Edit tour

Linux Analysis Report
sync.mips.elf

Overview

General Information

Sample name:sync.mips.elf
Analysis ID:1650800
MD5:295a2ee4c95ded101b1df753c0593d68
SHA1:ea3bbd12af411de4394866f3db07719603fc3515
SHA256:e702fc9d7e6f5d50c0f48bb4333ad26e3512f316b0cc6240656091b7e0df31d1
Tags:elfuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Sample is packed with UPX
ELF contains segments with high entropy indicating compressed/encrypted content
Executes the "rm" command used to delete files or directories
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1650800
Start date and time:2025-03-28 04:03:22 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 38s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:sync.mips.elf
Detection:MAL
Classification:mal52.evad.linELF@0/0@2/0
Command:/tmp/sync.mips.elf
PID:5435
Exit Code:133
Exit Code Info:
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 5 (Trace/breakpoint trap) - core dumped
  • system is lnxubuntu20
  • sync.mips.elf (PID: 5435, Parent: 5356, MD5: 0083f1f0e77be34ad27f849842bbb00c) Arguments: /tmp/sync.mips.elf
  • dash New Fork (PID: 5512, Parent: 3581)
  • rm (PID: 5512, Parent: 3581, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.VHscusB5ku /tmp/tmp.zwIrDnW77s /tmp/tmp.zsBd0AQ8HP
  • dash New Fork (PID: 5513, Parent: 3581)
  • cat (PID: 5513, Parent: 3581, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.VHscusB5ku
  • dash New Fork (PID: 5514, Parent: 3581)
  • head (PID: 5514, Parent: 3581, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5515, Parent: 3581)
  • tr (PID: 5515, Parent: 3581, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5516, Parent: 3581)
  • cut (PID: 5516, Parent: 3581, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5517, Parent: 3581)
  • cat (PID: 5517, Parent: 3581, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.VHscusB5ku
  • dash New Fork (PID: 5518, Parent: 3581)
  • head (PID: 5518, Parent: 3581, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5519, Parent: 3581)
  • tr (PID: 5519, Parent: 3581, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5520, Parent: 3581)
  • cut (PID: 5520, Parent: 3581, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5521, Parent: 3581)
  • rm (PID: 5521, Parent: 3581, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.VHscusB5ku /tmp/tmp.zwIrDnW77s /tmp/tmp.zsBd0AQ8HP
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: sync.mips.elfReversingLabs: Detection: 22%
Source: unknownHTTPS traffic detected: 54.171.230.55:443 -> 192.168.2.13:58866 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: sync.mips.elfString found in binary or memory: http://upx.sf.net
Source: unknownNetwork traffic detected: HTTP traffic on port 58866 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58866
Source: unknownHTTPS traffic detected: 54.171.230.55:443 -> 192.168.2.13:58866 version: TLS 1.2
Source: LOAD without section mappingsProgram segment: 0x400000
Source: classification engineClassification label: mal52.evad.linELF@0/0@2/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.95 Copyright (C) 1996-2018 the UPX Team. All Rights Reserved. $
Source: /usr/bin/dash (PID: 5512)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.VHscusB5ku /tmp/tmp.zwIrDnW77s /tmp/tmp.zsBd0AQ8HPJump to behavior
Source: /usr/bin/dash (PID: 5521)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.VHscusB5ku /tmp/tmp.zwIrDnW77s /tmp/tmp.zsBd0AQ8HPJump to behavior
Source: sync.mips.elfSubmission file: segment LOAD with 7.7266 entropy (max. 8.0)
Source: /tmp/sync.mips.elf (PID: 5435)Queries kernel information via 'uname': Jump to behavior
Source: sync.mips.elf, 5435.1.00005606bec6d000.00005606becf4000.rw-.sdmpBinary or memory string: V!/etc/qemu-binfmt/mips
Source: sync.mips.elf, 5435.1.00005606bec6d000.00005606becf4000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mips
Source: sync.mips.elf, 5435.1.00007ffef1ca9000.00007ffef1cca000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mips
Source: sync.mips.elf, 5435.1.00007ffef1ca9000.00007ffef1cca000.rw-.sdmpBinary or memory string: <x86_64/usr/bin/qemu-mips/tmp/sync.mips.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sync.mips.elf
Source: sync.mips.elf, 5435.1.00007ffef1ca9000.00007ffef1cca000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 5 (Trace/breakpoint trap) - core dumped
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Obfuscated Files or Information
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File Deletion
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1650800 Sample: sync.mips.elf Startdate: 28/03/2025 Architecture: LINUX Score: 52 14 54.171.230.55, 443, 58866 AMAZON-02US United States 2->14 16 daisy.ubuntu.com 2->16 18 Multi AV Scanner detection for submitted file 2->18 20 Sample is packed with UPX 2->20 6 dash rm 2->6         started        8 dash cut 2->8         started        10 dash tr 2->10         started        12 8 other processes 2->12 signatures3 process4

