Linux
Analysis Report
zsvc
Overview
General Information
Sample Name: | zsvc |
Analysis ID: | 583683 |
MD5: | 991fc745e45b15d782d13330e051d001 |
SHA1: | 2b55ad9f8bb2d9cd483f382b172b0ac6d8878b39 |
SHA256: | 1d1a234975bab10c6409fa5fde405ce3c5e65832c020f8fbd2958e1577065737 |
Infos: |
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Classification
Joe Sandbox Version: | 34.0.0 Boulder Opal |
Analysis ID: | 583683 |
Start date: | 05.03.2022 |
Start time: | 18:00:09 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 56s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | zsvc |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 16.04 x64 (Kernel 4.4.0-116, Firefox 59.0, Document Viewer 3.18.2, LibreOffice 5.1.6.2, OpenJDK 1.8.0_171) |
Analysis Mode: | default |
Detection: | MAL |
Classification: | mal64.evad.lin@0/3@5/0 |
- VT rate limit hit for: http://p3.feefreepool.net/cgi-bin/prometei.cgi?r=0&i=271872B6X2BPQ1Z2
Command: | /tmp/zsvc |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | Starting... System install...OK |
Standard Error: | Created symlink from /etc/systemd/system/multi-user.target.wants/uplugplay.service to /lib/systemd/system/uplugplay.service. |
- system is lnxubuntu1
- zsvc New Fork (PID: 6822, Parent: 6808)
- sh New Fork (PID: 6824, Parent: 6822)
- zsvc New Fork (PID: 6842, Parent: 6808)
- sh New Fork (PID: 6843, Parent: 6842)
- zsvc New Fork (PID: 6862, Parent: 6808)
- sh New Fork (PID: 6863, Parent: 6862)
- zsvc New Fork (PID: 6882, Parent: 6808)
- sh New Fork (PID: 6883, Parent: 6882)
- zsvc New Fork (PID: 6902, Parent: 6808)
- sh New Fork (PID: 6903, Parent: 6902)
- zsvc New Fork (PID: 6923, Parent: 6808)
- sh New Fork (PID: 6924, Parent: 6923)
- zsvc New Fork (PID: 6941, Parent: 6808)
- sh New Fork (PID: 6942, Parent: 6941)
- zsvc New Fork (PID: 6959, Parent: 6808)
- sh New Fork (PID: 6960, Parent: 6959)
- systemd New Fork (PID: 6962, Parent: 1)
- uplugplay New Fork (PID: 6988, Parent: 6962)
- uplugplay New Fork (PID: 6989, Parent: 6988)
- sh New Fork (PID: 6990, Parent: 6989)
- uplugplay New Fork (PID: 7011, Parent: 6990)
- sh New Fork (PID: 7012, Parent: 7011)
- uplugplay New Fork (PID: 7028, Parent: 6990)
- sh New Fork (PID: 7032, Parent: 7028)
- uplugplay New Fork (PID: 7042, Parent: 6990)
- sh New Fork (PID: 7048, Parent: 7042)
- uplugplay New Fork (PID: 7057, Parent: 6990)
- sh New Fork (PID: 7065, Parent: 7057)
- uplugplay New Fork (PID: 7082, Parent: 6990)
- sh New Fork (PID: 7086, Parent: 7082)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_ELF_LNX_UPX_Compressed_File | Detects a suspicious ELF binary with UPX compression | Florian Roth |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_ELF_LNX_UPX_Compressed_File | Detects a suspicious ELF binary with UPX compression | Florian Roth |
|
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior |
Source: | Reads CPU info from proc file: | Jump to behavior |
Networking |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Socket: | Jump to behavior |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Program segment: |
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Data Obfuscation |
---|
Source: | String containing UPX found: | ||
Source: | String containing UPX found: | ||
Source: | String containing UPX found: |
Source: | File written: | Jump to dropped file |
Source: | File: | Jump to behavior |
Source: | Reads from proc file: | Jump to behavior | ||
Source: | Reads from proc file: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior |
Source: | Systemctl executable: | Jump to behavior | ||
Source: | Systemctl executable: | Jump to behavior | ||
Source: | Systemctl executable: | Jump to behavior |
Source: | Pgrep executable: | Jump to behavior | ||
Source: | Pgrep executable: | Jump to behavior | ||
Source: | Pgrep executable: | Jump to behavior |
