Edit tour

Linux Analysis Report
KGkoLgvOGp.elf

Overview

General Information

Sample Name:KGkoLgvOGp.elf
Original Sample Name:24b923862a5e92038b93fbb6055d47ea.elf
Analysis ID:858973
MD5:24b923862a5e92038b93fbb6055d47ea
SHA1:f82fdcd4f27fc3ac895b0b20262793d06cdceb99
SHA256:920f0d8be6f53b0cf95f393664d99288af0fafca06a826f520c1d77160b7c5f6
Tags:64elfgafgytMirai
Infos:

Detection

Moobot
Score:88
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Moobot
Snort IDS alert for network traffic
Machine Learning detection for sample
Uses dynamic DNS services
Yara signature match
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Joe Sandbox Version:37.1.0 Beryl
Analysis ID:858973
Start date and time:2023-05-04 12:41:42 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 27s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample file name:KGkoLgvOGp.elf
Original Sample Name:24b923862a5e92038b93fbb6055d47ea.elf
Detection:MAL
Classification:mal88.troj.linELF@0/0@1/0
  • VT rate limit hit for: lkavsjdnbah.ddns.net
Command:/tmp/KGkoLgvOGp.elf
PID:6230
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
listening to tun0
Standard Error:
  • system is lnxubuntu20
  • udisksd New Fork (PID: 6241, Parent: 799)
  • dumpe2fs (PID: 6241, Parent: 799, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • cleanup
SourceRuleDescriptionAuthorStrings
KGkoLgvOGp.elfSUSP_XORed_MozillaDetects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.Florian Roth (Nextron Systems)
  • 0x10d08:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0x10d78:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0x10de8:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0x10e58:$xo1: oMXKNNC\x0D\x17\x0C\x12
  • 0x10ec8:$xo1: oMXKNNC\x0D\x17\x0C\x12
KGkoLgvOGp.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    KGkoLgvOGp.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
    • 0xc8c0:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
    KGkoLgvOGp.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
    • 0xd0af:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
    KGkoLgvOGp.elfLinux_Trojan_Gafgyt_ea92cca8unknownunknown
    • 0x103e0:$a: 53 65 6C 66 20 52 65 70 20 46 75 63 6B 69 6E 67 20 4E 65 54 69 53 20 61 6E 64
    Click to see the 11 entries
    SourceRuleDescriptionAuthorStrings
    6230.1.0000000000c6c000.0000000000c6e000.rw-.sdmpSUSP_XORed_MozillaDetects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.Florian Roth (Nextron Systems)
    • 0x6f0:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x770:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x7f0:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x870:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x8f0:$xo1: oMXKNNC\x0D\x17\x0C\x12
    6230.1.0000000000400000.0000000000413000.r-x.sdmpSUSP_XORed_MozillaDetects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.Florian Roth (Nextron Systems)
    • 0x10d08:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x10d78:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x10de8:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x10e58:$xo1: oMXKNNC\x0D\x17\x0C\x12
    • 0x10ec8:$xo1: oMXKNNC\x0D\x17\x0C\x12
    6230.1.0000000000400000.0000000000413000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
      6230.1.0000000000400000.0000000000413000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
      • 0xc8c0:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
      6230.1.0000000000400000.0000000000413000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
      • 0xd0af:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
      Click to see the 14 entries
      Timestamp:192.168.2.23205.185.123.504799862852030490 05/04/23-12:42:30.302977
      SID:2030490
      Source Port:47998
      Destination Port:6285
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:205.185.123.50192.168.2.236285479982030489 05/04/23-12:45:56.495659
      SID:2030489
      Source Port:6285
      Destination Port:47998
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: KGkoLgvOGp.elfAvira: detected
      Source: KGkoLgvOGp.elfReversingLabs: Detection: 64%
      Source: KGkoLgvOGp.elfVirustotal: Detection: 61%Perma Link
      Source: KGkoLgvOGp.elfJoe Sandbox ML: detected

      Networking

      barindex
      Source: TrafficSnort IDS: 2030490 ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) 192.168.2.23:47998 -> 205.185.123.50:6285
      Source: TrafficSnort IDS: 2030489 ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response 205.185.123.50:6285 -> 192.168.2.23:47998
      Source: unknownDNS query: name: lkavsjdnbah.ddns.net
      Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
      Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
      Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
      Source: global trafficTCP traffic: 192.168.2.23:47998 -> 205.185.123.50:6285
      Source: /tmp/KGkoLgvOGp.elf (PID: 6230)Socket: 127.0.0.1::6628Jump to behavior
      Source: unknownDNS traffic detected: queries for: lkavsjdnbah.ddns.net
      Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
      Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
      Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
      Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42

