Linux
Analysis Report
FBI.arm7.elf
Overview
General Information
Sample name: | FBI.arm7.elf |
Analysis ID: | 1654267 |
MD5: | 378b09df9a9968c82244c20384a08273 |
SHA1: | d0aa9090227d5925eb4111fdc4d37311fbb25e47 |
SHA256: | 7d86d8a3c9db41dff194c8183ddab9e662cb990aefdd3ffdd8109d3eb13a474a |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Gafgyt, Mirai
Score: | 80 |
Range: | 0 - 100 |
Signatures
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Gafgyt
Yara detected Mirai
Detected TCP or UDP traffic on non-standard ports
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads system version information
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings that are user agent strings indicative of HTTP manipulation
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1654267 |
Start date and time: | 2025-04-02 08:30:18 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 31s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | FBI.arm7.elf |
Detection: | MAL |
Classification: | mal80.troj.linELF@0/0@3/0 |
Command: | /tmp/FBI.arm7.elf |
PID: | 5709 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: | qemu: uncaught target signal 11 (Segmentation fault) - core dumped qemu: uncaught target signal 8 (Floating point exception) - core dumped qemu: uncaught target signal 8 (Floating point exception) - core dumped qemu: uncaught target signal 8 (Floating point exception) - core dumped qemu: uncaught target signal 8 (Floating point exception) - core dumped |
- system is lnxubuntu20
- FBI.arm7.elf New Fork (PID: 5711, Parent: 5709)
- FBI.arm7.elf New Fork (PID: 5713, Parent: 5709)
- FBI.arm7.elf New Fork (PID: 5715, Parent: 5713)
- FBI.arm7.elf New Fork (PID: 5717, Parent: 5715)
- FBI.arm7.elf New Fork (PID: 5719, Parent: 5717)
- FBI.arm7.elf New Fork (PID: 5748, Parent: 5713)
- FBI.arm7.elf New Fork (PID: 5750, Parent: 5748)
- systemd New Fork (PID: 5789, Parent: 1)
- snap-failure New Fork (PID: 5803, Parent: 5789)
- snap-failure New Fork (PID: 5804, Parent: 5789)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Bashlite, Gafgyt | Bashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Gafgyt | Yara detected Gafgyt | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Linux_Trojan_Gafgyt_28a2fe0c | unknown | unknown |
| |
Linux_Trojan_Gafgyt_ea92cca8 | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Gafgyt | Yara detected Gafgyt | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Linux_Trojan_Gafgyt_28a2fe0c | unknown | unknown |
| |
Linux_Trojan_Gafgyt_ea92cca8 | unknown | unknown |
| |
JoeSecurity_Gafgyt | Yara detected Gafgyt | Joe Security | ||
Click to see the 37 entries |
⊘No Suricata rule has matched
- • AV Detection
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Malware Analysis System Evasion
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: |
Source: | .symtab present: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Systemctl executable: | Jump to behavior |
Source: | Reads version info: | Jump to behavior |
Source: | Stderr: qemu: uncaught target signal 11 (Segmentation fault) - core dumpedqemu: uncaught target signal 8 (Floating point exception) - core dumpedqemu: uncaught target signal 8 (Floating point exception) - core dumpedqemu: uncaught target signal 8 (Floating point exception) - core dumpedqemu: uncaught target signal 8 (Floating point exception) - core dumped: |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: | ||
Source: | User agent string found: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Systemd Service | 1 Systemd Service | Direct Volume Access | OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 1 Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | 1 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 1 Application Layer Protocol | Traffic Duplication | Data Destruction |
⊘No configs have been found
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
63% | Virustotal | Browse | ||
64% | ReversingLabs | Linux.Trojan.Gafgyt | ||
100% | Avira | EXP/ELF.Mirai.Z |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
daisy.ubuntu.com | 162.213.35.25 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
176.65.144.18 | unknown | Germany | 12975 | PALTEL-ASPALTELAutonomousSystemPS | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
176.65.144.18 | Get hash | malicious | Gafgyt, Mirai | Browse | ||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
daisy.ubuntu.com | Get hash | malicious | Gafgyt, Mirai | Browse |
| |
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
PALTEL-ASPALTELAutonomousSystemPS | Get hash | malicious | Gafgyt, Mirai | Browse |
| |
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Amadey | Browse |
| ||
Get hash | malicious | Amadey | Browse |
| ||
Get hash | malicious | Amadey | Browse |
| ||
Get hash | malicious | Amadey | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
⊘No context
⊘No context
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 6.260684471250833 |
TrID: |
|
File name: | FBI.arm7.elf |
File size: | 129'968 bytes |
MD5: | 378b09df9a9968c82244c20384a08273 |
SHA1: | d0aa9090227d5925eb4111fdc4d37311fbb25e47 |
