Edit tour

Linux Analysis Report
FBI.ppc.elf

Overview

General Information

Sample name:FBI.ppc.elf
Analysis ID:1654265
MD5:e22244cc38378ba3a46adcba90fce5e3
SHA1:361ab9694799de2bf69dd5960f4a8f466de9ce35
SHA256:95b3ab821453f7944f5c98de0da2d9bc48331e3611cc4d20deeacbbbf326564d
Tags:elfuser-abuse_ch
Infos:

Detection

Gafgyt, Mirai
Score:80
Range:0 - 100

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Gafgyt
Yara detected Mirai
Detected TCP or UDP traffic on non-standard ports
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings that are user agent strings indicative of HTTP manipulation
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1654265
Start date and time:2025-04-02 08:26:15 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 2s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:FBI.ppc.elf
Detection:MAL
Classification:mal80.troj.linELF@0/0@2/0
Command:/tmp/FBI.ppc.elf
PID:5490
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Bashlite, GafgytBashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.bashlite
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
FBI.ppc.elfJoeSecurity_GafgytYara detected GafgytJoe Security
    FBI.ppc.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      FBI.ppc.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x155a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x155b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x155cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x155e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x155f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15608:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1561c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15630:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15644:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15658:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1566c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15680:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15694:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x156a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x156bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x156d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x156e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x156f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1570c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15720:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15734:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      FBI.ppc.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
      • 0x15554:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
      SourceRuleDescriptionAuthorStrings
      5490.1.00007f1c34001000.00007f1c3401a000.r-x.sdmpJoeSecurity_GafgytYara detected GafgytJoe Security
        5490.1.00007f1c34001000.00007f1c3401a000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5490.1.00007f1c34001000.00007f1c3401a000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x155a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x155b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x155cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x155e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x155f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15608:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1561c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15630:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15644:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15658:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1566c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15680:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15694:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x156a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x156bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x156d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x156e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x156f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1570c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15720:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x15734:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          5490.1.00007f1c34001000.00007f1c3401a000.r-x.sdmpLinux_Trojan_Gafgyt_ea92cca8unknownunknown
          • 0x15554:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
          Process Memory Space: FBI.ppc.elf PID: 5490JoeSecurity_Mirai_8Yara detected MiraiJoe Security
            Click to see the 2 entries
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: FBI.ppc.elfAvira: detected
            Source: FBI.ppc.elfVirustotal: Detection: 64%Perma Link
            Source: FBI.ppc.elfReversingLabs: Detection: 63%
            Source: global trafficTCP traffic: 192.168.2.14:52950 -> 176.65.144.18:1337
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.18
            Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
            Source: FBI.ppc.elfString found in binary or memory: http://fast.no/support/crawler.asp)
            Source: FBI.ppc.elfString found in binary or memory: http://feedback.redkolibri.com/
            Source: FBI.ppc.elfString found in binary or memory: http://www.baidu.com/search/spider.htm)
            Source: FBI.ppc.elfString found in binary or memory: http://www.baidu.com/search/spider.html)
            Source: FBI.ppc.elfString found in binary or memory: http://www.billybobbot.com/crawler/)