      System Summary

      barindex
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
      Source: Process Memory Space: KGkoLgvOGp.elf PID: 6230, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth (Nextron Systems), description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
      Source: KGkoLgvOGp.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
      Source: 6230.1.0000000000c6c000.0000000000c6e000.rw-.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth (Nextron Systems), description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth (Nextron Systems), description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_1e0c5ce0 reference_sample = 5b1f95840caebf9721bf318126be27085ec08cf7881ec64a884211a934351c2d, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 8e45538b59f9c9b8bc49661069044900c8199e487714c715c1b1f970fd528e3b, id = 1e0c5ce0-3b76-4da4-8bed-2e5036b6ce79, last_modified = 2021-09-16
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
      Source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
      Source: Process Memory Space: KGkoLgvOGp.elf PID: 6230, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: Initial sampleString containing 'busybox' found: /bin/busybox
      Source: Initial sampleString containing 'busybox' found: /proc/self/exe/bin/busybox/proc/%d/etc/dosbotcantkill//proc/%sjx3k9zqo7h/lib/systemd/usr/lib/systemd/systemd/usr/lib/openssh/sftp-server/sys/system/dvr/main/usr/mnt/mtd/org/userfs/home/process/net_process/var/tmp/sonia/usr/sbin/usr/bin/mnt/gm/bin/var/Sofia/usr/sbin/sshd/usr/sbin/ntpd/usr/sbin/cupsd/usr/lib/apt/methods/http/usr/sbin/crond/usr/sbin/rsyslogd/usr/sbin/inetd/usr/sbin/dnsmasq/usr/bin/DVRServer/usr/bin/DVRShell/usr/bin/DVRControl/usr/bin/DVRRemoteAgent/usr/bin/DVRNetService/usr/libexec/openssh/sftp-serverM
      Source: classification engineClassification label: mal88.troj.linELF@0/0@1/0
      Source: /tmp/KGkoLgvOGp.elf (PID: 6232)Queries kernel information via 'uname': Jump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: KGkoLgvOGp.elf, type: SAMPLE
      Source: Yara matchFile source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: KGkoLgvOGp.elf PID: 6230, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: KGkoLgvOGp.elf, type: SAMPLE
      Source: Yara matchFile source: 6230.1.0000000000400000.0000000000413000.r-x.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: KGkoLgvOGp.elf PID: 6230, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping1
      Security Software Discovery
      Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
      Non-Standard Port
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Non-Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer12
      Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 858973 Sample: KGkoLgvOGp.elf Startdate: 04/05/2023 Architecture: LINUX Score: 88 15 lkavsjdnbah.ddns.net 205.185.123.50, 47998, 6285 PONYNETUS United States 2->15 17 109.202.202.202, 80 INIT7CH Switzerland 2->17 19 2 other IPs or domains 2->19 21 Snort IDS alert for network traffic 2->21 23 Malicious sample detected (through community Yara rule) 2->23 25 Antivirus / Scanner detection for submitted sample 2->25 27 4 other signatures 2->27 7 KGkoLgvOGp.elf 2->7         started        9 udisksd dumpe2fs 2->9         started        signatures3 process4 process5 11 KGkoLgvOGp.elf 7->11         started        13 KGkoLgvOGp.elf 7->13         started       
      SourceDetectionScannerLabelLink
      KGkoLgvOGp.elf65%ReversingLabsLinux.Trojan.Mirai
      KGkoLgvOGp.elf61%VirustotalBrowse
      KGkoLgvOGp.elf100%AviraEXP/ELF.Gafgyt.Gen.I
      KGkoLgvOGp.elf100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches

