Edit tour

Linux Analysis Report
x86.elf

Overview

General Information

Sample name:x86.elf
Analysis ID:1648006
MD5:4723db3e0c3b110d68f28f8e5df76db6
SHA1:269b8b6e937f6799ed09dd3c4ae7a868e39af126
SHA256:0ba736f91aee682b5b8a1f2da2b06e06a7b4a46ceeb610bc0d1f01d1681c122c
Tags:elfuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1648006
Start date and time:2025-03-25 13:39:55 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:x86.elf
Detection:MAL
Classification:mal56.linELF@0/0@0/0
Command:/tmp/x86.elf
PID:6233
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
a cat is fine too
Standard Error:
  • system is lnxubuntu20
  • x86.elf (PID: 6233, Parent: 6155, MD5: 4723db3e0c3b110d68f28f8e5df76db6) Arguments: /tmp/x86.elf
    • x86.elf New Fork (PID: 6234, Parent: 6233)
      • x86.elf New Fork (PID: 6235, Parent: 6234)
  • dash New Fork (PID: 6292, Parent: 4331)
  • rm (PID: 6292, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.4T3MxiSLvM /tmp/tmp.CEUSyaMCSy /tmp/tmp.UFc11hK7BX
  • dash New Fork (PID: 6293, Parent: 4331)
  • rm (PID: 6293, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.4T3MxiSLvM /tmp/tmp.CEUSyaMCSy /tmp/tmp.UFc11hK7BX
  • cleanup
SourceRuleDescriptionAuthorStrings
x86.elfLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x33b0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
x86.elfLinux_Trojan_Mirai_88de437funknownunknown
  • 0x4ee2:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
x86.elfLinux_Trojan_Mirai_ae9d0fa6unknownunknown
  • 0x192:$a: 83 EC 04 8A 44 24 18 8B 5C 24 14 88 44 24 03 8A 44 24 10 25 FF 00
x86.elfLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0x80b4:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
x86.elfLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x68ef:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
Click to see the 1 entries
SourceRuleDescriptionAuthorStrings
6233.1.0000000008048000.0000000008054000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
  • 0x33b0:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
6233.1.0000000008048000.0000000008054000.r-x.sdmpLinux_Trojan_Mirai_88de437funknownunknown
  • 0x4ee2:$a: 24 08 8B 4C 24 04 85 D2 74 0D 31 C0 89 F6 C6 04 08 00 40 39 D0
6233.1.0000000008048000.0000000008054000.r-x.sdmpLinux_Trojan_Mirai_ae9d0fa6unknownunknown
  • 0x192:$a: 83 EC 04 8A 44 24 18 8B 5C 24 14 88 44 24 03 8A 44 24 10 25 FF 00
6233.1.0000000008048000.0000000008054000.r-x.sdmpLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0x80b4:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
6233.1.0000000008048000.0000000008054000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x68ef:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
Click to see the 1 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: x86.elfVirustotal: Detection: 13%Perma Link
Source: x86.elfReversingLabs: Detection: 19%
Source: global trafficTCP traffic: 192.168.2.23:37696 -> 156.229.232.154:51325
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 34.249.145.219
Source: unknownTCP traffic detected without corresponding DNS query: 34.249.145.219
Source: unknownTCP traffic detected without corresponding DNS query: 34.249.145.219
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 34.249.145.219
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownTCP traffic detected without corresponding DNS query: 156.229.232.154
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 39248 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 39248
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443

