Linux
Analysis Report
FBI.ppc.elf
Overview
General Information
Detection
Gafgyt, Mirai
Score: | 80 |
Range: | 0 - 100 |
Signatures
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Gafgyt
Yara detected Mirai
Detected TCP or UDP traffic on non-standard ports
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings that are user agent strings indicative of HTTP manipulation
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1654265 |
Start date and time: | 2025-04-02 08:26:15 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 2s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | FBI.ppc.elf |
Detection: | MAL |
Classification: | mal80.troj.linELF@0/0@2/0 |
Command: | /tmp/FBI.ppc.elf |
PID: | 5490 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: |
- system is lnxubuntu20
- FBI.ppc.elf New Fork (PID: 5492, Parent: 5490)
- FBI.ppc.elf New Fork (PID: 5494, Parent: 5490)
- FBI.ppc.elf New Fork (PID: 5496, Parent: 5494)
- FBI.ppc.elf New Fork (PID: 5498, Parent: 5496)
- FBI.ppc.elf New Fork (PID: 5500, Parent: 5498)
- FBI.ppc.elf New Fork (PID: 5502, Parent: 5494)
- FBI.ppc.elf New Fork (PID: 5504, Parent: 5502)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Bashlite, Gafgyt | Bashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Gafgyt | Yara detected Gafgyt | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Linux_Trojan_Gafgyt_28a2fe0c | unknown | unknown |
| |
Linux_Trojan_Gafgyt_ea92cca8 | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Gafgyt | Yara detected Gafgyt | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Linux_Trojan_Gafgyt_28a2fe0c | unknown | unknown |
| |
Linux_Trojan_Gafgyt_ea92cca8 | unknown | unknown |
| |
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Click to see the 2 entries |
⊘No Suricata rule has matched
- • AV Detection
- • Networking
- • System Summary
- • Malware Analysis System Evasion
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: |
Source: | .symtab present: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | Direct Volume Access | OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 1 Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Application Layer Protocol | Traffic Duplication | Data Destruction |
⊘No configs have been found
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
64% | Virustotal | Browse | ||
64% | ReversingLabs | Linux.Backdoor.Gafgyt | ||
100% | Avira | EXP/ELF.Mirai.Z |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
daisy.ubuntu.com | 162.213.35.24 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
176.65.144.18 | unknown | Germany | 12975 | PALTEL-ASPALTELAutonomousSystemPS | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
176.65.144.18 | Get hash | malicious | Gafgyt, Mirai | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
daisy.ubuntu.com | Get hash | malicious | Gafgyt, Mirai | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
PALTEL-ASPALTELAutonomousSystemPS | Get hash | malicious | Gafgyt, Mirai | Browse |
| |
Get hash | malicious | Amadey | Browse |
| ||
Get hash | malicious | Amadey | Browse |
| ||
Get hash | malicious | Amadey | Browse |
| ||
Get hash | malicious | Amadey | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
⊘No context
⊘No context
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 6.235021490471917 |
TrID: |
|
File name: | FBI.ppc.elf |
File size: | 107'848 bytes |
MD5: | e22244cc38378ba3a46adcba90fce5e3 |
SHA1: | 361ab9694799de2bf69dd5960f4a8f466de9ce35 |
SHA256: | 95b3ab821453f7944f5c98de0da2d9bc48331e3611cc4d20deeacbbbf326564d |
SHA512: | 18e757e672c3398e73c09c5e3976b9e20fd72b226834c84cbe922a4dcc68c00a16ef437e138a268301a1b660cb0a9b6fc59fd783e77e6e21f4987c044fa2bcef |
SSDEEP: | 3072:BuwEO0ZtH4UiWorsf3IhUukStG+wRt5hKpu4:BuwEpYrsPSgwG++5h/4 |
TLSH: | 7AB319037B0E0F83D1533DF02A7F2BF1979ABEE215A4A184651EBDC062719B32595ED8 |
File Content Preview: | .ELF...........................4.........4. ...(..........................................................j.........dt.Q.............................!..|......$H...H.6....$8!. |...N.. .!..|.......?..........h..../...@..\?........+../...A..$8...})......N.. |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 107248 |
Section Header Size: | 40 |
Number of Section Headers: | 15 |
Header String Table Index: | 14 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x10000094 | 0x94 | 0x24 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.text | PROGBITS | 0x100000b8 | 0xb8 | 0x13738 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.fini | PROGBITS | 0x100137f0 | 0x137f0 | 0x20 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.rodata | PROGBITS | 0x10013810 | 0x13810 | 0x4f94 | 0x0 | 0x2 | A | 0 | 0 | 8 |
.eh_frame | PROGBITS | 0x100187a4 | 0x187a4 | 0x4 | 0x0 | 0x2 | A | 0 | 0 | 4 |
.ctors | PROGBITS | 0x10029000 | 0x19000 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.dtors | PROGBITS | 0x10029008 | 0x19008 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.jcr | PROGBITS | 0x10029010 | 0x19010 | 0x4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x10029018 | 0x19018 | 0x458 | 0x0 | 0x3 | WA | 0 | 0 | 8 |
.sdata | PROGBITS | 0x10029470 | 0x19470 | 0x40 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.sbss | NOBITS | 0x100294b0 | 0x194b0 | 0xb8 | 0x0 | 0x3 | WA | 0 | 0 | 8 |
.bss | NOBITS | 0x10029568 | 0x194b0 | 0x653c | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.comment | PROGBITS | 0x0 | 0x194b0 | 0xdda | 0x0 | 0x0 | 0 | 0 | 1 | |