      Download Network PCAP: filteredfull

      NameIPActiveMaliciousAntivirus DetectionReputation
      lkavsjdnbah.ddns.net
      205.185.123.50
      truetrue
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        205.185.123.50
        lkavsjdnbah.ddns.netUnited States
        53667PONYNETUStrue
        109.202.202.202
        unknownSwitzerland
        13030INIT7CHfalse
        91.189.91.43
        unknownUnited Kingdom
        41231CANONICAL-ASGBfalse
        91.189.91.42
        unknownUnited Kingdom
        41231CANONICAL-ASGBfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        205.185.123.50UGIl9GEfZ8.elfGet hashmaliciousMoobotBrowse
          109.202.202.202UGIl9GEfZ8.elfGet hashmaliciousMoobotBrowse
            SecuriteInfo.com.ELF.Mirai-CDA.16672.15430.elfGet hashmaliciousUnknownBrowse
              Ra1ixhHhPo.elfGet hashmaliciousUnknownBrowse
                fixrTE1tEH.elfGet hashmaliciousUnknownBrowse
                  R1l4QyoHAs.elfGet hashmaliciousUnknownBrowse
                    XL67blcDWh.elfGet hashmaliciousUnknownBrowse
                      ohV78wh8AQ.elfGet hashmaliciousUnknownBrowse
                        4G1y865GFg.elfGet hashmaliciousUnknownBrowse
                          TW12EHHuzt.elfGet hashmaliciousMiraiBrowse
                            kxbGfVfLyW.elfGet hashmaliciousMiraiBrowse
                              0smo0BlzPm.elfGet hashmaliciousUnknownBrowse
                                yKtufapSlG.elfGet hashmaliciousMiraiBrowse
                                  9PYy188mtA.elfGet hashmaliciousUnknownBrowse
                                    LQ6nA8yvZo.elfGet hashmaliciousUnknownBrowse
                                      rOpXBFSUYZ.elfGet hashmaliciousUnknownBrowse
                                        hidq5TmFsF.elfGet hashmaliciousUnknownBrowse
                                          W4WrVROd45.elfGet hashmaliciousUnknownBrowse
                                            HWcgrdgfba.elfGet hashmaliciousUnknownBrowse
                                              x6JdQINStZ.elfGet hashmaliciousUnknownBrowse
                                                lava.x86_64.elfGet hashmaliciousUnknownBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  lkavsjdnbah.ddns.netUGIl9GEfZ8.elfGet hashmaliciousMoobotBrowse
                                                  • 205.185.123.50
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  PONYNETUSUGIl9GEfZ8.elfGet hashmaliciousMoobotBrowse
                                                  • 205.185.123.50
                                                  https://r20.rs6.net/tn.jsp?f=001OEpvye9gwARBAbLt7Vf1EU1Yl_hX1FWX6SThguHY7PN6nAm8cvEbwYGzFeeO9XamgT8kGBW_Kg44XFBhCxVKrMPatnlBie4toQjVi-C1fk7IFGObZt9UTCwD7CM13gNH44uhgtj4n8U=&c=kpPxQ7IIqKpcV_lz3HYx5pWKQpxSQl6atlL3jMRSjHShyxWSz77o6A==&ch=0yah6N9fqubKFLpqVrNcxk82ZRnvx1NaC4dbMvZmrEp4YTfKMfvtGA==&__=?e=bG9yZXR0YS5rZWFuWUBhcmNhZGlhLmlvGet hashmaliciousCaptcha PhishBrowse
                                                  • 205.185.126.3
                                                  DHL_2017128_Receipt_Document,pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                  • 198.251.89.66
                                                  DHL_2017128_Receipt_Document,pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                  • 198.251.89.66
                                                  DHL_2017128_Receipt_Document,pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                  • 198.251.89.66
                                                  Ksrj8b01A4.exeGet hashmaliciousEternity ClipperBrowse
                                                  • 198.251.84.49
                                                  https://r20.rs6.net/tn.jsp?f=001xHyZrR72Hidzq8vQJJfXXcupqF34If7bNua9sfMos1st7eh0nWN7csmgunZYNG8wtON9b5HvZr_5n4itBRezz60blGmW4LNeIz6nESyIZJ-1Bw4nJ1XZq12gHgFI7tJocXJYzWoKKcSTAIH9tR0qZQ==&c=Q36P3YFW__J-XpVjNzvlOJdbGtq5OwP4S805IHzgm91Smwxq2wcnUQ==&ch=kV1or1zo9OkAqqH-53i9eXTuOndWOP47P7qPQ7xSizd7XTj9PeskEA==&__=?rPD6OAE=YnNhbmR2aWdAdnFjaGVlc2UuY29tGet hashmaliciousCaptcha PhishBrowse
                                                  • 209.141.60.219
                                                  SecuriteInfo.com.Trojan.Mardom.ON.24.25444.6656.exeGet hashmaliciousGurcu StealerBrowse
                                                  • 198.251.88.130
                                                  jH6YKOsqK0.elfGet hashmaliciousMoobotBrowse
                                                  • 205.185.118.82
                                                  rBbDsuIbiS.elfGet hashmaliciousMoobotBrowse
                                                  • 205.185.118.82
                                                  eWuf0e99R8.elfGet hashmaliciousMoobotBrowse
                                                  • 205.185.118.82
                                                  vzYcMFIGyG.elfGet hashmaliciousMoobotBrowse
                                                  • 205.185.118.82
                                                  QjC9ks0zMz.elfGet hashmaliciousMoobotBrowse
                                                  • 205.185.118.82
                                                  WGwwrQ2hm6.elfGet hashmaliciousMoobotBrowse
                                                  • 205.185.118.82
                                                  R1vUZccNsx.elfGet hashmaliciousMoobotBrowse
                                                  • 205.185.118.82
                                                  mqtg8NbRhW.elfGet hashmaliciousMirai, MoobotBrowse
                                                  • 205.185.118.82
                                                  b6wZjdMZog.elfGet hashmaliciousMoobotBrowse
                                                  • 205.185.118.82
                                                  IRiSrvb5oH.elfGet hashmaliciousMoobotBrowse
                                                  • 205.185.118.82
                                                  uvepyRSMZ4.elfGet hashmaliciousMiraiBrowse
                                                  • 144.172.99.68
                                                  https://canton-texas.mykajabi.com/cantontxGet hashmaliciousHTMLPhisherBrowse
                                                  • 107.189.3.124
                                                  No context
                                                  No context
                                                  No created / dropped files found
                                                  File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                                                  Entropy (8bit):6.292751719693222
                                                  TrID:
                                                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                  File name:KGkoLgvOGp.elf
                                                  File size:76960
                                                  MD5:24b923862a5e92038b93fbb6055d47ea
                                                  SHA1:f82fdcd4f27fc3ac895b0b20262793d06cdceb99
                                                  SHA256:920f0d8be6f53b0cf95f393664d99288af0fafca06a826f520c1d77160b7c5f6
                                                  SHA512:5124d7908f9a70ff9c18a373fd9c969fb96f60129da97caba285a0ad71c89eca2ad736083a7a5ab907a90cfe8496fee036545f31b5a4815e1dfe1306e8083d55
                                                  SSDEEP:1536:HosfX5Z+J75f5CHOQCDdZAkNbU5moHkmOuiqi3AN52bhVx:I4+J7XyxCLAkNEkEji3+2bhVx
                                                  TLSH:CD734B07B681C1FCC459C1784B6BB23AD53275BE0239B2AAA7D8FF232C09E605F1D955
                                                  File Content Preview:.ELF..............>.......@.....@....... *..........@.8...@.......................@.......@......$.......$.......................$.......$Q......$Q..............1..............Q.td....................................................H...._....j...H........

