Edit tour

Linux Analysis Report
Aqua.x86_64.elf

Overview

General Information

Sample name:Aqua.x86_64.elf
Analysis ID:1674905
MD5:82cedcbf94d87951457555ef0f02419e
SHA1:1fc57989dcea75e43e39cd8868821e5aa7a6fa66
SHA256:724bfd506c66f1fa9d7464a4ce6b79b027dfae1a0c16dabc159d1404a67e029f
Tags:elfMiraiuser-abuse_ch
Infos:

Detection

Aquabot
Score:76
Range:0 - 100

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Aquabot
Sample deletes itself
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1674905
Start date and time:2025-04-26 18:20:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 40s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:Aqua.x86_64.elf
Detection:MAL
Classification:mal76.troj.evad.linELF@0/0@6/0
Command:/tmp/Aqua.x86_64.elf
PID:5499
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
about to cum inside a femboy btw
Standard Error:
  • system is lnxubuntu20
  • sh (PID: 5502, Parent: 1588, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
  • gsd-rfkill (PID: 5502, Parent: 1588, MD5: 88a16a3c0aba1759358c06215ecfb5cc) Arguments: /usr/libexec/gsd-rfkill
  • systemd New Fork (PID: 5507, Parent: 1)
  • systemd-hostnamed (PID: 5507, Parent: 1, MD5: 2cc8a5576629a2d5bd98e49a4b8bef65) Arguments: /lib/systemd/systemd-hostnamed
  • cleanup
SourceRuleDescriptionAuthorStrings
Aqua.x86_64.elfJoeSecurity_AquabotYara detected AquabotJoe Security
    Aqua.x86_64.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
    • 0xa084:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
    Aqua.x86_64.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
    • 0xa873:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
    Aqua.x86_64.elfLinux_Trojan_Gafgyt_d4227dbfunknownunknown
    • 0x740e:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
    • 0xc40c:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
    Aqua.x86_64.elfLinux_Trojan_Gafgyt_d996d335unknownunknown
    • 0xe2ba:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
    Click to see the 5 entries
    SourceRuleDescriptionAuthorStrings
    5499.1.0000000000400000.0000000000411000.r-x.sdmpJoeSecurity_AquabotYara detected AquabotJoe Security
      5499.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
      • 0xa084:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
      5499.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
      • 0xa873:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
      5499.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_d4227dbfunknownunknown
      • 0x740e:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
      • 0xc40c:$a: FF 48 81 EC D0 00 00 00 48 8D 84 24 E0 00 00 00 48 89 54 24 30 C7 04 24 18 00
      5499.1.0000000000400000.0000000000411000.r-x.sdmpLinux_Trojan_Gafgyt_d996d335unknownunknown
      • 0xe2ba:$a: D0 EB 0F 40 38 37 75 04 48 89 F8 C3 49 FF C8 48 FF C7 4D 85 C0
      Click to see the 6 entries
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Aqua.x86_64.elfAvira: detected
      Source: Aqua.x86_64.elfVirustotal: Detection: 51%Perma Link
      Source: Aqua.x86_64.elfReversingLabs: Detection: 50%
      Source: Aqua.x86_64.elfString: EOF/proc//proc/%s/cmdlinerwgetcurlftpechokillbashrebootshutdownhaltpoweroff/fdsocket/proc/%s/stat/proc/proc/%d/exe/proc/%d/stat%d %s %c %d/proc/%d/maps/var/run/mnt/root/var/tmp/boot/bin/sbin/../(deleted)/homedbgmpslmipselmipsarmarm4arm5arm6arm7sh4m68kx86x586x86_64i586i686ppcspc[locker] killed process: %s ;; pid: %d
      Source: global trafficTCP traffic: 192.168.2.13:44742 -> 89.190.156.145:7733
      Source: global trafficTCP traffic: 192.168.2.13:37088 -> 193.200.78.28:33966
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: unknownTCP traffic detected without corresponding DNS query: 89.190.156.145
      Source: global trafficDNS traffic detected: DNS query: raw.intenseproxy.zip

