Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
aisuru.i686.elf

Overview

General Information

Sample name:aisuru.i686.elf
Analysis ID:1502207
MD5:753260e6e64b1936a1f486cce4a3a9c5
SHA1:715ab9a6a3d1799c8b5b935a2a5726114c08a279
SHA256:29695f49ecf815061171a5f826c91361238d0648f86b24151e5f43a032fdfbc6
Tags:aisuruelf
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1502207
Start date and time:2024-08-31 14:56:29 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 26s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:aisuru.i686.elf
Detection:MAL
Classification:mal60.linELF@0/0@1/0
Command:/tmp/aisuru.i686.elf
PID:5628
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:Segmentation fault
  • system is lnxubuntu20
  • udisksd New Fork (PID: 5638, Parent: 803)
  • dumpe2fs (PID: 5638, Parent: 803, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • udisksd New Fork (PID: 5672, Parent: 803)
  • dumpe2fs (PID: 5672, Parent: 803, MD5: 5c66f7d8f7681a40562cf049ad4b72b4) Arguments: dumpe2fs -h /dev/dm-0
  • cleanup
SourceRuleDescriptionAuthorStrings
aisuru.i686.elfLinux_Trojan_Mirai_dab39a25unknownunknown
  • 0x9032:$a: 0E 75 20 50 6A 00 6A 00 6A 00 53 6A 0E FF 74 24 48 68 DD 00
SourceRuleDescriptionAuthorStrings
5628.1.0000000008048000.0000000008058000.r-x.sdmpLinux_Trojan_Mirai_dab39a25unknownunknown
  • 0x9032:$a: 0E 75 20 50 6A 00 6A 00 6A 00 53 6A 0E FF 74 24 48 68 DD 00
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: aisuru.i686.elfVirustotal: Detection: 7%Perma Link
Source: aisuru.i686.elfJoe Sandbox ML: detected
Source: global trafficDNS traffic detected: DNS query: g.dvrinside.digital

System Summary

barindex
Source: aisuru.i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_dab39a25 Author: unknown
Source: 5628.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 Author: unknown
Source: ELF static info symbol of initial sample.symtab present: no
Source: aisuru.i686.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_dab39a25 reference_sample = 3e02fb63803110cabde08e809cf4acc1b8fb474ace531959a311858fdd578bab, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 5a628d9af9d6dccf29e78f780bb74a2fa25167954c34d4a1529bdea5ea891ac0, id = dab39a25-852b-441f-86ab-23d945daa62c, last_modified = 2022-01-26
Source: 5628.1.0000000008048000.0000000008058000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_dab39a25 reference_sample = 3e02fb63803110cabde08e809cf4acc1b8fb474ace531959a311858fdd578bab, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 5a628d9af9d6dccf29e78f780bb74a2fa25167954c34d4a1529bdea5ea891ac0, id = dab39a25-852b-441f-86ab-23d945daa62c, last_modified = 2022-01-26
Source: classification engineClassification label: mal60.linELF@0/0@1/0
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3760/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3760/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/1583/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/1583/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/2672/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/2672/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/110/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/110/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3759/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3759/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/111/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/111/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/112/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/112/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/113/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/113/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/234/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/234/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/1577/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/1577/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/114/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/114/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/235/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/235/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/115/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/115/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/116/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/116/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/117/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/117/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/118/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/118/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/119/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/119/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3873/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3873/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3757/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3757/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/10/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/10/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/917/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3758/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3758/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/11/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/11/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/12/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/12/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/13/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/13/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/14/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/14/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/15/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/15/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/16/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/16/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/17/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/17/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/18/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/18/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/19/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/19/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/1593/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/1593/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/240/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/240/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/120/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/120/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3094/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3094/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/121/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/121/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/242/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/242/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3406/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3406/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/5706/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/5706/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/1/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/122/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/122/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/243/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/243/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/5707/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/5707/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/2/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/123/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/123/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/244/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/244/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/1589/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/1589/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/5708/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/5708/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/124/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/124/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/245/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/245/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/1588/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/5709/mapsJump to behavior
Source: /tmp/aisuru.i686.elf (PID: 5644)File opened: /proc/5709/cmdlineJump to behavior
Source: submitted sampleStderr: Segmentation fault: exit code = 0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
System Service DiscoveryRemote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1502207 Sample: aisuru.i686.elf Startdate: 31/08/2024 Architecture: LINUX Score: 60 18 172.232.34.247, 3257, 43632 AKAMAI-ASN1EU United States 2->18 20 g.dvrinside.digital 2->20 22 Malicious sample detected (through community Yara rule) 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Machine Learning detection for sample 2->26 8 aisuru.i686.elf 2->8         started        10 udisksd dumpe2fs 2->10         started        12 udisksd dumpe2fs 2->12         started        signatures3 process4 process5 14 aisuru.i686.elf 8->14         started        process6 16 aisuru.i686.elf 14->16         started       
SourceDetectionScannerLabelLink
aisuru.i686.elf5%ReversingLabsLinux.Trojan.Mirai
aisuru.i686.elf7%VirustotalBrowse
aisuru.i686.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
g.dvrinside.digital
5.188.34.250
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    172.232.34.247
    unknownUnited States
    20940AKAMAI-ASN1EUfalse
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    AKAMAI-ASN1EUfile.exeGet hashmaliciousUnknownBrowse
    • 23.54.161.105
    file.exeGet hashmaliciousUnknownBrowse
    • 23.200.0.9
    file.exeGet hashmaliciousUnknownBrowse
    • 23.55.235.170
    file.exeGet hashmaliciousUnknownBrowse
    • 23.219.161.132
    file.exeGet hashmaliciousUnknownBrowse
    • 23.219.161.132
    file.exeGet hashmaliciousUnknownBrowse
    • 23.219.161.132
    file.exeGet hashmaliciousUnknownBrowse
    • 23.200.0.42
    file.exeGet hashmaliciousUnknownBrowse
    • 23.200.0.42
    https://xjp.steamproxy.vip/profiles/76561199276106401Get hashmaliciousUnknownBrowse
    • 2.16.241.11
    https://xjp.steamproxy.vip/id/sircapthe4thGet hashmaliciousUnknownBrowse
    • 2.16.238.136
    No context
    No context
    No created / dropped files found
    File type:ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
    Entropy (8bit):6.250330087352088
    TrID:
    • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
    • ELF Executable and Linkable format (generic) (4004/1) 49.84%
    File name:aisuru.i686.elf
    File size:66'640 bytes
    MD5:753260e6e64b1936a1f486cce4a3a9c5
    SHA1:715ab9a6a3d1799c8b5b935a2a5726114c08a279
    SHA256:29695f49ecf815061171a5f826c91361238d0648f86b24151e5f43a032fdfbc6
    SHA512:7b2e7571fbf87a8e3950a315cc34ebe656f26fdcefa30e40df2058e7b9c971bafe97f5af1729794c6207c45a08546706c4d81af1eb7ee1ba22a71153c4f74fe8
    SSDEEP:768:LEaGyq/jK+hBMBCFJSvKayHM28Q401rV+0WKnYf+CyxNJsu335V8aUOH31s7o0/K:ujJMqgv8hZYWCyt8aUo31s7o3ajBKXr
    TLSH:1A534B88E687E1F1DD070970915BF37F8371AA14D930DEAEDF48EE81AE23E12511A758
    File Content Preview:.ELF....................X...4...H.......4. ...(.....................................................................Q.td................................d.......................U......=.....t..1...................u........t...$.............................

