Linux
Analysis Report
Aqua.i686.elf
Overview
General Information
Sample name: | Aqua.i686.elf |
Analysis ID: | 1674863 |
MD5: | fc825e19428452692b9d03d7e9d5d792 |
SHA1: | 0144b8c492edab5dd0a10881c69291ea5150ed10 |
SHA256: | 245aff1b588fc79031fc48b4064eabd9eddfe68cbe583419540d2da60d9d2a09 |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Score: | 64 |
Range: | 0 - 100 |
Signatures
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample deletes itself
Sends malformed DNS queries
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara signature match
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1674863 |
Start date and time: | 2025-04-26 17:30:54 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 55s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | Aqua.i686.elf |
Detection: | MAL |
Classification: | mal64.troj.evad.linELF@0/0@6/0 |
- VT rate limit hit for: raw.intenseproxy.zip. [malformed]
Command: | /tmp/Aqua.i686.elf |
PID: | 6255 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | about to cum inside a femboy btw |
Standard Error: |
- system is lnxubuntu20
- Aqua.i686.elf New Fork (PID: 6256, Parent: 6255)
- dash New Fork (PID: 6298, Parent: 4331)
- dash New Fork (PID: 6299, Parent: 4331)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Linux_Trojan_Mirai_268aac0b | unknown | unknown |
| |
Linux_Trojan_Mirai_0cb1699c | unknown | unknown |
| |
Linux_Trojan_Mirai_70ef58f1 | unknown | unknown |
| |
Linux_Trojan_Mirai_3a85a418 | unknown | unknown |
| |
Linux_Trojan_Mirai_2e3f67a9 | unknown | unknown |
| |
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Linux_Trojan_Mirai_268aac0b | unknown | unknown |
| |
Linux_Trojan_Mirai_0cb1699c | unknown | unknown |
| |
Linux_Trojan_Mirai_70ef58f1 | unknown | unknown |
| |
Linux_Trojan_Mirai_3a85a418 | unknown | unknown |
| |
Linux_Trojan_Mirai_2e3f67a9 | unknown | unknown |
| |
Click to see the 2 entries |
⊘No Suricata rule has matched
- • AV Detection
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Networking |
---|
Source: | DNS traffic detected: |
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | .symtab present: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Rm executable: | Jump to behavior | ||
Source: | Rm executable: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 11 File Deletion | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 2 Application Layer Protocol | Traffic Duplication | Data Destruction |
⊘No configs have been found
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
31% | Virustotal | Browse | ||
25% | ReversingLabs | Linux.Backdoor.Mirai |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
raw.intenseproxy.zip | 193.200.78.28 | true | false | high | |
raw.intenseproxy.zip. [malformed] | unknown | unknown | true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
193.200.78.28 | raw.intenseproxy.zip | Switzerland | 29496 | LINK-SERVICE-ASUA | false | |
34.249.145.219 | unknown | United States | 16509 | AMAZON-02US | false | |
109.202.202.202 | unknown | Switzerland | 13030 | INIT7CH | false | |
91.189.91.42 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
193.200.78.28 | Get hash | malicious | Aquabot, Mirai | Browse | ||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
34.249.145.219 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
109.202.202.202 | Get hash | malicious | Unknown | Browse |
| |
91.189.91.42 | Get hash | malicious | Prometei | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Mirai | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Gafgyt, Mirai | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
raw.intenseproxy.zip | Get hash | malicious | Aquabot | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CANONICAL-ASGB | Get hash | malicious | Prometei | Browse |
| |
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
LINK-SERVICE-ASUA | Get hash | malicious | Aquabot, Mirai | Browse |
| |
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
INIT7CH | Get hash | malicious | Prometei | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
AMAZON-02US | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Gafgyt, Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Prometei | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