System Summary

barindex
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 6233.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
Source: 6233.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
Source: 6233.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 Author: unknown
Source: 6233.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 6233.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 6233.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: ELF static info symbol of initial sample.symtab present: no
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: x86.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 6233.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
Source: 6233.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
Source: 6233.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_ae9d0fa6 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = ca2bf2771844bec95563800d19a35dd230413f8eff0bd44c8ab0b4c596f81bfc, id = ae9d0fa6-be06-4656-9b13-8edfc0ee9e71, last_modified = 2021-09-16
Source: 6233.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 6233.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 6233.1.0000000008048000.0000000008054000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: classification engineClassification label: mal56.linELF@0/0@0/0
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/6234/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/6235/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1582/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/3088/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1579/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1699/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1335/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1698/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1334/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1576/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/2302/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/910/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/912/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/2307/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/918/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1594/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1349/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1344/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1465/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1586/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1463/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/801/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/6119/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1900/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/491/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1599/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1477/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1476/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/379/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1475/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/4500/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/4502/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/936/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/2208/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1809/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1494/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/260/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/261/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/141/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/262/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/263/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/264/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/144/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/265/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/266/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/267/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1489/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/269/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/270/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/272/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/274/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/278/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/157/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/2226/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/2102/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/2223/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/4527/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/2242/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/281/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/286/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/1389/cmdlineJump to behavior
Source: /tmp/x86.elf (PID: 6235)File opened: /proc/720/cmdlineJump to behavior
Source: /usr/bin/dash (PID: 6292)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.4T3MxiSLvM /tmp/tmp.CEUSyaMCSy /tmp/tmp.UFc11hK7BXJump to behavior
Source: /usr/bin/dash (PID: 6293)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.4T3MxiSLvM /tmp/tmp.CEUSyaMCSy /tmp/tmp.UFc11hK7BXJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
File Deletion
1
OS Credential Dumping
System Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1648006 Sample: x86.elf Startdate: 25/03/2025 Architecture: LINUX Score: 56 18 156.229.232.154, 37696, 51325 ONL-HKOCEANNETWORKLIMITEDHK Seychelles 2->18 20 109.202.202.202, 80 INIT7CH Switzerland 2->20 22 3 other IPs or domains 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Multi AV Scanner detection for submitted file 2->26 8 x86.elf 2->8         started        10 dash rm 2->10         started        12 dash rm 2->12         started        signatures3 process4 process5 14 x86.elf 8->14         started        process6 16 x86.elf 14->16         started       
SourceDetectionScannerLabelLink
x86.elf14%VirustotalBrowse
x86.elf19%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
156.229.232.154
unknownSeychelles
139086ONL-HKOCEANNETWORKLIMITEDHKfalse
34.249.145.219
unknownUnited States
16509AMAZON-02USfalse
109.202.202.202
unknownSwitzerland
13030INIT7CHfalse
91.189.91.43
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
91.189.91.42
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
156.229.232.154mpsl.elfGet hashmaliciousUnknownBrowse
    gmpsl.elfGet hashmaliciousUnknownBrowse
      tmpsl.elfGet hashmaliciousUnknownBrowse
        tarm5.elfGet hashmaliciousUnknownBrowse
          gmips.elfGet hashmaliciousUnknownBrowse
            mips.elfGet hashmaliciousUnknownBrowse
              garm7.elfGet hashmaliciousMiraiBrowse
                tsh4.elfGet hashmaliciousUnknownBrowse
                  garm5.elfGet hashmaliciousUnknownBrowse
                    arm5.elfGet hashmaliciousUnknownBrowse
                      34.249.145.219tmpsl.elfGet hashmaliciousUnknownBrowse
                        tmips.elfGet hashmaliciousUnknownBrowse
                          tarm.elfGet hashmaliciousUnknownBrowse
                            na.elfGet hashmaliciousPrometeiBrowse
                              na.elfGet hashmaliciousPrometeiBrowse
                                .i.elfGet hashmaliciousUnknownBrowse
                                  na.elfGet hashmaliciousPrometeiBrowse
                                    main_m68k.elfGet hashmaliciousMiraiBrowse
                                      mpsl.elfGet hashmaliciousUnknownBrowse
                                        na.elfGet hashmaliciousPrometeiBrowse
                                          109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                          • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                          91.189.91.43tmpsl.elfGet hashmaliciousUnknownBrowse
