Edit tour

Linux Analysis Report
bot.x86.elf

Overview

General Information

Sample name:bot.x86.elf
Analysis ID:1647202
MD5:16eedcd50d268dc0649de66d7c5d9a51
SHA1:3caf59c6f4b10619b9227399ca118fb5901620ae
SHA256:e7582daa9ae1cf7d9ead083ddd932a3222265a28156cb4fc43f0741987e5a562
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Okiru
Score:100
Range:0 - 100

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Okiru
Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1647202
Start date and time:2025-03-24 16:14:04 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 26s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:bot.x86.elf
Detection:MAL
Classification:mal100.troj.linELF@0/0@22/0
Command:/tmp/bot.x86.elf
PID:5512
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • bot.x86.elf (PID: 5512, Parent: 5436, MD5: 16eedcd50d268dc0649de66d7c5d9a51) Arguments: /tmp/bot.x86.elf
  • dash New Fork (PID: 5515, Parent: 3671)
  • rm (PID: 5515, Parent: 3671, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.ZnXAROhRAn /tmp/tmp.8aUYyTSrpf /tmp/tmp.czQIKME71C
  • dash New Fork (PID: 5516, Parent: 3671)
  • rm (PID: 5516, Parent: 3671, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.ZnXAROhRAn /tmp/tmp.8aUYyTSrpf /tmp/tmp.czQIKME71C
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
bot.x86.elfJoeSecurity_OkiruYara detected OkiruJoe Security
    bot.x86.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
      bot.x86.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        bot.x86.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
        • 0x10704:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10718:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1072c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10740:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10754:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10768:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1077c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10790:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x107a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x107b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x107cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x107e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x107f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10808:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1081c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10830:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10844:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10858:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x1086c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10880:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        • 0x10894:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
        bot.x86.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
        • 0x105e4:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        5512.1.0000000008048000.000000000805b000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
          5512.1.0000000008048000.000000000805b000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
            5512.1.0000000008048000.000000000805b000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              5512.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
              • 0x10704:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10718:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1072c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10740:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10754:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10768:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1077c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10790:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x107a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x107b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x107cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x107e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x107f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10808:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1081c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10830:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10844:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10858:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x1086c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10880:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              • 0x10894:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
              5512.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
              • 0x105e4:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
              Click to see the 12 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-24T16:14:47.673611+010020304901Malware Command and Control Activity Detected192.168.2.1540056103.135.45.11047925TCP
              2025-03-24T16:14:51.122709+010020304901Malware Command and Control Activity Detected192.168.2.1540058103.135.45.11047925TCP
              2025-03-24T16:14:52.576107+010020304901Malware Command and Control Activity Detected192.168.2.1540060103.135.45.11047925TCP
              2025-03-24T16:14:58.030903+010020304901Malware Command and Control Activity Detected192.168.2.1540062103.135.45.11047925TCP
              2025-03-24T16:15:08.501000+010020304901Malware Command and Control Activity Detected192.168.2.1540064103.135.45.11047925TCP
              2025-03-24T16:15:15.957011+010020304901Malware Command and Control Activity Detected192.168.2.1540066103.135.45.11047925TCP
              2025-03-24T16:15:21.402268+010020304901Malware Command and Control Activity Detected192.168.2.1540068103.135.45.11047925TCP
              2025-03-24T16:15:25.864397+010020304901Malware Command and Control Activity Detected192.168.2.1540070103.135.45.11047925TCP
              2025-03-24T16:15:32.322883+010020304901Malware Command and Control Activity Detected192.168.2.1540072103.135.45.11047925TCP
              2025-03-24T16:15:41.792681+010020304901Malware Command and Control Activity Detected192.168.2.1540074103.135.45.11047925TCP
              2025-03-24T16:15:43.254609+010020304901Malware Command and Control Activity Detected192.168.2.1540076103.135.45.11047925TCP
              2025-03-24T16:15:51.723904+010020304901Malware Command and Control Activity Detected192.168.2.1540078103.135.45.11047925TCP
              2025-03-24T16:15:55.221133+010020304901Malware Command and Control Activity Detected192.168.2.1540080103.135.45.11047925TCP
              2025-03-24T16:16:00.695117+010020304901Malware Command and Control Activity Detected192.168.2.1540082103.135.45.11047925TCP
              2025-03-24T16:16:16.174675+010020304901Malware Command and Control Activity Detected192.168.2.1540084103.135.45.11047925TCP
              2025-03-24T16:16:25.677143+010020304901Malware Command and Control Activity Detected192.168.2.1540086103.135.45.11047925TCP
              2025-03-24T16:16:34.231819+010020304901Malware Command and Control Activity Detected192.168.2.1540088103.135.45.11047925TCP
              2025-03-24T16:16:34.871859+010020304901Malware Command and Control Activity Detected192.168.2.1540088103.135.45.11047925TCP
              2025-03-24T16:16:43.435101+010020304901Malware Command and Control Activity Detected192.168.2.1540090103.135.45.11047925TCP
              2025-03-24T16:16:48.991264+010020304901Malware Command and Control Activity Detected192.168.2.1540092103.135.45.11047925TCP
              2025-03-24T16:16:49.631250+010020304901Malware Command and Control Activity Detected192.168.2.1540092103.135.45.11047925TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: bot.x86.elfAvira: detected
              Source: bot.x86.elfVirustotal: Detection: 61%Perma Link
              Source: bot.x86.elfReversingLabs: Detection: 66%
              Source: bot.x86.elfString: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40074 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40064 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40078 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40072 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40056 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40062 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40058 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40088 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40076 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40068 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40084 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40066 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40082 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40070 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40080 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40086 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40060 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40092 -> 103.135.45.110:47925
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.15:40090 -> 103.135.45.110:47925
              Source: global trafficTCP traffic: 103.135.45.110 ports 47925,2,4,5,7,9
              Source: global trafficTCP traffic: 192.168.2.15:40056 -> 103.135.45.110:47925
              Source: global trafficTCP traffic: 192.168.2.15:36178 -> 34.243.160.129:443
              Source: unknownTCP traffic detected without corresponding DNS query: 34.243.160.129
              Source: global trafficDNS traffic detected: DNS query: bot.dstats.org
              Source: unknownNetwork traffic detected: HTTP traffic on port 36178 -> 443

