Edit tour

Linux Analysis Report
Space.x86.elf

Overview

General Information

Sample name:Space.x86.elf
Analysis ID:1654322
MD5:d5aab005715cbfd7407eb17dc1fd7d41
SHA1:a239a8fca2ab800b3ea8e1bfb9044ebbc5e6e057
SHA256:9b5db858b55174f21e7f59859310c6e8c4833c30f08277f543f863dbc2062d91
Tags:elfuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Sample contains only a LOAD segment without any section mappings
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1654322
Start date and time:2025-04-02 09:37:36 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:Space.x86.elf
Detection:MAL
Classification:mal60.evad.linELF@0/0@0/0
Command:/tmp/Space.x86.elf
PID:5433
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
lzrd cock fest"/proc/"/exe
Standard Error:
  • system is lnxubuntu20
  • cleanup
SourceRuleDescriptionAuthorStrings
5433.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x10874:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10888:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1089c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10900:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10914:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10928:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1093c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10950:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10964:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10978:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1098c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10a04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
5433.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Mirai_3a56423bunknownunknown
  • 0x8f3b:$a: 24 1C 8B 44 24 20 0F B6 D0 C1 E8 08 89 54 24 24 89 44 24 20 BA 01 00
5433.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Mirai_dab39a25unknownunknown
  • 0x7726:$a: 0E 75 20 50 6A 00 6A 00 6A 00 53 6A 0E FF 74 24 48 68 DD 00
5433.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Mirai_8aa7b5d3unknownunknown
  • 0x7052:$a: 8B 4C 24 14 8B 74 24 0C 8B 5C 24 10 85 C9 74 0D 31 D2 8A 04 1A 88
5445.1.0000000008048000.000000000805b000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
  • 0x10874:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10888:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1089c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108b0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108c4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108d8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x108ec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10900:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10914:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10928:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1093c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10950:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10964:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10978:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x1098c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x109f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
  • 0x10a04:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
Click to see the 15 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Space.x86.elfVirustotal: Detection: 55%Perma Link
Source: Space.x86.elfReversingLabs: Detection: 52%
Source: global trafficTCP traffic: 192.168.2.13:43926 -> 176.65.144.220:3778
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.220
Source: Space.x86.elfString found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: 5433.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5433.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b Author: unknown
Source: 5433.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 Author: unknown
Source: 5433.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5445.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5445.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b Author: unknown
Source: 5445.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 Author: unknown
Source: 5445.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5434.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5434.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b Author: unknown
Source: 5434.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 Author: unknown
Source: 5434.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5435.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5435.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b Author: unknown
Source: 5435.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 Author: unknown
Source: 5435.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: Process Memory Space: Space.x86.elf PID: 5433, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: Space.x86.elf PID: 5434, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: Space.x86.elf PID: 5435, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: Space.x86.elf PID: 5445, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: LOAD without section mappingsProgram segment: 0xc01000
Source: 5433.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5433.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 117d6eb47f000c9d475119ca0e6a1b49a91bbbece858758aaa3d7f30d0777d75, id = 3a56423b-c0cf-4483-87e3-552beb40563a, last_modified = 2021-09-16
Source: 5433.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 reference_sample = 3e02fb63803110cabde08e809cf4acc1b8fb474ace531959a311858fdd578bab, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 5a628d9af9d6dccf29e78f780bb74a2fa25167954c34d4a1529bdea5ea891ac0, id = dab39a25-852b-441f-86ab-23d945daa62c, last_modified = 2022-01-26
Source: 5433.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5445.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5445.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 117d6eb47f000c9d475119ca0e6a1b49a91bbbece858758aaa3d7f30d0777d75, id = 3a56423b-c0cf-4483-87e3-552beb40563a, last_modified = 2021-09-16
Source: 5445.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 reference_sample = 3e02fb63803110cabde08e809cf4acc1b8fb474ace531959a311858fdd578bab, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 5a628d9af9d6dccf29e78f780bb74a2fa25167954c34d4a1529bdea5ea891ac0, id = dab39a25-852b-441f-86ab-23d945daa62c, last_modified = 2022-01-26
Source: 5445.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5434.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5434.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 117d6eb47f000c9d475119ca0e6a1b49a91bbbece858758aaa3d7f30d0777d75, id = 3a56423b-c0cf-4483-87e3-552beb40563a, last_modified = 2021-09-16
Source: 5434.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 reference_sample = 3e02fb63803110cabde08e809cf4acc1b8fb474ace531959a311858fdd578bab, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 5a628d9af9d6dccf29e78f780bb74a2fa25167954c34d4a1529bdea5ea891ac0, id = dab39a25-852b-441f-86ab-23d945daa62c, last_modified = 2022-01-26
Source: 5434.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5435.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5435.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_3a56423b os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 117d6eb47f000c9d475119ca0e6a1b49a91bbbece858758aaa3d7f30d0777d75, id = 3a56423b-c0cf-4483-87e3-552beb40563a, last_modified = 2021-09-16
Source: 5435.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 reference_sample = 3e02fb63803110cabde08e809cf4acc1b8fb474ace531959a311858fdd578bab, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 5a628d9af9d6dccf29e78f780bb74a2fa25167954c34d4a1529bdea5ea891ac0, id = dab39a25-852b-441f-86ab-23d945daa62c, last_modified = 2022-01-26