Source: | Stderr: Created symlink from /etc/systemd/system/multi-user.target.wants/uplugplay.service to /lib/systemd/system/uplugplay.service.: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File: | Jump to behavior |
Source: | File: | Jump to dropped file |
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior |
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Reads CPU info from proc file: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 1 Scripting | 1 Systemd Service | 1 Systemd Service | 1 Masquerading | 1 OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 2 Non-Application Layer Protocol | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 File and Directory Permissions Modification | LSASS Memory | 3 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 2 Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Scripting | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 1 Proxy | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 Obfuscated Files or Information | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | 1 Ingress Tool Transfer | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 1 File Deletion | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
39% | Virustotal | Browse | ||
29% | Metadefender | Browse | ||
57% | ReversingLabs | Linux.Backdoor.Prometei |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
29% | Metadefender | Browse | ||
57% | ReversingLabs | Linux.Backdoor.Prometei |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
9% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
p3.feefreepool.net | 88.198.246.242 | true | true |
| unknown |
xinchaoafccda.org | unknown | unknown | false | unknown | |
xinchaoafccda.net | unknown | unknown | false | unknown | |
xinchaoafccda.com | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
true |
| unknown | ||
false | high | |||
true |
| unknown | ||
true |
| unknown | ||
true |
| unknown | ||
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
88.198.246.242 | p3.feefreepool.net | Germany | 24940 | HETZNER-ASDE | true |
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
88.198.246.242 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
p3.feefreepool.net | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
HETZNER-ASDE | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Process: | /usr/sbin/uplugplay |
File Type: | |
Category: | dropped |
Size (bytes): | 16 |
Entropy (8bit): | 3.125 |
Encrypted: | false |
SSDEEP: | 3:yBrf:k |
MD5: | BBA52E97BA0A0E0865922C808110DC1F |
SHA1: | 079AC2E4EB0F89F28DC6920203B575C9C21C82F2 |
SHA-256: | B861FB16D047CE7601F245DCA34565DE3B91CD9690B4B5DD7965E2A87A4AED89 |
SHA-512: | 49B08749E89D08A95180B1B6162535C66A29DEE6679F39796D3A532F120C7D8C2BFBE7E55894EE0F2C68291DAC6FE81CB5B8FA8CE77D55297F8E06BAAF94EB02 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | /tmp/zsvc |
File Type: | |
Category: | dropped |
Size (bytes): | 145 |
Entropy (8bit): | 4.769509838572339 |
Encrypted: | false |
SSDEEP: | 3:zMZa75X1PxQJqtWA1+DRvBADMikAdIgQ+aQmNJX4ev+sirSkQmWA1+DRvn:z8uXcqtWA4RZAMD+aBNdhTILQmWA4Rv |
MD5: | 8CA62D1F47880BCE036C2956C9B7B272 |
SHA1: | 3BCC3A5C4FCC5B0D08C4524A59F6B8E113B62060 |
SHA-256: | C655D3D4E374FAD38313EC4262207B2D7D68A870238F203EF3C33F85E66C8E32 |
SHA-512: | 4CD2D9D67151FA25E833707DEE2442C4A5F752053FC2C36EC73C0E2B734C66CA69C63FCEB47714D9ADD5B9FE2EEE1E45BE5199E2CAE7C26173E766B333877DA6 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | /tmp/zsvc |
File Type: | |
Category: | dropped |
Size (bytes): | 426571 |
Entropy (8bit): | 7.9421347952552654 |
Encrypted: | false |
SSDEEP: | 12288:vuUGbSUQf6LndsBl8c7Imd7Bb7PfZwZfYEmvozMy6:vuuujdCr7X57HZwVEoi |
MD5: | 991FC745E45B15D782D13330E051D001 |
SHA1: | 2B55AD9F8BB2D9CD483F382B172B0AC6D8878B39 |
SHA-256: | 1D1A234975BAB10C6409FA5FDE405CE3C5E65832C020F8FBD2958E1577065737 |
SHA-512: | 4FA95F59FBA641AC50E8B838C18F2084BC93865521CB028862322673F2CA4A9F242F137771A8E431E325457A10CE5F81B623B4AC36431898F6102BF9F2BED936 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.9421347952552654 |