.shstrtab | STRTAB | 0x0 | 0x1a28a | 0x63 | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x10000000 | 0x10000000 | 0x187a8 | 0x187a8 | 6.3222 | 0x5 | R E | 0x10000 | .init .text .fini .rodata .eh_frame | |
LOAD | 0x19000 | 0x10029000 | 0x10029000 | 0x4b0 | 0x6aa4 | 3.5129 | 0x6 | RW | 0x10000 | .ctors .dtors .jcr .data .sdata .sbss .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x4 |
Download Network PCAP: filtered – full
- Total Packets: 85
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 2, 2025 08:27:05.641155005 CEST | 52950 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:05.841433048 CEST | 1337 | 52950 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:07.580126047 CEST | 52952 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:07.783435106 CEST | 1337 | 52952 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:10.844573021 CEST | 52954 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:11.045351982 CEST | 1337 | 52954 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:12.785670042 CEST | 52956 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:12.988159895 CEST | 1337 | 52956 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:16.047334909 CEST | 52958 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:16.253302097 CEST | 1337 | 52958 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:17.989962101 CEST | 52960 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:18.193393946 CEST | 1337 | 52960 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:21.255445004 CEST | 52962 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:21.459537029 CEST | 1337 | 52962 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:23.196026087 CEST | 52964 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:23.397445917 CEST | 1337 | 52964 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:26.461872101 CEST | 52966 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:26.662625074 CEST | 1337 | 52966 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:28.399600983 CEST | 52968 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:28.601454020 CEST | 1337 | 52968 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:31.665560961 CEST | 52970 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:31.866852999 CEST | 1337 | 52970 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:33.603811026 CEST | 52972 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:33.807022095 CEST | 1337 | 52972 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:36.869380951 CEST | 52974 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:37.074172020 CEST | 1337 | 52974 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:38.809959888 CEST | 52976 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:39.011315107 CEST | 1337 | 52976 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:42.076376915 CEST | 52978 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:42.281856060 CEST | 1337 | 52978 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:44.013602972 CEST | 52980 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:44.215799093 CEST | 1337 | 52980 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:47.284218073 CEST | 52982 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:47.489614964 CEST | 1337 | 52982 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:49.218453884 CEST | 52984 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:49.422041893 CEST | 1337 | 52984 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:52.491889954 CEST | 52986 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:52.695096970 CEST | 1337 | 52986 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:54.424210072 CEST | 52988 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:54.626620054 CEST | 1337 | 52988 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:57.697504997 CEST | 52990 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:57.901278019 CEST | 1337 | 52990 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:27:59.628635883 CEST | 52992 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:27:59.838507891 CEST | 1337 | 52992 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:02.903328896 CEST | 52994 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:03.108382940 CEST | 1337 | 52994 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:04.841263056 CEST | 52996 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:05.044673920 CEST | 1337 | 52996 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:08.110785961 CEST | 52998 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:08.313810110 CEST | 1337 | 52998 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:10.047209978 CEST | 53000 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:10.250277996 CEST | 1337 | 53000 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:13.315869093 CEST | 53002 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:13.518080950 CEST | 1337 | 53002 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:15.252003908 CEST | 53004 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:15.451936007 CEST | 1337 | 53004 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:18.520018101 CEST | 53006 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:18.721086979 CEST | 1337 | 53006 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:20.453651905 CEST | 53008 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:20.656006098 CEST | 1337 | 53008 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:23.722888947 CEST | 53010 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:23.924834967 