Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1528836
MD5:8ef966a2f485a72bc42746ae4745cefa
SHA1:1ce26f48ab05a314fb9ddb9818c634e6617ca4a7
SHA256:56ccebabf40f7191e11afdf659584d9c15bb12070ec9e01293cabc78d78cf0c2
Tags:elfMiraiuser-abuse_ch
Infos:

Detection

Mirai
Score:76
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Machine Learning detection for sample
Sample deletes itself
Sample is packed with UPX
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "ps" command used to list the status of processes
Reads CPU information from /sys indicative of miner or evasive malware
Reads system information from the proc file system
Sample contains only a LOAD segment without any section mappings
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1528836
Start date and time:2024-10-08 11:33:28 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 7m 35s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal76.troj.evad.linELF@0/0@3/0
  • VT rate limit hit for: daisy.ubuntu.com
Command:/tmp/na.elf
PID:5718
Exit Code:
Exit Code Info:
Killed:True
Standard Output:
Hello, World!
[DEBUG] Checking process: PID=1, Path=/usr/lib/systemd/systemd
[DEBUG] Process is in whitelist or matches safe prefix: PID=1, Path=/usr/lib/systemd/systemd
[DEBUG] Checking process: PID=490, Path=/usr/lib/systemd/systemd-journald
[DEBUG] Process is in whitelist or matches safe prefix: PID=490, Path=/usr/lib/systemd/systemd-journald
[DEBUG] Checking process: PID=660, Path=/usr/sbin/multipathdtemd-journald
[DEBUG] Killing process: PID=660, Path=/usr/sbin/multipathdtemd-journald
[DEBUG] Checking process: PID=726, Path=/usr/bin/VGAuthServicemd-journald
[DEBUG] Killing process: PID=726, Path=/usr/bin/VGAuthServicemd-journald
[DEBUG] Checking process: PID=727, Path=/usr/bin/vmtoolsdrvicemd-journald
[DEBUG] Killing process: PID=727, Path=/usr/bin/vmtoolsdrvicemd-journald
[DEBUG] Checking process: PID=765, Path=/usr/lib/systemd/systemd-networkd
[DEBUG] Process is in whitelist or matches safe prefix: PID=765, Path=/usr/lib/systemd/systemd-networkd
[DEBUG] Checking process: PID=767, Path=/usr/lib/systemd/systemd-resolved
[DEBUG] Process is in whitelist or matches safe prefix: PID=767, Path=/usr/lib/systemd/systemd-resolved
[DEBUG] Checking process: PID=778, Path=/usr/sbin/acpidd/systemd-resolved
[DEBUG] Killing process: PID=778, Path=/usr/sbin/acpidd/systemd-resolved
[DEBUG] Checking process: PID=780, Path=/usr/sbin/avahi-daemonmd-resolved
[DEBUG] Killing process: PID=780, Path=/usr/sbin/avahi-daemonmd-resolved
[DEBUG] Checking process: PID=783, Path=/usr/bin/dbus-daemononmd-resolved
[DEBUG] Process is in whitelist or matches safe prefix: PID=783, Path=/usr/bin/dbus-daemononmd-resolved
[DEBUG] Checking process: PID=790, Path=/usr/sbin/irqbalanceonmd-resolved
[DEBUG] Killing process: PID=790, Path=/usr/sbin/irqbalanceonmd-resolved
[DEBUG] Checking process: PID=792, Path=/usr/bin/python3.8ceonmd-resolved