              System Summary

              barindex
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 Author: unknown
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
              Source: Process Memory Space: bot.x86.elf PID: 5512, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: bot.x86.elf PID: 5512, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
              Source: Initial sampleString containing 'busybox' found: /bin/busybox
              Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ3f
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: /tmp/bot.x86.elf (PID: 5514)SIGKILL sent: pid: 3769, result: successfulJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)SIGKILL sent: pid: 3799, result: successfulJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)SIGKILL sent: pid: 3800, result: successfulJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)SIGKILL sent: pid: 3801, result: successfulJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)SIGKILL sent: pid: 3802, result: successfulJump to behavior
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: bot.x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_5f7b67b8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 6cb5fb0b7c132e9c11ac72da43278025b60810ea3733c9c6d6ca966163185940, id = 5f7b67b8-3d7b-48a4-8f03-b6f2c92be92e, last_modified = 2021-09-16
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
              Source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
              Source: Process Memory Space: bot.x86.elf PID: 5512, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: bot.x86.elf PID: 5512, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.linELF@0/0@22/0
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/231/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/233/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/1333/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/1695/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/911/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/914/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/19/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/1591/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/246/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/5/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/1585/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/7/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/129/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/8/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/802/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/804/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/3407/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/3769/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/1484/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/131/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/133/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/1479/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/378/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/931/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/1595/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/812/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/933/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/3419/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/35/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/3671/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/3310/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/260/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/261/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/262/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/142/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/263/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/264/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/265/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/145/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/266/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/267/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/268/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/3303/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/269/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/1486/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/1806/cmdlineJump to behavior
              Source: /tmp/bot.x86.elf (PID: 5514)File opened: /proc/3440/cmdlineJump to behavior
              Source: /usr/bin/dash (PID: 5515)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.ZnXAROhRAn /tmp/tmp.8aUYyTSrpf /tmp/tmp.czQIKME71CJump to behavior
              Source: /usr/bin/dash (PID: 5516)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.ZnXAROhRAn /tmp/tmp.8aUYyTSrpf /tmp/tmp.czQIKME71CJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5512, type: MEMORYSTR
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5512, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5512, type: MEMORYSTR
              Source: Yara matchFile source: bot.x86.elf, type: SAMPLE
              Source: Yara matchFile source: 5512.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: bot.x86.elf PID: 5512, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              Valid AccountsWindows Management Instrumentation1
              Scripting
              Path Interception1
              File Deletion
              1
              OS Credential Dumping
              System Service DiscoveryRemote ServicesData from Local System1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
              Application Layer Protocol
              Traffic DuplicationData Destruction
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1647202 Sample: bot.x86.elf Startdate: 24/03/2025 Architecture: LINUX Score: 100 18 bot.dstats.org 103.135.45.110, 40056, 40058, 40060 IISPL-AS-APIJInternetServicesPVTLimitedPK Pakistan 2->18 20 34.243.160.129, 443 AMAZON-02US United States 2->20 22 Suricata IDS alerts for network traffic 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 5 other signatures 2->28 8 bot.x86.elf 2->8         started        10 dash rm 2->10         started        12 dash rm 2->12         started        signatures3 process4 process5 14 bot.x86.elf 8->14         started        process6 16 bot.x86.elf 14->16         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              bot.x86.elf62%VirustotalBrowse