            System Summary

            barindex
            Source: FBI.ppc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: FBI.ppc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
            Source: 5490.1.00007f1c34001000.00007f1c3401a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: 5490.1.00007f1c34001000.00007f1c3401a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
            Source: Process Memory Space: FBI.ppc.elf PID: 5490, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
            Source: Process Memory Space: FBI.ppc.elf PID: 5490, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
            Source: Initial sampleString containing 'busybox' found: busybox
            Source: Initial sampleString containing 'busybox' found: BusyBox
            Source: Initial sampleString containing 'busybox' found: 20+!g}]/proc/self/maps/proc//maps/root//tmp//var/run/mnt/BinsameccountoginnterhraseordeyshellsystemenablebusyboxBusyBoxBuilt-in107.182.129.217
            Source: ELF static info symbol of initial sample.symtab present: no
            Source: FBI.ppc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: FBI.ppc.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
            Source: 5490.1.00007f1c34001000.00007f1c3401a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: 5490.1.00007f1c34001000.00007f1c3401a000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
            Source: Process Memory Space: FBI.ppc.elf PID: 5490, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
            Source: Process Memory Space: FBI.ppc.elf PID: 5490, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
            Source: classification engineClassification label: mal80.troj.linELF@0/0@2/0
            Source: /tmp/FBI.ppc.elf (PID: 5490)Queries kernel information via 'uname': Jump to behavior
            Source: FBI.ppc.elf, 5490.1.000055a9503d8000.000055a950488000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc1
            Source: FBI.ppc.elf, 5490.1.00007ffc2d6be000.00007ffc2d6df000.rw-.sdmpBinary or memory string: -x86_64/usr/bin/qemu-ppc/tmp/FBI.ppc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/FBI.ppc.elf
            Source: FBI.ppc.elf, 5490.1.000055a9503d8000.000055a950488000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
            Source: FBI.ppc.elf, 5490.1.00007ffc2d6be000.00007ffc2d6df000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: FBI.ppc.elf, type: SAMPLE
            Source: Yara matchFile source: 5490.1.00007f1c34001000.00007f1c3401a000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: FBI.ppc.elf, type: SAMPLE
            Source: Yara matchFile source: 5490.1.00007f1c34001000.00007f1c3401a000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: FBI.ppc.elf PID: 5490, type: MEMORYSTR
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
            Source: Initial sampleUser agent string found: Opera/9.80 (X11; Linux i686; Ubuntu/14.10) Presto/2.12.388 Version/12.16
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows; U; Windows NT 6.1; rv:2.2) Gecko/20110201
            Source: Initial sampleUser agent string found: Opera/9.80 (Windows NT 5.2; U; ru) Presto/2.5.22 Version/10.51
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Android; Linux armv7l; rv:9.0) Gecko/20111216 Firefox/9.0 Fennec/9.0
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5
            Source: Initial sampleUser agent string found: Opera/9.80 (Windows NT 5.1; U; en) Presto/2.10.229 Version/11.60
            Source: Initial sampleUser agent string found: Mozilla/5.0 (iPad; U; CPU OS 5_1 like Mac OS X) AppleWebKit/531.21.10 (KHTML, like Gecko) Version/4.0.4 Mobile/7B367 Safari/531.21.10 UCBrowser/3.4.3.532
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Nintendo WiiU) AppleWebKit/536.30 (KHTML, like Gecko) NX/3.0.4.2.12 NintendoBrowser/4.3.1.11264.US
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:25.0) Gecko/20100101 Firefox/25.0
            Source: Initial sampleUser agent string found: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; pl) Opera 11.00
            Source: Initial sampleUser agent string found: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; en) Opera 11.00
            Source: Initial sampleUser agent string found: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; ja) Opera 11.00
            Source: Initial sampleUser agent string found: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; cn) Opera 11.00
            Source: Initial sampleUser agent string found: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; fr) Opera 11.00
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:12.0) Gecko/20100101 Firefox/12.0
            Source: Initial sampleUser agent string found: Mozilla/5.0 (X11; U; Linux x86_64; de; rv:1.9.2.8) Gecko/20100723 Ubuntu/10.04 (lucid) Firefox/3.6.8
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 5.1; rv:13.0) Gecko/20100101 Firefox/13.0.1
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:11.0) Gecko/20100101 Firefox/11.0
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20100101 Firefox/13.0.1
            Source: Initial sampleUser agent string found: Opera/9.80 (Windows NT 5.1; U; en) Presto/2.10.289 Version/12.01
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 5.1; rv:5.0.1) Gecko/20100101 Firefox/5.0.1
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 6.1; rv:5.0) Gecko/20100101 Firefox/5.02
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 6.0) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.112 Safari/535.1
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.116 Safari/537.36
            Source: Initial sampleUser agent string found: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.143 Safari/537.36