TrID: |
|
File name: | zsvc |
File size: | 426571 |
MD5: | 991fc745e45b15d782d13330e051d001 |
SHA1: | 2b55ad9f8bb2d9cd483f382b172b0ac6d8878b39 |
SHA256: | 1d1a234975bab10c6409fa5fde405ce3c5e65832c020f8fbd2958e1577065737 |
SHA512: | 4fa95f59fba641ac50e8b838c18f2084bc93865521cb028862322673f2ca4a9f242f137771a8e431e325457a10ce5f81b623b4ac36431898f6102bf9f2bed936 |
SSDEEP: | 12288:vuUGbSUQf6LndsBl8c7Imd7Bb7PfZwZfYEmvozMy6:vuuujdCr7X57HZwVEoi |
File Content Preview: | .ELF..............>......pF.....@...................@.8...@.......................@.......@......y.......y................................F.......F.............................Q.td....................................................k&1FUPX!$........(...(. |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | |
Entry Point Address: | |
Flags: | |
ELF Header Size: | |
Program Header Offset: | |
Program Header Size: | |
Number of Program Headers: | |
Section Header Offset: | |
Section Header Size: | |
Number of Section Headers: | |
Header String Table Index: |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x400000 | 0x400000 | 0x679a3 | 0x679a3 | 4.3374 | 0x5 | R E | 0x1000 | ||
LOAD | 0x0 | 0x468000 | 0x468000 | 0x0 | 0xe1d498 | 0.0000 | 0x6 | RW | 0x1000 | ||
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x10 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 5, 2022 18:00:50.239248991 CET | 33090 | 80 | 192.168.2.20 | 88.198.246.242 |
Mar 5, 2022 18:00:50.262495041 CET | 80 | 33090 | 88.198.246.242 | 192.168.2.20 |
Mar 5, 2022 18:00:50.262767076 CET | 33090 | 80 | 192.168.2.20 | 88.198.246.242 |
Mar 5, 2022 18:00:50.263353109 CET | 33090 | 80 | 192.168.2.20 | 88.198.246.242 |
Mar 5, 2022 18:00:50.317595959 CET | 80 | 33090 | 88.198.246.242 | 192.168.2.20 |
Mar 5, 2022 18:00:50.317651033 CET | 80 | 33090 | 88.198.246.242 | 192.168.2.20 |
Mar 5, 2022 18:00:50.318099022 CET | 33090 | 80 | 192.168.2.20 | 88.198.246.242 |
Mar 5, 2022 18:00:50.318144083 CET | 33090 | 80 | 192.168.2.20 | 88.198.246.242 |
Mar 5, 2022 18:00:50.340490103 CET | 80 | 33090 | 88.198.246.242 | 192.168.2.20 |
Mar 5, 2022 18:00:50.472883940 CET | 33092 | 80 | 192.168.2.20 | 88.198.246.242 |
Mar 5, 2022 18:00:50.494786024 CET | 80 | 33092 | 88.198.246.242 | 192.168.2.20 |
Mar 5, 2022 18:00:50.495035887 CET | 33092 | 80 | 192.168.2.20 | 88.198.246.242 |
Mar 5, 2022 18:00:50.495316982 CET | 33092 | 80 | 192.168.2.20 | 88.198.246.242 |
Mar 5, 2022 18:00:50.553150892 CET | 80 | 33092 | 88.198.246.242 | 192.168.2.20 |
Mar 5, 2022 18:00:50.553462029 CET | 80 | 33092 | 88.198.246.242 | 192.168.2.20 |
Mar 5, 2022 18:00:50.553647041 CET | 33092 | 80 | 192.168.2.20 | 88.198.246.242 |
Mar 5, 2022 18:00:50.553692102 CET | 33092 | 80 | 192.168.2.20 | 88.198.246.242 |
Mar 5, 2022 18:00:50.575483084 CET | 80 | 33092 | 88.198.246.242 | 192.168.2.20 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 5, 2022 18:00:50.218703032 CET | 49342 | 53 | 192.168.2.20 | 8.8.8.8 |
Mar 5, 2022 18:00:50.238817930 CET | 53 | 49342 | 8.8.8.8 | 192.168.2.20 |
Mar 5, 2022 18:00:50.454821110 CET | 36275 | 53 | 192.168.2.20 | 8.8.8.8 |
Mar 5, 2022 18:00:50.472604036 CET | 53 | 36275 | 8.8.8.8 | 192.168.2.20 |
Mar 5, 2022 18:00:51.520899057 CET | 33648 | 80 | 192.168.2.20 | 88.198.246.242 |
Mar 5, 2022 18:02:51.672333002 CET | 48541 | 53 | 192.168.2.20 | 8.8.8.8 |
Mar 5, 2022 18:02:51.692214012 CET | 53 | 48541 | 8.8.8.8 | 192.168.2.20 |
Mar 5, 2022 18:02:51.693572044 CET | 45615 | 53 | 192.168.2.20 | 8.8.8.8 |
Mar 5, 2022 18:02:51.716672897 CET | 33648 | 80 | 192.168.2.20 | 88.198.246.242 |
Mar 5, 2022 18:02:51.775576115 CET | 53 | 45615 | 8.8.8.8 | 192.168.2.20 |
Mar 5, 2022 18:02:51.777101994 CET | 39967 | 53 | 192.168.2.20 | 8.8.8.8 |
Mar 5, 2022 18:02:51.803783894 CET | 53 | 39967 | 8.8.8.8 | 192.168.2.20 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Mar 5, 2022 18:00:50.218703032 CET | 192.168.2.20 | 8.8.8.8 | 0x1b4e | Standard query (0) | A (IP address) | IN (0x0001) | |