      System Summary

      barindex
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)SIGKILL sent: pid: 1884, result: successfulJump to behavior
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
      Source: Aqua.x86_64.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
      Source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
      Source: classification engineClassification label: mal76.troj.evad.linELF@0/0@6/0
      Source: /usr/libexec/gsd-rfkill (PID: 5502)Directory: <invalid fd (9)>/..Jump to behavior
      Source: /usr/libexec/gsd-rfkill (PID: 5502)Directory: <invalid fd (8)>/..Jump to behavior
      Source: /lib/systemd/systemd-hostnamed (PID: 5507)Directory: <invalid fd (10)>/..Jump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/230/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/110/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/231/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/111/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/232/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/112/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/233/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/113/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/234/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/114/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/235/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/115/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/236/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/116/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/237/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/117/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/238/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/118/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/239/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/119/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/914/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/10/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/917/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/11/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/12/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/13/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/14/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/15/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/16/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/17/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/18/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/19/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/240/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/120/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/241/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/121/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/242/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/122/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/243/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/2/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/123/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/244/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/3/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/124/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/245/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/1588/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/125/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/4/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/246/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/126/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/5/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/247/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/127/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/6/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/248/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/128/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/7/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/249/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/129/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/8/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/800/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/9/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/802/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/803/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/20/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/21/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/22/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/23/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/24/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/25/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/26/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/27/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/28/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/29/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/1482/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/490/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/1480/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/250/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/371/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/130/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/251/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/131/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/252/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/132/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/253/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/254/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/1238/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/134/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/255/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/256/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/257/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/378/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/258/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/259/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/1475/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/936/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/30/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/816/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/35/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/260/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/261/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/262/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/142/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/263/cmdlineJump to behavior
      Source: /tmp/Aqua.x86_64.elf (PID: 5501)File opened: /proc/264/cmdlineJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: /tmp/Aqua.x86_64.elf (PID: 5500)File: /tmp/Aqua.x86_64.elfJump to behavior
      Source: /lib/systemd/systemd-hostnamed (PID: 5507)Queries kernel information via 'uname': Jump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: Aqua.x86_64.elf, type: SAMPLE
      Source: Yara matchFile source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Aqua.x86_64.elf PID: 5499, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: Aqua.x86_64.elf, type: SAMPLE
      Source: Yara matchFile source: 5499.1.0000000000400000.0000000000411000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Aqua.x86_64.elf PID: 5499, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information1
      Scripting
      Valid AccountsWindows Management Instrumentation1
      Scripting
      Path Interception1
      Hidden Files and Directories
      1
      OS Credential Dumping
      1
      Security Software Discovery
      Remote ServicesData from Local System1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      File Deletion
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1674905 Sample: Aqua.x86_64.elf Startdate: 26/04/2025 Architecture: LINUX Score: 76 19 raw.intenseproxy.zip 193.200.78.28, 33966, 37088 LINK-SERVICE-ASUA Switzerland 2->19 21 89.190.156.145, 7733 HOSTUS-GLOBAL-ASHostUSHK United Kingdom 2->21 23 Malicious sample detected (through community Yara rule) 2->23 25 Antivirus / Scanner detection for submitted sample 2->25 27 Multi AV Scanner detection for submitted file 2->27 29 Yara detected Aquabot 2->29 8 Aqua.x86_64.elf 2->8         started        10 gnome-session-binary sh gsd-rfkill 2->10         started        12 systemd systemd-hostnamed 2->12         started        signatures3 process4 process5 14 Aqua.x86_64.elf 8->14         started        signatures6 31 Sample deletes itself 14->31 17 Aqua.x86_64.elf 14->17         started        process7
      SourceDetectionScannerLabelLink
      Aqua.x86_64.elf52%VirustotalBrowse
      Aqua.x86_64.elf50%ReversingLabsLinux.Backdoor.Mirai
      Aqua.x86_64.elf100%AviraEXP/ELF.Mirai.W
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches

