Edit tour

Linux Analysis Report
tarm5.elf

Overview

General Information

Sample name:tarm5.elf
Analysis ID:1648005
MD5:7b79477202b3412bcc0fda67def6f7be
SHA1:4262b4342e41edc7b017b447b2e4bd5dcbd1ed35
SHA256:5c67f73979bc56ea4abc98c124f930be3a71d3b389dd4e0b22a72b88d81094fb
Tags:elfuser-abuse_ch
Infos:

Detection

Score:48
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1648005
Start date and time:2025-03-25 13:35:27 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 26s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:tarm5.elf
Detection:MAL
Classification:mal48.linELF@0/0@0/0
Command:/tmp/tarm5.elf
PID:5427
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
a cat is fine too
Standard Error:
  • system is lnxubuntu20
  • tarm5.elf (PID: 5427, Parent: 5348, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/tarm5.elf
  • dash New Fork (PID: 5499, Parent: 3582)
  • rm (PID: 5499, Parent: 3582, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.MIiAB8kCsm /tmp/tmp.8Tqud3jI19 /tmp/tmp.zn2Zt1OMn1
  • dash New Fork (PID: 5500, Parent: 3582)
  • rm (PID: 5500, Parent: 3582, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.MIiAB8kCsm /tmp/tmp.8Tqud3jI19 /tmp/tmp.zn2Zt1OMn1
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: tarm5.elfVirustotal: Detection: 33%Perma Link
Source: tarm5.elfReversingLabs: Detection: 38%
Source: global trafficTCP traffic: 192.168.2.13:37912 -> 156.229.232.154:51325
Source: /tmp/tarm5.elf (PID: 5427)Socket: 127.0.0.1:51101Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownNetwork traffic detected: HTTP traffic on port 54644 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54644
Source: unknownNetwork traffic detected: HTTP traffic on port 37676 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/tarm5.elf (PID: 5431)SIGKILL sent: pid: 5500, result: successfulJump to behavior
Source: classification engineClassification label: mal48.linELF@0/0@0/0
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5460/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5450/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5461/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5483/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5451/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5462/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5452/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5463/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5453/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5464/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5267/cmdlineJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5454/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5465/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5455/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5456/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5457/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/317/cmdlineJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5458/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5459/statusJump to behavior
Source: /tmp/tarm5.elf (PID: 5431)File opened: /proc/5449/statusJump to behavior
Source: /usr/bin/dash (PID: 5499)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.MIiAB8kCsm /tmp/tmp.8Tqud3jI19 /tmp/tmp.zn2Zt1OMn1Jump to behavior
Source: /usr/bin/dash (PID: 5500)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.MIiAB8kCsm /tmp/tmp.8Tqud3jI19 /tmp/tmp.zn2Zt1OMn1Jump to behavior
Source: /tmp/tarm5.elf (PID: 5427)Queries kernel information via 'uname': Jump to behavior
Source: tarm5.elf, 5427.1.000055d91cd5d000.000055d91ceac000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: tarm5.elf, 5427.1.000055d91cd5d000.000055d91ceac000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: tarm5.elf, 5427.1.00007fff5724e000.00007fff5726f000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: tarm5.elf, 5427.1.00007fff5724e000.00007fff5726f000.rw-.sdmpBinary or memory string: Px86_64/usr/bin/qemu-arm/tmp/tarm5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/tarm5.elf
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
File Deletion
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1648005 Sample: tarm5.elf Startdate: 25/03/2025 Architecture: LINUX Score: 48 18 156.229.232.154, 37912, 51325 ONL-HKOCEANNETWORKLIMITEDHK Seychelles 2->18 20 34.254.182.186, 443, 54644 AMAZON-02US United States 2->20 22 54.217.10.153, 443 AMAZON-02US United States 2->22 24 Multi AV Scanner detection for submitted file 2->24 8 tarm5.elf 2->8         started        10 dash rm 2->10         started        12 dash rm 2->12         started        signatures3 process4 process5 14 tarm5.elf 8->14         started        process6 16 tarm5.elf 14->16         started       
SourceDetectionScannerLabelLink
tarm5.elf34%VirustotalBrowse
tarm5.elf39%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
156.229.232.154
unknownSeychelles
139086ONL-HKOCEANNETWORKLIMITEDHKfalse
54.217.10.153
unknownUnited States
16509AMAZON-02USfalse
34.254.182.186
unknownUnited States
16509AMAZON-02USfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
156.229.232.154gmips.elfGet hashmaliciousUnknownBrowse
    mips.elfGet hashmaliciousUnknownBrowse
      garm7.elfGet hashmaliciousMiraiBrowse
        tsh4.elfGet hashmaliciousUnknownBrowse
          garm5.elfGet hashmaliciousUnknownBrowse
            arm5.elfGet hashmaliciousUnknownBrowse
              tmips.elfGet hashmaliciousUnknownBrowse
                gx86.elfGet hashmaliciousUnknownBrowse
                  tarm.elfGet hashmaliciousUnknownBrowse
                    tarm7.elfGet hashmaliciousMiraiBrowse
                      54.217.10.153ppc.elfGet hashmaliciousUnknownBrowse
                        tftp.elfGet hashmaliciousUnknownBrowse
                          na.elfGet hashmaliciousPrometeiBrowse
                            pspc.elfGet hashmaliciousMiraiBrowse
                              sh4.elfGet hashmaliciousMiraiBrowse
                                wget.elfGet hashmaliciousGafgyt, MiraiBrowse
                                  wget.elfGet hashmaliciousGafgytBrowse
                                    main_x86_64.elfGet hashmaliciousUnknownBrowse
                                      arm7.elfGet hashmaliciousMiraiBrowse
                                        46.19.143.26-mips-2025-03-01T06_09_25.elfGet hashmaliciousUnknownBrowse
                                          34.254.182.186arm5.elfGet hashmaliciousUnknownBrowse
                                            arm7.elfGet hashmaliciousMiraiBrowse
                                              mpsl.elfGet hashmaliciousUnknownBrowse
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                    arc.elfGet hashmaliciousMiraiBrowse
                                                      na.elfGet hashmaliciousPrometeiBrowse
                                                        yakuza.sh4.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          na.elfGet hashmaliciousPrometeiBrowse
                                                            arm6.elfGet hashmaliciousMiraiBrowse
                                                              No context