SHA256: | 7d86d8a3c9db41dff194c8183ddab9e662cb990aefdd3ffdd8109d3eb13a474a |
SHA512: | ea45a1eecbafbb2e0e427d3bceb111803b2b7aed23e873460243af18f5e592cb79030262f99273819cb746920ac888d940514de78b61d08d852f8abd574fc53e |
SSDEEP: | 3072:96na6nlJosoawDh6iNwaVBgqO7sCk3Xr5h/pc1n:9Sa6nlesoawF6iNwaLgYCk375ha1n |
TLSH: | 14C32917F9419F42C1C325BAFB8E964933136FF8E3EB7102D9249F60278699B0E76941 |
File Content Preview: | .ELF..............(.........4...........4. ...(........ph...hd..hd.. ... ........................................................... ....w..........................................Q.td..................................-...L..................G.F.G.F.G.F.G. |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 5 |
Section Header Offset: | 129208 |
Section Header Size: | 40 |
Number of Section Headers: | 19 |
Header String Table Index: | 18 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x80d4 | 0xd4 | 0x10 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.text | PROGBITS | 0x80f0 | 0xf0 | 0x195ec | 0x0 | 0x6 | AX | 0 | 0 | 16 |
.fini | PROGBITS | 0x216dc | 0x196dc | 0x10 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.rodata | PROGBITS | 0x216f0 | 0x196f0 | 0x4d60 | 0x0 | 0x2 | A | 0 | 0 | 8 |
.ARM.extab | PROGBITS | 0x26450 | 0x1e450 | 0x18 | 0x0 | 0x2 | A | 0 | 0 | 4 |
.ARM.exidx | ARM_EXIDX | 0x26468 | 0x1e468 | 0x120 | 0x0 | 0x82 | AL | 2 | 0 | 4 |
.eh_frame | PROGBITS | 0x2e588 | 0x1e588 | 0x4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.tbss | NOBITS | 0x2e58c | 0x1e58c | 0x8 | 0x0 | 0x403 | WAT | 0 | 0 | 4 |
.init_array | INIT_ARRAY | 0x2e58c | 0x1e58c | 0x4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.fini_array | FINI_ARRAY | 0x2e590 | 0x1e590 | 0x4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.jcr | PROGBITS | 0x2e594 | 0x1e594 | 0x4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data.rel.ro | PROGBITS | 0x2e598 | 0x1e598 | 0x18 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.got | PROGBITS | 0x2e5b0 | 0x1e5b0 | 0xb8 | 0x4 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x2e668 | 0x1e668 | 0x340 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.bss | NOBITS | 0x2e9a8 | 0x1e9a8 | 0x73c0 | 0x0 | 0x3 | WA | 0 | 0 | 8 |
.comment | PROGBITS | 0x0 | 0x1e9a8 | 0xe5c | 0x0 | 0x0 | 0 | 0 | 1 | |
.ARM.attributes | ARM_ATTRIBUTES | 0x0 | 0x1f804 | 0x16 | 0x0 | 0x0 | 0 | 0 | 1 | |
.shstrtab | STRTAB | 0x0 | 0x1f81a | 0x9e | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
EXIDX | 0x1e468 | 0x26468 | 0x26468 | 0x120 | 0x120 | 4.5361 | 0x4 | R | 0x4 | .ARM.exidx | |
LOAD | 0x0 | 0x8000 | 0x8000 | 0x1e588 | 0x1e588 | 6.2481 | 0x5 | R E | 0x8000 | .init .text .fini .rodata .ARM.extab .ARM.exidx | |
LOAD | 0x1e588 | 0x2e588 | 0x2e588 | 0x420 | 0x77e0 | 4.2245 | 0x6 | RW | 0x8000 | .eh_frame .tbss .init_array .fini_array .jcr .data.rel.ro .got .data .bss | |
TLS | 0x1e58c | 0x2e58c | 0x2e58c | 0x0 | 0x8 | 0.0000 | 0x4 | R | 0x4 | .tbss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x7 | RWE | 0x4 |
Download Network PCAP: filtered – full
- Total Packets: 59
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 2, 2025 08:31:55.952306032 CEST | 33840 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:31:56.154722929 CEST | 1337 | 33840 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:31:57.835736990 CEST | 33842 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:31:58.039297104 CEST | 1337 | 33842 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:01.157241106 CEST | 33844 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:01.364183903 CEST | 1337 | 33844 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:02.923074007 CEST | 34806 | 53 | 192.168.2.13 | 8.8.8.8 |
Apr 2, 2025 08:32:03.016726017 CEST | 53 | 34806 | 8.8.8.8 | 192.168.2.13 |
Apr 2, 2025 08:32:03.016840935 CEST | 34806 | 53 | 192.168.2.13 | 8.8.8.8 |
Apr 2, 2025 08:32:03.016840935 CEST | 34806 | 53 | 192.168.2.13 | 8.8.8.8 |
Apr 2, 2025 08:32:03.045532942 CEST | 33848 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:03.109834909 CEST | 53 | 34806 | 8.8.8.8 | 192.168.2.13 |
Apr 2, 2025 08:32:03.109858036 CEST | 53 | 34806 | 8.8.8.8 | 192.168.2.13 |
Apr 2, 2025 08:32:03.109950066 CEST | 34806 | 53 | 192.168.2.13 | 8.8.8.8 |
Apr 2, 2025 08:32:03.251539946 CEST | 1337 | 33848 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:05.110707045 CEST | 53 | 34806 | 8.8.8.8 | 192.168.2.13 |
Apr 2, 2025 08:32:05.111022949 CEST | 34806 | 53 | 192.168.2.13 | 8.8.8.8 |
Apr 2, 2025 08:32:05.204587936 CEST | 53 | 34806 | 8.8.8.8 | 192.168.2.13 |
