Play interactive tourEdit tour
Linux Analysis Report 1TnmkstVG8
Overview
General Information
Sample Name: | 1TnmkstVG8 |
Analysis ID: | 511513 |
MD5: | 2f7ce4fdab3edd7aed014bd5a124c718 |
SHA1: | 0b1e76fac74052db6e7a342cdba0f90622100093 |
SHA256: | 6597350ca45adfe532bd93ffde9c92d98f2ed1ecedd4d7d73c6dd147b0b613a9 |
Tags: | 32elfmiraisparc |
Infos: |
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Multi AV Scanner detection for submitted file
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Classification
Analysis Advice |
---|
Static ELF header machine description suggests that the sample might not execute correctly on this machine |
General Information |
---|
Joe Sandbox Version: | 34.0.0 Boulder Opal |
Analysis ID: | 511513 |
Start date: | 29.10.2021 |
Start time: | 08:49:09 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 52s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | 1TnmkstVG8 |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Detection: | MAL |
Classification: | mal48.lin@0/1@0/0 |
Process Tree |
---|
|
Yara Overview |
---|
No yara matches |
---|
Jbx Signature Overview |
---|
Click to jump to signature section
Show All Signature Results
AV Detection: |
---|
Multi AV Scanner detection for submitted file | Show sources |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | HTTPS traffic detected: |
Source: | TCP traffic: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: |
Source: | HTTPS traffic detected: |
Source: | .symtab present: |
Source: | Classification label: |
Source: | Joe Sandbox Cloud Basic: | Perma Link |
Source: | Rm executable: |
Source: | Queries kernel information via 'uname': |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | File Deletion1 | OS Credential Dumping | Security Software Discovery11 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Non-Standard Port1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Application Layer Protocol1 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Malware Configuration |
---|
No configs have been found |
---|
Behavior Graph |
---|
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
21% | Virustotal | Browse | ||
16% | ReversingLabs | Linux.Trojan.Mirai |
Dropped Files |
---|
No Antivirus matches |
---|
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
No Antivirus matches |
---|
Domains and IPs |
---|
Contacted Domains |
---|
No contacted domains info |
---|
URLs from Memory and Binaries |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
Public |
---|
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
34.249.145.219 | unknown | United States | 16509 | AMAZON-02US | false | |
45.95.169.120 | unknown | Croatia (LOCAL Name: Hrvatska) | 42864 | GIGANET-HUGigaNetInternetServiceProviderCoHU | false | |
46.244.112.164 | unknown | Netherlands | 51088 | A2BNL | false | |
109.202.202.202 | unknown | Switzerland | 13030 | INIT7CH | false | |
189.57.206.167 | unknown | Brazil | 10429 | TELEFONICABRASILSABR | false | |
37.80.245.107 | unknown | Germany | 3320 | DTAGInternetserviceprovideroperationsDE | false | |
91.189.91.43 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false | |
91.189.91.42 | unknown | United Kingdom | 41231 | CANONICAL-ASGB | false |
Runtime Messages |
---|
Command: | /tmp/1TnmkstVG8 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: |
Joe Sandbox View / Context |
---|
IPs |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
34.249.145.219 | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
45.95.169.120 | Get hash | malicious | Browse | ||
109.202.202.202 | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
91.189.91.43 | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse |
Domains |
---|
No context |
---|
ASN |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
GIGANET-HUGigaNetInternetServiceProviderCoHU | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
A2BNL | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
AMAZON-02US | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
JA3 Fingerprints |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
fb4726d465c5f28b84cd6d14cedd13a7 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Dropped Files |
