Linux
Analysis Report
skid.armv7l.elf
Overview
General Information
Detection
Score: | 60 |
Range: | 0 - 100 |
Signatures
Suricata IDS alerts for network traffic
Connects to many ports of the same IP (likely port scanning)
Performs DNS TXT record lookups
Uses STUN server to do NAT traversial
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1670265 |
Start date and time: | 2025-04-21 13:08:12 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 27s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | skid.armv7l.elf |
Detection: | MAL |
Classification: | mal60.troj.evad.linELF@0/5@2/0 |
Command: | /tmp/skid.armv7l.elf |
PID: | 5552 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | snow slide |
Standard Error: |
- system is lnxubuntu20
- skid.armv7l.elf New Fork (PID: 5554, Parent: 5552)
- skid.armv7l.elf New Fork (PID: 5556, Parent: 5554)
- cleanup
⊘No yara matches
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-21T13:08:57.825436+0200 | 2812067 | 1 | Malware Command and Control Activity Detected | 192.168.2.15 | 57602 | 8.8.8.8 | 53 | UDP |
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Malware Analysis System Evasion
- • HIPS / PFW / Operating System Protection Evasion
Click to jump to signature section
Show All Signature Results
Networking |
---|
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | DNS query: |
Source: | TCP traffic: | ||
Source: | UDP traffic: |
Source: | Socket: | Jump to behavior |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | .symtab present: |
Source: | Classification label: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | DNS traffic detected: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | Direct Volume Access | 1 OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 1 Non-Standard Port | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
⊘No configs have been found
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
8% | ReversingLabs | Linux.Worm.Mirai |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
stun.l.google.com | 74.125.250.129 | true | false | high | |
6mv1eyr328y6due83u3js6whtzuxfyhw.su | unknown | unknown | false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
93.95.115.22 | unknown | Netherlands | 35705 | PELICAN-ICTNL | true | |
74.125.250.129 | stun.l.google.com | United States | 15169 | GOOGLEUS | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
93.95.115.22 | Get hash | malicious | Unknown | Browse |
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
PELICAN-ICTNL | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | CobaltStrike | Browse |
|
⊘No context
⊘No context
Process: | /tmp/skid.armv7l.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 21 |
Entropy (8bit): | 4.011365041826379 |
Encrypted: | false |
SSDEEP: | 3:TgJuEtgl:Tg5tgl |
MD5: | A4CE74F8268011D2644AF20AB79E7627 |
SHA1: | 13CE4F7675DB3BD073DDA202B1E329F079FC6BB6 |
SHA-256: | DC2D298D3317A53FBB7F28632793EEEF7EAF2FB7CF8B1186DF97BF4AFE816EA0 |
SHA-512: | 004FBC3D639FDF61C61A765759A1D7E989ADF2347BC54A454314C5738DE49210F6FB44CC6D718D5105D62E1B2E4E0A2E0C34F1020A09262D39A6CCBC831AE557 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/skid.armv7l.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 21 |
Entropy (8bit): | 4.011365041826379 |
Encrypted: | false |
SSDEEP: | 3:TgJuEtgl:Tg5tgl |
MD5: | A4CE74F8268011D2644AF20AB79E7627 |
SHA1: | 13CE4F7675DB3BD073DDA202B1E329F079FC6BB6 |
SHA-256: | DC2D298D3317A53FBB7F28632793EEEF7EAF2FB7CF8B1186DF97BF4AFE816EA0 |
SHA-512: | 004FBC3D639FDF61C61A765759A1D7E989ADF2347BC54A454314C5738DE49210F6FB44CC6D718D5105D62E1B2E4E0A2E0C34F1020A09262D39A6CCBC831AE557 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/skid.armv7l.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 21 |
Entropy (8bit): | 4.011365041826379 |
Encrypted: | false |
SSDEEP: | 3:TgJuEtgl:Tg5tgl |
MD5: | A4CE74F8268011D2644AF20AB79E7627 |
SHA1: | 13CE4F7675DB3BD073DDA202B1E329F079FC6BB6 |
SHA-256: | DC2D298D3317A53FBB7F28632793EEEF7EAF2FB7CF8B1186DF97BF4AFE816EA0 |
SHA-512: | 004FBC3D639FDF61C61A765759A1D7E989ADF2347BC54A454314C5738DE49210F6FB44CC6D718D5105D62E1B2E4E0A2E0C34F1020A09262D39A6CCBC831AE557 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/skid.armv7l.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 21 |
Entropy (8bit): | 4.011365041826379 |
Encrypted: | false |
SSDEEP: | 3:TgJuEtgl:Tg5tgl |
MD5: | A4CE74F8268011D2644AF20AB79E7627 |
SHA1: | 13CE4F7675DB3BD073DDA202B1E329F079FC6BB6 |
SHA-256: | DC2D298D3317A53FBB7F28632793EEEF7EAF2FB7CF8B1186DF97BF4AFE816EA0 |
SHA-512: | 004FBC3D639FDF61C61A765759A1D7E989ADF2347BC54A454314C5738DE49210F6FB44CC6D718D5105D62E1B2E4E0A2E0C34F1020A09262D39A6CCBC831AE557 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/skid.armv7l.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 21 |
Entropy (8bit): | 4.011365041826379 |