      Download Network PCAP: filteredfull

      NameIPActiveMaliciousAntivirus DetectionReputation
      raw.intenseproxy.zip
      193.200.78.28
      truefalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        193.200.78.28
        raw.intenseproxy.zipSwitzerland
        29496LINK-SERVICE-ASUAfalse
        89.190.156.145
        unknownUnited Kingdom
        7489HOSTUS-GLOBAL-ASHostUSHKfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        193.200.78.28Aqua.ppc.elfGet hashmaliciousUnknownBrowse
          Aqua.dbg.elfGet hashmaliciousAquabotBrowse
            Aqua.sh4.elfGet hashmaliciousAquabotBrowse
              Aqua.m68k.elfGet hashmaliciousAquabotBrowse
                Aqua.mpsl.elfGet hashmaliciousAquabotBrowse
                  Aqua.arm5.elfGet hashmaliciousUnknownBrowse
                    Aqua.x86_64.elfGet hashmaliciousUnknownBrowse
                      Aqua.x86.elfGet hashmaliciousAquabotBrowse
                        Aqua.arm5.elfGet hashmaliciousAquabotBrowse
                          Aqua.mips.elfGet hashmaliciousAquabotBrowse
                            89.190.156.145Aqua.dbg.elfGet hashmaliciousAquabotBrowse
                              Aqua.sh4.elfGet hashmaliciousAquabotBrowse
                                Aqua.m68k.elfGet hashmaliciousAquabotBrowse
                                  Aqua.mpsl.elfGet hashmaliciousAquabotBrowse
                                    Aqua.x86.elfGet hashmaliciousAquabotBrowse
                                      Aqua.arm5.elfGet hashmaliciousAquabotBrowse
                                        Aqua.mips.elfGet hashmaliciousAquabotBrowse
                                          Aqua.spc.elfGet hashmaliciousAquabotBrowse
                                            Aqua.m68k.elfGet hashmaliciousAquabotBrowse
                                              Aqua.arm5.elfGet hashmaliciousAquabotBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                raw.intenseproxy.zipAqua.ppc.elfGet hashmaliciousUnknownBrowse
                                                • 193.200.78.28
                                                Aqua.dbg.elfGet hashmaliciousAquabotBrowse
                                                • 193.200.78.28
                                                Aqua.m68k.elfGet hashmaliciousAquabotBrowse
                                                • 193.200.78.28
                                                Aqua.mpsl.elfGet hashmaliciousAquabotBrowse
                                                • 193.200.78.28
                                                Aqua.mips.elfGet hashmaliciousAquabotBrowse
                                                • 193.200.78.28
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                HOSTUS-GLOBAL-ASHostUSHKAqua.dbg.elfGet hashmaliciousAquabotBrowse
                                                • 89.190.156.145
                                                Aqua.sh4.elfGet hashmaliciousAquabotBrowse
                                                • 89.190.156.145
                                                Aqua.m68k.elfGet hashmaliciousAquabotBrowse
                                                • 89.190.156.145
                                                Aqua.mpsl.elfGet hashmaliciousAquabotBrowse
                                                • 89.190.156.145
                                                Aqua.x86.elfGet hashmaliciousAquabotBrowse
                                                • 89.190.156.145
                                                Aqua.arm5.elfGet hashmaliciousAquabotBrowse
                                                • 89.190.156.145
                                                Aqua.mips.elfGet hashmaliciousAquabotBrowse
                                                • 89.190.156.145
                                                Aqua.spc.elfGet hashmaliciousAquabotBrowse
                                                • 89.190.156.145
                                                Aqua.m68k.elfGet hashmaliciousAquabotBrowse
                                                • 89.190.156.145
                                                Aqua.arm5.elfGet hashmaliciousAquabotBrowse
                                                • 89.190.156.145
                                                LINK-SERVICE-ASUAAqua.ppc.elfGet hashmaliciousUnknownBrowse
                                                • 193.200.78.28
                                                Aqua.dbg.elfGet hashmaliciousAquabotBrowse
                                                • 193.200.78.28
                                                Aqua.sh4.elfGet hashmaliciousAquabotBrowse
                                                • 193.200.78.28
                                                Aqua.m68k.elfGet hashmaliciousAquabotBrowse
                                                • 193.200.78.28
                                                Aqua.mpsl.elfGet hashmaliciousAquabotBrowse
                                                • 193.200.78.28
                                                Aqua.arm5.elfGet hashmaliciousUnknownBrowse
                                                • 193.200.78.28
                                                Aqua.x86_64.elfGet hashmaliciousUnknownBrowse
                                                • 193.200.78.28
                                                Aqua.x86.elfGet hashmaliciousAquabotBrowse
                                                • 193.200.78.28
                                                Aqua.arm5.elfGet hashmaliciousAquabotBrowse
                                                • 193.200.78.28
                                                Aqua.mips.elfGet hashmaliciousAquabotBrowse
                                                • 193.200.78.28
                                                No context
                                                No context
                                                No created / dropped files found
                                                File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                                                Entropy (8bit):6.215737723916479
                                                TrID:
                                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                File name:Aqua.x86_64.elf
                                                File size:71'824 bytes
                                                MD5:82cedcbf94d87951457555ef0f02419e
                                                SHA1:1fc57989dcea75e43e39cd8868821e5aa7a6fa66
                                                SHA256:724bfd506c66f1fa9d7464a4ce6b79b027dfae1a0c16dabc159d1404a67e029f
                                                SHA512:69e586cfbb9fa10b739d92427b434db25d2cfc6e41ce5980ca647303f1ebc608260bfab66a0cdfdbe90c6040031f02c1a389d1dfa2efb2e87951121a93553c1c
                                                SSDEEP:1536:GBEtqb9a7oY6uHhK0ygRZKbBqAdUFfP57atD9kuQTGJ0OGjnV:htYQsYFwERYVqAdUhPctD6TGOO+V
                                                TLSH:64634A13B58190FCC29DC374476BB63AE93375BE1239F2AA37D8FA126D49E211E1E540
                                                File Content Preview:.ELF..............>.......@.....@...................@.8...@.......................@.......@.....%.......%.................................Q.......Q............../..............Q.td....................................................H...._........H........

