Linux
Analysis Report
Aqua.x86_64.elf
Overview
General Information
Sample name: | Aqua.x86_64.elf |
Analysis ID: | 1674905 |
MD5: | 82cedcbf94d87951457555ef0f02419e |
SHA1: | 1fc57989dcea75e43e39cd8868821e5aa7a6fa66 |
SHA256: | 724bfd506c66f1fa9d7464a4ce6b79b027dfae1a0c16dabc159d1404a67e029f |
Tags: | elfMiraiuser-abuse_ch |
Infos: |
Detection
Aquabot
Score: | 76 |
Range: | 0 - 100 |
Signatures
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Aquabot
Sample deletes itself
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1674905 |
Start date and time: | 2025-04-26 18:20:12 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 40s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | Aqua.x86_64.elf |
Detection: | MAL |
Classification: | mal76.troj.evad.linELF@0/0@6/0 |
Command: | /tmp/Aqua.x86_64.elf |
PID: | 5499 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | about to cum inside a femboy btw |
Standard Error: |
- system is lnxubuntu20
- Aqua.x86_64.elf New Fork (PID: 5500, Parent: 5499)
- Aqua.x86_64.elf New Fork (PID: 5501, Parent: 5500)
- gnome-session-binary New Fork (PID: 5502, Parent: 1588)
- systemd New Fork (PID: 5507, Parent: 1)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Aquabot | Yara detected Aquabot | Joe Security | ||
Linux_Trojan_Gafgyt_9e9530a7 | unknown | unknown |
| |
Linux_Trojan_Gafgyt_807911a2 | unknown | unknown |
| |
Linux_Trojan_Gafgyt_d4227dbf | unknown | unknown |
| |
Linux_Trojan_Gafgyt_d996d335 | unknown | unknown |
| |
Click to see the 5 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Aquabot | Yara detected Aquabot | Joe Security | ||
Linux_Trojan_Gafgyt_9e9530a7 | unknown | unknown |
| |
Linux_Trojan_Gafgyt_807911a2 | unknown | unknown |
| |
Linux_Trojan_Gafgyt_d4227dbf | unknown | unknown |
| |
Linux_Trojan_Gafgyt_d996d335 | unknown | unknown |
| |
Click to see the 6 entries |
⊘No Suricata rule has matched
- • AV Detection
- • Spreading
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | String: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | .symtab present: |
Source: | SIGKILL sent: | Jump to behavior |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior | ||
Source: | Directory: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | Windows Management Instrumentation | 1 Scripting | Path Interception | 1 Hidden Files and Directories | 1 OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 1 Non-Standard Port | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 File Deletion | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
⊘No configs have been found
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
52% | Virustotal | Browse | ||
50% | ReversingLabs | Linux.Backdoor.Mirai | ||
100% | Avira | EXP/ELF.Mirai.W |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
raw.intenseproxy.zip | 193.200.78.28 | true | false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
193.200.78.28 | raw.intenseproxy.zip | Switzerland | 29496 | LINK-SERVICE-ASUA | false | |
89.190.156.145 | unknown | United Kingdom | 7489 | HOSTUS-GLOBAL-ASHostUSHK | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
193.200.78.28 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
89.190.156.145 | Get hash | malicious | Aquabot | Browse | ||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse | |||
Get hash | malicious | Aquabot | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
raw.intenseproxy.zip | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
HOSTUS-GLOBAL-ASHostUSHK | Get hash | malicious | Aquabot | Browse |
| |
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
LINK-SERVICE-ASUA | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
| ||
Get hash | malicious | Aquabot | Browse |
|
⊘No context
⊘No context
⊘No created / dropped files found
File type: | |
Entropy (8bit): | 6.215737723916479 |
TrID: |
|
File name: | Aqua.x86_64.elf |
File size: | 71'824 bytes |
MD5: | 82cedcbf94d87951457555ef0f02419e |
SHA1: | 1fc57989dcea75e43e39cd8868821e5aa7a6fa66 |
SHA256: | 724bfd506c66f1fa9d7464a4ce6b79b027dfae1a0c16dabc159d1404a67e029f |