Apr 2, 2025 08:32:06.366365910 CEST | 33850 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:06.575836897 CEST | 1337 | 33850 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:08.253846884 CEST | 33852 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:09.282469034 CEST | 33852 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:09.485014915 CEST | 1337 | 33852 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:11.578757048 CEST | 33854 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:11.781352043 CEST | 1337 | 33854 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:14.488671064 CEST | 33856 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:14.693958044 CEST | 1337 | 33856 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:16.784213066 CEST | 33858 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:16.987251997 CEST | 1337 | 33858 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:19.696657896 CEST | 33860 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:19.902884007 CEST | 1337 | 33860 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:21.991225958 CEST | 33862 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:22.192692041 CEST | 1337 | 33862 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:24.905704975 CEST | 33864 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:25.110260010 CEST | 1337 | 33864 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:27.195697069 CEST | 33866 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:27.395615101 CEST | 1337 | 33866 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:30.113235950 CEST | 33868 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:30.319171906 CEST | 1337 | 33868 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:32.399178028 CEST | 33870 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:32.600636959 CEST | 1337 | 33870 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:35.321360111 CEST | 33872 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:35.524065018 CEST | 1337 | 33872 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:37.603188992 CEST | 33874 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:37.806546926 CEST | 1337 | 33874 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:40.528832912 CEST | 33876 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:40.732161045 CEST | 1337 | 33876 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:42.809113026 CEST | 33878 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:43.014406919 CEST | 1337 | 33878 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:45.734280109 CEST | 33880 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:45.941838026 CEST | 1337 | 33880 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:48.017702103 CEST | 33882 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:48.219129086 CEST | 1337 | 33882 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:50.944508076 CEST | 33884 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:51.150919914 CEST | 1337 | 33884 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:53.222870111 CEST | 33886 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:53.427386045 CEST | 1337 | 33886 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:56.153346062 CEST | 33888 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:56.360640049 CEST | 1337 | 33888 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:32:58.430039883 CEST | 33890 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:32:58.633697033 CEST | 1337 | 33890 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:01.363116980 CEST | 33892 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:01.569765091 CEST | 1337 | 33892 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:03.636519909 CEST | 33894 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:03.843923092 CEST | 1337 | 33894 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:06.572329998 CEST | 33896 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:06.774488926 CEST | 1337 | 33896 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:08.846873045 CEST | 33898 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:09.053648949 CEST | 1337 | 33898 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:11.776556015 CEST | 33900 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:11.983728886 CEST | 1337 | 33900 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:14.056488037 CEST | 33902 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:14.262451887 CEST | 1337 | 33902 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:16.986232042 CEST | 33904 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:17.192358017 CEST | 1337 | 33904 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:19.265249014 CEST | 33906 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:19.468583107 CEST | 1337 | 33906 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:22.195203066 CEST | 33908 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:22.401829004 CEST | 1337 | 33908 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:24.471024036 CEST | 33910 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:24.672873020 CEST | 1337 | 33910 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:27.404328108 CEST | 33912 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:27.607817888 CEST | 1337 | 33912 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:29.675515890 CEST | 33914 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:29.881536007 CEST | 1337 | 33914 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:32.609652042 CEST | 33916 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:32.818730116 CEST | 1337 | 33916 