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
sync.mips.elf22%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netsync.mips.elffalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      54.171.230.55
      unknownUnited States
      16509AMAZON-02USfalse
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      54.171.230.55na.elfGet hashmaliciousPrometeiBrowse
        Okami.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
          na.elfGet hashmaliciousPrometeiBrowse
            na.elfGet hashmaliciousPrometeiBrowse
              arm5.elfGet hashmaliciousUnknownBrowse
                na.elfGet hashmaliciousPrometeiBrowse
                  bin.sh.elfGet hashmaliciousMiraiBrowse
                    na.elfGet hashmaliciousPrometeiBrowse
                      SecuriteInfo.com.FileRepMalware.2065.17794.elfGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Linux.Mirai.2522.5402.17083.elfGet hashmaliciousUnknownBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          daisy.ubuntu.comsync.arm5.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.24
                          bin.sh.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.24
                          i.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.25
                          .gksed.x86.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.24
                          bash.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 162.213.35.25
                          Okami.arm4.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 162.213.35.24
                          ftp.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 162.213.35.24
                          Okami.ppc.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 162.213.35.24
                          Okami.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 162.213.35.25
                          Okami.m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 162.213.35.24
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                          • 34.249.145.219
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 34.254.182.186
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 34.249.145.219
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 54.170.242.139
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 34.249.145.219
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 34.249.145.219
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 34.249.145.219
                          bin.sh.elfGet hashmaliciousMiraiBrowse
                          • 54.217.10.153
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 54.170.242.139
                          Mozi.m.elfGet hashmaliciousUnknownBrowse
                          • 34.249.145.219
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          fb4726d465c5f28b84cd6d14cedd13a7bin.sh.elfGet hashmaliciousMiraiBrowse
                          • 54.171.230.55
                          Okami.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 54.171.230.55
                          Okami.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 54.171.230.55
                          sshd.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 54.171.230.55
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 54.171.230.55
                          wget.elfGet hashmaliciousGafgytBrowse
                          • 54.171.230.55
                          apache2.elfGet hashmaliciousGafgytBrowse
                          • 54.171.230.55
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 54.171.230.55
                          SecuriteInfo.com.Linux.Mirai.2522.5402.17083.elfGet hashmaliciousUnknownBrowse
                          • 54.171.230.55
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 54.171.230.55
                          No context
                          No created / dropped files found
                          File type:ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, no section header
                          Entropy (8bit):7.722239254894856
                          TrID:
                          • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                          • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                          File name:sync.mips.elf
                          File size:39'876 bytes
                          MD5:295a2ee4c95ded101b1df753c0593d68
                          SHA1:ea3bbd12af411de4394866f3db07719603fc3515
                          SHA256:e702fc9d7e6f5d50c0f48bb4333ad26e3512f316b0cc6240656091b7e0df31d1
                          SHA512:2b02c845a5ffdac061bd2618baff60ebffc16230e18c2a53056f2107a6b7c7bfc7ec8daf60efd465a215b3baaa74859fbf94ce2388447a3db78ddcaa3e4666a2
                          SSDEEP:768:dPuvixbEPDrOm7YKsOiXq6NRWR5qTh4VqbwI7MBY7LchkzIoAkNUD:dPuviVErbYKsOyqCO5sM2wIQKEhyIzke
                          TLSH:9703027E8A0817E1DFFC0DF828A8675128F358425068BD41FECD6AD75869337940ABD0
                          File Content Preview:.ELF.....................@.....4.........4. ...(.............@...@...........................A...A.....................VUPX!..........j...j........a....7.$..ELF.........@.....`.4.h..... ...(..`_......@..].u[.-.....>E.o...R.....dt.....Q................\|..

                          ELF header

                          Class:ELF32
                          Data:2's complement, big endian
                          Version:1 (current)
                          Machine:MIPS R3000
                          Version Number:0x1
                          Type:EXEC (Executable file)
                          OS/ABI:UNIX - System V
                          ABI Version:0
                          Entry Point Address:0x409008
                          Flags:0x1007
                          ELF Header Size:52
                          Program Header Offset:52
                          Program Header Size:32
                          Number of Program Headers:2
                          Section Header Offset:0
                          Section Header Size:40
                          Number of Section Headers:0
                          Header String Table Index:0
                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                          LOAD0x00x4000000x4000000x9a8c0x9a8c7.72660x5R E0x10000
                          LOAD0x00x4100000x4100000x00x50c100.00000x6RW 0x10000