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: FBI.ppc.elf, type: SAMPLE
            Source: Yara matchFile source: 5490.1.00007f1c34001000.00007f1c3401a000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: FBI.ppc.elf, type: SAMPLE
            Source: Yara matchFile source: 5490.1.00007f1c34001000.00007f1c3401a000.r-x.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: FBI.ppc.elf PID: 5490, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
            Security Software Discovery
            Remote ServicesData from Local System1
            Data Obfuscation
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
            Application Layer Protocol
            Traffic DuplicationData Destruction
            No configs have been found
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Number of created Files
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1654265 Sample: FBI.ppc.elf Startdate: 02/04/2025 Architecture: LINUX Score: 80 26 176.65.144.18, 1337, 52950, 52952 PALTEL-ASPALTELAutonomousSystemPS Germany 2->26 28 daisy.ubuntu.com 2->28 30 Malicious sample detected (through community Yara rule) 2->30 32 Antivirus / Scanner detection for submitted sample 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 2 other signatures 2->36 10 FBI.ppc.elf 2->10         started        signatures3 process4 process5 12 FBI.ppc.elf 10->12         started        14 FBI.ppc.elf 10->14         started        process6 16 FBI.ppc.elf 12->16         started        18 FBI.ppc.elf 12->18         started        process7 20 FBI.ppc.elf 16->20         started        22 FBI.ppc.elf 18->22         started        process8 24 FBI.ppc.elf 20->24         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            FBI.ppc.elf64%VirustotalBrowse
            FBI.ppc.elf64%ReversingLabsLinux.Backdoor.Gafgyt
            FBI.ppc.elf100%AviraEXP/ELF.Mirai.Z
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches

            Download Network PCAP: filteredfull

            NameIPActiveMaliciousAntivirus DetectionReputation
            daisy.ubuntu.com
            162.213.35.24
            truefalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.baidu.com/search/spider.html)FBI.ppc.elffalse
                high
                http://www.billybobbot.com/crawler/)FBI.ppc.elffalse
                  high
                  http://fast.no/support/crawler.asp)FBI.ppc.elffalse
                    high
                    http://feedback.redkolibri.com/FBI.ppc.elffalse
                      high
                      http://www.baidu.com/search/spider.htm)FBI.ppc.elffalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        176.65.144.18
                        unknownGermany
                        12975PALTEL-ASPALTELAutonomousSystemPSfalse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        176.65.144.18FBI.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          daisy.ubuntu.comFBI.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 162.213.35.24
                          mpsl.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.25
                          arm6.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.25
                          rjfe686.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.25
                          arm.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.25
                          efefa7.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.24
                          arm7.elfGet hashmaliciousMiraiBrowse
                          • 162.213.35.24
                          weje64.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.25
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 162.213.35.24
                          drea4.elfGet hashmaliciousUnknownBrowse
                          • 162.213.35.24
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          PALTEL-ASPALTELAutonomousSystemPSFBI.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 176.65.144.18
                          clip64.dllGet hashmaliciousAmadeyBrowse
                          • 176.65.137.193
                          clip64.dllGet hashmaliciousAmadeyBrowse
                          • 176.65.137.193
                          cred64.dll.dllGet hashmaliciousAmadeyBrowse
                          • 176.65.137.193
                          gLLOqKC.exeGet hashmaliciousAmadeyBrowse
                          • 176.65.137.193
                          boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                          • 176.65.137.13
                          boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                          • 176.65.137.13
                          boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                          • 176.65.137.13
                          boatnet.spc.elfGet hashmaliciousMiraiBrowse
                          • 176.65.137.13
                          boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                          • 176.65.137.13
                          No context
                          No context
                          No created / dropped files found
                          File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
                          Entropy (8bit):6.235021490471917
                          TrID:
                          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                          File name:FBI.ppc.elf
                          File size:107'848 bytes
                          MD5:e22244cc38378ba3a46adcba90fce5e3
                          SHA1:361ab9694799de2bf69dd5960f4a8f466de9ce35
                          SHA256:95b3ab821453f7944f5c98de0da2d9bc48331e3611cc4d20deeacbbbf326564d
                          SHA512:18e757e672c3398e73c09c5e3976b9e20fd72b226834c84cbe922a4dcc68c00a16ef437e138a268301a1b660cb0a9b6fc59fd783e77e6e21f4987c044fa2bcef
                          SSDEEP:3072:BuwEO0ZtH4UiWorsf3IhUukStG+wRt5hKpu4:BuwEpYrsPSgwG++5h/4
                          TLSH:7AB319037B0E0F83D1533DF02A7F2BF1979ABEE215A4A184651EBDC062719B32595ED8
                          File Content Preview:.ELF...........................4.........4. ...(..........................................................j.........dt.Q.............................!..|......$H...H.6....$8!. |...N.. .!..|.......?..........h..../...@..\?........+../...A..$8...})......N..