                                                ELF header

                                                Class:ELF64
                                                Data:2's complement, little endian
                                                Version:1 (current)
                                                Machine:Advanced Micro Devices X86-64
                                                Version Number:0x1
                                                Type:EXEC (Executable file)
                                                OS/ABI:UNIX - System V
                                                ABI Version:0
                                                Entry Point Address:0x400194
                                                Flags:0x0
                                                ELF Header Size:64
                                                Program Header Offset:64
                                                Program Header Size:56
                                                Number of Program Headers:3
                                                Section Header Offset:71184
                                                Section Header Size:64
                                                Number of Section Headers:10
                                                Header String Table Index:9
                                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                NULL0x00x00x00x00x0000
                                                .initPROGBITS0x4000e80xe80x130x00x6AX001
                                                .textPROGBITS0x4001000x1000xeb460x00x6AX0016
                                                .finiPROGBITS0x40ec460xec460xe0x00x6AX001
                                                .rodataPROGBITS0x40ec600xec600x1dc50x00x2A0032
                                                .ctorsPROGBITS0x5110000x110000x100x00x3WA008
                                                .dtorsPROGBITS0x5110100x110100x100x00x3WA008
                                                .dataPROGBITS0x5110400x110400x5900x00x3WA0032
                                                .bssNOBITS0x5115e00x115d00x29c80x00x3WA0032
                                                .shstrtabSTRTAB0x00x115d00x3e0x00x0001
                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                LOAD0x00x4000000x4000000x10a250x10a256.37140x5R E0x100000.init .text .fini .rodata
                                                LOAD0x110000x5110000x5110000x5d00x2fa82.72500x6RW 0x100000.ctors .dtors .data .bss
                                                GNU_STACK0x00x00x00x00x00.00000x6RW 0x8