                                                  ELF header

                                                  Class:
                                                  Data:
                                                  Version:
                                                  Machine:
                                                  Version Number:
                                                  Type:
                                                  OS/ABI:
                                                  ABI Version:
                                                  Entry Point Address:
                                                  Flags:
                                                  ELF Header Size:
                                                  Program Header Offset:
                                                  Program Header Size:
                                                  Number of Program Headers:
                                                  Section Header Offset:
                                                  Section Header Size:
                                                  Number of Section Headers:
                                                  Header String Table Index:
                                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                  NULL0x00x00x00x00x0000
                                                  .initPROGBITS0x4000e80xe80x130x00x6AX001
                                                  .textPROGBITS0x4001000x1000xfb960x00x6AX0016
                                                  .finiPROGBITS0x40fc960xfc960xe0x00x6AX001
                                                  .rodataPROGBITS0x40fcc00xfcc00x28300x00x2A0032
                                                  .ctorsPROGBITS0x5124f80x124f80x100x00x3WA008
                                                  .dtorsPROGBITS0x5125080x125080x100x00x3WA008
                                                  .dataPROGBITS0x5125200x125200x4c00x00x3WA0032
                                                  .bssNOBITS0x5129e00x129e00x2ce80x00x3WA0032
                                                  .shstrtabSTRTAB0x00x129e00x3e0x00x0001
                                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                  LOAD0x00x4000000x4000000x124f00x124f06.35980x5R E0x100000.init .text .fini .rodata
                                                  LOAD0x124f80x5124f80x5124f80x4e80x31d02.35800x6RW 0x100000.ctors .dtors .data .bss
                                                  GNU_STACK0x00x00x00x00x00.00000x6RW 0x8