              bot.x86.elf67%ReversingLabsLinux.Backdoor.Mirai
              bot.x86.elf100%AviraEXP/ELF.Mirai.Z.A
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches

              Download Network PCAP: filteredfull

              NameIPActiveMaliciousAntivirus DetectionReputation
              bot.dstats.org
              103.135.45.110
              truefalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                103.135.45.110
                bot.dstats.orgPakistan
                138640IISPL-AS-APIJInternetServicesPVTLimitedPKfalse
                34.243.160.129
                unknownUnited States
                16509AMAZON-02USfalse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                103.135.45.110bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                  bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                    bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                      bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                        34.243.160.129arm.elfGet hashmaliciousUnknownBrowse
                          arm5.elfGet hashmaliciousUnknownBrowse
                            na.elfGet hashmaliciousPrometeiBrowse
                              na.elfGet hashmaliciousPrometeiBrowse
                                ppc.fkunigr.elfGet hashmaliciousMiraiBrowse
                                  mips.elfGet hashmaliciousMiraiBrowse
                                    na.elfGet hashmaliciousPrometeiBrowse
                                      wget.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        na.elfGet hashmaliciousPrometeiBrowse
                                          miner.elfGet hashmaliciousUnknownBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            bot.dstats.orgbot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                            • 103.135.45.110
                                            bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                            • 103.135.45.110
                                            bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                            • 103.135.45.110
                                            bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                            • 103.135.45.110
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            AMAZON-02UShttps://teqaloki.site/gasnasalk/hagshaisn/xxx/ZXdlbi5jYWlybnNAZm9zdGVyLWdhbWtvLmNvbQ==Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                                            • 3.168.73.40
                                            inventory list.exeGet hashmaliciousFormBookBrowse
                                            • 13.248.169.48
                                            na.elfGet hashmaliciousPrometeiBrowse
                                            • 52.212.150.54
                                            na.elfGet hashmaliciousPrometeiBrowse
                                            • 34.249.145.219
                                            em_XsVM4WZh_installer_Win7-Win11_x86_x64.msiGet hashmaliciousUnknownBrowse
                                            • 18.157.52.237
                                            FT-51050458.exeGet hashmaliciousFormBookBrowse
                                            • 13.248.169.48
                                            na.elfGet hashmaliciousPrometeiBrowse
                                            • 52.212.150.54
                                            65W20 mokapto Siparisi.pdf.exeGet hashmaliciousGuLoaderBrowse
                                            • 52.11.240.239
                                            na.elfGet hashmaliciousPrometeiBrowse
                                            • 52.212.150.54
                                            na.elfGet hashmaliciousPrometeiBrowse
                                            • 54.171.230.55
                                            IISPL-AS-APIJInternetServicesPVTLimitedPKbot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                            • 103.135.45.110
                                            bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                            • 103.135.45.110
                                            bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                            • 103.135.45.110
                                            bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                            • 103.135.45.110
                                            aKDVvCx8ni.exeGet hashmaliciousFormBookBrowse
                                            • 103.135.45.76
                                            No context
                                            No context
                                            No created / dropped files found
                                            File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                            Entropy (8bit):5.7722422595198895
                                            TrID:
                                            • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                            • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                            File name:bot.x86.elf
                                            File size:93'768 bytes
                                            MD5:16eedcd50d268dc0649de66d7c5d9a51
                                            SHA1:3caf59c6f4b10619b9227399ca118fb5901620ae
                                            SHA256:e7582daa9ae1cf7d9ead083ddd932a3222265a28156cb4fc43f0741987e5a562
                                            SHA512:89c155ab26b0fc8fc009613b0bb6e284e2e363c967bf967a9f20548d81fc299f0211eb75e78f7fa7e1a1dcfa66ab1f4422840f4455a8d148a6f91bae98ae9c44
                                            SSDEEP:1536:oFd1IRgCXUzx7t0fMqlmgQEiyhcg+7ju72wPZnWhZS5xtY+c:oFdmR9XUzxh0fMgmgQEimEjLAdew5bc
                                            TLSH:6E936BC4F643E5F1EC8709B16137EB374B32F0BA111AEA43C76999729CA2541DA06B9C
                                            File Content Preview:.ELF....................d...4....l......4. ...(......................$...$...............$...........G..8...........Q.td............................U..S.......o4...h....c...[]...$.............U......=.....t..5....$......$.......u........t....h............