⊘No context
⊘No context
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 6.291015374614521 |
TrID: |
|
File name: | Aqua.i686.elf |
File size: | 50'352 bytes |
MD5: | fc825e19428452692b9d03d7e9d5d792 |
SHA1: | 0144b8c492edab5dd0a10881c69291ea5150ed10 |
SHA256: | 245aff1b588fc79031fc48b4064eabd9eddfe68cbe583419540d2da60d9d2a09 |
SHA512: | 44d572dcb1874aeebad96b30e328c6e568cd12050f117b309f9f1bdb428acf1fb88a8c2b6b2a6d6f7607bbfdcba6fe359bed26bca2df770825792d94cef71e21 |
SSDEEP: | 1536:j7WsI7YXIRWH+MK+77QdfzVFjZWlw4gtbnPwC7FQEvc:j7W37Y4RAK+77Qdfz/wa4gtLPbRHv |
TLSH: | 61332AC1F54F84F9D95B49304063F33FCF32E5294175CAAEEF99AE36DA23541821A298 |
File Content Preview: | .ELF....................h...4... .......4. ...(.....................<...<....................@...@.......(..........Q.td............................U..S.......w....h........[]...$.............U......=.B...t..1....$@.....$@......u........t...$<?..........B |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 49952 |
Section Header Size: | 40 |
Number of Section Headers: | 10 |
Header String Table Index: | 9 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x8048094 | 0x94 | 0x1c | 0x0 | 0x6 | AX | 0 | 0 | 1 |
.text | PROGBITS | 0x80480b0 | 0xb0 | 0xaac1 | 0x0 | 0x6 | AX | 0 | 0 | 16 |
.fini | PROGBITS | 0x8052b71 | 0xab71 | 0x17 | 0x0 | 0x6 | AX | 0 | 0 | 1 |
.rodata | PROGBITS | 0x8052ba0 | 0xaba0 | 0x139c | 0x0 | 0x2 | A | 0 | 0 | 32 |
.ctors | PROGBITS | 0x8054000 | 0xc000 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.dtors | PROGBITS | 0x8054008 | 0xc008 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x8054020 | 0xc020 | 0x2c0 | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.bss | NOBITS | 0x80542e0 | 0xc2e0 | 0x2520 | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.shstrtab | STRTAB | 0x0 | 0xc2e0 | 0x3e | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x8048000 | 0x8048000 | 0xbf3c | 0xbf3c | 6.3405 | 0x5 | R E | 0x1000 | .init .text .fini .rodata | |
LOAD | 0xc000 | 0x8054000 | 0x8054000 | 0x2e0 | 0x2800 | 3.9530 | 0x6 | RW | 0x1000 | .ctors .dtors .data .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x4 |
Download Network PCAP: filtered – full
- Total Packets: 28
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 26, 2025 17:32:03.960984945 CEST | 39258 | 443 | 192.168.2.23 | 34.249.145.219 |
Apr 26, 2025 17:32:06.068361044 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Apr 26, 2025 17:32:06.341393948 CEST | 33966 | 53014 | 193.200.78.28 | 192.168.2.23 |
Apr 26, 2025 17:32:06.341629028 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Apr 26, 2025 17:32:06.341665030 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Apr 26, 2025 17:32:06.613368034 CEST | 33966 | 53014 | 193.200.78.28 | 192.168.2.23 |
Apr 26, 2025 17:32:06.613454103 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Apr 26, 2025 17:32:06.888299942 CEST | 33966 | 53014 | 193.200.78.28 | 192.168.2.23 |
Apr 26, 2025 17:32:07.256573915 CEST | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Apr 26, 2025 17:32:08.024499893 CEST | 39258 | 443 | 192.168.2.23 | 34.249.145.219 |
Apr 26, 2025 17:32:16.215492964 CEST | 39258 | 443 | 192.168.2.23 | 34.249.145.219 |
Apr 26, 2025 17:32:21.887068033 CEST | 33966 | 53014 | 193.200.78.28 | 192.168.2.23 |
Apr 26, 2025 17:32:21.887255907 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Apr 26, 2025 17:32:26.454051971 CEST | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Apr 26, 2025 17:32:28.501830101 CEST | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Apr 26, 2025 17:32:32.341373920 CEST | 39258 | 443 | 192.168.2.23 | 34.249.145.219 |
Apr 26, 2025 17:32:37.163178921 CEST | 33966 | 53014 | 193.200.78.28 | 192.168.2.23 |
Apr 26, 2025 17:32:37.163479090 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Apr 26, 2025 17:32:52.440788984 CEST | 33966 | 53014 | 193.200.78.28 | 192.168.2.23 |
Apr 26, 2025 17:32:52.440938950 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Apr 26, 2025 17:33:07.714828968 CEST | 33966 | 53014 | 193.200.78.28 | 192.168.2.23 |