                                                  Download Network PCAP: filteredfull

                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                  192.168.2.23205.185.123.504799862852030490 05/04/23-12:42:30.302977TCP2030490ET TROJAN ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)479986285192.168.2.23205.185.123.50
                                                  205.185.123.50192.168.2.236285479982030489 05/04/23-12:45:56.495659TCP2030489ET TROJAN ELF/MooBot Mirai DDoS Variant Server Response628547998205.185.123.50192.168.2.23
                                                  • Total Packets: 26
                                                  • 6285 undefined
                                                  • 443 (HTTPS)
                                                  • 80 (HTTP)
                                                  • 53 (DNS)
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  May 4, 2023 12:42:29.136131048 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:42:29.294893026 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:42:29.295064926 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:42:29.408655882 CEST42836443192.168.2.2391.189.91.43
                                                  May 4, 2023 12:42:29.664746046 CEST4251680192.168.2.23109.202.202.202
                                                  May 4, 2023 12:42:30.144589901 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:42:30.302589893 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:42:30.302848101 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:42:30.302977085 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:42:30.460685015 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:42:30.462133884 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:42:30.462270021 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:42:36.464133978 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:42:36.464324951 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:42:45.791831970 CEST43928443192.168.2.2391.189.91.42
                                                  May 4, 2023 12:42:46.464499950 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:42:46.665045023 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:42:56.031234026 CEST42836443192.168.2.2391.189.91.43
                                                  May 4, 2023 12:42:56.467291117 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:42:56.467447042 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:43:00.127125978 CEST4251680192.168.2.23109.202.202.202
                                                  May 4, 2023 12:43:16.470521927 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:43:16.470673084 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:43:26.749744892 CEST43928443192.168.2.2391.189.91.42
                                                  May 4, 2023 12:43:36.475596905 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:43:36.475876093 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:43:56.478730917 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:43:56.479420900 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:44:16.479707003 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:44:16.479909897 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:44:36.483279943 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:44:36.483428955 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:44:46.489909887 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:44:46.647944927 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:44:56.486581087 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:44:56.486813068 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:45:16.489567995 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:45:16.489790916 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:45:36.494667053 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:45:36.494878054 CEST479986285192.168.2.23205.185.123.50
                                                  May 4, 2023 12:45:56.495659113 CEST628547998205.185.123.50192.168.2.23
                                                  May 4, 2023 12:45:56.495834112 CEST479986285192.168.2.23205.185.123.50
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  May 4, 2023 12:42:29.106312037 CEST4174453192.168.2.238.8.8.8
                                                  May 4, 2023 12:42:29.135960102 CEST53417448.8.8.8192.168.2.23
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  May 4, 2023 12:42:29.106312037 CEST192.168.2.238.8.8.80x832cStandard query (0)lkavsjdnbah.ddns.netA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  May 4, 2023 12:42:29.135960102 CEST8.8.8.8192.168.2.230x832cNo error (0)lkavsjdnbah.ddns.net205.185.123.50A (IP address)IN (0x0001)false

                                                  System Behavior

                                                  Start time:12:42:28
                                                  Start date:04/05/2023
                                                  Path:/tmp/KGkoLgvOGp.elf
                                                  Arguments:/tmp/KGkoLgvOGp.elf
                                                  File size:76960 bytes
                                                  MD5 hash:24b923862a5e92038b93fbb6055d47ea

                                                  Start time:12:42:28
                                                  Start date:04/05/2023
                                                  Path:/tmp/KGkoLgvOGp.elf
                                                  Arguments:n/a
                                                  File size:76960 bytes
                                                  MD5 hash:24b923862a5e92038b93fbb6055d47ea

                                                  Start time:12:42:28
                                                  Start date:04/05/2023
                                                  Path:/tmp/KGkoLgvOGp.elf
                                                  Arguments:n/a
                                                  File size:76960 bytes
                                                  MD5 hash:24b923862a5e92038b93fbb6055d47ea

                                                  Start time:12:42:28
                                                  Start date:04/05/2023
                                                  Path:/usr/lib/udisks2/udisksd
                                                  Arguments:n/a
                                                  File size:483056 bytes
                                                  MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

                                                  Start time:12:42:28
                                                  Start date:04/05/2023
                                                  Path:/usr/sbin/dumpe2fs
                                                  Arguments:dumpe2fs -h /dev/dm-0
                                                  File size:31112 bytes
                                                  MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4