                                            ELF header

                                            Class:ELF32
                                            Data:2's complement, little endian
                                            Version:1 (current)
                                            Machine:Intel 80386
                                            Version Number:0x1
                                            Type:EXEC (Executable file)
                                            OS/ABI:UNIX - System V
                                            ABI Version:0
                                            Entry Point Address:0x8048164
                                            Flags:0x0
                                            ELF Header Size:52
                                            Program Header Offset:52
                                            Program Header Size:32
                                            Number of Program Headers:3
                                            Section Header Offset:93368
                                            Section Header Size:40
                                            Number of Section Headers:10
                                            Header String Table Index:9
                                            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                            NULL0x00x00x00x00x0000
                                            .initPROGBITS0x80480940x940x1c0x00x6AX001
                                            .textPROGBITS0x80480b00xb00xfe860x00x6AX0016
                                            .finiPROGBITS0x8057f360xff360x170x00x6AX001
                                            .rodataPROGBITS0x8057f600xff600x25900x00x2A0032
                                            .ctorsPROGBITS0x805b4f40x124f40xc0x00x3WA004
                                            .dtorsPROGBITS0x805b5000x125000x80x00x3WA004
                                            .dataPROGBITS0x805b5200x125200x47580x00x3WA0032
                                            .bssNOBITS0x805fc800x16c780x49ac0x00x3WA0032
                                            .shstrtabSTRTAB0x00x16c780x3e0x00x0001
                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                            LOAD0x00x80480000x80480000x124f00x124f06.60500x5R E0x1000.init .text .fini .rodata
                                            LOAD0x124f40x805b4f40x805b4f40x47840x91380.36420x6RW 0x1000.ctors .dtors .data .bss
                                            GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