                          ELF header

                          Class:ELF32
                          Data:2's complement, big endian
                          Version:1 (current)
                          Machine:PowerPC
                          Version Number:0x1
                          Type:EXEC (Executable file)
                          OS/ABI:UNIX - System V
                          ABI Version:0
                          Entry Point Address:0x100001f0
                          Flags:0x0
                          ELF Header Size:52
                          Program Header Offset:52
                          Program Header Size:32
                          Number of Program Headers:3
                          Section Header Offset:107248
                          Section Header Size:40
                          Number of Section Headers:15
                          Header String Table Index:14
                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                          NULL0x00x00x00x00x0000
                          .initPROGBITS0x100000940x940x240x00x6AX004
                          .textPROGBITS0x100000b80xb80x137380x00x6AX004
                          .finiPROGBITS0x100137f00x137f00x200x00x6AX004
                          .rodataPROGBITS0x100138100x138100x4f940x00x2A008
                          .eh_framePROGBITS0x100187a40x187a40x40x00x2A004
                          .ctorsPROGBITS0x100290000x190000x80x00x3WA004
                          .dtorsPROGBITS0x100290080x190080x80x00x3WA004
                          .jcrPROGBITS0x100290100x190100x40x00x3WA004
                          .dataPROGBITS0x100290180x190180x4580x00x3WA008
                          .sdataPROGBITS0x100294700x194700x400x00x3WA004
                          .sbssNOBITS0x100294b00x194b00xb80x00x3WA008
                          .bssNOBITS0x100295680x194b00x653c0x00x3WA004
                          .commentPROGBITS0x00x194b00xdda0x00x0001
                          .shstrtabSTRTAB0x00x1a28a0x630x00x0001
                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                          LOAD0x00x100000000x100000000x187a80x187a86.32220x5R E0x10000.init .text .fini .rodata .eh_frame
                          LOAD0x190000x100290000x100290000x4b00x6aa43.51290x6RW 0x10000.ctors .dtors .jcr .data .sdata .sbss .bss
                          GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