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              AMAZON-02UShttp://loginmlcrosoftonline365greatbear.co.uk.verifyex.com/cache/css?email=richard.moorhouse@greatbear.co.ukGet hashmaliciousHTMLPhisherBrowse
                                                              • 18.238.80.98
                                                              SeraphicSecurity_147b4295445662bf74688972754b7e4fc8d6512147988822ea9449fede9e66ab.msiGet hashmaliciousUnknownBrowse
                                                              • 54.154.75.195
                                                              Invoice Number INV132146-1.pdfGet hashmaliciousUnknownBrowse
                                                              • 108.138.106.34
                                                              arm5.elfGet hashmaliciousUnknownBrowse
                                                              • 34.254.182.186
                                                              tmips.elfGet hashmaliciousUnknownBrowse
                                                              • 34.249.145.219
                                                              SeraphicSecurity_f605c43a4f26313c6228c8fa342de4539f09081dc4e4ffc66e0f5d0a0634e99d.msiGet hashmaliciousUnknownBrowse
                                                              • 52.19.170.97
                                                              tarm.elfGet hashmaliciousUnknownBrowse
                                                              • 34.249.145.219
                                                              http://www.bordgaisenergytheatre.ieGet hashmaliciousUnknownBrowse
                                                              • 52.49.19.13
                                                              tarm7.elfGet hashmaliciousMiraiBrowse
                                                              • 54.171.230.55
                                                              RFQ3252025.exeGet hashmaliciousFormBookBrowse
                                                              • 18.139.62.226
                                                              ONL-HKOCEANNETWORKLIMITEDHKgmips.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              mips.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              garm7.elfGet hashmaliciousMiraiBrowse
                                                              • 156.229.232.154
                                                              tsh4.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              garm5.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              arm5.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              tmips.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              gx86.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              tarm.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              tarm7.elfGet hashmaliciousMiraiBrowse
                                                              • 156.229.232.154
                                                              AMAZON-02UShttp://loginmlcrosoftonline365greatbear.co.uk.verifyex.com/cache/css?email=richard.moorhouse@greatbear.co.ukGet hashmaliciousHTMLPhisherBrowse
                                                              • 18.238.80.98
                                                              SeraphicSecurity_147b4295445662bf74688972754b7e4fc8d6512147988822ea9449fede9e66ab.msiGet hashmaliciousUnknownBrowse
                                                              • 54.154.75.195
                                                              Invoice Number INV132146-1.pdfGet hashmaliciousUnknownBrowse
                                                              • 108.138.106.34
                                                              arm5.elfGet hashmaliciousUnknownBrowse
                                                              • 34.254.182.186
                                                              tmips.elfGet hashmaliciousUnknownBrowse
                                                              • 34.249.145.219
                                                              SeraphicSecurity_f605c43a4f26313c6228c8fa342de4539f09081dc4e4ffc66e0f5d0a0634e99d.msiGet hashmaliciousUnknownBrowse
                                                              • 52.19.170.97
                                                              tarm.elfGet hashmaliciousUnknownBrowse
                                                              • 34.249.145.219
                                                              http://www.bordgaisenergytheatre.ieGet hashmaliciousUnknownBrowse
                                                              • 52.49.19.13
                                                              tarm7.elfGet hashmaliciousMiraiBrowse
                                                              • 54.171.230.55
                                                              RFQ3252025.exeGet hashmaliciousFormBookBrowse
                                                              • 18.139.62.226
                                                              No context
                                                              No context
                                                              No created / dropped files found
                                                              File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                                                              Entropy (8bit):6.033165116755033
                                                              TrID:
                                                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                              File name:tarm5.elf
                                                              File size:56'528 bytes
                                                              MD5:7b79477202b3412bcc0fda67def6f7be
                                                              SHA1:4262b4342e41edc7b017b447b2e4bd5dcbd1ed35
                                                              SHA256:5c67f73979bc56ea4abc98c124f930be3a71d3b389dd4e0b22a72b88d81094fb
                                                              SHA512:a624e9aaf16ddbcda2ff775a2f0dc5f7c35628bb6f9fac36b68698f16f3c2e6c29ed988b6e5355d505dd8ffbc35e217be778da241038b359eab26a22725dd4b0
                                                              SSDEEP:768:M9dHt5BLGqFby78ZIAGGamRZ2KKpVNu7Jpn80BMJqGUE77McqX1cTgw+TraI:mJt5ELCBamRZ2KK8bn+JqLMMLXOkXa
                                                              TLSH:90432A81BC819A12C6C412BBFB5F428D376653A8E2EB3303DD256F21778792B0E77645
                                                              File Content Preview:.ELF...a..........(.........4...@.......4. ...(..........................................................e..........Q.td..................................-...L."....0..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                                                              ELF header