[DEBUG] Killing process: PID=792, Path=/usr/bin/python3.8ceonmd-resolved
[DEBUG] Checking process: PID=793, Path=/usr/lib/policykit-1/polkitdolved
[DEBUG] Process is in whitelist or matches safe prefix: PID=793, Path=/usr/lib/policykit-1/polkitdolved
[DEBUG] Checking process: PID=795, Path=/usr/sbin/rsyslogd-1/polkitdolved
[DEBUG] Process is in whitelist or matches safe prefix: PID=795, Path=/usr/sbin/rsyslogd-1/polkitdolved
[DEBUG] Checking process: PID=797, Path=/usr/libexec/switcheroo-controled
[DEBUG] Killing process: PID=797, Path=/usr/libexec/switcheroo-controled
[DEBUG] Checking process: PID=800, Path=/usr/lib/systemd/systemd-loginded
[DEBUG] Process is in whitelist or matches safe prefix: PID=800, Path=/usr/lib/systemd/systemd-loginded
[DEBUG] Checking process: PID=802, Path=/usr/lib/udisks2/udisksd-loginded
[DEBUG] Killing process: PID=802, Path=/usr/lib/udisks2/udisksd-loginded
[DEBUG] Checking process: PID=803, Path=/usr/sbin/wpa_supplicant-loginded
[DEBUG] Killing process: PID=803, Path=/usr/sbin/wpa_supplicant-loginded
[DEBUG] Checking process: PID=816, Path=/usr/sbin/avahi-daemonnt-loginded
[DEBUG] Killing process: PID=816, Path=/usr/sbin/avahi-daemonnt-loginded
[DEBUG] Checking process: PID=855, Path=/usr/sbin/ModemManagernt-loginded
[DEBUG] Killing process: PID=855, Path=/usr/sbin/ModemManagernt-loginded
[DEBUG] Checking process: PID=884, Path=/usr/bin/python3.8agernt-loginded
[DEBUG] Killing process: PID=884, Path=/usr/bin/python3.8agernt-loginded
[DEBUG] Checking process: PID=914, Path=/usr/sbin/kerneloopsernt-loginded
[DEBUG] Killing process: PID=914, Path=/usr/sbin/kerneloopsernt-loginded
[DEBUG] Checking process: PID=917, Path=/usr/sbin/kerneloopsernt-loginded
[DEBUG] Checking process: PID=936, Path=/usr/sbin/sshdeloopsernt-loginded
[DEBUG] Process is in whitelist or matches safe prefix: PID=936, Path=/usr/sbin/sshdeloopsernt-loginded
[DEBUG] Checking process: PID=1400, Path=/usr/sbin/gdm3eloopsernt-loginded
[DEBUG] Killing process: PID=1400, Path=/usr/sbin/gdm3eloopsernt-loginded
[DEBUG] Checking process: PID=1410, Path=/usr/lib/systemd/systemd-loginded
[DEBUG] Process is in whitelist or matches safe prefix: PID=1410, Path=/usr/lib/systemd/systemd-loginded
[DEBUG] Checking process: PID=1411, Path=/usr/lib/systemd/systemd-loginded
[DEBUG] Process is in whitelist or matches safe prefix: PID=1411, Path=/usr/lib/systemd/systemd-loginded
[DEBUG] Checking process: PID=1432, Path=/usr/bin/dbus-daemontemd-loginded
[DEBUG] Process is in whitelist or matches safe prefix: PID=1432, Path=/usr/bin/dbus-daemontemd-loginded
[DEBUG] Checking process: PID=1444, Path=/usr/libexec/rtkit-daemonloginded
[DEBUG] Killing process: PID=1444, Path=/usr/libexec/rtkit-daemonloginded
[DEBUG] Checking process: PID=1475, Path=/usr/lib/gdm3/gdm-session-workerd
[DEBUG] Killing process: PID=1475, Path=/usr/lib/gdm3/gdm-session-workerd
[DEBUG] Checking process: PID=1480, Path=/usr/lib/gdm3/gdm-x-sessionorkerd