Encrypted: | false |
SSDEEP: | 3:TgJuEtgl:Tg5tgl |
MD5: | A4CE74F8268011D2644AF20AB79E7627 |
SHA1: | 13CE4F7675DB3BD073DDA202B1E329F079FC6BB6 |
SHA-256: | DC2D298D3317A53FBB7F28632793EEEF7EAF2FB7CF8B1186DF97BF4AFE816EA0 |
SHA-512: | 004FBC3D639FDF61C61A765759A1D7E989ADF2347BC54A454314C5738DE49210F6FB44CC6D718D5105D62E1B2E4E0A2E0C34F1020A09262D39A6CCBC831AE557 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.142589189167621 |
TrID: |
|
File name: | skid.armv7l.elf |
File size: | 122'660 bytes |
MD5: | 69bebc09bbfd6a5a3303bde5b1cc855d |
SHA1: | 5bf2e3b9d54d39435936501833771f330aa0ba23 |
SHA256: | 54fef35548fda687a444bc628e7b2c5ca3da1f64e34165f67b6e778956f38e7f |
SHA512: | 8d0836f20895c98f082e46e67a31056600113d269dc611ca89a275950d8b1585ee96ec6f2ddd26772c98856cebde404baab3b54b123bab867a63b855311d1b94 |
SSDEEP: | 3072:TmY6ih2Oz3Y2E0zyaSGqJ3frU00npCxcyIQXu3:Tyd2E9dGUr/0npCxcnQe3 |
TLSH: | 51C31A4DE892AB15C1DA25BAFE5E448D330717FCD3EA71158C111B61A38F94E0F3EA86 |
File Content Preview: | .ELF..............(.........4...........4. ...(........p.....X...X..(...(................................................................1..........................................Q.td..................................-...L..................G.F.G.F.G.F.G. |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 5 |
Section Header Offset: | 122020 |
Section Header Size: | 40 |
Number of Section Headers: | 16 |
Header String Table Index: | 15 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x80d4 | 0xd4 | 0x10 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.text | PROGBITS | 0x80f0 | 0xf0 | 0x1d074 | 0x0 | 0x6 | AX | 0 | 0 | 16 |
.fini | PROGBITS | 0x25164 | 0x1d164 | 0x10 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.rodata | PROGBITS | 0x25174 | 0x1d174 | 0x740 | 0x0 | 0x2 | A | 0 | 0 | 4 |
.ARM.extab | PROGBITS | 0x258b4 | 0x1d8b4 | 0x18 | 0x0 | 0x2 | A | 0 | 0 | 4 |
.ARM.exidx | ARM_EXIDX | 0x258cc | 0x1d8cc | 0x128 | 0x0 | 0x82 | AL | 2 | 0 | 4 |
.eh_frame | PROGBITS | 0x2d9f4 | 0x1d9f4 | 0x4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.tbss | NOBITS | 0x2d9f8 | 0x1d9f8 | 0x8 | 0x0 | 0x403 | WAT | 0 | 0 | 4 |
.init_array | INIT_ARRAY | 0x2d9f8 | 0x1d9f8 | 0x4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.fini_array | FINI_ARRAY | 0x2d9fc | 0x1d9fc | 0x4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.got | PROGBITS | 0x2da04 | 0x1da04 | 0xac | 0x4 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x2dab0 | 0x1dab0 | 0x158 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.bss | NOBITS | 0x2dc08 | 0x1dc08 | 0x2ef0 | 0x0 | 0x3 | WA | 0 | 0 | 8 |
.ARM.attributes | ARM_ATTRIBUTES | 0x0 | 0x1dc08 | 0x16 | 0x0 | 0x0 | 0 | 0 | 1 | |
.shstrtab | STRTAB | 0x0 | 0x1dc1e | 0x83 | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
EXIDX | 0x1d8cc | 0x258cc | 0x258cc | 0x128 | 0x128 | 4.5952 | 0x4 | R | 0x4 | .ARM.exidx | |
LOAD | 0x0 | 0x8000 | 0x8000 | 0x1d9f4 | 0x1d9f4 | 6.1552 | 0x5 | R E | 0x8000 | .init .text .fini .rodata .ARM.extab .ARM.exidx | |
LOAD | 0x1d9f4 | 0x2d9f4 | 0x2d9f4 | 0x214 | 0x3104 | 2.6271 | 0x6 | RW | 0x8000 | .eh_frame .tbss .init_array .fini_array .got .data .bss | |
TLS | 0x1d9f8 | 0x2d9f8 | 0x2d9f8 | 0x0 | 0x8 | 0.0000 | 0x4 | R | 0x4 | .tbss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x7 | RWE | 0x4 |
Download Network PCAP: filtered – full
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-04-21T13:08:57.825436+0200 | 2812067 | ETPRO MALWARE SOGU DNS CnC Channel TXT Lookup | 1 | 192.168.2.15 | 57602 | 8.8.8.8 | 53 | UDP |
- Total Packets: 29
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 21, 2025 13:08:58.026567936 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:08:58.301913023 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:08:58.303328037 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:08:58.303328037 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:08:58.578685045 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:08:58.578743935 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:08:58.853902102 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:08:58.853920937 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:08:58.854677916 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:08:58.856081009 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:08:59.172319889 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:08:59.172482967 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:08:59.447796106 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:08:59.447813034 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:08:59.448725939 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:08:59.835774899 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:09:00.151492119 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:09:00.151642084 