                          Download Network PCAP: filteredfull

                          • Total Packets: 85
                          • 1337 undefined
                          • 53 (DNS)
                          TimestampSource PortDest PortSource IPDest IP
                          Apr 2, 2025 08:27:05.641155005 CEST529501337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:05.841433048 CEST133752950176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:07.580126047 CEST529521337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:07.783435106 CEST133752952176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:10.844573021 CEST529541337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:11.045351982 CEST133752954176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:12.785670042 CEST529561337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:12.988159895 CEST133752956176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:16.047334909 CEST529581337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:16.253302097 CEST133752958176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:17.989962101 CEST529601337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:18.193393946 CEST133752960176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:21.255445004 CEST529621337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:21.459537029 CEST133752962176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:23.196026087 CEST529641337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:23.397445917 CEST133752964176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:26.461872101 CEST529661337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:26.662625074 CEST133752966176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:28.399600983 CEST529681337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:28.601454020 CEST133752968176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:31.665560961 CEST529701337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:31.866852999 CEST133752970176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:33.603811026 CEST529721337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:33.807022095 CEST133752972176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:36.869380951 CEST529741337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:37.074172020 CEST133752974176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:38.809959888 CEST529761337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:39.011315107 CEST133752976176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:42.076376915 CEST529781337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:42.281856060 CEST133752978176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:44.013602972 CEST529801337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:44.215799093 CEST133752980176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:47.284218073 CEST529821337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:47.489614964 CEST133752982176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:49.218453884 CEST529841337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:49.422041893 CEST133752984176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:52.491889954 CEST529861337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:52.695096970 CEST133752986176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:54.424210072 CEST529881337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:54.626620054 CEST133752988176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:57.697504997 CEST529901337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:57.901278019 CEST133752990176.65.144.18192.168.2.14
                          Apr 2, 2025 08:27:59.628635883 CEST529921337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:27:59.838507891 CEST133752992176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:02.903328896 CEST529941337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:03.108382940 CEST133752994176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:04.841263056 CEST529961337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:05.044673920 CEST133752996176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:08.110785961 CEST529981337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:08.313810110 CEST133752998176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:10.047209978 CEST530001337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:10.250277996 CEST133753000176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:13.315869093 CEST530021337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:13.518080950 CEST133753002176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:15.252003908 CEST530041337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:15.451936007 CEST133753004176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:18.520018101 CEST530061337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:18.721086979 CEST133753006176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:20.453651905 CEST530081337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:20.656006098 CEST133753008176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:23.722888947 CEST530101337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:23.924834967 CEST133753010176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:25.658113003 CEST530121337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:25.858782053 CEST133753012176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:28.927021980 CEST530141337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:29.128288984 CEST133753014176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:30.861242056 CEST530161337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:31.063944101 CEST133753016176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:34.130471945 CEST530181337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:34.352961063 CEST133753018176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:36.065789938 CEST530201337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:36.270772934 CEST133753020176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:39.354572058 CEST530221337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:39.574234009 CEST133753022176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:41.272521973 CEST530241337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:41.474018097 CEST133753024176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:44.575908899 CEST530261337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:44.777955055 CEST133753026176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:46.475649118 CEST530281337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:46.678075075 CEST133753028176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:49.780107975 CEST530301337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:49.980787039 CEST133753030176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:51.679538012 CEST530321337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:51.881253004 CEST133753032176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:54.983081102 CEST530341337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:55.186336040 CEST133753034176.65.144.18192.168.2.14
                          Apr 2, 2025 08:28:56.883285999 CEST530361337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:28:57.086287022 CEST133753036176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:00.188184023 CEST530381337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:00.393172979 CEST133753038176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:02.088448048 CEST530401337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:02.295721054 CEST133753040176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:05.394892931 CEST530421337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:05.595557928 CEST133753042176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:07.297744036 CEST530441337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:07.507652044 CEST133753044176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:10.596807957 CEST530461337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:10.803155899 CEST133753046176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:12.509576082 CEST530481337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:12.717483997 CEST133753048176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:15.804495096 CEST530501337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:16.010986090 CEST133753050176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:17.719335079 CEST530521337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:17.922853947 CEST133753052176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:21.012527943 CEST530541337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:22.024215937 CEST530541337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:22.225367069 CEST133753054176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:22.924942017 CEST530561337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:23.132227898 CEST133753056176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:27.227505922 CEST530581337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:27.429224968 CEST133753058176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:28.134377956 CEST530601337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:28.336328983 CEST133753060176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:32.431395054 CEST530621337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:32.632860899 CEST133753062176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:33.338630915 CEST530641337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:33.543373108 CEST133753064176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:37.634820938 CEST530661337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:37.834777117 CEST133753066176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:38.545434952 CEST530681337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:38.747863054 CEST133753068176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:42.836935043 CEST530701337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:43.039422989 CEST133753070176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:43.750006914 CEST530721337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:43.953921080 CEST133753072176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:48.041687012 CEST530741337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:48.248966932 CEST133753074176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:48.955594063 CEST530761337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:49.157460928 CEST133753076176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:53.387166023 CEST530781337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:53.589797020 CEST133753078176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:54.159214973 CEST530801337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:54.364088058 CEST133753080176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:58.700491905 CEST530821337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:58.903712034 CEST133753082176.65.144.18192.168.2.14
                          Apr 2, 2025 08:29:59.366061926 CEST530841337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:29:59.566909075 CEST133753084176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:03.905771971 CEST530861337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:04.107789993 CEST133753086176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:04.568520069 CEST530881337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:04.771744013 CEST133753088176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:09.109946966 CEST530901337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:09.316880941 CEST133753090176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:09.773724079 CEST530921337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:09.979935884 CEST133753092176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:14.318425894 CEST530941337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:14.522289038 CEST133753094176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:14.981600046 CEST530961337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:15.188591957 CEST133753096176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:19.524014950 CEST530981337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:19.742048979 CEST133753098176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:20.190207958 CEST531001337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:20.396405935 CEST133753100176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:24.743410110 CEST531021337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:24.946477890 CEST133753102176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:25.398087025 CEST531041337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:25.602794886 CEST133753104176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:29.947915077 CEST531061337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:30.154206038 CEST133753106176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:30.604531050 CEST531081337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:30.810424089 CEST133753108176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:35.155627012 CEST531101337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:35.360522032 CEST133753110176.65.144.18192.168.2.14
                          Apr 2, 2025 08:30:35.812351942 CEST531121337192.168.2.14176.65.144.18
                          Apr 2, 2025 08:30:36.014853954 CEST133753112176.65.144.18192.168.2.14
                          TimestampSource PortDest PortSource IPDest IP
                          Apr 2, 2025 08:29:50.352468967 CEST3675653192.168.2.141.1.1.1
                          Apr 2, 2025 08:29:50.352468967 CEST3630553192.168.2.141.1.1.1
                          Apr 2, 2025 08:29:50.455918074 CEST53363051.1.1.1192.168.2.14
                          Apr 2, 2025 08:29:50.456137896 CEST53367561.1.1.1192.168.2.14
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Apr 2, 2025 08:29:50.352468967 CEST192.168.2.141.1.1.10xa2e9Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                          Apr 2, 2025 08:29:50.352468967 CEST192.168.2.141.1.1.10xd73cStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Apr 2, 2025 08:29:50.456137896 CEST1.1.1.1192.168.2.140xa2e9No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                          Apr 2, 2025 08:29:50.456137896 CEST1.1.1.1192.168.2.140xa2e9No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                          System Behavior