Source: 5435.1.0000000008048000.000000000805b000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: Process Memory Space: Space.x86.elf PID: 5433, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: Space.x86.elf PID: 5434, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: Space.x86.elf PID: 5435, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: Space.x86.elf PID: 5445, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: classification engineClassification label: mal60.evad.linELF@0/0@0/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/5380/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/230/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/110/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/231/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/111/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/232/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/112/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/233/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/113/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/234/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/114/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/235/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/115/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/236/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/116/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/237/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/117/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/238/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/118/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/239/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/119/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/3631/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/914/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/10/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/917/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/11/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/12/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/13/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/14/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/5275/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/15/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/16/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/17/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/18/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/19/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/240/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/3095/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/120/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/241/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/121/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/242/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/1/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/122/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/243/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/2/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/123/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/244/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/3/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/124/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/245/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/1588/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/125/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/4/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/246/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/126/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/5/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/247/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/127/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/6/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/248/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/128/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/7/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/249/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/129/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/8/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/800/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/9/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/1906/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/802/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/803/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/20/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/21/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/22/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/23/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/24/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/25/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/26/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/27/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/28/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/29/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/3420/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/1482/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/490/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/1480/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/250/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/371/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/130/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/251/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/131/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/252/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/132/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/253/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/254/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/1238/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/134/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/255/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/256/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/257/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/378/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/3413/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/258/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/259/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/1475/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/936/statusJump to behavior
Source: /tmp/Space.x86.elf (PID: 5433)File opened: /proc/30/statusJump to behavior
Source: Space.x86.elfSubmission file: segment LOAD with 7.9631 entropy (max. 8.0)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception11
Obfuscated Files or Information
1
OS Credential Dumping
System Service DiscoveryRemote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1654322 Sample: Space.x86.elf Startdate: 02/04/2025 Architecture: LINUX Score: 60 20 176.65.144.220, 3778, 43926, 43928 PALTEL-ASPALTELAutonomousSystemPS Germany 2->20 22 Malicious sample detected (through community Yara rule) 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Sample is packed with UPX 2->26 8 Space.x86.elf 2->8         started        signatures3 process4 process5 10 Space.x86.elf 8->10         started        12 Space.x86.elf 8->12         started        14 Space.x86.elf 8->14         started        process6 16 Space.x86.elf 10->16         started        18 Space.x86.elf 10->18         started       
SourceDetectionScannerLabelLink
Space.x86.elf55%VirustotalBrowse
Space.x86.elf53%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netSpace.x86.elffalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    176.65.144.220
    unknownGermany
    12975PALTEL-ASPALTELAutonomousSystemPSfalse
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    PALTEL-ASPALTELAutonomousSystemPSFBI.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 176.65.144.18
    FBI.arm.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 176.65.144.18
    FBI.sh4.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 176.65.144.18
    FBI.arm7.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 176.65.144.18
    FBI.x86.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 176.65.144.18
    FBI.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 176.65.144.18
    FBI.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 176.65.144.18
    FBI.ppc.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 176.65.144.18
    FBI.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 176.65.144.18
    clip64.dllGet hashmaliciousAmadeyBrowse
    • 176.65.137.193
    No context
    No context
    No created / dropped files found
    File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
    Entropy (8bit):7.961154542668553
    TrID:
    • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
    • ELF Executable and Linkable format (generic) (4004/1) 49.84%
    File name:Space.x86.elf
    File size:38'740 bytes
    MD5:d5aab005715cbfd7407eb17dc1fd7d41
    SHA1:a239a8fca2ab800b3ea8e1bfb9044ebbc5e6e057
    SHA256:9b5db858b55174f21e7f59859310c6e8c4833c30f08277f543f863dbc2062d91
    SHA512:40581fc6bd83987508a1ca23645df70e322207c391963b2378711fd21823e41bc1b573d2ca12073474c8a537869e2db1239a4cbdc9e23fd5d8476745341397d2
    SSDEEP:768:va+BWS+ZPwIIBPGpssqVuAIrRMvOGnQ55RT7iIUeLgffYyIFgBxutfnbcuyD7Ur1:va+BH+hKBZrhIynQ55BiTeLgffbJKnoK
    TLSH:2A03F252B1FACE05DA6B9373006FF40F3152B539A0A9229A7D88993908C2F565D3C3DF
    File Content Preview:.ELF....................h...4...........4. ...(.....................\...\...........................................Q.td.............................-..UPX!.........2...2......W..........?..k.I/.j....\.R......)..n.4go.|.>#.....{~q..`.mm.XCp.ch....i.E'.)..