                                            garm7.elfGet hashmaliciousMiraiBrowse
                                              tmips.elfGet hashmaliciousUnknownBrowse
                                                tarm.elfGet hashmaliciousUnknownBrowse
                                                  na.elfGet hashmaliciousPrometeiBrowse
                                                    na.elfGet hashmaliciousPrometeiBrowse
                                                      na.elfGet hashmaliciousPrometeiBrowse
                                                        na.elfGet hashmaliciousPrometeiBrowse
                                                          sshd.elfGet hashmaliciousUnknownBrowse
                                                            tftp.elfGet hashmaliciousUnknownBrowse
                                                              No context
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              CANONICAL-ASGBtmpsl.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              mips.elfGet hashmaliciousUnknownBrowse
                                                              • 185.125.190.26
                                                              garm7.elfGet hashmaliciousMiraiBrowse
                                                              • 91.189.91.42
                                                              arm5.elfGet hashmaliciousUnknownBrowse
                                                              • 185.125.190.26
                                                              tmips.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              tarm.elfGet hashmaliciousUnknownBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 91.189.91.42
                                                              INIT7CHtmpsl.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              garm7.elfGet hashmaliciousMiraiBrowse
                                                              • 109.202.202.202
                                                              tmips.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              tarm.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 109.202.202.202
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 109.202.202.202
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 109.202.202.202
                                                              na.elfGet hashmaliciousPrometeiBrowse
                                                              • 109.202.202.202
                                                              sshd.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              tftp.elfGet hashmaliciousUnknownBrowse
                                                              • 109.202.202.202
                                                              ONL-HKOCEANNETWORKLIMITEDHKmpsl.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              gmpsl.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              tmpsl.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              tarm5.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              gmips.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              mips.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              garm7.elfGet hashmaliciousMiraiBrowse
                                                              • 156.229.232.154
                                                              tsh4.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              garm5.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              arm5.elfGet hashmaliciousUnknownBrowse
                                                              • 156.229.232.154
                                                              AMAZON-02UStmpsl.elfGet hashmaliciousUnknownBrowse
                                                              • 34.249.145.219
                                                              tarm5.elfGet hashmaliciousUnknownBrowse
                                                              • 34.254.182.186
                                                              http://loginmlcrosoftonline365greatbear.co.uk.verifyex.com/cache/css?email=richard.moorhouse@greatbear.co.ukGet hashmaliciousHTMLPhisherBrowse
                                                              • 18.238.80.98
                                                              SeraphicSecurity_147b4295445662bf74688972754b7e4fc8d6512147988822ea9449fede9e66ab.msiGet hashmaliciousUnknownBrowse
                                                              • 54.154.75.195
                                                              Invoice Number INV132146-1.pdfGet hashmaliciousUnknownBrowse
                                                              • 108.138.106.34
                                                              arm5.elfGet hashmaliciousUnknownBrowse
                                                              • 34.254.182.186
                                                              tmips.elfGet hashmaliciousUnknownBrowse
                                                              • 34.249.145.219
                                                              SeraphicSecurity_f605c43a4f26313c6228c8fa342de4539f09081dc4e4ffc66e0f5d0a0634e99d.msiGet hashmaliciousUnknownBrowse
                                                              • 52.19.170.97
                                                              tarm.elfGet hashmaliciousUnknownBrowse
                                                              • 34.249.145.219
                                                              http://www.bordgaisenergytheatre.ieGet hashmaliciousUnknownBrowse
                                                              • 52.49.19.13
                                                              No context
                                                              No context
                                                              No created / dropped files found
                                                              File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
                                                              Entropy (8bit):6.491028396422343
                                                              TrID:
                                                              • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                                              • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                                              File name:x86.elf
                                                              File size:46'768 bytes
                                                              MD5:4723db3e0c3b110d68f28f8e5df76db6
                                                              SHA1:269b8b6e937f6799ed09dd3c4ae7a868e39af126
                                                              SHA256:0ba736f91aee682b5b8a1f2da2b06e06a7b4a46ceeb610bc0d1f01d1681c122c
                                                              SHA512:62a8451a14323563c26a6d717bd6a2899005483cc6c01fdfc5fac60c36a991d1057d361d2a04c0cf432edb9cd517ba9d4f041e85df1a5472fba83f5cb7475988
                                                              SSDEEP:768:0VKxgFMPUNSIK83I4K+wpaUPnJxFDk3rzXNMGaLSE+0k3Frd8BWSDGIi:0VGgFWUNSI2ZAGJzg7OGaLh+zVr6WSDG
                                                              TLSH:6E236DC9E683E4F5ED1706F52137F7339A73E1391068DE83C358D932AC52A54E62628C
                                                              File Content Preview:.ELF....................d...4... .......4. ...(..............................................A...A......@h..........Q.td............................U..S.......W....h........[]...$.............U......=.D...t..5.....B......B......u........t....h.1..........