CEST | 1337 | 53010 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:25.658113003 CEST | 53012 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:25.858782053 CEST | 1337 | 53012 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:28.927021980 CEST | 53014 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:29.128288984 CEST | 1337 | 53014 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:30.861242056 CEST | 53016 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:31.063944101 CEST | 1337 | 53016 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:34.130471945 CEST | 53018 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:34.352961063 CEST | 1337 | 53018 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:36.065789938 CEST | 53020 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:36.270772934 CEST | 1337 | 53020 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:39.354572058 CEST | 53022 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:39.574234009 CEST | 1337 | 53022 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:41.272521973 CEST | 53024 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:41.474018097 CEST | 1337 | 53024 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:44.575908899 CEST | 53026 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:44.777955055 CEST | 1337 | 53026 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:46.475649118 CEST | 53028 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:46.678075075 CEST | 1337 | 53028 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:49.780107975 CEST | 53030 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:49.980787039 CEST | 1337 | 53030 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:51.679538012 CEST | 53032 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:51.881253004 CEST | 1337 | 53032 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:54.983081102 CEST | 53034 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:55.186336040 CEST | 1337 | 53034 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:28:56.883285999 CEST | 53036 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:28:57.086287022 CEST | 1337 | 53036 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:00.188184023 CEST | 53038 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:00.393172979 CEST | 1337 | 53038 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:02.088448048 CEST | 53040 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:02.295721054 CEST | 1337 | 53040 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:05.394892931 CEST | 53042 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:05.595557928 CEST | 1337 | 53042 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:07.297744036 CEST | 53044 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:07.507652044 CEST | 1337 | 53044 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:10.596807957 CEST | 53046 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:10.803155899 CEST | 1337 | 53046 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:12.509576082 CEST | 53048 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:12.717483997 CEST | 1337 | 53048 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:15.804495096 CEST | 53050 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:16.010986090 CEST | 1337 | 53050 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:17.719335079 CEST | 53052 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:17.922853947 CEST | 1337 | 53052 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:21.012527943 CEST | 53054 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:22.024215937 CEST | 53054 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:22.225367069 CEST | 1337 | 53054 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:22.924942017 CEST | 53056 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:23.132227898 CEST | 1337 | 53056 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:27.227505922 CEST | 53058 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:27.429224968 CEST | 1337 | 53058 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:28.134377956 CEST | 53060 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:28.336328983 CEST | 1337 | 53060 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:32.431395054 CEST | 53062 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:32.632860899 CEST | 1337 | 53062 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:33.338630915 CEST | 53064 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:33.543373108 CEST | 1337 | 53064 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:37.634820938 CEST | 53066 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:37.834777117 CEST | 1337 | 53066 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:38.545434952 CEST | 53068 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:38.747863054 CEST | 1337 | 53068 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:42.836935043 CEST | 53070 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:43.039422989 CEST | 1337 | 53070 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:43.750006914 CEST | 53072 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:43.953921080 CEST | 1337 | 53072 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:48.041687012 CEST | 53074 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:48.248966932 CEST | 1337 | 53074 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:48.955594063 CEST | 53076 