    ELF header

    Class:ELF32
    Data:2's complement, little endian
    Version:1 (current)
    Machine:Intel 80386
    Version Number:0x1
    Type:EXEC (Executable file)
    OS/ABI:UNIX - Linux
    ABI Version:0
    Entry Point Address:0xc09468
    Flags:0x0
    ELF Header Size:52
    Program Header Offset:52
    Program Header Size:32
    Number of Program Headers:3
    Section Header Offset:0
    Section Header Size:40
    Number of Section Headers:0
    Header String Table Index:0
    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
    LOAD0x00xc010000xc010000x965c0x965c7.96310x5R E0x1000
    LOAD0xc080x805bc080x805bc080x00x00.00000x6RW 0x1000
    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

    Download Network PCAP: filteredfull

    TimestampSource PortDest PortSource IPDest IP
    Apr 2, 2025 09:38:26.557960987 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:38:26.763981104 CEST377843926176.65.144.220192.168.2.13
    Apr 2, 2025 09:38:26.764101982 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:38:26.764101982 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:38:26.966950893 CEST377843926176.65.144.220192.168.2.13
    Apr 2, 2025 09:38:26.967045069 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:38:27.170413971 CEST377843926176.65.144.220192.168.2.13
    Apr 2, 2025 09:38:32.321173906 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:38:32.523389101 CEST377843928176.65.144.220192.168.2.13
    Apr 2, 2025 09:38:32.523511887 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:38:32.523607016 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:38:32.727453947 CEST377843928176.65.144.220192.168.2.13
    Apr 2, 2025 09:38:32.727583885 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:38:32.927495956 CEST377843928176.65.144.220192.168.2.13
    Apr 2, 2025 09:38:36.769227982 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:38:36.984502077 CEST377843926176.65.144.220192.168.2.13
    Apr 2, 2025 09:38:36.984565973 CEST377843926176.65.144.220192.168.2.13
    Apr 2, 2025 09:38:36.984636068 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:38:42.533705950 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:38:42.734602928 CEST377843928176.65.144.220192.168.2.13
    Apr 2, 2025 09:38:42.734642982 CEST377843928176.65.144.220192.168.2.13
    Apr 2, 2025 09:38:42.734747887 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:38:52.233818054 CEST377843926176.65.144.220192.168.2.13
    Apr 2, 2025 09:38:52.233987093 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:38:58.120964050 CEST377843928176.65.144.220192.168.2.13
    Apr 2, 2025 09:38:58.121251106 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:39:07.441046953 CEST377843926176.65.144.220192.168.2.13
    Apr 2, 2025 09:39:07.441226006 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:39:13.326776028 CEST377843928176.65.144.220192.168.2.13
