138 | 0.3642 | 0x6 | RW | 0x1000 | .ctors .dtors .data .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x4 |
Download Network PCAP: filtered – full
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-24T16:14:47.673611+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40056 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:14:51.122709+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40058 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:14:52.576107+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40060 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:14:58.030903+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40062 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:08.501000+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40064 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:15.957011+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40066 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:21.402268+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40068 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:25.864397+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40070 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:32.322883+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40072 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:41.792681+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40074 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:43.254609+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40076 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:51.723904+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40078 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:15:55.221133+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40080 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:00.695117+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40082 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:16.174675+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40084 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:25.677143+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40086 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:34.231819+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40088 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:34.871859+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40088 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:43.435101+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40090 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:48.991264+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40092 | 103.135.45.110 | 47925 | TCP |
2025-03-24T16:16:49.631250+0100 | 2030490 | ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) | 1 | 192.168.2.15 | 40092 | 103.135.45.110 | 47925 | TCP |
- Total Packets: 88
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 24, 2025 16:14:46.849190950 CET | 36178 | 443 | 192.168.2.15 | 34.243.160.129 |
Mar 24, 2025 16:14:47.497962952 CET | 40056 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:14:47.673459053 CET | 47925 | 40056 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:14:47.673540115 CET | 40056 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:14:47.673610926 CET | 40056 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:14:47.850183964 CET | 47925 | 40056 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:14:47.850405931 CET | 47925 | 40056 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:14:50.951342106 CET | 40058 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:14:51.122543097 CET | 47925 | 40058 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:14:51.122636080 CET | 40058 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:14:51.122709036 CET | 40058 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:14:51.291960955 CET | 47925 | 40058 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:14:51.291984081 CET | 47925 | 40058 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:14:52.401957989 CET | 40060 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:14:52.575972080 CET | 47925 | 40060 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:14:52.576044083 CET | 40060 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:14:52.576107025 CET | 40060 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:14:52.751419067 CET | 47925 | 40060 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:14:52.751516104 CET | 47925 | 40060 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:14:57.861211061 CET | 40062 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:14:58.030734062 CET | 47925 | 40062 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:14:58.030867100 CET | 40062 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:14:58.030903101 CET | 40062 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:14:58.212006092 CET | 47925 | 40062 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:14:58.212057114 CET | 47925 | 40062 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:08.322310925 CET | 40064 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:08.500845909 CET | 47925 | 40064 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:08.500962019 CET | 40064 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:08.500999928 CET | 40064 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:08.676675081 CET | 47925 | 40064 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:08.676701069 CET | 47925 | 40064 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:08.676815033 CET | 40064 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:08.855298042 CET | 47925 | 40064 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:15.785168886 CET | 40066 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:15.956588984 CET | 47925 | 40066 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:15.957010984 CET | 40066 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:15.957010984 CET | 40066 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:16.127962112 CET | 47925 | 40066 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:16.128048897 CET | 47925 | 40066 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:16.128348112 CET | 40066 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:16.297583103 CET | 47925 | 40066 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:21.232656002 CET | 40068 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:21.402065992 CET | 47925 | 40068 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:21.402185917 CET | 40068 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:21.402267933 CET | 40068 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:21.570477962 CET | 47925 | 40068 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:21.570528030 CET | 47925 | 40068 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:21.570626020 CET | 40068 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:21.740770102 CET | 47925 | 40068 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:25.681932926 CET | 40070 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:25.864255905 CET | 47925 | 40070 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:25.864367962 CET | 40070 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:25.864397049 CET | 40070 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:26.042499065 CET | 47925 | 40070 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:26.042526007 CET | 47925 | 40070 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:32.156038046 CET | 40072 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:32.322721004 