Edit tour

Linux Analysis Report
x86_64.elf

Overview

General Information

Sample name:x86_64.elf
Analysis ID:1648820
MD5:e0c5cc0f56bbf5e42ea4c897696231e0
SHA1:d0f7d6a70d8cc1d4dc7aed4d229e073bb2c8cc75
SHA256:74d859cb45c7c3b604f15f1151b4bc247a0acc2c6852feca5abfbd9c7a912a74
Tags:elfuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Sample is packed with UPX
Sends malformed DNS queries
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Sample contains only a LOAD segment without any section mappings
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1648820
Start date and time:2025-03-26 08:39:02 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 27s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:x86_64.elf
Detection:MAL
Classification:mal56.troj.evad.linELF@0/1@29/0
Command:/tmp/x86_64.elf
PID:5437
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
skidmark botnet
Standard Error:
  • system is lnxubuntu20
  • x86_64.elf (PID: 5437, Parent: 5359, MD5: e0c5cc0f56bbf5e42ea4c897696231e0) Arguments: /tmp/x86_64.elf
  • dash New Fork (PID: 5444, Parent: 3582)
  • rm (PID: 5444, Parent: 3582, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.lacvsLv5BI /tmp/tmp.1XICa3hV7v /tmp/tmp.1RnJZEoQb5
  • dash New Fork (PID: 5445, Parent: 3582)
  • rm (PID: 5445, Parent: 3582, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.lacvsLv5BI /tmp/tmp.1XICa3hV7v /tmp/tmp.1RnJZEoQb5
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: x86_64.elfVirustotal: Detection: 7%Perma Link
Source: x86_64.elfReversingLabs: Detection: 19%