                                            Download Network PCAP: filteredfull

                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2025-03-24T16:14:47.673611+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540056103.135.45.11047925TCP
                                            2025-03-24T16:14:51.122709+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540058103.135.45.11047925TCP
                                            2025-03-24T16:14:52.576107+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540060103.135.45.11047925TCP
                                            2025-03-24T16:14:58.030903+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540062103.135.45.11047925TCP
                                            2025-03-24T16:15:08.501000+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540064103.135.45.11047925TCP
                                            2025-03-24T16:15:15.957011+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540066103.135.45.11047925TCP
                                            2025-03-24T16:15:21.402268+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540068103.135.45.11047925TCP
                                            2025-03-24T16:15:25.864397+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540070103.135.45.11047925TCP
                                            2025-03-24T16:15:32.322883+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540072103.135.45.11047925TCP
                                            2025-03-24T16:15:41.792681+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540074103.135.45.11047925TCP
                                            2025-03-24T16:15:43.254609+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540076103.135.45.11047925TCP
                                            2025-03-24T16:15:51.723904+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540078103.135.45.11047925TCP
                                            2025-03-24T16:15:55.221133+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540080103.135.45.11047925TCP
                                            2025-03-24T16:16:00.695117+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540082103.135.45.11047925TCP
                                            2025-03-24T16:16:16.174675+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540084103.135.45.11047925TCP
                                            2025-03-24T16:16:25.677143+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540086103.135.45.11047925TCP
                                            2025-03-24T16:16:34.231819+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540088103.135.45.11047925TCP
                                            2025-03-24T16:16:34.871859+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540088103.135.45.11047925TCP
                                            2025-03-24T16:16:43.435101+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540090103.135.45.11047925TCP
                                            2025-03-24T16:16:48.991264+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540092103.135.45.11047925TCP
                                            2025-03-24T16:16:49.631250+01002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.1540092103.135.45.11047925TCP
                                            • Total Packets: 88
                                            • 47925 undefined
                                            • 443 (HTTPS)
                                            • 53 (DNS)
                                            TimestampSource PortDest PortSource IPDest IP
                                            Mar 24, 2025 16:14:46.849190950 CET36178443192.168.2.1534.243.160.129
                                            Mar 24, 2025 16:14:47.497962952 CET4005647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:14:47.673459053 CET4792540056103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:14:47.673540115 CET4005647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:14:47.673610926 CET4005647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:14:47.850183964 CET4792540056103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:14:47.850405931 CET4792540056103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:14:50.951342106 CET4005847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:14:51.122543097 CET4792540058103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:14:51.122636080 CET4005847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:14:51.122709036 CET4005847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:14:51.291960955 CET4792540058103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:14:51.291984081 CET4792540058103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:14:52.401957989 CET4006047925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:14:52.575972080 CET4792540060103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:14:52.576044083 CET4006047925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:14:52.576107025 CET4006047925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:14:52.751419067 CET4792540060103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:14:52.751516104 CET4792540060103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:14:57.861211061 CET4006247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:14:58.030734062 CET4792540062103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:14:58.030867100 CET4006247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:14:58.030903101 CET4006247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:14:58.212006092 CET4792540062103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:14:58.212057114 CET4792540062103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:08.322310925 CET4006447925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:08.500845909 CET4792540064103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:08.500962019 CET4006447925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:08.500999928 CET4006447925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:08.676675081 CET4792540064103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:08.676701069 CET4792540064103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:08.676815033 CET4006447925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:08.855298042 CET4792540064103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:15.785168886 CET4006647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:15.956588984 CET4792540066103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:15.957010984 CET4006647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:15.957010984 CET4006647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:16.127962112 CET4792540066103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:16.128048897 CET4792540066103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:16.128348112 CET4006647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:16.297583103 CET4792540066103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:21.232656002 CET4006847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:21.402065992 CET4792540068103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:21.402185917 CET4006847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:21.402267933 CET4006847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:21.570477962 CET4792540068103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:21.570528030 CET4792540068103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:21.570626020 