                                                              Class:ELF32
                                                              Data:2's complement, little endian
                                                              Version:1 (current)
                                                              Machine:ARM
                                                              Version Number:0x1
                                                              Type:EXEC (Executable file)
                                                              OS/ABI:ARM - ABI
                                                              ABI Version:0
                                                              Entry Point Address:0x8190
                                                              Flags:0x2
                                                              ELF Header Size:52
                                                              Program Header Offset:52
                                                              Program Header Size:32
                                                              Number of Program Headers:3
                                                              Section Header Offset:56128
                                                              Section Header Size:40
                                                              Number of Section Headers:10
                                                              Header String Table Index:9
                                                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                              NULL0x00x00x00x00x0000
                                                              .initPROGBITS0x80940x940x180x00x6AX004
                                                              .textPROGBITS0x80b00xb00xc3a40x00x6AX0016
                                                              .finiPROGBITS0x144540xc4540x140x00x6AX004
                                                              .rodataPROGBITS0x144680xc4680x12a80x00x2A004
                                                              .ctorsPROGBITS0x1d7140xd7140x80x00x3WA004
                                                              .dtorsPROGBITS0x1d71c0xd71c0x80x00x3WA004
                                                              .dataPROGBITS0x1d7280xd7280x3d80x00x3WA004
                                                              .bssNOBITS0x1db000xdb000x61d80x00x3WA004
                                                              .shstrtabSTRTAB0x00xdb000x3e0x00x0001
                                                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                              LOAD0x00x80000x80000xd7100xd7106.06600x5R E0x8000.init .text .fini .rodata
                                                              LOAD0xd7140x1d7140x1d7140x3ec0x65c43.56920x6RW 0x8000.ctors .dtors .data .bss
                                                              GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