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:49.157460928 CEST | 1337 | 53076 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:53.387166023 CEST | 53078 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:53.589797020 CEST | 1337 | 53078 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:54.159214973 CEST | 53080 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:54.364088058 CEST | 1337 | 53080 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:58.700491905 CEST | 53082 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:58.903712034 CEST | 1337 | 53082 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:29:59.366061926 CEST | 53084 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:29:59.566909075 CEST | 1337 | 53084 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:03.905771971 CEST | 53086 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:04.107789993 CEST | 1337 | 53086 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:04.568520069 CEST | 53088 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:04.771744013 CEST | 1337 | 53088 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:09.109946966 CEST | 53090 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:09.316880941 CEST | 1337 | 53090 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:09.773724079 CEST | 53092 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:09.979935884 CEST | 1337 | 53092 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:14.318425894 CEST | 53094 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:14.522289038 CEST | 1337 | 53094 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:14.981600046 CEST | 53096 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:15.188591957 CEST | 1337 | 53096 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:19.524014950 CEST | 53098 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:19.742048979 CEST | 1337 | 53098 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:20.190207958 CEST | 53100 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:20.396405935 CEST | 1337 | 53100 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:24.743410110 CEST | 53102 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:24.946477890 CEST | 1337 | 53102 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:25.398087025 CEST | 53104 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:25.602794886 CEST | 1337 | 53104 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:29.947915077 CEST | 53106 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:30.154206038 CEST | 1337 | 53106 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:30.604531050 CEST | 53108 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:30.810424089 CEST | 1337 | 53108 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:35.155627012 CEST | 53110 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:35.360522032 CEST | 1337 | 53110 | 176.65.144.18 | 192.168.2.14 |
Apr 2, 2025 08:30:35.812351942 CEST | 53112 | 1337 | 192.168.2.14 | 176.65.144.18 |
Apr 2, 2025 08:30:36.014853954 CEST | 1337 | 53112 | 176.65.144.18 | 192.168.2.14 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 2, 2025 08:29:50.352468967 CEST | 36756 | 53 | 192.168.2.14 | 1.1.1.1 |
Apr 2, 2025 08:29:50.352468967 CEST | 36305 | 53 | 192.168.2.14 | 1.1.1.1 |
Apr 2, 2025 08:29:50.455918074 CEST | 53 | 36305 | 1.1.1.1 | 192.168.2.14 |
Apr 2, 2025 08:29:50.456137896 CEST | 53 | 36756 | 1.1.1.1 | 192.168.2.14 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 2, 2025 08:29:50.352468967 CEST | 192.168.2.14 | 1.1.1.1 | 0xa2e9 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 2, 2025 08:29:50.352468967 CEST | 192.168.2.14 | 1.1.1.1 | 0xd73c | Standard query (0) | 28 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 2, 2025 08:29:50.456137896 CEST | 1.1.1.1 | 192.168.2.14 | 0xa2e9 | No error (0) | 162.213.35.24 | A (IP address) | IN (0x0001) | false | ||
Apr 2, 2025 08:29:50.456137896 CEST | 1.1.1.1 | 192.168.2.14 | 0xa2e9 | No error (0) | 162.213.35.25 | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 06:27:04 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.ppc.elf |
Arguments: | /tmp/FBI.ppc.elf |
File size: | 5388968 bytes |
MD5 hash: | ae65271c943d3451b7f026d1fadccea6 |
Start time (UTC): | 06:27:04 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.ppc.elf |
Arguments: | - |
File size: | 5388968 bytes |
MD5 hash: | ae65271c943d3451b7f026d1fadccea6 |
Start time (UTC): | 06:27:04 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.ppc.elf |
Arguments: | - |
File size: | 5388968 bytes |
MD5 hash: | ae65271c943d3451b7f026d1fadccea6 |
Start time (UTC): | 06:27:04 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.ppc.elf |
Arguments: | - |
File size: | 5388968 bytes |
MD5 hash: | ae65271c943d3451b7f026d1fadccea6 |
Start time (UTC): | 06:27:04 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.ppc.elf |
Arguments: | - |
File size: | 5388968 bytes |
MD5 hash: | ae65271c943d3451b7f026d1fadccea6 |
Start time (UTC): | 06:27:04 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.ppc.elf |
Arguments: | - |
File size: | 5388968 bytes |
MD5 hash: | ae65271c943d3451b7f026d1fadccea6 |
Start time (UTC): | 06:27:06 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.ppc.elf |
Arguments: | - |
File size: | 5388968 bytes |
MD5 hash: | ae65271c943d3451b7f026d1fadccea6 |
Start time (UTC): | 06:27:06 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.ppc.elf |
Arguments: | - |
File size: | 5388968 bytes |
MD5 hash: | ae65271c943d3451b7f026d1fadccea6 |