                                                              ELF header

                                                              Class:ELF32
                                                              Data:2's complement, little endian
                                                              Version:1 (current)
                                                              Machine:Intel 80386
                                                              Version Number:0x1
                                                              Type:EXEC (Executable file)
                                                              OS/ABI:UNIX - System V
                                                              ABI Version:0
                                                              Entry Point Address:0x8048164
                                                              Flags:0x0
                                                              ELF Header Size:52
                                                              Program Header Offset:52
                                                              Program Header Size:32
                                                              Number of Program Headers:3
                                                              Section Header Offset:46368
                                                              Section Header Size:40
                                                              Number of Section Headers:10
                                                              Header String Table Index:9
                                                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                              NULL0x00x00x00x00x0000
                                                              .initPROGBITS0x80480940x940x1c0x00x6AX001
                                                              .textPROGBITS0x80480b00xb00x9bf60x00x6AX0016
                                                              .finiPROGBITS0x8051ca60x9ca60x170x00x6AX001
                                                              .rodataPROGBITS0x8051cc00x9cc00x151c0x00x2A0032
                                                              .ctorsPROGBITS0x80541e00xb1e00x80x00x3WA004
                                                              .dtorsPROGBITS0x80541e80xb1e80x80x00x3WA004
                                                              .dataPROGBITS0x80542000xb2000x2e00x00x3WA0032
                                                              .bssNOBITS0x80544e00xb4e00x65400x00x3WA0032
                                                              .shstrtabSTRTAB0x00xb4e00x3e0x00x0001
                                                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                              LOAD0x00x80480000x80480000xb1dc0xb1dc6.52870x5R E0x1000.init .text .fini .rodata
                                                              LOAD0xb1e00x80541e00x80541e00x3000x68404.43070x6RW 0x1000.ctors .dtors .data .bss
                                                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