Mar 5, 2022 18:00:50.454821110 CET | 192.168.2.20 | 8.8.8.8 | 0x1b4e | Standard query (0) | A (IP address) | IN (0x0001) | |
Mar 5, 2022 18:02:51.672333002 CET | 192.168.2.20 | 8.8.8.8 | 0x1b4e | Standard query (0) | A (IP address) | IN (0x0001) | |
Mar 5, 2022 18:02:51.693572044 CET | 192.168.2.20 | 8.8.8.8 | 0x1b4e | Standard query (0) | A (IP address) | IN (0x0001) | |
Mar 5, 2022 18:02:51.777101994 CET | 192.168.2.20 | 8.8.8.8 | 0x1b4e | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Mar 5, 2022 18:00:50.238817930 CET | 8.8.8.8 | 192.168.2.20 | 0x1b4e | No error (0) | 88.198.246.242 | A (IP address) | IN (0x0001) | ||
Mar 5, 2022 18:00:50.472604036 CET | 8.8.8.8 | 192.168.2.20 | 0x1b4e | No error (0) | 88.198.246.242 | A (IP address) | IN (0x0001) | ||
Mar 5, 2022 18:02:51.692214012 CET | 8.8.8.8 | 192.168.2.20 | 0x1b4e | Name error (3) | none | none | A (IP address) | IN (0x0001) | |
Mar 5, 2022 18:02:51.775576115 CET | 8.8.8.8 | 192.168.2.20 | 0x1b4e | Name error (3) | none | none | A (IP address) | IN (0x0001) | |
Mar 5, 2022 18:02:51.803783894 CET | 8.8.8.8 | 192.168.2.20 | 0x1b4e | Name error (3) | none | none | A (IP address) | IN (0x0001) |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
0 | 192.168.2.20 | 33090 | 88.198.246.242 | 80 |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Mar 5, 2022 18:00:50.263353109 CET | 0 | OUT | |
Mar 5, 2022 18:00:50.317595959 CET | 0 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port |
---|---|---|---|---|
1 | 192.168.2.20 | 33092 | 88.198.246.242 | 80 |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Mar 5, 2022 18:00:50.495316982 CET | 2 | OUT | |
Mar 5, 2022 18:00:50.553150892 CET | 2 | IN |
System Behavior
Start time: | 18:00:44 |
Start date: | 05/03/2022 |
Path: | /tmp/zsvc |
Arguments: | /tmp/zsvc |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:44 |
Start date: | 05/03/2022 |
Path: | /tmp/zsvc |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:44 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c "pgrep zsvc" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:44 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:44 |
Start date: | 05/03/2022 |
Path: | /usr/bin/pgrep |
Arguments: | pgrep zsvc |
File size: | 27280 bytes |
MD5 hash: | f3b843351a404d4e8d4ce0ed0775fa9c |
Start time: | 18:00:44 |
Start date: | 05/03/2022 |
Path: | /tmp/zsvc |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:44 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c "pgrep uplugplay" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:44 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:44 |
Start date: | 05/03/2022 |
Path: | /usr/bin/pgrep |
Arguments: | pgrep uplugplay |
File size: | 27280 bytes |
MD5 hash: | f3b843351a404d4e8d4ce0ed0775fa9c |
Start time: | 18:00:45 |
Start date: | 05/03/2022 |
Path: | /tmp/zsvc |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:45 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c "pidof uplugplay" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:45 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:45 |
Start date: | 05/03/2022 |
Path: | /bin/pidof |
Arguments: | pidof uplugplay |
File size: | 14 bytes |
MD5 hash: | 1927a3fb9f656f7b53b72c92cbbecfe9 |
Start time: | 18:00:46 |
Start date: | 05/03/2022 |
Path: | /tmp/zsvc |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:46 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c "pgrep upnpsetup" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:46 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:46 |
Start date: | 05/03/2022 |
Path: | /usr/bin/pgrep |
Arguments: | pgrep upnpsetup |
File size: | 27280 bytes |
MD5 hash: | f3b843351a404d4e8d4ce0ed0775fa9c |
Start time: | 18:00:47 |
Start date: | 05/03/2022 |