Networking

barindex
Source: global trafficDNS traffic detected: malformed DNS query: solarwhale.dyn. [malformed]
Source: /tmp/x86_64.elf (PID: 5437)Socket: 127.0.0.1:47845Jump to behavior
Source: global trafficTCP traffic: 192.168.2.13:54636 -> 34.254.182.186:443
Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownTCP traffic detected without corresponding DNS query: 175.30.53.20
Source: unknownUDP traffic detected without corresponding DNS query: 134.195.4.2
Source: unknownUDP traffic detected without corresponding DNS query: 134.195.4.2
Source: unknownUDP traffic detected without corresponding DNS query: 134.195.4.2
Source: unknownUDP traffic detected without corresponding DNS query: 134.195.4.2
Source: unknownUDP traffic detected without corresponding DNS query: 134.195.4.2
Source: unknownUDP traffic detected without corresponding DNS query: 51.158.108.203
Source: unknownUDP traffic detected without corresponding DNS query: 94.16.114.254
Source: unknownUDP traffic detected without corresponding DNS query: 94.16.114.254
Source: unknownUDP traffic detected without corresponding DNS query: 94.16.114.254
Source: unknownUDP traffic detected without corresponding DNS query: 94.16.114.254
Source: unknownUDP traffic detected without corresponding DNS query: 94.16.114.254
Source: unknownUDP traffic detected without corresponding DNS query: 81.169.136.222
Source: unknownUDP traffic detected without corresponding DNS query: 81.169.136.222
Source: unknownUDP traffic detected without corresponding DNS query: 81.169.136.222
Source: unknownUDP traffic detected without corresponding DNS query: 81.169.136.222
Source: unknownUDP traffic detected without corresponding DNS query: 81.169.136.222
Source: unknownUDP traffic detected without corresponding DNS query: 51.254.162.59
Source: unknownUDP traffic detected without corresponding DNS query: 51.254.162.59
Source: unknownUDP traffic detected without corresponding DNS query: 51.254.162.59
Source: unknownUDP traffic detected without corresponding DNS query: 51.254.162.59
Source: unknownUDP traffic detected without corresponding DNS query: 51.254.162.59
Source: unknownUDP traffic detected without corresponding DNS query: 178.254.22.166
Source: unknownUDP traffic detected without corresponding DNS query: 178.254.22.166
Source: unknownUDP traffic detected without corresponding DNS query: 178.254.22.166
Source: global trafficDNS traffic detected: DNS query: echohorizon.dyn
Source: global trafficDNS traffic detected: DNS query: solarwhale.dyn. [malformed]
Source: x86_64.elfString found in binary or memory: http://upx.sf.net
Source: unknownNetwork traffic detected: HTTP traffic on port 54636 -> 443
Source: LOAD without section mappingsProgram segment: 0x400000
Source: /tmp/x86_64.elf (PID: 5440)SIGKILL sent: pid: 3686, result: successfulJump to behavior
Source: classification engineClassification label: mal56.troj.evad.linELF@0/1@29/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 5.00 Copyright (C) 1996-2025 the UPX Team. All Rights Reserved. $
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/5383/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/230/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/231/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/232/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/233/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/236/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/237/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/238/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/239/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/5278/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/241/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/125/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/246/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/126/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/247/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/127/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/248/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/128/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/249/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/129/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/3646/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/20/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/21/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/22/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/23/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/24/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/25/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/26/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/27/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/28/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/29/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/3420/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/1482/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/490/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/1480/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/250/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/371/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/130/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/251/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/131/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/252/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/132/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/253/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/254/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/1238/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/134/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/255/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/256/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/257/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/378/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/3413/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/258/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/259/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/1475/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/936/cmdlineJump to behavior