SHA512: | 69e586cfbb9fa10b739d92427b434db25d2cfc6e41ce5980ca647303f1ebc608260bfab66a0cdfdbe90c6040031f02c1a389d1dfa2efb2e87951121a93553c1c |
SSDEEP: | 1536:GBEtqb9a7oY6uHhK0ygRZKbBqAdUFfP57atD9kuQTGJ0OGjnV:htYQsYFwERYVqAdUhPctD6TGOO+V |
TLSH: | 64634A13B58190FCC29DC374476BB63AE93375BE1239F2AA37D8FA126D49E211E1E540 |
File Content Preview: | .ELF..............>.......@.....@...................@.8...@.......................@.......@.....%.......%.................................Q.......Q............../..............Q.td....................................................H...._........H........ |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 64 |
Program Header Offset: | 64 |
Program Header Size: | 56 |
Number of Program Headers: | 3 |
Section Header Offset: | 71184 |
Section Header Size: | 64 |
Number of Section Headers: | 10 |
Header String Table Index: | 9 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x4000e8 | 0xe8 | 0x13 | 0x0 | 0x6 | AX | 0 | 0 | 1 |
.text | PROGBITS | 0x400100 | 0x100 | 0xeb46 | 0x0 | 0x6 | AX | 0 | 0 | 16 |
.fini | PROGBITS | 0x40ec46 | 0xec46 | 0xe | 0x0 | 0x6 | AX | 0 | 0 | 1 |
.rodata | PROGBITS | 0x40ec60 | 0xec60 | 0x1dc5 | 0x0 | 0x2 | A | 0 | 0 | 32 |
.ctors | PROGBITS | 0x511000 | 0x11000 | 0x10 | 0x0 | 0x3 | WA | 0 | 0 | 8 |
.dtors | PROGBITS | 0x511010 | 0x11010 | 0x10 | 0x0 | 0x3 | WA | 0 | 0 | 8 |
.data | PROGBITS | 0x511040 | 0x11040 | 0x590 | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.bss | NOBITS | 0x5115e0 | 0x115d0 | 0x29c8 | 0x0 | 0x3 | WA | 0 | 0 | 32 |
.shstrtab | STRTAB | 0x0 | 0x115d0 | 0x3e | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x400000 | 0x400000 | 0x10a25 | 0x10a25 | 6.3714 | 0x5 | R E | 0x100000 | .init .text .fini .rodata | |
LOAD | 0x11000 | 0x511000 | 0x511000 | 0x5d0 | 0x2fa8 | 2.7250 | 0x6 | RW | 0x100000 | .ctors .dtors .data .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x8 |
Download Network PCAP: filtered – full
- Total Packets: 27
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 26, 2025 18:21:20.223773003 CEST | 44742 | 7733 | 192.168.2.13 | 89.190.156.145 |
Apr 26, 2025 18:21:20.813873053 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Apr 26, 2025 18:21:21.087873936 CEST | 33966 | 37088 | 193.200.78.28 | 192.168.2.13 |
Apr 26, 2025 18:21:21.088058949 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Apr 26, 2025 18:21:21.088905096 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Apr 26, 2025 18:21:21.254621983 CEST | 44742 | 7733 | 192.168.2.13 | 89.190.156.145 |
Apr 26, 2025 18:21:21.363497019 CEST | 33966 | 37088 | 193.200.78.28 | 192.168.2.13 |
Apr 26, 2025 18:21:21.363569021 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Apr 26, 2025 18:21:21.638053894 CEST | 33966 | 37088 | 193.200.78.28 | 192.168.2.13 |
Apr 26, 2025 18:21:23.270628929 CEST | 44742 | 7733 | 192.168.2.13 | 89.190.156.145 |
Apr 26, 2025 18:21:27.334745884 CEST | 44742 | 7733 | 192.168.2.13 | 89.190.156.145 |
Apr 26, 2025 18:21:35.530756950 CEST | 44742 | 7733 | 192.168.2.13 | 89.190.156.145 |
Apr 26, 2025 18:21:36.639746904 CEST | 33966 | 37088 | 193.200.78.28 | 192.168.2.13 |
Apr 26, 2025 18:21:36.639946938 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Apr 26, 2025 18:21:51.654618025 CEST | 44742 | 7733 | 192.168.2.13 | 89.190.156.145 |
Apr 26, 2025 18:21:51.917730093 CEST | 33966 | 37088 | 193.200.78.28 | 192.168.2.13 |
Apr 26, 2025 18:21:51.917913914 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Apr 26, 2025 18:22:07.196420908 CEST | 33966 | 37088 | 193.200.78.28 | 192.168.2.13 |
Apr 26, 2025 18:22:07.196607113 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Apr 26, 2025 18:22:22.471600056 CEST | 33966 | 37088 | 193.200.78.28 | 192.168.2.13 |
Apr 26, 2025 18:22:22.471761942 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Apr 26, 2025 18:22:25.190674067 CEST | 44742 | 7733 | 192.168.2.13 | 89.190.156.145 |
Apr 26, 2025 18:22:31.142682076 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Apr 26, 2025 18:22:31.457869053 CEST | 33966 | 37088 | 193.200.78.28 | 192.168.2.13 |
Apr 26, 2025 18:22:31.457886934 CEST | 33966 | 37088 | 193.200.78.28 | 192.168.2.13 |