                          Start time (UTC):06:27:04
                          Start date (UTC):02/04/2025
                          Path:/tmp/FBI.ppc.elf
                          Arguments:/tmp/FBI.ppc.elf
                          File size:5388968 bytes
                          MD5 hash:ae65271c943d3451b7f026d1fadccea6

                          Start time (UTC):06:27:04
                          Start date (UTC):02/04/2025
                          Path:/tmp/FBI.ppc.elf
                          Arguments:-
                          File size:5388968 bytes
                          MD5 hash:ae65271c943d3451b7f026d1fadccea6

                          Start time (UTC):06:27:04
                          Start date (UTC):02/04/2025
                          Path:/tmp/FBI.ppc.elf
                          Arguments:-
                          File size:5388968 bytes
                          MD5 hash:ae65271c943d3451b7f026d1fadccea6

                          Start time (UTC):06:27:04
                          Start date (UTC):02/04/2025
                          Path:/tmp/FBI.ppc.elf
                          Arguments:-
                          File size:5388968 bytes
                          MD5 hash:ae65271c943d3451b7f026d1fadccea6

                          Start time (UTC):06:27:04
                          Start date (UTC):02/04/2025
                          Path:/tmp/FBI.ppc.elf
                          Arguments:-
                          File size:5388968 bytes
                          MD5 hash:ae65271c943d3451b7f026d1fadccea6

                          Start time (UTC):06:27:04
                          Start date (UTC):02/04/2025
                          Path:/tmp/FBI.ppc.elf
                          Arguments:-
                          File size:5388968 bytes
                          MD5 hash:ae65271c943d3451b7f026d1fadccea6

                          Start time (UTC):06:27:06
                          Start date (UTC):02/04/2025
                          Path:/tmp/FBI.ppc.elf
                          Arguments:-
                          File size:5388968 bytes
                          MD5 hash:ae65271c943d3451b7f026d1fadccea6

                          Start time (UTC):06:27:06
                          Start date (UTC):02/04/2025
                          Path:/tmp/FBI.ppc.elf
                          Arguments:-
                          File size:5388968 bytes
                          MD5 hash:ae65271c943d3451b7f026d1fadccea6