CET4006847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:21.740770102 CET4792540068103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:25.681932926 CET4007047925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:25.864255905 CET4792540070103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:25.864367962 CET4007047925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:25.864397049 CET4007047925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:26.042499065 CET4792540070103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:26.042526007 CET4792540070103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:32.156038046 CET4007247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:32.322721004 CET4792540072103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:32.322819948 CET4007247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:32.322882891 CET4007247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:32.503953934 CET4792540072103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:32.504123926 CET4792540072103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:32.504215002 CET4007247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:32.673162937 CET4792540072103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:41.616465092 CET4007447925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:41.792360067 CET4792540074103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:41.792644024 CET4007447925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:41.792680979 CET4007447925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:41.962856054 CET4792540074103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:41.962956905 CET4792540074103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:43.075660944 CET4007647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:43.254422903 CET4792540076103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:43.254568100 CET4007647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:43.254609108 CET4007647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:43.433717012 CET4792540076103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:43.433954000 CET4792540076103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:51.550381899 CET4007847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:51.723611116 CET4792540078103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:51.723810911 CET4007847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:51.723903894 CET4007847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:51.896502972 CET4792540078103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:51.896593094 CET4792540078103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:55.043055058 CET4008047925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:55.220896006 CET4792540080103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:55.221093893 CET4008047925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:55.221132994 CET4008047925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:15:55.394579887 CET4792540080103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:15:55.394738913 CET4792540080103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:00.521403074 CET4008247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:00.694974899 CET4792540082103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:00.695075989 CET4008247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:00.695116997 CET4008247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:00.871092081 CET4792540082103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:00.871121883 CET4792540082103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:15.994776964 CET4008447925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:16.174495935 CET4792540084103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:16.174638033 CET4008447925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:16.174674988 CET4008447925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:16.352487087 CET4792540084103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:16.352508068 CET4792540084103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:16.352644920 CET4008447925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:16.526469946 CET4792540084103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:25.501426935 CET4008647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:25.676979065 CET4792540086103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:25.677090883 CET4008647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:25.677143097 CET4008647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:25.881989956 CET4792540086103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:25.882342100 CET4792540086103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:25.882466078 CET4008647925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:26.096038103 CET4792540086103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:34.029172897 CET4008847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:34.231628895 CET4792540088103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:34.231818914 CET4008847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:34.231818914 CET4008847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:34.871859074 CET4008847925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:35.083632946 CET4792540088103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:43.221725941 CET4009047925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:43.432629108 CET4792540090103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:43.435101032 CET4009047925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:43.435101032 CET4009047925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:43.637479067 CET4792540090103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:43.637499094 CET4792540090103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:48.785130024 CET4009247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:48.991096973 CET4792540092103.135.45.110192.168.2.15
                                            Mar 24, 2025 16:16:48.991221905 CET4009247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:48.991264105 CET4009247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:49.631249905 CET4009247925192.168.2.15103.135.45.110
                                            Mar 24, 2025 16:16:49.825220108 CET4792540092103.135.45.110192.168.2.15
                                            TimestampSource PortDest PortSource IPDest IP
                                            Mar 24, 2025 16:14:47.388593912 CET5542753192.168.2.158.8.8.8
                                            Mar 24, 2025 16:14:47.497829914 CET53554278.8.8.8192.168.2.15
                                            Mar 24, 2025 16:14:50.853507996 CET4788253192.168.2.158.8.8.8
                                            Mar 24, 2025 16:14:50.951209068 CET53478828.8.8.8192.168.2.15
                                            Mar 24, 2025 16:14:52.295577049 CET3471153192.168.2.158.8.8.8
                                            Mar 24, 2025 16:14:52.401818991 CET53347118.8.8.8192.168.2.15
                                            Mar 24, 2025 16:14:57.755470991 CET3814553192.168.2.158.8.8.8
                                            Mar 24, 2025 16:14:57.861067057 CET53381458.8.8.8192.168.2.15
                                            Mar 24, 2025 16:15:08.218403101 CET5153253192.168.2.158.8.8.8
                                            Mar 24, 2025 16:15:08.322145939 CET53515328.8.8.8192.168.2.15
                                            Mar 24, 2025 16:15:15.682261944 CET5570153192.168.2.158.8.8.8