Source: /tmp/x86_64.elf (PID: 5440)File opened: /proc/3777/cmdlineJump to behavior
Source: /usr/bin/dash (PID: 5444)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.lacvsLv5BI /tmp/tmp.1XICa3hV7v /tmp/tmp.1RnJZEoQb5Jump to behavior
Source: /usr/bin/dash (PID: 5445)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.lacvsLv5BI /tmp/tmp.1XICa3hV7v /tmp/tmp.1RnJZEoQb5Jump to behavior
Source: x86_64.elfSubmission file: segment LOAD with 7.8076 entropy (max. 8.0)
Source: x86_64.elfSubmission file: segment LOAD with 7.9783 entropy (max. 8.0)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Obfuscated Files or Information
1
OS Credential Dumping
System Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File Deletion
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1648820 Sample: x86_64.elf Startdate: 26/03/2025 Architecture: LINUX Score: 56 22 solarwhale.dyn. [malformed] 2->22 24 175.30.53.20, 23 CHINANET-BACKBONENo31Jin-rongStreetCN China 2->24 26 2 other IPs or domains 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 Sample is packed with UPX 2->30 8 x86_64.elf 2->8         started        10 dash rm 2->10         started        12 dash rm 2->12         started        signatures3 32 Sends malformed DNS queries 22->32 process4 process5 14 x86_64.elf 8->14         started        process6 16 x86_64.elf 14->16         started        18 x86_64.elf 14->18         started        20 x86_64.elf 14->20         started       
SourceDetectionScannerLabelLink
x86_64.elf8%VirustotalBrowse
x86_64.elf19%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
echohorizon.dyn
unknown
unknownfalse
    high
    solarwhale.dyn. [malformed]
    unknown
    unknownfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://upx.sf.netx86_64.elffalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        175.30.53.20
        unknownChina
        4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
        34.254.182.186
        unknownUnited States
        16509AMAZON-02USfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        175.30.53.20i686.elfGet hashmaliciousUnknownBrowse
          arm7.elfGet hashmaliciousUnknownBrowse
            x86.elfGet hashmaliciousUnknownBrowse
              x86.elfGet hashmaliciousUnknownBrowse
                x86_64.elfGet hashmaliciousUnknownBrowse
                  arm.elfGet hashmaliciousUnknownBrowse
                    mpsl.elfGet hashmaliciousUnknownBrowse
                      gjsoX84ZOy.elfGet hashmaliciousMiraiBrowse
                        skwXrj6q72.elfGet hashmaliciousUnknownBrowse
                          VqY324s7TO.elfGet hashmaliciousUnknownBrowse
                            34.254.182.186morte.arm5.elfGet hashmaliciousUnknownBrowse
                              arm6.elfGet hashmaliciousUnknownBrowse
                                ppc.elfGet hashmaliciousUnknownBrowse
                                  na.elfGet hashmaliciousPrometeiBrowse
                                    boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                      tarm5.elfGet hashmaliciousUnknownBrowse
                                        arm5.elfGet hashmaliciousUnknownBrowse
                                          arm7.elfGet hashmaliciousMiraiBrowse
                                            mpsl.elfGet hashmaliciousUnknownBrowse
                                              na.elfGet hashmaliciousPrometeiBrowse
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                                                • 34.249.145.219
                                                Inquiry Purchase Order 25.03.2025.jsGet hashmaliciousFormBookBrowse
                                                • 13.248.169.48
                                                CEKA RFQ IND18042128.xls.vbsGet hashmaliciousFormBookBrowse
                                                • 52.217.163.218
                                                https://bafkreid3spujifazpolzpws2zk5tjxpdvw52r5kyca5fumyn5avau4pzsa.ipfs.dweb.link/#ixxx@dhl.comGet hashmaliciousHTMLPhisherBrowse
                                                • 176.32.108.185
                                                E1AcRCtgSA.exeGet hashmaliciousUnknownBrowse
                                                • 18.238.49.124
                                                https://tracking.vocus.io/link?id=9f3c0089-0991-4e0a-8d31-6f4ff071a629&url=https%3A%2F%2Fbusinessappealsupport-suite.com#user_email=llinos.coe@dentsu.com&fname=Llinos&lname=CoeGet hashmaliciousUnknownBrowse
                                                • 54.187.103.82
                                                i686.elfGet hashmaliciousUnknownBrowse
                                                • 54.171.230.55
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 34.243.160.129
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 54.171.230.55
                                                na.elfGet hashmaliciousPrometeiBrowse
                                                • 54.171.230.55