    Apr 2, 2025 09:39:13.327063084 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:39:22.647020102 CEST377843926176.65.144.220192.168.2.13
    Apr 2, 2025 09:39:22.647135019 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:39:28.531191111 CEST377843928176.65.144.220192.168.2.13
    Apr 2, 2025 09:39:28.531455994 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:39:37.042125940 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:39:37.244961977 CEST377843926176.65.144.220192.168.2.13
    Apr 2, 2025 09:39:37.245095968 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:39:42.765213013 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:39:42.968348980 CEST377843928176.65.144.220192.168.2.13
    Apr 2, 2025 09:39:42.968491077 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:39:52.651370049 CEST377843926176.65.144.220192.168.2.13
    Apr 2, 2025 09:39:52.651587963 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:39:58.284905910 CEST377843928176.65.144.220192.168.2.13
    Apr 2, 2025 09:39:58.285001040 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:40:07.855222940 CEST377843926176.65.144.220192.168.2.13
    Apr 2, 2025 09:40:07.855348110 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:40:13.489921093 CEST377843928176.65.144.220192.168.2.13
    Apr 2, 2025 09:40:13.490077972 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:40:23.057658911 CEST377843926176.65.144.220192.168.2.13
    Apr 2, 2025 09:40:23.057910919 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:40:28.748866081 CEST377843928176.65.144.220192.168.2.13
    Apr 2, 2025 09:40:28.748975992 CEST439283778192.168.2.13176.65.144.220
    Apr 2, 2025 09:40:37.305989027 CEST439263778192.168.2.13176.65.144.220
    Apr 2, 2025 09:40:37.510982037 CEST377843926176.65.144.220192.168.2.13
    Apr 2, 2025 09:40:37.511234999 CEST439263778192.168.2.13176.65.144.220

    System Behavior

    Start time (UTC):07:38:25
    Start date (UTC):02/04/2025
    Path:/tmp/Space.x86.elf
    Arguments:/tmp/Space.x86.elf
    File size:38740 bytes
    MD5 hash:d5aab005715cbfd7407eb17dc1fd7d41

    Start time (UTC):07:38:25
    Start date (UTC):02/04/2025
    Path:/tmp/Space.x86.elf
    Arguments:-
    File size:38740 bytes
    MD5 hash:d5aab005715cbfd7407eb17dc1fd7d41

    Start time (UTC):07:38:25
    Start date (UTC):02/04/2025
    Path:/tmp/Space.x86.elf
    Arguments:-
    File size:38740 bytes
    MD5 hash:d5aab005715cbfd7407eb17dc1fd7d41

    Start time (UTC):07:38:25
    Start date (UTC):02/04/2025
    Path:/tmp/Space.x86.elf
    Arguments:-
    File size:38740 bytes
    MD5 hash:d5aab005715cbfd7407eb17dc1fd7d41
    Start time (UTC):07:38:31
    Start date (UTC):02/04/2025
    Path:/tmp/Space.x86.elf
    Arguments:-
    File size:38740 bytes
    MD5 hash:d5aab005715cbfd7407eb17dc1fd7d41

    Start time (UTC):07:38:31
    Start date (UTC):02/04/2025
    Path:/tmp/Space.x86.elf
    Arguments:-
    File size:38740 bytes
    MD5 hash:d5aab005715cbfd7407eb17dc1fd7d41