---|
No context |
---|
Created / dropped Files |
---|
Process: | /usr/bin/cut |
File Type: | |
Category: | dropped |
Size (bytes): | 191 |
Entropy (8bit): | 4.515771857099866 |
Encrypted: | false |
SSDEEP: | 3:P2lnI+5MsqqzNLz+FRNScHUBfRau95++sZzR5woLB1Fh0VTGTl/X5kURn:OZ8uNLzDc0pR75+9Zz/woFmIT52URn |
MD5: | DD514F892B5F93ED615D366E58AC58AF |
SHA1: | BA75EDB3C2232CC260BC187F604DC8F25AA72C11 |
SHA-256: | F40D0DCE6E83DF74109FEF5E68E51CC255727783EEAE04C3E34677E23F7552CF |
SHA-512: | 9150BDE63F6C4850C5340D8877892B4D9BBF9EBDC98CDCF557A93FA304C1222CEE446418F5BE2ACCDBF38393778AFA5D4F3EDCB37A47BF57D3A4B2DEAD42A2D0 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 6.100479824147886 |
TrID: |
|
File name: | 1TnmkstVG8 |
File size: | 38344 |
MD5: | 2f7ce4fdab3edd7aed014bd5a124c718 |
SHA1: | 0b1e76fac74052db6e7a342cdba0f90622100093 |
SHA256: | 6597350ca45adfe532bd93ffde9c92d98f2ed1ecedd4d7d73c6dd147b0b613a9 |
SHA512: | 3ccfd7025235684ef7663b204620b372536a484a10695705a1e0cb6aaa9af6baddc9f4fb7889a6f34394f2223a15031e5312917b9491535a4e63d0bca6aac98c |
SSDEEP: | 384:scwxATYTY/41v0pvRFU+preqdBrF6wleRlJT0nJ2JMjP5:scwxAEM9RO+l8t4Nh |
File Content Preview: | .ELF...........................4...8.....4. ...(..........................................................!.........dt.Q................................@..(....@..y................#.....c...`.....!..... ,..@.....".........`......$ ,.. ,..@...........`.... |
Static ELF Info |
---|
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | |
Entry Point Address: | |
Flags: | |
ELF Header Size: | |
Program Header Offset: | |
Program Header Size: | |
Number of Program Headers: | |
Section Header Offset: | |
Section Header Size: | |
Number of Section Headers: | |
Header String Table Index: |
Sections |
---|
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x10094 | 0x94 | 0x1c | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.text | PROGBITS | 0x100b0 | 0xb0 | 0x7a1c | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.fini | PROGBITS | 0x17acc | 0x7acc | 0x14 | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.rodata | PROGBITS | 0x17ae0 | 0x7ae0 | 0x530 | 0x0 | 0x2 | A | 0 | 0 | 8 |
.ctors | PROGBITS | 0x28014 | 0x8014 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.dtors | PROGBITS | 0x2801c | 0x801c | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x28028 | 0x8028 | 0x13d0 | 0x0 | 0x3 | WA | 0 | 0 | 8 |
.bss | NOBITS | 0x293f8 | 0x93f8 | 0xdb0 | 0x0 | 0x3 | WA | 0 | 0 | 8 |
.shstrtab | STRTAB | 0x0 | 0x93f8 | 0x3e | 0x0 | 0x0 | 0 | 0 | 1 |
Program Segments |
---|
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x10000 | 0x10000 | 0x8010 | 0x8010 | 3.5125 | 0x5 | R E | 0x10000 | .init .text .fini .rodata | |
LOAD | 0x8014 | 0x28014 | 0x28014 | 0x13e4 | 0x2194 | 1.7574 | 0x6 | RW | 0x10000 | .ctors .dtors .data .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x4 |
Network Behavior |
---|
Network Port Distribution |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 29, 2021 08:49:51.233458042 CEST | 56596 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:49:52.254165888 CEST | 56596 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:49:53.470083952 CEST | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Oct 29, 2021 08:49:54.238035917 CEST | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Oct 29, 2021 08:49:54.270015955 CEST | 56596 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:49:58.333842993 CEST | 56596 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:50:02.579926014 CEST | 23 | 45062 | 189.57.206.167 | 192.168.2.23 |
Oct 29, 2021 08:50:02.580113888 CEST | 23 | 45062 | 189.57.206.167 | 192.168.2.23 |
Oct 29, 2021 08:50:02.580205917 CEST | 45062 | 23 | 192.168.2.23 | 189.57.206.167 |
Oct 29, 2021 08:50:02.580256939 CEST | 45062 | 23 | 192.168.2.23 | 189.57.206.167 |
Oct 29, 2021 08:50:03.311676979 CEST | 23 | 47456 | 37.80.245.107 | 192.168.2.23 |
Oct 29, 2021 08:50:03.311985970 CEST | 47456 | 23 | 192.168.2.23 | 37.80.245.107 |
Oct 29, 2021 08:50:03.319192886 CEST | 23 | 47456 | 37.80.245.107 | 192.168.2.23 |
Oct 29, 2021 08:50:03.319333076 CEST | 47456 | 23 | 192.168.2.23 | 37.80.245.107 |