                                                CHINANET-BACKBONENo31Jin-rongStreetCNi686.elfGet hashmaliciousUnknownBrowse
                                                • 175.30.53.20
                                                arm7.elfGet hashmaliciousUnknownBrowse
                                                • 175.30.53.20
                                                x86.elfGet hashmaliciousUnknownBrowse
                                                • 175.30.53.20
                                                https://energy-innovation-4916.my.salesforce-sites.com/enrGet hashmaliciousHTMLPhisherBrowse
                                                • 63.140.39.248
                                                https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://tucansport.com/sample-page/&ved=2ahUKEwjQ8uXI8KWMAxXnRzABHZNPGggQFnoECBcQAQ&usg=AOvVaw0aeev5ilte-Y3jh1kJeCpRGet hashmaliciousUnknownBrowse
                                                • 63.140.38.112
                                                http://hak5.comGet hashmaliciousUnknownBrowse
                                                • 63.140.39.22
                                                arm.elfGet hashmaliciousGafgyt, OkiruBrowse
                                                • 183.144.215.77
                                                ppc.elfGet hashmaliciousOkiruBrowse
                                                • 114.220.169.100
                                                mips.elfGet hashmaliciousGafgyt, OkiruBrowse
                                                • 171.93.227.232
                                                m68k.elfGet hashmaliciousGafgyt, OkiruBrowse
                                                • 222.209.183.103
                                                No context
                                                No context
                                                Process:/tmp/x86_64.elf
                                                File Type:Unknown
                                                Category:dropped
                                                Size (bytes):5673
                                                Entropy (8bit):6.428779669660604
                                                Encrypted:false
                                                SSDEEP:96:e5Lp6hF8/EcH6J3XOUyshRjClY55kyUx7P2EbfOlDhS+dY64At7S1TBIa+tej72S:eX6hvJ3XOUygRClq5kyUxaVXFaLF
                                                MD5:BD2B3E20445C1B065DCB4B93520D62AC
                                                SHA1:A68FBE63EEDB549D1ACCFF7D5BB10D60C67A9513
                                                SHA-256:580DCE9DB5ECC5A899681755E0DF79E4FE4A57FB062207338F067F2D6D7DDD91
                                                SHA-512:64A402E3E53D9F87C5C1799959013A328A9DD8D7248599FE32A6CAB0229A7520E9DA6C4C68DC38A08DF0B2F32ECA001F3ACA45CF30ABEADE5F738C6F8E3A8199
                                                Malicious:false
                                                Reputation:low
                                                Preview:............L.m0L.....E.H...E0.u.H......H..j.Y.H.H.>.H.u.I...E0.u.H.H.>.H.u.I..H..H.>.H.H.u.I..I..I)..E0.t....I...rWH.=....)..}.....^.....jYX....y.W^j.X..I.}....H.t...H..... =I.>H...L..H).H...I.w...1....H).I..H....H.H.g..K.L&._^H...AXD.....H..I).M..H......H...z...H........H.D$.I......L.......L........x.M).A..j.Yj.Z.....)..F........._^j.XA.&H.......QH9.L.G.H.J.s.......t...H...t.A...H..I....H....H.W.H).X.UH..SH..H..(H.>.......H.t$......H.......D$..T$...u...UPX!u.H.;...........u...........9.w..H;M.w.9.H.u.s3H.{.H.T$.H.L$.H.........u.D$.H9D$.u..D$.H.C.H)...H.....H........T$.H.E.H.U.H).H..H.E..J...H..([].H..APtP@...uJE1.1.H..A..L9.u...H.W...H...u.I...!H..u...u.M..t.M..I.P.........6...H....^.ATA..I...S..E1.H......H......H...D..L..A....2....H..L..H....H......[A\.AWAVI..AUATUSH.....L.w H...T$TH.|$`H.t$XH.L$HL.D$@H.D$h....H.D$8......W.t3I.8H.G@H+xHf...u.H.x...H.|$8H.p(H..>H.D$h.f....,...f...H.T$`.....A.....H.D$0....L..D.D.I...E1...j8D.T$.....D.T$.H....x@.;.u3H.S(H..t*H.C.L9.L.B
                                                File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
                                                Entropy (8bit):7.97602673075889
                                                TrID:
                                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                File name:x86_64.elf
                                                File size:30'052 bytes
                                                MD5:e0c5cc0f56bbf5e42ea4c897696231e0
                                                SHA1:d0f7d6a70d8cc1d4dc7aed4d229e073bb2c8cc75
                                                SHA256:74d859cb45c7c3b604f15f1151b4bc247a0acc2c6852feca5abfbd9c7a912a74
                                                SHA512:4c834b08e6c93374f3a1558384cc43e81d770bda8a49fcb6793828f9fd4ef90f02c335ec39e1c06600c45bbdf0d36e414eb10193d47fe116b8f22b0b8e00d948
                                                SSDEEP:768:t2yyVbNJ7xXAV5SvLbOAdY/DO7SIMJ4T+G8L1MOrCW:rgbruVEHdYDHxJnv+W
                                                TLSH:5ED2E0D97FB50B1BC82B91725D8D8B14FB29058BEE14550D0E8BE28D301BA61B352FDE
                                                File Content Preview:.ELF..............>......c`.....@...................@.8...........................@.......@...............................................`.......`.....bt......bt..............Q.td........................................................UPX!...............