    ELF header

    Class:ELF32
    Data:2's complement, little endian
    Version:1 (current)
    Machine:Intel 80386
    Version Number:0x1
    Type:EXEC (Executable file)
    OS/ABI:UNIX - System V
    ABI Version:0
    Entry Point Address:0x8048158
    Flags:0x0
    ELF Header Size:52
    Program Header Offset:52
    Program Header Size:32
    Number of Program Headers:3
    Section Header Offset:66120
    Section Header Size:40
    Number of Section Headers:13
    Header String Table Index:12
    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
    NULL0x00x00x00x00x0000
    .initPROGBITS0x80480940x940x110x00x6AX001
    .textPROGBITS0x80480b00xb00xee190x00x6AX0016
    .finiPROGBITS0x8056ec90xeec90xc0x00x6AX001
    .rodataPROGBITS0x8056ed80xeed80xd2c0x00x2A004
    .eh_framePROGBITS0x80580000x100000x740x00x3WA004
    .ctorsPROGBITS0x80580740x100740x80x00x3WA004
    .dtorsPROGBITS0x805807c0x1007c0x80x00x3WA004
    .jcrPROGBITS0x80580840x100840x40x00x3WA004
    .got.pltPROGBITS0x80580880x100880xc0x40x3WA004
    .dataPROGBITS0x80580a00x100a00x1500x00x3WA0032
    .bssNOBITS0x80582000x101f00x1be80x00x3WA0032
    .shstrtabSTRTAB0x00x101f00x560x00x0001
    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
    LOAD0x00x80480000x80480000xfc040xfc046.33710x5R E0x1000.init .text .fini .rodata
    LOAD0x100000x80580000x80580000x1f00x1de83.17880x6RW 0x1000.eh_frame .ctors .dtors .jcr .got.plt .data .bss
    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
    TimestampSource PortDest PortSource IPDest IP
    Aug 31, 2024 14:57:28.573868990 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:28.579015017 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:28.579071045 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:28.579071045 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:28.584125042 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:29.238116980 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:29.240492105 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:29.240528107 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:29.245337009 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:29.463578939 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:29.464498043 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:29.464530945 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:29.469319105 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:29.688240051 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:29.688508987 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:29.688508987 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:29.693408012 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:29.693444014 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:29.698292017 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:31.690485001 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:31.695678949 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:31.915081024 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:31.958622932 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:43.924303055 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:43.929738998 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:44.147507906 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:44.147571087 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:56.154827118 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:57:56.159722090 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:56.379914045 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:57:56.379960060 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:58:08.392074108 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:58:08.397027016 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:58:08.615226984 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:58:08.615283012 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:58:20.627449989 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:58:20.632270098 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:58:20.850904942 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:58:20.851075888 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:58:32.863219023 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:58:32.868010044 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:58:33.086478949 