[DEBUG] Killing process: PID=1480, Path=/usr/lib/gdm3/gdm-x-sessionorkerd
[DEBUG] Checking process: PID=1482, Path=/usr/lib/xorg/Xorgx-sessionorkerd
[DEBUG] Killing process: PID=1482, Path=/usr/lib/xorg/Xorgx-sessionorkerd
[DEBUG] Checking process: PID=1563, Path=/usr/bin/dbus-run-sessiononorkerd
[DEBUG] Killing process: PID=1563, Path=/usr/bin/dbus-run-sessiononorkerd
[DEBUG] Checking process: PID=1565, Path=/usr/bin/dbus-daemonssiononorkerd
[DEBUG] Process is in whitelist or matches safe prefix: PID=1565, Path=/usr/bin/dbus-daemonssiononorkerd
[DEBUG] Checking process: PID=1588, Path=/usr/libexec/gnome-session-binary
[DEBUG] Killing process: PID=1588, Path=/usr/libexec/gnome-session-binary
[DEBUG] Checking process: PID=1604, Path=/usr/libexec/at-spi-bus-launchery
[DEBUG] Killing process: PID=1604, Path=/usr/libexec/at-spi-bus-launchery
[DEBUG] Checking process: PID=1609, Path=/usr/bin/dbus-daemonbus-launchery
[DEBUG] Process is in whitelist or matches safe prefix: PID=1609, Path=/usr/bin/dbus-daemonbus-launchery
[DEBUG] Checking process: PID=1691, Path=/usr/bin/gnome-shellbus-launchery
[DEBUG] Killing process: PID=1691, Path=/usr/bin/gnome-shellbus-launchery
[DEBUG] Checking process: PID=1745, Path=/usr/bin/ibus-daemonbus-launchery
[DEBUG] Killing process: PID=1745, Path=/usr/bin/ibus-daemonbus-launchery
[DEBUG] Checking process: PID=1748, Path=/usr/libexec/ibus-memconfaunchery
[DEBUG] Killing process: PID=1748, Path=/usr/libexec/ibus-memconfaunchery
[DEBUG] Checking process: PID=1751, Path=/usr/libexec/ibus-x11confaunchery
[DEBUG] Killing process: PID=1751, Path=/usr/libexec/ibus-x11confaunchery
[DEBUG] Checking process: PID=1755, Path=/usr/libexec/ibus-portalfaunchery
[DEBUG] Killing process: PID=1755, Path=/usr/libexec/ibus-portalfaunchery
[DEBUG] Checking process: PID=1765, Path=/usr/libexec/at-spi2-registrydery
[DEBUG] Killing process: PID=1765, Path=/usr/libexec/at-spi2-registrydery
[DEBUG] Checking process: PID=1804, Path=/usr/lib/upower/upowerdgistrydery
[DEBUG] Killing process: PID=1804, Path=/usr/lib/upower/upowerdgistrydery
[DEBUG] Checking process: PID=1805, Path=/usr/bin/pulseaudiowerdgistrydery
[DEBUG] Killing process: PID=1805, Path=/usr/bin/pulseaudiowerdgistrydery
[DEBUG] Checking process: PID=1832, Path=/usr/lib/packagekit/packagekitdry
[DEBUG] Killing process: PID=1832, Path=/usr/lib/packagekit/packagekitdry
[DEBUG] Checking process: PID=1847, Path=/usr/bin/gjs-consolepackagekitdry
[DEBUG] Killing process: PID=1847, Path=/usr/bin/gjs-consolepackagekitdry
[DEBUG] Checking process: PID=1866, Path=/usr/libexec/gsd-sharingagekitdry
[DEBUG] Killing process: PID=1866, Path=/usr/libexec/gsd-sharingagekitdry
[DEBUG] Checking process: PID=1872, Path=/usr/libexec/gsd-wacomngagekitdry
[DEBUG] Killing process: PID=1872, Path=/usr/libexec/gsd-wacomngagekitdry
[DEBUG] Checking process: PID=1875, Path=/usr/libexec/gsd-colorngagekitdry