                                                ELF header

                                                Class:ELF64
                                                Data:2's complement, little endian
                                                Version:1 (current)
                                                Machine:Advanced Micro Devices X86-64
                                                Version Number:0x1
                                                Type:EXEC (Executable file)
                                                OS/ABI:UNIX - System V
                                                ABI Version:0
                                                Entry Point Address:0x6063d0
                                                Flags:0x0
                                                ELF Header Size:64
                                                Program Header Offset:64
                                                Program Header Size:56
                                                Number of Program Headers:3
                                                Section Header Offset:0
                                                Section Header Size:0
                                                Number of Section Headers:0
                                                Header String Table Index:0
                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                LOAD0x00x4000000x4000000x10000x110e087.80760x6RW 0x100000
                                                LOAD0x00x6000000x6000000x74620x74627.97830x5R E0x100000
                                                GNU_STACK0x00x00x00x00x00.00000x6RW 0x8

                                                Download Network PCAP: filteredfull

                                                • Total Packets: 54
                                                • 443 (HTTPS)
                                                • 53 (DNS)
                                                • 23 (Telnet)
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 26, 2025 08:39:51.392297029 CET54636443192.168.2.1334.254.182.186
                                                Mar 26, 2025 08:39:53.190143108 CET4445623192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:39:54.208240986 CET4445623192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:39:56.224234104 CET4445623192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:40:00.352236986 CET4445623192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:40:03.570426941 CET4445823192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:40:04.576452971 CET4445823192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:40:06.596230984 CET4445823192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:40:10.848283052 CET4445823192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:40:14.448143005 CET4446023192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:40:15.456248045 CET4446023192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:40:17.472376108 CET4446023192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:40:21.600275993 CET4446023192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:40:49.480556965 CET4446223192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:40:50.496279001 CET4446223192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:40:52.512285948 CET4446223192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:40:56.672272921 CET4446223192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:41:00.401113033 CET4446423192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:41:01.408292055 CET4446423192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:41:03.424491882 CET4446423192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:41:07.680298090 CET4446423192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:41:35.432969093 CET4446623192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:41:36.448329926 CET4446623192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:41:38.464391947 CET4446623192.168.2.13175.30.53.20
                                                Mar 26, 2025 08:41:42.496345043 CET4446623192.168.2.13175.30.53.20
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 26, 2025 08:39:52.649507999 CET4660353192.168.2.13134.195.4.2
                                                Mar 26, 2025 08:39:52.758764982 CET5346603134.195.4.2192.168.2.13
                                                Mar 26, 2025 08:39:52.770158052 CET4234453192.168.2.13134.195.4.2
                                                Mar 26, 2025 08:39:52.880680084 CET5342344134.195.4.2192.168.2.13
                                                Mar 26, 2025 08:39:52.883649111 CET3377253192.168.2.13134.195.4.2
                                                Mar 26, 2025 08:39:52.984123945 CET5333772134.195.4.2192.168.2.13
                                                Mar 26, 2025 08:39:52.986552000 CET5510353192.168.2.13134.195.4.2
                                                Mar 26, 2025 08:39:53.086424112 CET5355103134.195.4.2192.168.2.13
                                                Mar 26, 2025 08:39:53.088944912 CET5722253192.168.2.13134.195.4.2
                                                Mar 26, 2025 08:39:53.188935041 CET5357222134.195.4.2192.168.2.13
                                                Mar 26, 2025 08:40:03.392976046 CET3480953192.168.2.1351.158.108.203
                                                Mar 26, 2025 08:40:03.569886923 CET533480951.158.108.203192.168.2.13
                                                Mar 26, 2025 08:40:13.581722975 CET3741753192.168.2.13195.10.195.195
                                                Mar 26, 2025 08:40:13.751852989 CET5337417195.10.195.195192.168.2.13
                                                Mar 26, 2025 08:40:13.752598047 CET4666253192.168.2.13195.10.195.195
                                                Mar 26, 2025 08:40:13.923856020 CET5346662195.10.195.195192.168.2.13
                                                Mar 26, 2025 08:40:13.929987907 CET5915753192.168.2.13195.10.195.195
                                                Mar 26, 2025 08:40:14.101495028 CET5359157195.10.195.195192.168.2.13
                                                Mar 26, 2025 08:40:14.102416039 CET5576953192.168.2.13195.10.195.195
                                                Mar 26, 2025 08:40:14.277589083 CET5355769195.10.195.195192.168.2.13
                                                Mar 26, 2025 08:40:14.278347969 CET3434853192.168.2.13195.10.195.195
                                                Mar 26, 2025 08:40:14.447653055 CET5334348195.10.195.195192.168.2.13
                                                Mar 26, 2025 08:40:24.460546017 CET3951453192.168.2.1394.16.114.254
                                                Mar 26, 2025 08:40:29.463186026 CET3483553192.168.2.1394.16.114.254
                                                Mar 26, 2025 08:40:34.469377995 CET6053053192.168.2.1394.16.114.254
                                                Mar 26, 2025 08:40:39.472834110 CET5422353192.168.2.1394.16.114.254
                                                Mar 26, 2025 08:40:44.477444887 CET4288353192.168.2.1394.16.114.254