                                                Download Network PCAP: filteredfull

                                                • Total Packets: 27
                                                • 33966 undefined
                                                • 7733 undefined
                                                • 53 (DNS)
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 26, 2025 18:21:20.223773003 CEST447427733192.168.2.1389.190.156.145
                                                Apr 26, 2025 18:21:20.813873053 CEST3708833966192.168.2.13193.200.78.28
                                                Apr 26, 2025 18:21:21.087873936 CEST3396637088193.200.78.28192.168.2.13
                                                Apr 26, 2025 18:21:21.088058949 CEST3708833966192.168.2.13193.200.78.28
                                                Apr 26, 2025 18:21:21.088905096 CEST3708833966192.168.2.13193.200.78.28
                                                Apr 26, 2025 18:21:21.254621983 CEST447427733192.168.2.1389.190.156.145
                                                Apr 26, 2025 18:21:21.363497019 CEST3396637088193.200.78.28192.168.2.13
                                                Apr 26, 2025 18:21:21.363569021 CEST3708833966192.168.2.13193.200.78.28
                                                Apr 26, 2025 18:21:21.638053894 CEST3396637088193.200.78.28192.168.2.13
                                                Apr 26, 2025 18:21:23.270628929 CEST447427733192.168.2.1389.190.156.145
                                                Apr 26, 2025 18:21:27.334745884 CEST447427733192.168.2.1389.190.156.145
                                                Apr 26, 2025 18:21:35.530756950 CEST447427733192.168.2.1389.190.156.145
                                                Apr 26, 2025 18:21:36.639746904 CEST3396637088193.200.78.28192.168.2.13
                                                Apr 26, 2025 18:21:36.639946938 CEST3708833966192.168.2.13193.200.78.28
                                                Apr 26, 2025 18:21:51.654618025 CEST447427733192.168.2.1389.190.156.145
                                                Apr 26, 2025 18:21:51.917730093 CEST3396637088193.200.78.28192.168.2.13
                                                Apr 26, 2025 18:21:51.917913914 CEST3708833966192.168.2.13193.200.78.28
                                                Apr 26, 2025 18:22:07.196420908 CEST3396637088193.200.78.28192.168.2.13
                                                Apr 26, 2025 18:22:07.196607113 CEST3708833966192.168.2.13193.200.78.28
                                                Apr 26, 2025 18:22:22.471600056 CEST3396637088193.200.78.28192.168.2.13
                                                Apr 26, 2025 18:22:22.471761942 CEST3708833966192.168.2.13193.200.78.28
                                                Apr 26, 2025 18:22:25.190674067 CEST447427733192.168.2.1389.190.156.145
                                                Apr 26, 2025 18:22:31.142682076 CEST3708833966192.168.2.13193.200.78.28
                                                Apr 26, 2025 18:22:31.457869053 CEST3396637088193.200.78.28192.168.2.13
                                                Apr 26, 2025 18:22:31.457886934 CEST3396637088193.200.78.28192.168.2.13
                                                Apr 26, 2025 18:22:31.457967997 CEST3708833966192.168.2.13193.200.78.28
                                                Apr 26, 2025 18:22:41.468194962 CEST3708833966192.168.2.13193.200.78.28
                                                Apr 26, 2025 18:22:41.748980999 CEST3396637088193.200.78.28192.168.2.13
                                                Apr 26, 2025 18:22:41.749001980 CEST3396637088193.200.78.28192.168.2.13
                                                Apr 26, 2025 18:22:41.749149084 CEST3708833966192.168.2.13193.200.78.28
                                                Apr 26, 2025 18:22:57.247473001 CEST3396637088193.200.78.28192.168.2.13
                                                Apr 26, 2025 18:22:57.247684002 CEST3708833966192.168.2.13193.200.78.28
                                                Apr 26, 2025 18:23:12.521864891 CEST3396637088193.200.78.28192.168.2.13
                                                Apr 26, 2025 18:23:12.522053957 CEST3708833966192.168.2.13193.200.78.28
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 26, 2025 18:21:19.863708973 CEST5533453192.168.2.138.8.8.8
                                                Apr 26, 2025 18:21:20.065020084 CEST53553348.8.8.8192.168.2.13
                                                Apr 26, 2025 18:21:20.065895081 CEST5035653192.168.2.138.8.8.8
                                                Apr 26, 2025 18:21:20.214082956 CEST53503568.8.8.8192.168.2.13
                                                Apr 26, 2025 18:21:20.215302944 CEST3478953192.168.2.138.8.8.8
                                                Apr 26, 2025 18:21:20.363353968 CEST53347898.8.8.8192.168.2.13
                                                Apr 26, 2025 18:21:20.364442110 CEST5773053192.168.2.138.8.8.8
                                                Apr 26, 2025 18:21:20.513421059 CEST53577308.8.8.8192.168.2.13
                                                Apr 26, 2025 18:21:20.514358044 CEST4251653192.168.2.138.8.8.8
                                                Apr 26, 2025 18:21:20.662956953 CEST53425168.8.8.8192.168.2.13
                                                Apr 26, 2025 18:21:20.664330006 CEST3822853192.168.2.138.8.8.8
                                                Apr 26, 2025 18:21:20.812504053 CEST53382288.8.8.8192.168.2.13
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Apr 26, 2025 18:21:19.863708973 CEST192.168.2.138.8.8.80x75c5Standard query (0)raw.intenseproxy.zipA (IP address)IN (0x0001)false
                                                Apr 26, 2025 18:21:20.065895081 CEST192.168.2.138.8.8.80x8997Standard query (0)raw.intenseproxy.zip0256false
                                                Apr 26, 2025 18:21:20.215302944 CEST192.168.2.138.8.8.80x8997Standard query (0)raw.intenseproxy.zip0256false
                                                Apr 26, 2025 18:21:20.364442110 CEST192.168.2.138.8.8.80x8997Standard query (0)raw.intenseproxy.zip0256false
                                                Apr 26, 2025 18:21:20.514358044 CEST192.168.2.138.8.8.80x8997Standard query (0)raw.intenseproxy.zip0256false
                                                Apr 26, 2025 18:21:20.664330006 CEST192.168.2.138.8.8.80x8997Standard query (0)raw.intenseproxy.zip0256false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Apr 26, 2025 18:21:20.065020084 CEST8.8.8.8192.168.2.130x75c5No error (0)raw.intenseproxy.zip193.200.78.28A (IP address)IN (0x0001)false