Apr 26, 2025 17:33:07.715038061 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Apr 26, 2025 17:33:09.456278086 CEST | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Apr 26, 2025 17:33:16.390983105 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Apr 26, 2025 17:33:16.666168928 CEST | 33966 | 53014 | 193.200.78.28 | 192.168.2.23 |
Apr 26, 2025 17:33:16.666186094 CEST | 33966 | 53014 | 193.200.78.28 | 192.168.2.23 |
Apr 26, 2025 17:33:16.666517019 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Apr 26, 2025 17:33:26.675312042 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Apr 26, 2025 17:33:26.948898077 CEST | 33966 | 53014 | 193.200.78.28 | 192.168.2.23 |
Apr 26, 2025 17:33:26.948928118 CEST | 33966 | 53014 | 193.200.78.28 | 192.168.2.23 |
Apr 26, 2025 17:33:26.949109077 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Apr 26, 2025 17:33:42.244971037 CEST | 33966 | 53014 | 193.200.78.28 | 192.168.2.23 |
Apr 26, 2025 17:33:42.245178938 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Apr 26, 2025 17:33:57.521763086 CEST | 33966 | 53014 | 193.200.78.28 | 192.168.2.23 |
Apr 26, 2025 17:33:57.522026062 CEST | 53014 | 33966 | 192.168.2.23 | 193.200.78.28 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 26, 2025 17:32:05.116599083 CEST | 53113 | 53 | 192.168.2.23 | 8.8.8.8 |
Apr 26, 2025 17:32:05.325282097 CEST | 53 | 53113 | 8.8.8.8 | 192.168.2.23 |
Apr 26, 2025 17:32:05.325625896 CEST | 43880 | 53 | 192.168.2.23 | 8.8.8.8 |
Apr 26, 2025 17:32:05.473597050 CEST | 53 | 43880 | 8.8.8.8 | 192.168.2.23 |
Apr 26, 2025 17:32:05.473728895 CEST | 34244 | 53 | 192.168.2.23 | 8.8.8.8 |
Apr 26, 2025 17:32:05.622277975 CEST | 53 | 34244 | 8.8.8.8 | 192.168.2.23 |
Apr 26, 2025 17:32:05.622472048 CEST | 32921 | 53 | 192.168.2.23 | 8.8.8.8 |
Apr 26, 2025 17:32:05.770726919 CEST | 53 | 32921 | 8.8.8.8 | 192.168.2.23 |
Apr 26, 2025 17:32:05.770844936 CEST | 52605 | 53 | 192.168.2.23 | 8.8.8.8 |
Apr 26, 2025 17:32:05.919699907 CEST | 53 | 52605 | 8.8.8.8 | 192.168.2.23 |
Apr 26, 2025 17:32:05.919841051 CEST | 48534 | 53 | 192.168.2.23 | 8.8.8.8 |
Apr 26, 2025 17:32:06.068103075 CEST | 53 | 48534 | 8.8.8.8 | 192.168.2.23 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 26, 2025 17:32:05.116599083 CEST | 192.168.2.23 | 8.8.8.8 | 0x45c3 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 26, 2025 17:32:05.325625896 CEST | 192.168.2.23 | 8.8.8.8 | 0x22e9 | Standard query (0) | 256 | 373 | false | |
Apr 26, 2025 17:32:05.473728895 CEST | 192.168.2.23 | 8.8.8.8 | 0x22e9 | Standard query (0) | 256 | 373 | false | |
Apr 26, 2025 17:32:05.622472048 CEST | 192.168.2.23 | 8.8.8.8 | 0x22e9 | Standard query (0) | 256 | 373 | false | |
Apr 26, 2025 17:32:05.770844936 CEST | 192.168.2.23 | 8.8.8.8 | 0x22e9 | Standard query (0) | 256 | 373 | false | |
Apr 26, 2025 17:32:05.919841051 CEST | 192.168.2.23 | 8.8.8.8 | 0x22e9 | Standard query (0) | 256 | 374 | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 26, 2025 17:32:05.325282097 CEST | 8.8.8.8 | 192.168.2.23 | 0x45c3 | No error (0) | 193.200.78.28 | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 15:32:04 |
Start date (UTC): | 26/04/2025 |
Path: | /tmp/Aqua.i686.elf |
Arguments: | /tmp/Aqua.i686.elf |
File size: | 50352 bytes |
MD5 hash: | fc825e19428452692b9d03d7e9d5d792 |
Start time (UTC): | 15:32:04 |
Start date (UTC): | 26/04/2025 |
Path: | /tmp/Aqua.i686.elf |
Arguments: | - |
File size: | 50352 bytes |
MD5 hash: | fc825e19428452692b9d03d7e9d5d792 |
Start time (UTC): | 15:33:00 |
Start date (UTC): | 26/04/2025 |
Path: | /usr/bin/dash |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 15:33:00 |
Start date (UTC): | 26/04/2025 |
Path: | /usr/bin/rm |
Arguments: | rm -f /tmp/tmp.IZvnweZzFG /tmp/tmp.3l87Pt173c /tmp/tmp.eijGQjLfI9 |
File size: | 72056 bytes |
MD5 hash: | aa2b5496fdbfd88e38791ab81f90b95b |
Start time (UTC): | 15:33:00 |
Start date (UTC): | 26/04/2025 |
Path: | /usr/bin/dash |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 15:33:00 |
Start date (UTC): | 26/04/2025 |
Path: | /usr/bin/rm |
Arguments: | rm -f /tmp/tmp.IZvnweZzFG /tmp/tmp.3l87Pt173c /tmp/tmp.eijGQjLfI9 |
File size: | 72056 bytes |
MD5 hash: | aa2b5496fdbfd88e38791ab81f90b95b |