Oct 29, 2021 08:50:06.525520086 CEST | 56596 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:50:08.573417902 CEST | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Oct 29, 2021 08:50:16.160259962 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.205056906 CEST | 443 | 39244 | 34.249.145.219 | 192.168.2.23 |
Oct 29, 2021 08:50:16.205240965 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.205849886 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.249986887 CEST | 443 | 39244 | 34.249.145.219 | 192.168.2.23 |
Oct 29, 2021 08:50:16.251286983 CEST | 443 | 39244 | 34.249.145.219 | 192.168.2.23 |
Oct 29, 2021 08:50:16.251306057 CEST | 443 | 39244 | 34.249.145.219 | 192.168.2.23 |
Oct 29, 2021 08:50:16.251370907 CEST | 443 | 39244 | 34.249.145.219 | 192.168.2.23 |
Oct 29, 2021 08:50:16.251374006 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.251384974 CEST | 443 | 39244 | 34.249.145.219 | 192.168.2.23 |
Oct 29, 2021 08:50:16.251399994 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.251410961 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.251435041 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.252171040 CEST | 443 | 39244 | 34.249.145.219 | 192.168.2.23 |
Oct 29, 2021 08:50:16.252213955 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.254503012 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.299272060 CEST | 443 | 39244 | 34.249.145.219 | 192.168.2.23 |
Oct 29, 2021 08:50:16.299439907 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.299820900 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.345458984 CEST | 443 | 39244 | 34.249.145.219 | 192.168.2.23 |
Oct 29, 2021 08:50:16.345611095 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.347381115 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.393722057 CEST | 443 | 39244 | 34.249.145.219 | 192.168.2.23 |
Oct 29, 2021 08:50:16.393734932 CEST | 443 | 39244 | 34.249.145.219 | 192.168.2.23 |
Oct 29, 2021 08:50:16.393800020 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:16.393822908 CEST | 39244 | 443 | 192.168.2.23 | 34.249.145.219 |
Oct 29, 2021 08:50:20.860939026 CEST | 42836 | 443 | 192.168.2.23 | 91.189.91.43 |
Oct 29, 2021 08:50:22.652750015 CEST | 56596 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:50:24.956691027 CEST | 42516 | 80 | 192.168.2.23 | 109.202.202.202 |
Oct 29, 2021 08:50:49.531693935 CEST | 43928 | 443 | 192.168.2.23 | 91.189.91.42 |
Oct 29, 2021 08:50:55.675467014 CEST | 56596 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:50:55.709491014 CEST | 455 | 56596 | 45.95.169.120 | 192.168.2.23 |
Oct 29, 2021 08:50:55.710903883 CEST | 56600 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:50:55.749160051 CEST | 455 | 56600 | 45.95.169.120 | 192.168.2.23 |
Oct 29, 2021 08:50:55.749802113 CEST | 56602 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:50:56.763346910 CEST | 56602 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:50:57.466229916 CEST | 23 | 45104 | 46.244.112.164 | 192.168.2.23 |
Oct 29, 2021 08:50:57.466480970 CEST | 45104 | 23 | 192.168.2.23 | 46.244.112.164 |
Oct 29, 2021 08:50:58.779268980 CEST | 56602 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:51:02.843082905 CEST | 56602 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:51:11.034754992 CEST | 56602 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:51:27.162185907 CEST | 56602 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:51:27.195202112 CEST | 455 | 56602 | 45.95.169.120 | 192.168.2.23 |
Oct 29, 2021 08:51:27.195672989 CEST | 56606 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:51:27.229099989 CEST | 455 | 56606 | 45.95.169.120 | 192.168.2.23 |
Oct 29, 2021 08:51:27.229629993 CEST | 56608 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:51:27.262991905 CEST | 455 | 56608 | 45.95.169.120 | 192.168.2.23 |
Oct 29, 2021 08:51:27.263380051 CEST | 56610 | 455 | 192.168.2.23 | 45.95.169.120 |
Oct 29, 2021 08:51:27.296152115 CEST | 455 | 56610 | 45.95.169.120 | 192.168.2.23 |
HTTPS Packets |
---|