[DEBUG] Killing process: PID=1875, Path=/usr/libexec/gsd-colorngagekitdry
[DEBUG] Checking process: PID=1879, Path=/usr/libexec/gsd-keyboardgekitdry
[DEBUG] Killing process: PID=1879, Path=/usr/libexec/gsd-keyboardgekitdry
[DEBUG] Checking process: PID=1881, Path=/usr/libexec/gsd-print-notifications
[DEBUG] Killing process: PID=1881, Path=/usr/libexec/gsd-print-notifications
[DEBUG] Checking process: PID=1884, Path=/usr/libexec/gsd-rfkillnotifications
[DEBUG] Killing process: PID=1884, Path=/usr/libexec/gsd-rfkillnotifications
[DEBUG] Checking process: PID=1891, Path=/usr/libexec/gsd-smartcardifications
[DEBUG] Killing process: PID=1891, Path=/usr/libexec/gsd-smartcardifications
[DEBUG] Checking process: PID=1906, Path=/usr/libexec/gsd-datetimedifications
[DEBUG] Killing process: PID=1906, Path=/usr/libexec/gsd-datetimedifications
[DEBUG] Checking process: PID=1921, Path=/usr/libexec/gsd-media-keysfications
[DEBUG] Killing process: PID=1921, Path=/usr/libexec/gsd-media-keysfications
[DEBUG] Checking process: PID=1922, Path=/usr/libexec/ibus-engine-simpletions
[DEBUG] Killing process: PID=1922, Path=/usr/libexec/ibus-engine-simpletions
[DEBUG] Checking process: PID=1925, Path=/usr/libexec/gsd-screensaver-proxyns
[DEBUG] Killing process: PID=1925, Path=/usr/libexec/gsd-screensaver-proxyns
[DEBUG] Checking process: PID=1930, Path=/usr/libexec/gsd-soundnsaver-proxyns
[DEBUG] Killing process: PID=1930, Path=/usr/libexec/gsd-soundnsaver-proxyns
[DEBUG] Checking process: PID=1940, Path=/usr/libexec/gsd-a11y-settingsroxyns
[DEBUG] Killing process: PID=1940, Path=/usr/libexec/gsd-a11y-settingsroxyns
[DEBUG] Checking process: PID=1944, Path=/usr/libexec/gsd-housekeepingsroxyns
[DEBUG] Killing process: PID=1944, Path=/usr/libexec/gsd-housekeepingsroxyns
[DEBUG] Checking process: PID=1946, Path=/usr/libexec/gsd-powerkeepingsroxyns
[DEBUG] Killing process: PID=1946, Path=/usr/libexec/gsd-powerkeepingsroxyns
[DEBUG] Checking process: PID=1969, Path=/usr/libexec/colordwerkeepingsroxyns
[DEBUG] Killing process: PID=1969, Path=/usr/libexec/colordwerkeepingsroxyns
[DEBUG] Checking process: PID=1982, Path=/usr/libexec/gsd-printerepingsroxyns
[DEBUG] Killing process: PID=1982, Path=/usr/libexec/gsd-printerepingsroxyns
[DEBUG] Checking process: PID=2926, Path=/usr/lib/gdm3/gdm-session-workerxyns
[DEBUG] Killing process: PID=2926, Path=/usr/lib/gdm3/gdm-session-workerxyns
[DEBUG] Checking process: PID=2935, Path=/usr/lib/systemd/systemdn-workerxyns
[DEBUG] Process is in whitelist or matches safe prefix: PID=2935, Path=/usr/lib/systemd/systemdn-workerxyns
[DEBUG] Checking process: PID=2936, Path=/usr/lib/systemd/systemdn-workerxyns
[DEBUG] Process is in whitelist or matches safe prefix: PID=2936, Path=/usr/lib/systemd/systemdn-workerxyns
[DEBUG] Checking process: PID=2961, Path=/usr/bin/pulseaudiostemdn-workerxyns
[DEBUG] Killing process: PID=2961, Path=/usr/bin/pulseaudiostemdn-workerxyns
[DEBUG] Checking process: PID=2964, Path=/usr/bin/gnome-keyring-daemonkerxyns