                                                              Download Network PCAP: filteredfull

                                                              • Total Packets: 19
                                                              • 51325 undefined
                                                              • 443 (HTTPS)
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Mar 25, 2025 13:36:08.504328966 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:36:08.672053099 CET5132537912156.229.232.154192.168.2.13
                                                              Mar 25, 2025 13:36:08.672144890 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:36:08.675513029 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:36:08.843019962 CET5132537912156.229.232.154192.168.2.13
                                                              Mar 25, 2025 13:36:08.843099117 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:36:09.011567116 CET5132537912156.229.232.154192.168.2.13
                                                              Mar 25, 2025 13:36:10.133316994 CET37676443192.168.2.1354.217.10.153
                                                              Mar 25, 2025 13:36:18.685496092 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:36:18.851943016 CET5132537912156.229.232.154192.168.2.13
                                                              Mar 25, 2025 13:36:18.851990938 CET5132537912156.229.232.154192.168.2.13
                                                              Mar 25, 2025 13:36:18.852052927 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:36:34.027890921 CET5132537912156.229.232.154192.168.2.13
                                                              Mar 25, 2025 13:36:34.028192043 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:36:38.724584103 CET54644443192.168.2.1334.254.182.186
                                                              Mar 25, 2025 13:36:38.724692106 CET4435464434.254.182.186192.168.2.13
                                                              Mar 25, 2025 13:36:38.724770069 CET54644443192.168.2.1334.254.182.186
                                                              Mar 25, 2025 13:36:38.725945950 CET54644443192.168.2.1334.254.182.186
                                                              Mar 25, 2025 13:36:38.725976944 CET4435464434.254.182.186192.168.2.13
                                                              Mar 25, 2025 13:36:49.194911003 CET5132537912156.229.232.154192.168.2.13
                                                              Mar 25, 2025 13:36:49.194989920 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:37:04.363868952 CET5132537912156.229.232.154192.168.2.13
                                                              Mar 25, 2025 13:37:04.363969088 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:37:18.901443005 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:37:19.071012020 CET5132537912156.229.232.154192.168.2.13
                                                              Mar 25, 2025 13:37:19.071090937 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:37:34.251650095 CET5132537912156.229.232.154192.168.2.13
                                                              Mar 25, 2025 13:37:34.252145052 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:37:38.725028992 CET54644443192.168.2.1334.254.182.186
                                                              Mar 25, 2025 13:37:38.772288084 CET4435464434.254.182.186192.168.2.13
                                                              Mar 25, 2025 13:37:49.422522068 CET5132537912156.229.232.154192.168.2.13
                                                              Mar 25, 2025 13:37:49.422672033 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:38:04.589592934 CET5132537912156.229.232.154192.168.2.13
                                                              Mar 25, 2025 13:38:04.589782953 CET3791251325192.168.2.13156.229.232.154
                                                              Mar 25, 2025 13:38:11.410752058 CET4435464434.254.182.186192.168.2.13

                                                              System Behavior

                                                              Start time (UTC):12:36:07
                                                              Start date (UTC):25/03/2025
                                                              Path:/tmp/tarm5.elf
                                                              Arguments:-
                                                              File size:4956856 bytes
                                                              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                              Start time (UTC):12:36:07
                                                              Start date (UTC):25/03/2025
                                                              Path:/tmp/tarm5.elf
                                                              Arguments:-
                                                              File size:4956856 bytes
                                                              MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                              Start time (UTC):12:37:37
                                                              Start date (UTC):25/03/2025
                                                              Path:/usr/bin/dash
                                                              Arguments:-
                                                              File size:129816 bytes
                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                              Start time (UTC):12:37:37
                                                              Start date (UTC):25/03/2025
                                                              Path:/usr/bin/rm
                                                              Arguments:rm -f /tmp/tmp.MIiAB8kCsm /tmp/tmp.8Tqud3jI19 /tmp/tmp.zn2Zt1OMn1
                                                              File size:72056 bytes
                                                              MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                              Start time (UTC):12:37:38
                                                              Start date (UTC):25/03/2025
                                                              Path:/usr/bin/dash
                                                              Arguments:-
                                                              File size:129816 bytes
                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                              Start time (UTC):12:37:38
                                                              Start date (UTC):25/03/2025
                                                              Path:/usr/bin/rm
                                                              Arguments:rm -f /tmp/tmp.MIiAB8kCsm /tmp/tmp.8Tqud3jI19 /tmp/tmp.zn2Zt1OMn1
                                                              File size:72056 bytes
                                                              MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b