Timestamp | Source IP | Source Port | Dest IP | Dest Port | Subject | Issuer | Not Before | Not After | JA3 SSL Client Fingerprint | JA3 SSL Client Digest |
---|---|---|---|---|---|---|---|---|---|---|
Oct 29, 2021 08:50:16.252171040 CEST | 34.249.145.219 | 443 | 192.168.2.23 | 39244 | CN=motd.ubuntu.com CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US | CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US CN=DST Root CA X3, O=Digital Signature Trust Co. | Tue Sep 07 13:50:45 CEST 2021 Fri Sep 04 02:00:00 CEST 2020 Wed Jan 20 20:14:03 CET 2021 | Mon Dec 06 12:50:44 CET 2021 Mon Sep 15 18:00:00 CEST 2025 Mon Sep 30 20:14:03 CEST 2024 | 771,4866-4867-4865-49196-49200-163-159-52393-52392-52394-49327-49325-49315-49311-49245-49249-49239-49235-49195-49199-162-158-49326-49324-49314-49310-49244-49248-49238-49234-49188-49192-107-106-49267-49271-196-195-49187-49191-103-64-49266-49270-190-189-49162-49172-57-56-136-135-49161-49171-51-50-69-68-157-49313-49309-49233-156-49312-49308-49232-61-192-60-186-53-132-47-65-255,0-11-10-35-22-23-13-43-45-51,29-23-30-25-24,0-1-2 | fb4726d465c5f28b84cd6d14cedd13a7 |
CN=R3, O=Let's Encrypt, C=US | CN=ISRG Root X1, O=Internet Security Research Group, C=US | Fri Sep 04 02:00:00 CEST 2020 | Mon Sep 15 18:00:00 CEST 2025 | |||||||
CN=ISRG Root X1, O=Internet Security Research Group, C=US | CN=DST Root CA X3, O=Digital Signature Trust Co. | Wed Jan 20 20:14:03 CET 2021 | Mon Sep 30 20:14:03 CEST 2024 |
System Behavior |
---|
General |
---|
Start time: | 08:49:50 |
Start date: | 29/10/2021 |
Path: | /tmp/1TnmkstVG8 |
Arguments: | /tmp/1TnmkstVG8 |
File size: | 4379400 bytes |
MD5 hash: | 7dc1c0e23cd5e102bb12e5c29403410e |
General |
---|
Start time: | 08:49:50 |
Start date: | 29/10/2021 |
Path: | /tmp/1TnmkstVG8 |
Arguments: | n/a |
File size: | 4379400 bytes |
MD5 hash: | 7dc1c0e23cd5e102bb12e5c29403410e |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/dash |
Arguments: | n/a |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/cat |
Arguments: | cat /tmp/tmp.gtT3aisjF5 |
File size: | 43416 bytes |
MD5 hash: | 7e9d213e404ad3bb82e4ebb2e1f2c1b3 |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/dash |
Arguments: | n/a |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/head |
Arguments: | head -n 10 |
File size: | 47480 bytes |
MD5 hash: | fd96a67145172477dd57131396fc9608 |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/dash |
Arguments: | n/a |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/tr |
Arguments: | tr -d \\000-\\011\\013\\014\\016-\\037 |
File size: | 51544 bytes |
MD5 hash: | fbd1402dd9f72d8ebfff00ce7c3a7bb5 |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/dash |
Arguments: | n/a |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/cut |
Arguments: | cut -c -80 |
File size: | 47480 bytes |
MD5 hash: | d8ed0ea8f22c0de0f8692d4d9f1759d3 |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/dash |
Arguments: | n/a |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/cat |
Arguments: | cat /tmp/tmp.gtT3aisjF5 |
File size: | 43416 bytes |
MD5 hash: | 7e9d213e404ad3bb82e4ebb2e1f2c1b3 |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/dash |
Arguments: | n/a |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/head |
Arguments: | head -n 10 |
File size: | 47480 bytes |
MD5 hash: | fd96a67145172477dd57131396fc9608 |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/dash |
Arguments: | n/a |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/tr |
Arguments: | tr -d \\000-\\011\\013\\014\\016-\\037 |
File size: | 51544 bytes |
MD5 hash: | fbd1402dd9f72d8ebfff00ce7c3a7bb5 |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/dash |
Arguments: | n/a |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/cut |
Arguments: | cut -c -80 |
File size: | 47480 bytes |
MD5 hash: | d8ed0ea8f22c0de0f8692d4d9f1759d3 |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/dash |
Arguments: | n/a |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
General |
---|
Start time: | 08:50:15 |
Start date: | 29/10/2021 |
Path: | /usr/bin/rm |
Arguments: | rm -f /tmp/tmp.gtT3aisjF5 /tmp/tmp.0HpvoUv25y /tmp/tmp.kZRxhtfsZX |
File size: | 72056 bytes |
MD5 hash: | aa2b5496fdbfd88e38791ab81f90b95b |