Path: | /tmp/zsvc |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:47 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c "pidof upnpsetup" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:47 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:47 |
Start date: | 05/03/2022 |
Path: | /bin/pidof |
Arguments: | pidof upnpsetup |
File size: | 14 bytes |
MD5 hash: | 1927a3fb9f656f7b53b72c92cbbecfe9 |
Start time: | 18:00:48 |
Start date: | 05/03/2022 |
Path: | /tmp/zsvc |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:48 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c "systemctl daemon-reload" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:48 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:48 |
Start date: | 05/03/2022 |
Path: | /bin/systemctl |
Arguments: | systemctl daemon-reload |
File size: | 659848 bytes |
MD5 hash: | b08096235b8c90203e17721264b5ce40 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /tmp/zsvc |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c "systemctl enable uplugplay.service" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/systemctl |
Arguments: | systemctl enable uplugplay.service |
File size: | 659848 bytes |
MD5 hash: | b08096235b8c90203e17721264b5ce40 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /tmp/zsvc |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c "systemctl start uplugplay.service" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/systemctl |
Arguments: | systemctl start uplugplay.service |
File size: | 659848 bytes |
MD5 hash: | b08096235b8c90203e17721264b5ce40 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /lib/systemd/systemd |
Arguments: | n/a |
File size: | 0 bytes |
MD5 hash: | unknown |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /usr/sbin/uplugplay |
Arguments: | /usr/sbin/uplugplay |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /usr/sbin/uplugplay |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /usr/sbin/uplugplay |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c "/usr/sbin/uplugplay -Dcomsvc" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /usr/sbin/uplugplay |
Arguments: | /usr/sbin/uplugplay -Dcomsvc |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /usr/sbin/uplugplay |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c "cat /proc/cpuinfo" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/cat |
Arguments: | cat /proc/cpuinfo |
File size: | 52080 bytes |
MD5 hash: | efa10d52f37361f2e3a5d22742f0fcc4 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /usr/sbin/uplugplay |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c "dmidecode --type baseboard" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /usr/sbin/dmidecode |
Arguments: | dmidecode --type baseboard |
File size: | 104952 bytes |
MD5 hash: | cdb63a6daba7a995ddd1d3d0a5fef8a6 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /usr/sbin/uplugplay |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c "cat /etc/os-release" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/cat |
Arguments: | cat /etc/os-release |
File size: | 52080 bytes |
MD5 hash: | efa10d52f37361f2e3a5d22742f0fcc4 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /usr/sbin/uplugplay |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c uptime |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /usr/bin/uptime |
Arguments: | uptime |
File size: | 10576 bytes |
MD5 hash: | 8796b6264c7fd70904d2192ddb5ebf9a |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /usr/sbin/uplugplay |
Arguments: | n/a |
File size: | 426571 bytes |
MD5 hash: | 991fc745e45b15d782d13330e051d001 |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | sh -c "uname -a" |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
Start time: | 18:00:49 |
Start date: | 05/03/2022 |
Path: | /bin/uname |
Arguments: | uname -a |
File size: | 31440 bytes |
MD5 hash: | 1078d9dca4e90919f7b2433cae105008 |