CET | 47925 | 40072 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:32.322819948 CET | 40072 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:32.322882891 CET | 40072 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:32.503953934 CET | 47925 | 40072 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:32.504123926 CET | 47925 | 40072 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:32.504215002 CET | 40072 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:32.673162937 CET | 47925 | 40072 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:41.616465092 CET | 40074 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:41.792360067 CET | 47925 | 40074 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:41.792644024 CET | 40074 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:41.792680979 CET | 40074 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:41.962856054 CET | 47925 | 40074 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:41.962956905 CET | 47925 | 40074 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:43.075660944 CET | 40076 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:43.254422903 CET | 47925 | 40076 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:43.254568100 CET | 40076 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:43.254609108 CET | 40076 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:43.433717012 CET | 47925 | 40076 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:43.433954000 CET | 47925 | 40076 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:51.550381899 CET | 40078 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:51.723611116 CET | 47925 | 40078 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:51.723810911 CET | 40078 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:51.723903894 CET | 40078 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:51.896502972 CET | 47925 | 40078 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:51.896593094 CET | 47925 | 40078 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:55.043055058 CET | 40080 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:55.220896006 CET | 47925 | 40080 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:55.221093893 CET | 40080 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:55.221132994 CET | 40080 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:15:55.394579887 CET | 47925 | 40080 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:15:55.394738913 CET | 47925 | 40080 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:00.521403074 CET | 40082 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:00.694974899 CET | 47925 | 40082 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:00.695075989 CET | 40082 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:00.695116997 CET | 40082 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:00.871092081 CET | 47925 | 40082 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:00.871121883 CET | 47925 | 40082 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:15.994776964 CET | 40084 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:16.174495935 CET | 47925 | 40084 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:16.174638033 CET | 40084 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:16.174674988 CET | 40084 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:16.352487087 CET | 47925 | 40084 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:16.352508068 CET | 47925 | 40084 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:16.352644920 CET | 40084 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:16.526469946 CET | 47925 | 40084 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:25.501426935 CET | 40086 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:25.676979065 CET | 47925 | 40086 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:25.677090883 CET | 40086 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:25.677143097 CET | 40086 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:25.881989956 CET | 47925 | 40086 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:25.882342100 CET | 47925 | 40086 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:25.882466078 CET | 40086 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:26.096038103 CET | 47925 | 40086 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:34.029172897 CET | 40088 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:34.231628895 CET | 47925 | 40088 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:34.231818914 CET | 40088 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:34.231818914 CET | 40088 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:34.871859074 CET | 40088 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:35.083632946 CET | 47925 | 40088 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:43.221725941 CET | 40090 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:43.432629108 CET | 47925 | 40090 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:43.435101032 CET | 40090 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:43.435101032 CET | 40090 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:43.637479067 CET | 47925 | 40090 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:43.637499094 CET | 47925 | 40090 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:48.785130024 CET | 40092 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:48.991096973 CET | 47925 | 40092 | 103.135.45.110 | 192.168.2.15 |
Mar 24, 2025 16:16:48.991221905 CET | 40092 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:48.991264105 CET | 40092 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:49.631249905 CET | 40092 | 47925 | 192.168.2.15 | 103.135.45.110 |
Mar 24, 2025 16:16:49.825220108 CET | 47925 | 40092 | 103.135.45.110 | 192.168.2.15 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 24, 2025 16:14:47.388593912 CET | 55427 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:14:47.497829914 CET | 53 | 55427 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:14:50.853507996 CET | 47882 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:14:50.951209068 CET | 53 | 47882 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:14:52.295577049 CET | 34711 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:14:52.401818991 CET | 53 | 34711 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:14:57.755470991 CET | 38145 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:14:57.861067057 CET | 53 | 38145 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:15:08.218403101 CET | 51532 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:15:08.322145939 CET | 53 | 51532 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:15:15.682261944 CET | 55701 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:15:15.784890890 CET | 53 | 55701 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:15:21.132498026 CET | 51292 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:15:21.232456923 CET | 53 | 51292 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:15:25.573712111 CET | 51595 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:15:25.681776047 CET | 53 | 51595 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:15:32.047032118 CET | 41758 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:15:32.155797958 CET | 53 | 41758 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:15:41.510580063 CET | 38153 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:15:41.615967035 CET | 53 | 38153 