                                                System Behavior

                                                Start time (UTC):16:21:18
                                                Start date (UTC):26/04/2025
                                                Path:/tmp/Aqua.x86_64.elf
                                                Arguments:/tmp/Aqua.x86_64.elf
                                                File size:71824 bytes
                                                MD5 hash:82cedcbf94d87951457555ef0f02419e

                                                Start time (UTC):16:21:18
                                                Start date (UTC):26/04/2025
                                                Path:/tmp/Aqua.x86_64.elf
                                                Arguments:-
                                                File size:71824 bytes
                                                MD5 hash:82cedcbf94d87951457555ef0f02419e

                                                Start time (UTC):16:21:18
                                                Start date (UTC):26/04/2025
                                                Path:/tmp/Aqua.x86_64.elf
                                                Arguments:-
                                                File size:71824 bytes
                                                MD5 hash:82cedcbf94d87951457555ef0f02419e

                                                Start time (UTC):16:21:19
                                                Start date (UTC):26/04/2025
                                                Path:/usr/libexec/gnome-session-binary
                                                Arguments:-
                                                File size:334664 bytes
                                                MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                                Start time (UTC):16:21:19
                                                Start date (UTC):26/04/2025
                                                Path:/bin/sh
                                                Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):16:21:19
                                                Start date (UTC):26/04/2025
                                                Path:/usr/libexec/gsd-rfkill
                                                Arguments:/usr/libexec/gsd-rfkill
                                                File size:51808 bytes
                                                MD5 hash:88a16a3c0aba1759358c06215ecfb5cc

                                                Start time (UTC):16:21:19
                                                Start date (UTC):26/04/2025
                                                Path:/usr/lib/systemd/systemd
                                                Arguments:-
                                                File size:1620224 bytes
                                                MD5 hash:9b2bec7092a40488108543f9334aab75

                                                Start time (UTC):16:21:19
                                                Start date (UTC):26/04/2025
                                                Path:/lib/systemd/systemd-hostnamed
                                                Arguments:/lib/systemd/systemd-hostnamed
                                                File size:35040 bytes
                                                MD5 hash:2cc8a5576629a2d5bd98e49a4b8bef65