                          Download Network PCAP: filteredfull

                          • Total Packets: 21
                          • 443 (HTTPS)
                          • 53 (DNS)
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 28, 2025 04:04:13.586994886 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:04:16.626786947 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:04:22.514828920 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:04:34.034810066 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:04:57.842684031 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:04:58.076292038 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:04:59.675848961 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:04:59.675905943 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:04:59.675940990 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:04:59.675971985 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:04:59.676004887 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:04:59.676043034 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:04:59.676081896 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:04:59.676083088 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:04:59.676083088 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:04:59.676178932 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:04:59.676179886 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:04:59.676179886 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:04:59.678618908 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:04:59.916050911 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:04:59.921238899 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:04:59.921380997 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:04:59.921516895 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:05:00.157681942 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:05:00.166659117 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:05:00.166711092 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:05:00.166851997 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:05:00.166852951 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:05:00.169127941 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:05:00.403563023 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:05:00.403584003 CET4435886654.171.230.55192.168.2.13
                          Mar 28, 2025 04:05:00.403667927 CET58866443192.168.2.1354.171.230.55
                          Mar 28, 2025 04:05:00.403667927 CET58866443192.168.2.1354.171.230.55
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 28, 2025 04:04:15.444163084 CET3516053192.168.2.131.1.1.1
                          Mar 28, 2025 04:04:15.444211960 CET5096853192.168.2.131.1.1.1
                          Mar 28, 2025 04:04:15.533087015 CET53351601.1.1.1192.168.2.13
                          Mar 28, 2025 04:04:15.533107996 CET53509681.1.1.1192.168.2.13
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Mar 28, 2025 04:04:15.444163084 CET192.168.2.131.1.1.10xad3dStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                          Mar 28, 2025 04:04:15.444211960 CET192.168.2.131.1.1.10xd57aStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Mar 28, 2025 04:04:15.533087015 CET1.1.1.1192.168.2.130xad3dNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                          Mar 28, 2025 04:04:15.533087015 CET1.1.1.1192.168.2.130xad3dNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                          TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                          Mar 28, 2025 04:04:59.676043034 CET54.171.230.55443192.168.2.1358866CN=motd.ubuntu.com CN=R10, O=Let's Encrypt, C=USCN=R10, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USSat Mar 22 09:18:05 CET 2025 Wed Mar 13 01:00:00 CET 2024Fri Jun 20 10:18:04 CEST 2025 Sat Mar 13 00:59:59 CET 2027771,4866-4867-4865-49196-49200-163-159-52393-52392-52394-49327-49325-49315-49311-49245-49249-49239-49235-49195-49199-162-158-49326-49324-49314-49310-49244-49248-49238-49234-49188-49192-107-106-49267-49271-196-195-49187-49191-103-64-49266-49270-190-189-49162-49172-57-56-136-135-49161-49171-51-50-69-68-157-49313-49309-49233-156-49312-49308-49232-61-192-60-186-53-132-47-65-255,0-11-10-35-22-23-13-43-45-51,29-23-30-25-24,0-1-2fb4726d465c5f28b84cd6d14cedd13a7
                          CN=R10, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USWed Mar 13 01:00:00 CET 2024Sat Mar 13 00:59:59 CET 2027

                          System Behavior

                          Start time (UTC):03:04:13
                          Start date (UTC):28/03/2025
                          Path:/tmp/sync.mips.elf
                          Arguments:/tmp/sync.mips.elf
                          File size:5777432 bytes
                          MD5 hash:0083f1f0e77be34ad27f849842bbb00c

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/dash
                          Arguments:-
                          File size:129816 bytes
                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/rm
                          Arguments:rm -f /tmp/tmp.VHscusB5ku /tmp/tmp.zwIrDnW77s /tmp/tmp.zsBd0AQ8HP
                          File size:72056 bytes
                          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/dash
                          Arguments:-
                          File size:129816 bytes
                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/cat
                          Arguments:cat /tmp/tmp.VHscusB5ku
                          File size:43416 bytes
                          MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/dash
                          Arguments:-
                          File size:129816 bytes
                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/head
                          Arguments:head -n 10
                          File size:47480 bytes
                          MD5 hash:fd96a67145172477dd57131396fc9608

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/dash
                          Arguments:-
                          File size:129816 bytes
                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/tr
                          Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                          File size:51544 bytes
                          MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/dash
                          Arguments:-
                          File size:129816 bytes
                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/cut
                          Arguments:cut -c -80
                          File size:47480 bytes
                          MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/dash
                          Arguments:-
                          File size:129816 bytes
                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/cat
                          Arguments:cat /tmp/tmp.VHscusB5ku
                          File size:43416 bytes
                          MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/dash
                          Arguments:-
                          File size:129816 bytes
                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/head
                          Arguments:head -n 10
                          File size:47480 bytes
                          MD5 hash:fd96a67145172477dd57131396fc9608

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/dash
                          Arguments:-
                          File size:129816 bytes
                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/tr
                          Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                          File size:51544 bytes
                          MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/dash
                          Arguments:-
                          File size:129816 bytes
                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/cut
                          Arguments:cut -c -80
                          File size:47480 bytes
                          MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/dash
                          Arguments:-
                          File size:129816 bytes
                          MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                          Start time (UTC):03:04:59
                          Start date (UTC):28/03/2025
                          Path:/usr/bin/rm
                          Arguments:rm -f /tmp/tmp.VHscusB5ku /tmp/tmp.zwIrDnW77s /tmp/tmp.zsBd0AQ8HP
                          File size:72056 bytes
                          MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b