                                            Mar 24, 2025 16:15:15.784890890 CET53557018.8.8.8192.168.2.15
                                            Mar 24, 2025 16:15:21.132498026 CET5129253192.168.2.158.8.8.8
                                            Mar 24, 2025 16:15:21.232456923 CET53512928.8.8.8192.168.2.15
                                            Mar 24, 2025 16:15:25.573712111 CET5159553192.168.2.158.8.8.8
                                            Mar 24, 2025 16:15:25.681776047 CET53515958.8.8.8192.168.2.15
                                            Mar 24, 2025 16:15:32.047032118 CET4175853192.168.2.158.8.8.8
                                            Mar 24, 2025 16:15:32.155797958 CET53417588.8.8.8192.168.2.15
                                            Mar 24, 2025 16:15:41.510580063 CET3815353192.168.2.158.8.8.8
                                            Mar 24, 2025 16:15:41.615967035 CET53381538.8.8.8192.168.2.15
                                            Mar 24, 2025 16:15:42.965183020 CET5460453192.168.2.158.8.8.8
                                            Mar 24, 2025 16:15:43.075418949 CET53546048.8.8.8192.168.2.15
                                            Mar 24, 2025 16:15:51.439372063 CET3708753192.168.2.158.8.8.8
                                            Mar 24, 2025 16:15:51.550184965 CET53370878.8.8.8192.168.2.15
                                            Mar 24, 2025 16:15:54.899336100 CET3912353192.168.2.158.8.8.8
                                            Mar 24, 2025 16:15:55.042850018 CET53391238.8.8.8192.168.2.15
                                            Mar 24, 2025 16:16:00.398619890 CET5512153192.168.2.158.8.8.8
                                            Mar 24, 2025 16:16:00.521132946 CET53551218.8.8.8192.168.2.15
                                            Mar 24, 2025 16:16:10.877657890 CET3534253192.168.2.158.8.8.8
                                            Mar 24, 2025 16:16:15.882396936 CET3900653192.168.2.158.8.8.8
                                            Mar 24, 2025 16:16:15.994585037 CET53390068.8.8.8192.168.2.15
                                            Mar 24, 2025 16:16:25.359006882 CET5518453192.168.2.158.8.8.8
                                            Mar 24, 2025 16:16:25.501125097 CET53551848.8.8.8192.168.2.15
                                            Mar 24, 2025 16:16:28.885487080 CET5041153192.168.2.158.8.8.8
                                            Mar 24, 2025 16:16:33.893275976 CET4633853192.168.2.158.8.8.8
                                            Mar 24, 2025 16:16:34.028891087 CET53463388.8.8.8192.168.2.15
                                            Mar 24, 2025 16:16:43.089355946 CET5934153192.168.2.158.8.8.8
                                            Mar 24, 2025 16:16:43.221558094 CET53593418.8.8.8192.168.2.15
                                            Mar 24, 2025 16:16:48.641712904 CET4086353192.168.2.158.8.8.8
                                            Mar 24, 2025 16:16:48.784965992 CET53408638.8.8.8192.168.2.15
                                            Mar 24, 2025 16:16:50.827294111 CET5245053192.168.2.158.8.8.8
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Mar 24, 2025 16:14:47.388593912 CET192.168.2.158.8.8.80x4e7cStandard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:14:50.853507996 CET192.168.2.158.8.8.80xcd89Standard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:14:52.295577049 CET192.168.2.158.8.8.80x8021Standard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:14:57.755470991 CET192.168.2.158.8.8.80xe3cbStandard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:08.218403101 CET192.168.2.158.8.8.80x75ddStandard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:15.682261944 CET192.168.2.158.8.8.80xc73Standard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:21.132498026 CET192.168.2.158.8.8.80x1beStandard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:25.573712111 CET192.168.2.158.8.8.80x9a4Standard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:32.047032118 CET192.168.2.158.8.8.80xfcaaStandard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:41.510580063 CET192.168.2.158.8.8.80xd3cbStandard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:42.965183020 CET192.168.2.158.8.8.80xac45Standard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:51.439372063 CET192.168.2.158.8.8.80x947eStandard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:54.899336100 CET192.168.2.158.8.8.80xaf38Standard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:00.398619890 CET192.168.2.158.8.8.80xf759Standard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:10.877657890 CET192.168.2.158.8.8.80xb824Standard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:15.882396936 CET192.168.2.158.8.8.80xb824Standard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:25.359006882 CET192.168.2.158.8.8.80x1569Standard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:28.885487080 CET192.168.2.158.8.8.80x4f4eStandard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:33.893275976 CET192.168.2.158.8.8.80x4f4eStandard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:43.089355946 CET192.168.2.158.8.8.80x514Standard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:48.641712904 CET192.168.2.158.8.8.80x3545Standard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:50.827294111 CET192.168.2.158.8.8.80x40d6Standard query (0)bot.dstats.orgA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Mar 24, 2025 16:14:47.497829914 CET8.8.8.8192.168.2.150x4e7cNo error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:14:50.951209068 CET8.8.8.8192.168.2.150xcd89No error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:14:52.401818991 CET8.8.8.8192.168.2.150x8021No error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:14:57.861067057 CET8.8.8.8192.168.2.150xe3cbNo error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:08.322145939 CET8.8.8.8192.168.2.150x75ddNo error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:15.784890890 CET8.8.8.8192.168.2.150xc73No error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:21.232456923 CET8.8.8.8192.168.2.150x1beNo error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:25.681776047 CET8.8.8.8192.168.2.150x9a4No error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:32.155797958 CET8.8.8.8192.168.2.150xfcaaNo error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:41.615967035 CET8.8.8.8192.168.2.150xd3cbNo error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:43.075418949 CET8.8.8.8192.168.2.150xac45No error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:51.550184965 CET8.8.8.8192.168.2.150x947eNo error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:15:55.042850018 CET8.8.8.8192.168.2.150xaf38No error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:00.521132946 CET8.8.8.8192.168.2.150xf759No error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:15.994585037 CET8.8.8.8192.168.2.150xb824No error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:25.501125097 CET8.8.8.8192.168.2.150x1569No error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:34.028891087 CET8.8.8.8192.168.2.150x4f4eNo error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:43.221558094 CET8.8.8.8192.168.2.150x514No error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false
                                            Mar 24, 2025 16:16:48.784965992 CET8.8.8.8192.168.2.150x3545No error (0)bot.dstats.org103.135.45.110A (IP address)IN (0x0001)false