                                                Mar 26, 2025 08:40:59.492213964 CET3459753192.168.2.1381.169.136.222
                                                Mar 26, 2025 08:40:59.675957918 CET533459781.169.136.222192.168.2.13
                                                Mar 26, 2025 08:40:59.676903963 CET4938553192.168.2.1381.169.136.222
                                                Mar 26, 2025 08:40:59.852637053 CET534938581.169.136.222192.168.2.13
                                                Mar 26, 2025 08:40:59.853662014 CET5707353192.168.2.1381.169.136.222
                                                Mar 26, 2025 08:41:00.041307926 CET535707381.169.136.222192.168.2.13
                                                Mar 26, 2025 08:41:00.042505026 CET4351753192.168.2.1381.169.136.222
                                                Mar 26, 2025 08:41:00.217753887 CET534351781.169.136.222192.168.2.13
                                                Mar 26, 2025 08:41:00.219156027 CET5899553192.168.2.1381.169.136.222
                                                Mar 26, 2025 08:41:00.400163889 CET535899581.169.136.222192.168.2.13
                                                Mar 26, 2025 08:41:10.412321091 CET3900353192.168.2.1351.254.162.59
                                                Mar 26, 2025 08:41:15.418194056 CET4415553192.168.2.1351.254.162.59
                                                Mar 26, 2025 08:41:20.421107054 CET3572653192.168.2.1351.254.162.59
                                                Mar 26, 2025 08:41:25.425604105 CET4475953192.168.2.1351.254.162.59
                                                Mar 26, 2025 08:41:30.429544926 CET4419353192.168.2.1351.254.162.59
                                                Mar 26, 2025 08:41:45.441391945 CET5532753192.168.2.13178.254.22.166
                                                Mar 26, 2025 08:41:50.445851088 CET4523153192.168.2.13178.254.22.166
                                                Mar 26, 2025 08:41:55.449186087 CET4355453192.168.2.13178.254.22.166
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Mar 26, 2025 08:39:52.649507999 CET192.168.2.13134.195.4.20xf5a2Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:39:52.770158052 CET192.168.2.13134.195.4.20xf5a2Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:39:52.883649111 CET192.168.2.13134.195.4.20xf5a2Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:39:52.986552000 CET192.168.2.13134.195.4.20xf5a2Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:39:53.088944912 CET192.168.2.13134.195.4.20xf5a2Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:40:03.392976046 CET192.168.2.1351.158.108.2030xbba4Standard query (0)solarwhale.dyn. [malformed]256339false
                                                Mar 26, 2025 08:40:13.581722975 CET192.168.2.13195.10.195.1950xc24cStandard query (0)solarwhale.dyn. [malformed]256349false
                                                Mar 26, 2025 08:40:13.752598047 CET192.168.2.13195.10.195.1950xc24cStandard query (0)solarwhale.dyn. [malformed]256349false
                                                Mar 26, 2025 08:40:13.929987907 CET192.168.2.13195.10.195.1950xc24cStandard query (0)solarwhale.dyn. [malformed]256350false
                                                Mar 26, 2025 08:40:14.102416039 CET192.168.2.13195.10.195.1950xc24cStandard query (0)solarwhale.dyn. [malformed]256350false
                                                Mar 26, 2025 08:40:14.278347969 CET192.168.2.13195.10.195.1950xc24cStandard query (0)solarwhale.dyn. [malformed]256350false
                                                Mar 26, 2025 08:40:24.460546017 CET192.168.2.1394.16.114.2540xa323Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:40:29.463186026 CET192.168.2.1394.16.114.2540xa323Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:40:34.469377995 CET192.168.2.1394.16.114.2540xa323Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:40:39.472834110 CET192.168.2.1394.16.114.2540xa323Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:40:44.477444887 CET192.168.2.1394.16.114.2540xa323Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:40:59.492213964 CET192.168.2.1381.169.136.2220xcc37Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:40:59.676903963 CET192.168.2.1381.169.136.2220xcc37Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:40:59.853662014 CET192.168.2.1381.169.136.2220xcc37Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:41:00.042505026 CET192.168.2.1381.169.136.2220xcc37Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:41:00.219156027 CET192.168.2.1381.169.136.2220xcc37Standard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:41:10.412321091 CET192.168.2.1351.254.162.590x1204Standard query (0)solarwhale.dyn. [malformed]256411false
                                                Mar 26, 2025 08:41:15.418194056 CET192.168.2.1351.254.162.590x1204Standard query (0)solarwhale.dyn. [malformed]256416false
                                                Mar 26, 2025 08:41:20.421107054 CET192.168.2.1351.254.162.590x1204Standard query (0)solarwhale.dyn. [malformed]256421false
                                                Mar 26, 2025 08:41:25.425604105 CET192.168.2.1351.254.162.590x1204Standard query (0)solarwhale.dyn. [malformed]256426false
                                                Mar 26, 2025 08:41:30.429544926 CET192.168.2.1351.254.162.590x1204Standard query (0)solarwhale.dyn. [malformed]256431false
                                                Mar 26, 2025 08:41:45.441391945 CET192.168.2.13178.254.22.1660xc25aStandard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:41:50.445851088 CET192.168.2.13178.254.22.1660xc25aStandard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:41:55.449186087 CET192.168.2.13178.254.22.1660xc25aStandard query (0)echohorizon.dynA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Mar 26, 2025 08:39:52.758764982 CET134.195.4.2192.168.2.130xf5a2Format error (1)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:39:52.880680084 CET134.195.4.2192.168.2.130xf5a2Format error (1)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:39:52.984123945 CET134.195.4.2192.168.2.130xf5a2Format error (1)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:39:53.086424112 CET134.195.4.2192.168.2.130xf5a2Format error (1)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:39:53.188935041 CET134.195.4.2192.168.2.130xf5a2Format error (1)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:40:03.569886923 CET51.158.108.203192.168.2.130xbba4Format error (1)solarwhale.dyn. [malformed]nonenone256339false
                                                Mar 26, 2025 08:40:59.675957918 CET81.169.136.222192.168.2.130xcc37Format error (1)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:40:59.852637053 CET81.169.136.222192.168.2.130xcc37Format error (1)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:41:00.041307926 CET81.169.136.222192.168.2.130xcc37Format error (1)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:41:00.217753887 CET81.169.136.222192.168.2.130xcc37Format error (1)echohorizon.dynnonenoneA (IP address)IN (0x0001)false
                                                Mar 26, 2025 08:41:00.400163889 CET81.169.136.222192.168.2.130xcc37Format error (1)echohorizon.dynnonenoneA (IP address)IN (0x0001)false