Apr 26, 2025 18:22:31.457967997 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Apr 26, 2025 18:22:41.468194962 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Apr 26, 2025 18:22:41.748980999 CEST | 33966 | 37088 | 193.200.78.28 | 192.168.2.13 |
Apr 26, 2025 18:22:41.749001980 CEST | 33966 | 37088 | 193.200.78.28 | 192.168.2.13 |
Apr 26, 2025 18:22:41.749149084 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Apr 26, 2025 18:22:57.247473001 CEST | 33966 | 37088 | 193.200.78.28 | 192.168.2.13 |
Apr 26, 2025 18:22:57.247684002 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Apr 26, 2025 18:23:12.521864891 CEST | 33966 | 37088 | 193.200.78.28 | 192.168.2.13 |
Apr 26, 2025 18:23:12.522053957 CEST | 37088 | 33966 | 192.168.2.13 | 193.200.78.28 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 26, 2025 18:21:19.863708973 CEST | 55334 | 53 | 192.168.2.13 | 8.8.8.8 |
Apr 26, 2025 18:21:20.065020084 CEST | 53 | 55334 | 8.8.8.8 | 192.168.2.13 |
Apr 26, 2025 18:21:20.065895081 CEST | 50356 | 53 | 192.168.2.13 | 8.8.8.8 |
Apr 26, 2025 18:21:20.214082956 CEST | 53 | 50356 | 8.8.8.8 | 192.168.2.13 |
Apr 26, 2025 18:21:20.215302944 CEST | 34789 | 53 | 192.168.2.13 | 8.8.8.8 |
Apr 26, 2025 18:21:20.363353968 CEST | 53 | 34789 | 8.8.8.8 | 192.168.2.13 |
Apr 26, 2025 18:21:20.364442110 CEST | 57730 | 53 | 192.168.2.13 | 8.8.8.8 |
Apr 26, 2025 18:21:20.513421059 CEST | 53 | 57730 | 8.8.8.8 | 192.168.2.13 |
Apr 26, 2025 18:21:20.514358044 CEST | 42516 | 53 | 192.168.2.13 | 8.8.8.8 |
Apr 26, 2025 18:21:20.662956953 CEST | 53 | 42516 | 8.8.8.8 | 192.168.2.13 |
Apr 26, 2025 18:21:20.664330006 CEST | 38228 | 53 | 192.168.2.13 | 8.8.8.8 |
Apr 26, 2025 18:21:20.812504053 CEST | 53 | 38228 | 8.8.8.8 | 192.168.2.13 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Apr 26, 2025 18:21:19.863708973 CEST | 192.168.2.13 | 8.8.8.8 | 0x75c5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Apr 26, 2025 18:21:20.065895081 CEST | 192.168.2.13 | 8.8.8.8 | 0x8997 | Standard query (0) | 0 | 256 | false | |
Apr 26, 2025 18:21:20.215302944 CEST | 192.168.2.13 | 8.8.8.8 | 0x8997 | Standard query (0) | 0 | 256 | false | |
Apr 26, 2025 18:21:20.364442110 CEST | 192.168.2.13 | 8.8.8.8 | 0x8997 | Standard query (0) | 0 | 256 | false | |
Apr 26, 2025 18:21:20.514358044 CEST | 192.168.2.13 | 8.8.8.8 | 0x8997 | Standard query (0) | 0 | 256 | false | |
Apr 26, 2025 18:21:20.664330006 CEST | 192.168.2.13 | 8.8.8.8 | 0x8997 | Standard query (0) | 0 | 256 | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 26, 2025 18:21:20.065020084 CEST | 8.8.8.8 | 192.168.2.13 | 0x75c5 | No error (0) | 193.200.78.28 | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 16:21:18 |
Start date (UTC): | 26/04/2025 |
Path: | /tmp/Aqua.x86_64.elf |
Arguments: | /tmp/Aqua.x86_64.elf |
File size: | 71824 bytes |
MD5 hash: | 82cedcbf94d87951457555ef0f02419e |
Start time (UTC): | 16:21:18 |
Start date (UTC): | 26/04/2025 |
Path: | /tmp/Aqua.x86_64.elf |
Arguments: | - |
File size: | 71824 bytes |
MD5 hash: | 82cedcbf94d87951457555ef0f02419e |
Start time (UTC): | 16:21:18 |
Start date (UTC): | 26/04/2025 |
Path: | /tmp/Aqua.x86_64.elf |
Arguments: | - |
File size: | 71824 bytes |
MD5 hash: | 82cedcbf94d87951457555ef0f02419e |
Start time (UTC): | 16:21:19 |
Start date (UTC): | 26/04/2025 |
Path: | /usr/libexec/gnome-session-binary |
Arguments: | - |
File size: | 334664 bytes |
MD5 hash: | d9b90be4f7db60cb3c2d3da6a1d31bfb |
Start time (UTC): | 16:21:19 |
Start date (UTC): | 26/04/2025 |
Path: | /bin/sh |
Arguments: | /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 16:21:19 |
Start date (UTC): | 26/04/2025 |
Path: | /usr/libexec/gsd-rfkill |
Arguments: | /usr/libexec/gsd-rfkill |
File size: | 51808 bytes |
MD5 hash: | 88a16a3c0aba1759358c06215ecfb5cc |
Start time (UTC): | 16:21:19 |
Start date (UTC): | 26/04/2025 |
Path: | /usr/lib/systemd/systemd |
Arguments: | - |
File size: | 1620224 bytes |
MD5 hash: | 9b2bec7092a40488108543f9334aab75 |
Start time (UTC): | 16:21:19 |
Start date (UTC): | 26/04/2025 |
Path: | /lib/systemd/systemd-hostnamed |
Arguments: | /lib/systemd/systemd-hostnamed |
File size: | 35040 bytes |
MD5 hash: | 2cc8a5576629a2d5bd98e49a4b8bef65 |