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:09:00.427567005 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:09:00.427717924 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:09:00.427762985 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:09:13.857280016 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:09:13.857345104 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:09:13.857620001 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:09:14.173155069 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:09:14.173218012 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:09:14.448064089 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:09:33.562630892 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:09:33.562789917 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:09:48.971982002 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:09:48.972162008 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:09:50.235038996 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:09:50.235229969 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:09:50.235500097 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:09:50.510668039 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:09:50.510945082 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:09:50.787431955 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:10:05.803035021 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:10:05.803160906 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:10:22.239372969 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:10:22.239656925 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:10:24.466995001 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:10:24.467173100 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:10:24.744319916 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:10:24.744379044 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:10:25.019489050 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:10:40.550187111 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:10:40.550328970 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:10:56.549591064 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:10:56.549701929 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Apr 21, 2025 13:11:01.890486002 CEST | 12345 | 45408 | 93.95.115.22 | 192.168.2.15 |
Apr 21, 2025 13:11:01.890738010 CEST | 45408 | 12345 | 192.168.2.15 | 93.95.115.22 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 21, 2025 13:08:57.825436115 CEST | 57602 | 53 | 192.168.2.15 | 8.8.8.8 |
Apr 21, 2025 13:08:58.024715900 CEST | 53 | 57602 | 8.8.8.8 | 192.168.2.15 |
Apr 21, 2025 13:08:59.448741913 CEST | 49349 | 53 | 192.168.2.15 | 8.8.8.8 |
Apr 21, 2025 13:08:59.649529934 CEST | 53 | 49349 | 8.8.8.8 | 192.168.2.15 |
Apr 21, 2025 13:08:59.649909973 CEST | 38915 | 19302 | 192.168.2.15 | 74.125.250.129 |
Apr 21, 2025 13:08:59.835058928 CEST | 19302 | 38915 | 74.125.250.129 | 192.168.2.15 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 21, 2025 13:08:57.825436115 CEST | 192.168.2.15 | 8.8.8.8 | 0x2eb6 | Standard query (0) | 16 | IN (0x0001) | false | |
Apr 21, 2025 13:08:59.448741913 CEST | 192.168.2.15 | 8.8.8.8 | 0x1f85 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 21, 2025 13:08:58.024715900 CEST | 8.8.8.8 | 192.168.2.15 | 0x2eb6 | No error (0) | TXT (Text strings) | IN (0x0001) | false | |||
Apr 21, 2025 13:08:58.024715900 CEST | 8.8.8.8 | 192.168.2.15 | 0x2eb6 | No error (0) | TXT (Text strings) | IN (0x0001) | false | |||
Apr 21, 2025 13:08:58.024715900 CEST | 8.8.8.8 | 192.168.2.15 | 0x2eb6 | No error (0) | TXT (Text strings) | IN (0x0001) | false | |||
Apr 21, 2025 13:08:58.024715900 CEST | 8.8.8.8 | 192.168.2.15 | 0x2eb6 | No error (0) | TXT (Text strings) | IN (0x0001) | false | |||
Apr 21, 2025 13:08:58.024715900 CEST | 8.8.8.8 | 192.168.2.15 | 0x2eb6 | No error (0) | TXT (Text strings) | IN (0x0001) | false | |||
Apr 21, 2025 13:08:58.024715900 CEST | 8.8.8.8 | 192.168.2.15 | 0x2eb6 | No error (0) | TXT (Text strings) | IN (0x0001) | false | |||
Apr 21, 2025 13:08:58.024715900 CEST | 8.8.8.8 | 192.168.2.15 | 0x2eb6 | No error (0) | TXT (Text strings) | IN (0x0001) | false | |||
Apr 21, 2025 13:08:59.649529934 CEST | 8.8.8.8 | 192.168.2.15 | 0x1f85 | No error (0) | 74.125.250.129 | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 11:08:55 |
Start date (UTC): | 21/04/2025 |
Path: | /tmp/skid.armv7l.elf |
Arguments: | /tmp/skid.armv7l.elf |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 11:08:57 |
Start date (UTC): | 21/04/2025 |
Path: | /tmp/skid.armv7l.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |
Start time (UTC): | 11:08:57 |
Start date (UTC): | 21/04/2025 |
Path: | /tmp/skid.armv7l.elf |
Arguments: | - |
File size: | 4956856 bytes |
MD5 hash: | 5ebfcae4fe2471fcc5695c2394773ff1 |