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:58:33.086695910 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:58:45.096193075 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:58:45.103034973 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:58:45.321592093 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:58:45.321808100 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:58:57.333475113 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:58:57.338346004 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:58:57.556704998 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:58:57.556838036 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:59:09.566668034 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:59:09.572665930 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:59:09.791941881 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:59:09.792067051 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:59:21.804200888 CEST436323257192.168.2.14172.232.34.247
    Aug 31, 2024 14:59:21.809031010 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:59:22.027369022 CEST325743632172.232.34.247192.168.2.14
    Aug 31, 2024 14:59:22.027445078 CEST436323257192.168.2.14172.232.34.247
    TimestampSource PortDest PortSource IPDest IP
    Aug 31, 2024 14:57:28.311278105 CEST3362653192.168.2.148.8.8.8
    Aug 31, 2024 14:57:28.573755026 CEST53336268.8.8.8192.168.2.14
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Aug 31, 2024 14:57:28.311278105 CEST192.168.2.148.8.8.80xace2Standard query (0)g.dvrinside.digitalA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Aug 31, 2024 14:57:28.573755026 CEST8.8.8.8192.168.2.140xace2No error (0)g.dvrinside.digital5.188.34.250A (IP address)IN (0x0001)false
    Aug 31, 2024 14:57:28.573755026 CEST8.8.8.8192.168.2.140xace2No error (0)g.dvrinside.digital193.32.179.248A (IP address)IN (0x0001)false
    Aug 31, 2024 14:57:28.573755026 CEST8.8.8.8192.168.2.140xace2No error (0)g.dvrinside.digital95.85.78.18A (IP address)IN (0x0001)false
    Aug 31, 2024 14:57:28.573755026 CEST8.8.8.8192.168.2.140xace2No error (0)g.dvrinside.digital172.232.34.247A (IP address)IN (0x0001)false
    Aug 31, 2024 14:57:28.573755026 CEST8.8.8.8192.168.2.140xace2No error (0)g.dvrinside.digital95.85.78.25A (IP address)IN (0x0001)false
    Aug 31, 2024 14:57:28.573755026 CEST8.8.8.8192.168.2.140xace2No error (0)g.dvrinside.digital5.8.33.125A (IP address)IN (0x0001)false
    Aug 31, 2024 14:57:28.573755026 CEST8.8.8.8192.168.2.140xace2No error (0)g.dvrinside.digital173.255.246.83A (IP address)IN (0x0001)false
    Aug 31, 2024 14:57:28.573755026 CEST8.8.8.8192.168.2.140xace2No error (0)g.dvrinside.digital193.32.179.252A (IP address)IN (0x0001)false
    Aug 31, 2024 14:57:28.573755026 CEST8.8.8.8192.168.2.140xace2No error (0)g.dvrinside.digital95.85.78.21A (IP address)IN (0x0001)false
    Aug 31, 2024 14:57:28.573755026 CEST8.8.8.8192.168.2.140xace2No error (0)g.dvrinside.digital92.223.30.94A (IP address)IN (0x0001)false

    System Behavior

    Start time (UTC):12:57:27
    Start date (UTC):31/08/2024
    Path:/tmp/aisuru.i686.elf
    Arguments:/tmp/aisuru.i686.elf
    File size:66640 bytes
    MD5 hash:753260e6e64b1936a1f486cce4a3a9c5

    Start time (UTC):12:57:27
    Start date (UTC):31/08/2024
    Path:/tmp/aisuru.i686.elf
    Arguments:-
    File size:66640 bytes
    MD5 hash:753260e6e64b1936a1f486cce4a3a9c5

    Start time (UTC):12:57:27
    Start date (UTC):31/08/2024
    Path:/tmp/aisuru.i686.elf
    Arguments:-
    File size:66640 bytes
    MD5 hash:753260e6e64b1936a1f486cce4a3a9c5

    Start time (UTC):12:57:27
    Start date (UTC):31/08/2024
    Path:/usr/lib/udisks2/udisksd
    Arguments:-
    File size:483056 bytes
    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

    Start time (UTC):12:57:27
    Start date (UTC):31/08/2024
    Path:/usr/sbin/dumpe2fs
    Arguments:dumpe2fs -h /dev/dm-0
    File size:31112 bytes
    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4

    Start time (UTC):12:57:28
    Start date (UTC):31/08/2024
    Path:/usr/lib/udisks2/udisksd
    Arguments:-
    File size:483056 bytes
    MD5 hash:1d7ae439cc3d82fa6b127671ce037a24

    Start time (UTC):12:57:28
    Start date (UTC):31/08/2024
    Path:/usr/sbin/dumpe2fs
    Arguments:dumpe2fs -h /dev/dm-0
    File size:31112 bytes
    MD5 hash:5c66f7d8f7681a40562cf049ad4b72b4