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:34.884450912 CEST | 33918 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:35.088314056 CEST | 1337 | 33918 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:37.820892096 CEST | 33920 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:38.022183895 CEST | 1337 | 33920 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:40.091552973 CEST | 33922 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:40.299998999 CEST | 1337 | 33922 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:43.024741888 CEST | 33924 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:43.228147984 CEST | 1337 | 33924 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:45.303045034 CEST | 33926 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:45.511409044 CEST | 1337 | 33926 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:48.230758905 CEST | 33928 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:48.434109926 CEST | 1337 | 33928 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:50.514578104 CEST | 33930 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:50.717905998 CEST | 1337 | 33930 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:53.436748028 CEST | 33932 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:53.640410900 CEST | 1337 | 33932 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:55.720932961 CEST | 33934 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:55.924833059 CEST | 1337 | 33934 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:33:58.642484903 CEST | 33936 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:33:58.850847960 CEST | 1337 | 33936 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:34:00.927551031 CEST | 33938 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:34:01.132467031 CEST | 1337 | 33938 | 176.65.144.18 | 192.168.2.13 |
Apr 2, 2025 08:34:03.853178978 CEST | 33940 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:34:04.866986990 CEST | 33940 | 1337 | 192.168.2.13 | 176.65.144.18 |
Apr 2, 2025 08:34:05.071310043 CEST | 1337 | 33940 | 176.65.144.18 | 192.168.2.13 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 2, 2025 08:31:57.916218042 CEST | 42565 | 53 | 192.168.2.13 | 1.1.1.1 |
Apr 2, 2025 08:31:57.916280985 CEST | 40192 | 53 | 192.168.2.13 | 1.1.1.1 |
Apr 2, 2025 08:31:58.019570112 CEST | 53 | 42565 | 1.1.1.1 | 192.168.2.13 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 2, 2025 08:31:57.916218042 CEST | 192.168.2.13 | 1.1.1.1 | 0xb4ce | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 2, 2025 08:31:57.916280985 CEST | 192.168.2.13 | 1.1.1.1 | 0xf87f | Standard query (0) | 28 | IN (0x0001) | false | |
Apr 2, 2025 08:32:03.016840935 CEST | 192.168.2.13 | 8.8.8.8 | 0xf87f | Standard query (0) | 28 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 2, 2025 08:31:58.019570112 CEST | 1.1.1.1 | 192.168.2.13 | 0xb4ce | No error (0) | 162.213.35.25 | A (IP address) | IN (0x0001) | false | ||
Apr 2, 2025 08:31:58.019570112 CEST | 1.1.1.1 | 192.168.2.13 | 0xb4ce | No error (0) | 162.213.35.24 | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 06:31:55 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.arm7.elf |
Arguments: | /tmp/FBI.arm7.elf |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 06:31:55 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.arm7.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 06:31:55 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.arm7.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 06:31:55 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.arm7.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 06:31:55 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.arm7.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 06:31:55 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.arm7.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 06:31:57 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.arm7.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 06:31:57 |
Start date (UTC): | 02/04/2025 |
Path: | /tmp/FBI.arm7.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 06:32:34 |
Start date (UTC): | 02/04/2025 |
Path: | /usr/lib/systemd/systemd |
Arguments: | - |
File size: | 1620224 bytes |
MD5 hash: | 9b2bec7092a40488108543f9334aab75 |
Start time (UTC): | 06:32:34 |
Start date (UTC): | 02/04/2025 |
Path: | /usr/lib/snapd/snap-failure |
Arguments: | /usr/lib/snapd/snap-failure snapd |
File size: | 4764904 bytes |
MD5 hash: | 69136a7d575731ce62349f2e4d3e5c36 |
Start time (UTC): | 06:32:34 |
Start date (UTC): | 02/04/2025 |
Path: | /usr/lib/snapd/snap-failure |
Arguments: | - |
File size: | 4764904 bytes |
MD5 hash: | 69136a7d575731ce62349f2e4d3e5c36 |
Start time (UTC): | 06:32:34 |
Start date (UTC): | 02/04/2025 |
Path: | /usr/bin/systemctl |
Arguments: | systemctl stop snapd.socket |
File size: | 996584 bytes |
MD5 hash: | 4deddfb6741481f68aeac522cc26ff4b |
Start time (UTC): | 06:32:34 |
Start date (UTC): | 02/04/2025 |
Path: | /usr/lib/snapd/snap-failure |
Arguments: | - |
File size: | 4764904 bytes |
MD5 hash: | 69136a7d575731ce62349f2e4d3e5c36 |