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:15:42.965183020 CET | 54604 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:15:43.075418949 CET | 53 | 54604 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:15:51.439372063 CET | 37087 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:15:51.550184965 CET | 53 | 37087 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:15:54.899336100 CET | 39123 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:15:55.042850018 CET | 53 | 39123 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:16:00.398619890 CET | 55121 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:16:00.521132946 CET | 53 | 55121 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:16:10.877657890 CET | 35342 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:16:15.882396936 CET | 39006 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:16:15.994585037 CET | 53 | 39006 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:16:25.359006882 CET | 55184 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:16:25.501125097 CET | 53 | 55184 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:16:28.885487080 CET | 50411 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:16:33.893275976 CET | 46338 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:16:34.028891087 CET | 53 | 46338 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:16:43.089355946 CET | 59341 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:16:43.221558094 CET | 53 | 59341 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:16:48.641712904 CET | 40863 | 53 | 192.168.2.15 | 8.8.8.8 |
Mar 24, 2025 16:16:48.784965992 CET | 53 | 40863 | 8.8.8.8 | 192.168.2.15 |
Mar 24, 2025 16:16:50.827294111 CET | 52450 | 53 | 192.168.2.15 | 8.8.8.8 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 24, 2025 16:14:47.388593912 CET | 192.168.2.15 | 8.8.8.8 | 0x4e7c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:14:50.853507996 CET | 192.168.2.15 | 8.8.8.8 | 0xcd89 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:14:52.295577049 CET | 192.168.2.15 | 8.8.8.8 | 0x8021 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:14:57.755470991 CET | 192.168.2.15 | 8.8.8.8 | 0xe3cb | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:15:08.218403101 CET | 192.168.2.15 | 8.8.8.8 | 0x75dd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:15:15.682261944 CET | 192.168.2.15 | 8.8.8.8 | 0xc73 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:15:21.132498026 CET | 192.168.2.15 | 8.8.8.8 | 0x1be | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:15:25.573712111 CET | 192.168.2.15 | 8.8.8.8 | 0x9a4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:15:32.047032118 CET | 192.168.2.15 | 8.8.8.8 | 0xfcaa | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:15:41.510580063 CET | 192.168.2.15 | 8.8.8.8 | 0xd3cb | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:15:42.965183020 CET | 192.168.2.15 | 8.8.8.8 | 0xac45 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:15:51.439372063 CET | 192.168.2.15 | 8.8.8.8 | 0x947e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:15:54.899336100 CET | 192.168.2.15 | 8.8.8.8 | 0xaf38 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:16:00.398619890 CET | 192.168.2.15 | 8.8.8.8 | 0xf759 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:16:10.877657890 CET | 192.168.2.15 | 8.8.8.8 | 0xb824 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:16:15.882396936 CET | 192.168.2.15 | 8.8.8.8 | 0xb824 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:16:25.359006882 CET | 192.168.2.15 | 8.8.8.8 | 0x1569 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:16:28.885487080 CET | 192.168.2.15 | 8.8.8.8 | 0x4f4e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:16:33.893275976 CET | 192.168.2.15 | 8.8.8.8 | 0x4f4e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:16:43.089355946 CET | 192.168.2.15 | 8.8.8.8 | 0x514 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:16:48.641712904 CET | 192.168.2.15 | 8.8.8.8 | 0x3545 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 24, 2025 16:16:50.827294111 CET | 192.168.2.15 | 8.8.8.8 | 0x40d6 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 24, 2025 16:14:47.497829914 CET | 8.8.8.8 | 192.168.2.15 | 0x4e7c | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:14:50.951209068 CET | 8.8.8.8 | 192.168.2.15 | 0xcd89 | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:14:52.401818991 CET | 8.8.8.8 | 192.168.2.15 | 0x8021 | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:14:57.861067057 CET | 8.8.8.8 | 192.168.2.15 | 0xe3cb | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:15:08.322145939 CET | 8.8.8.8 | 192.168.2.15 | 0x75dd | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:15:15.784890890 CET | 8.8.8.8 | 192.168.2.15 | 0xc73 | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:15:21.232456923 CET | 8.8.8.8 | 192.168.2.15 | 0x1be | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:15:25.681776047 CET | 8.8.8.8 | 192.168.2.15 | 0x9a4 | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:15:32.155797958 CET | 8.8.8.8 | 192.168.2.15 | 0xfcaa | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:15:41.615967035 CET | 8.8.8.8 | 192.168.2.15 | 0xd3cb | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:15:43.075418949 CET | 8.8.8.8 | 192.168.2.15 | 0xac45 | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:15:51.550184965 CET | 8.8.8.8 | 192.168.2.15 | 0x947e | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:15:55.042850018 CET | 8.8.8.8 | 192.168.2.15 | 0xaf38 | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:16:00.521132946 CET | 8.8.8.8 | 192.168.2.15 | 0xf759 | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:16:15.994585037 CET | 8.8.8.8 | 192.168.2.15 | 0xb824 | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:16:25.501125097 CET | 8.8.8.8 | 192.168.2.15 | 0x1569 | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:16:34.028891087 CET | 8.8.8.8 | 192.168.2.15 | 0x4f4e | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:16:43.221558094 CET | 8.8.8.8 | 192.168.2.15 | 0x514 | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false | ||
Mar 24, 2025 16:16:48.784965992 CET | 8.8.8.8 | 192.168.2.15 | 0x3545 | No error (0) | 103.135.45.110 | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 15:14:46 |
Start date (UTC): | 24/03/2025 |
Path: | /tmp/bot.x86.elf |
Arguments: | /tmp/bot.x86.elf |
File size: | 93768 bytes |
MD5 hash: | 16eedcd50d268dc0649de66d7c5d9a51 |
Start time (UTC): | 15:14:46 |
Start date (UTC): | 24/03/2025 |
Path: | /tmp/bot.x86.elf |
Arguments: | - |
File size: | 93768 bytes |
MD5 hash: | 16eedcd50d268dc0649de66d7c5d9a51 |
Start time (UTC): | 15:14:46 |
Start date (UTC): | 24/03/2025 |
Path: | /tmp/bot.x86.elf |
Arguments: | - |
File size: | 93768 bytes |
MD5 hash: | 16eedcd50d268dc0649de66d7c5d9a51 |
Start time (UTC): | 15:14:47 |
Start date (UTC): | 24/03/2025 |
Path: | /usr/bin/dash |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 15:14:47 |
Start date (UTC): | 24/03/2025 |
Path: | /usr/bin/rm |
Arguments: | rm -f /tmp/tmp.ZnXAROhRAn /tmp/tmp.8aUYyTSrpf /tmp/tmp.czQIKME71C |
File size: | 72056 bytes |
MD5 hash: | aa2b5496fdbfd88e38791ab81f90b95b |
Start time (UTC): | 15:14:47 |
Start date (UTC): | 24/03/2025 |
Path: | /usr/bin/dash |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 15:14:47 |
Start date (UTC): | 24/03/2025 |
Path: | /usr/bin/rm |
Arguments: | rm -f /tmp/tmp.ZnXAROhRAn /tmp/tmp.8aUYyTSrpf /tmp/tmp.czQIKME71C |
File size: | 72056 bytes |
MD5 hash: | aa2b5496fdbfd88e38791ab81f90b95b |