                                                              Download Network PCAP: filteredfull

                                                              • Total Packets: 25
                                                              • 51325 undefined
                                                              • 443 (HTTPS)
                                                              • 80 (HTTP)
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Mar 25, 2025 13:40:40.675235033 CET43928443192.168.2.2391.189.91.42
                                                              Mar 25, 2025 13:40:41.875889063 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:40:42.046017885 CET5132537696156.229.232.154192.168.2.23
                                                              Mar 25, 2025 13:40:42.046092033 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:40:42.046130896 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:40:42.215409040 CET5132537696156.229.232.154192.168.2.23
                                                              Mar 25, 2025 13:40:42.215475082 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:40:42.384911060 CET5132537696156.229.232.154192.168.2.23
                                                              Mar 25, 2025 13:40:46.050323963 CET42836443192.168.2.2391.189.91.43
                                                              Mar 25, 2025 13:40:47.330143929 CET4251680192.168.2.23109.202.202.202
                                                              Mar 25, 2025 13:40:52.055135965 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:40:52.222748041 CET5132537696156.229.232.154192.168.2.23
                                                              Mar 25, 2025 13:40:52.223609924 CET5132537696156.229.232.154192.168.2.23
                                                              Mar 25, 2025 13:40:52.223836899 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:41:01.219978094 CET39248443192.168.2.2334.249.145.219
                                                              Mar 25, 2025 13:41:01.220017910 CET4433924834.249.145.219192.168.2.23
                                                              Mar 25, 2025 13:41:01.220079899 CET39248443192.168.2.2334.249.145.219
                                                              Mar 25, 2025 13:41:01.220314026 CET39248443192.168.2.2334.249.145.219
                                                              Mar 25, 2025 13:41:01.220324039 CET4433924834.249.145.219192.168.2.23
                                                              Mar 25, 2025 13:41:02.176364899 CET43928443192.168.2.2391.189.91.42
                                                              Mar 25, 2025 13:41:07.406970024 CET5132537696156.229.232.154192.168.2.23
                                                              Mar 25, 2025 13:41:07.407177925 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:41:12.414773941 CET42836443192.168.2.2391.189.91.43
                                                              Mar 25, 2025 13:41:18.557907104 CET4251680192.168.2.23109.202.202.202
                                                              Mar 25, 2025 13:41:22.576904058 CET5132537696156.229.232.154192.168.2.23
                                                              Mar 25, 2025 13:41:22.577088118 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:41:37.743951082 CET5132537696156.229.232.154192.168.2.23
                                                              Mar 25, 2025 13:41:37.744101048 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:41:43.130517006 CET43928443192.168.2.2391.189.91.42
                                                              Mar 25, 2025 13:41:52.267329931 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:41:52.433772087 CET5132537696156.229.232.154192.168.2.23
                                                              Mar 25, 2025 13:41:52.433924913 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:42:01.212130070 CET39248443192.168.2.2334.249.145.219
                                                              Mar 25, 2025 13:42:01.252265930 CET4433924834.249.145.219192.168.2.23
                                                              Mar 25, 2025 13:42:07.628002882 CET5132537696156.229.232.154192.168.2.23
                                                              Mar 25, 2025 13:42:07.628237009 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:42:22.795186996 CET5132537696156.229.232.154192.168.2.23
                                                              Mar 25, 2025 13:42:22.795279980 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:42:37.965821028 CET5132537696156.229.232.154192.168.2.23
                                                              Mar 25, 2025 13:42:37.966244936 CET3769651325192.168.2.23156.229.232.154
                                                              Mar 25, 2025 13:42:45.005390882 CET4433924834.249.145.219192.168.2.23

                                                              System Behavior

                                                              Start time (UTC):12:40:41
                                                              Start date (UTC):25/03/2025
                                                              Path:/tmp/x86.elf
                                                              Arguments:/tmp/x86.elf
                                                              File size:46768 bytes
                                                              MD5 hash:4723db3e0c3b110d68f28f8e5df76db6

                                                              Start time (UTC):12:40:41
                                                              Start date (UTC):25/03/2025
                                                              Path:/tmp/x86.elf
                                                              Arguments:-
                                                              File size:46768 bytes
                                                              MD5 hash:4723db3e0c3b110d68f28f8e5df76db6

                                                              Start time (UTC):12:40:41
                                                              Start date (UTC):25/03/2025
                                                              Path:/tmp/x86.elf
                                                              Arguments:-
                                                              File size:46768 bytes
                                                              MD5 hash:4723db3e0c3b110d68f28f8e5df76db6

                                                              Start time (UTC):12:42:00
                                                              Start date (UTC):25/03/2025
                                                              Path:/usr/bin/dash
                                                              Arguments:-
                                                              File size:129816 bytes
                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                              Start time (UTC):12:42:00
                                                              Start date (UTC):25/03/2025
                                                              Path:/usr/bin/rm
                                                              Arguments:rm -f /tmp/tmp.4T3MxiSLvM /tmp/tmp.CEUSyaMCSy /tmp/tmp.UFc11hK7BX
                                                              File size:72056 bytes
                                                              MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                              Start time (UTC):12:42:00
                                                              Start date (UTC):25/03/2025
                                                              Path:/usr/bin/dash
                                                              Arguments:-
                                                              File size:129816 bytes
                                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                              Start time (UTC):12:42:00
                                                              Start date (UTC):25/03/2025
                                                              Path:/usr/bin/rm
                                                              Arguments:rm -f /tmp/tmp.4T3MxiSLvM /tmp/tmp.CEUSyaMCSy /tmp/tmp.UFc11hK7BX
                                                              File size:72056 bytes
                                                              MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b