                                            System Behavior

                                            Start time (UTC):15:14:46
                                            Start date (UTC):24/03/2025
                                            Path:/tmp/bot.x86.elf
                                            Arguments:/tmp/bot.x86.elf
                                            File size:93768 bytes
                                            MD5 hash:16eedcd50d268dc0649de66d7c5d9a51

                                            Start time (UTC):15:14:46
                                            Start date (UTC):24/03/2025
                                            Path:/tmp/bot.x86.elf
                                            Arguments:-
                                            File size:93768 bytes
                                            MD5 hash:16eedcd50d268dc0649de66d7c5d9a51

                                            Start time (UTC):15:14:46
                                            Start date (UTC):24/03/2025
                                            Path:/tmp/bot.x86.elf
                                            Arguments:-
                                            File size:93768 bytes
                                            MD5 hash:16eedcd50d268dc0649de66d7c5d9a51

                                            Start time (UTC):15:14:47
                                            Start date (UTC):24/03/2025
                                            Path:/usr/bin/dash
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):15:14:47
                                            Start date (UTC):24/03/2025
                                            Path:/usr/bin/rm
                                            Arguments:rm -f /tmp/tmp.ZnXAROhRAn /tmp/tmp.8aUYyTSrpf /tmp/tmp.czQIKME71C
                                            File size:72056 bytes
                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                            Start time (UTC):15:14:47
                                            Start date (UTC):24/03/2025
                                            Path:/usr/bin/dash
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):15:14:47
                                            Start date (UTC):24/03/2025
                                            Path:/usr/bin/rm
                                            Arguments:rm -f /tmp/tmp.ZnXAROhRAn /tmp/tmp.8aUYyTSrpf /tmp/tmp.czQIKME71C
                                            File size:72056 bytes
                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b