                                                System Behavior

                                                Start time (UTC):07:39:51
                                                Start date (UTC):26/03/2025
                                                Path:/tmp/x86_64.elf
                                                Arguments:/tmp/x86_64.elf
                                                File size:30052 bytes
                                                MD5 hash:e0c5cc0f56bbf5e42ea4c897696231e0

                                                Start time (UTC):07:39:51
                                                Start date (UTC):26/03/2025
                                                Path:/tmp/x86_64.elf
                                                Arguments:-
                                                File size:30052 bytes
                                                MD5 hash:e0c5cc0f56bbf5e42ea4c897696231e0

                                                Start time (UTC):07:39:51
                                                Start date (UTC):26/03/2025
                                                Path:/tmp/x86_64.elf
                                                Arguments:-
                                                File size:30052 bytes
                                                MD5 hash:e0c5cc0f56bbf5e42ea4c897696231e0

                                                Start time (UTC):07:39:51
                                                Start date (UTC):26/03/2025
                                                Path:/tmp/x86_64.elf
                                                Arguments:-
                                                File size:30052 bytes
                                                MD5 hash:e0c5cc0f56bbf5e42ea4c897696231e0

                                                Start time (UTC):07:39:51
                                                Start date (UTC):26/03/2025
                                                Path:/tmp/x86_64.elf
                                                Arguments:-
                                                File size:30052 bytes
                                                MD5 hash:e0c5cc0f56bbf5e42ea4c897696231e0

                                                Start time (UTC):07:39:54
                                                Start date (UTC):26/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):07:39:54
                                                Start date (UTC):26/03/2025
                                                Path:/usr/bin/rm
                                                Arguments:rm -f /tmp/tmp.lacvsLv5BI /tmp/tmp.1XICa3hV7v /tmp/tmp.1RnJZEoQb5
                                                File size:72056 bytes
                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                Start time (UTC):07:39:54
                                                Start date (UTC):26/03/2025
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):07:39:54
                                                Start date (UTC):26/03/2025
                                                Path:/usr/bin/rm
                                                Arguments:rm -f /tmp/tmp.lacvsLv5BI /tmp/tmp.1XICa3hV7v /tmp/tmp.1RnJZEoQb5
                                                File size:72056 bytes
                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b