[DEBUG] Killing process: PID=2964, Path=/usr/bin/gnome-keyring-daemonkerxyns
[DEBUG] Checking process: PID=2970, Path=/usr/bin/dbus-daemonng-daemonkerxyns
[DEBUG] Process is in whitelist or matches safe prefix: PID=2970, Path=/usr/bin/dbus-daemonng-daemonkerxyns
[DEBUG] Checking process: PID=2972, Path=/usr/lib/gdm3/gdm-x-sessiononkerxyns
[DEBUG] Killing process: PID=2972, Path=/usr/lib/gdm3/gdm-x-sessiononkerxyns
[DEBUG] Checking process: PID=2974, Path=/usr/lib/xorg/Xorgx-sessiononkerxyns
[DEBUG] Killing process: PID=2974, Path=/usr/lib/xorg/Xorgx-sessiononkerxyns
[DEBUG] Checking process: PID=2984, Path=/usr/bin/xfce4-sessionssiononkerxyns
[DEBUG] Killing process: PID=2984, Path=/usr/bin/xfce4-sessionssiononkerxyns
[DEBUG] Checking process: PID=3069, Path=/usr/bin/ssh-agentsionssiononkerxyns
[DEBUG] Killing process: PID=3069, Path=/usr/bin/ssh-agentsionssiononkerxyns
[DEBUG] Checking process: PID=3095, Path=/usr/libexec/at-spi-bus-launcherxyns
[DEBUG] Killing process: PID=3095, Path=/usr/libexec/at-spi-bus-launcherxyns
[DEBUG] Checking process: PID=3100, Path=/usr/bin/dbus-daemonbus-launcherxyns
[DEBUG] Process is in whitelist or matches safe prefix: PID=3100, Path=/usr/bin/dbus-daemonbus-launcherxyns
[DEBUG] Checking process: PID=3104, Path=/usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
[DEBUG] Killing process: PID=3104, Path=/usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
[DEBUG] Checking process: PID=3110, Path=/usr/libexec/at-spi2-registryd4/xfconf/xfconfd
[DEBUG] Killing process: PID=3110, Path=/usr/libexec/at-spi2-registryd4/xfconf/xfconfd
[DEBUG] Checking process: PID=3114, Path=/usr/bin/xfce4-screensavertryd4/xfconf/xfconfd
[DEBUG] Killing process: PID=3114, Path=/usr/bin/xfce4-screensavertryd4/xfconf/xfconfd
[DEBUG] Checking process: PID=3117, Path=/usr/libexec/gvfsdeensavertryd4/xfconf/xfconfd
[DEBUG] Killing process: PID=3117, Path=/usr/libexec/gvfsdeensavertryd4/xfconf/xfconfd
[DEBUG] Checking process: PID=3122, Path=/usr/libexec/gvfsd-fusevertryd4/xfconf/xfconfd
[DEBUG] Killing process: PID=3122, Path=/usr/libexec/gvfsd-fusevertryd4/xfconf/xfconfd
[DEBUG] Checking process: PID=3132, Path=/usr/bin/gpg-agent-fusevertryd4/xfconf/xfconfd
[DEBUG] Killing process: PID=3132, Path=/usr/bin/gpg-agent-fusevertryd4/xfconf/xfconfd
[DEBUG] Checking process: PID=3134, Path=/usr/bin/xfwm4gent-fusevertryd4/xfconf/xfconfd
[DEBUG] Killing process: PID=3134, Path=/usr/bin/xfwm4gent-fusevertryd4/xfconf/xfconfd
[DEBUG] Checking process: PID=3146, Path=/usr/bin/xfsettingsdusevertryd4/xfconf/xfconfd
[DEBUG] Killing process: PID=3146, Path=/usr/bin/xfsettingsdusevertryd4/xfconf/xfconfd
[DEBUG] Checking process: PID=3147, Path=/usr/bin/xfce4-panelusevertryd4/xfconf/xfconfd
[DEBUG] Killing process: PID=3147, Path=/usr/bin/xfce4-panelusevertryd4/xfconf/xfconfd
[DEBUG] Checking process: PID=3153, Path=/usr/bin/thunarpanelusevertryd4/xfconf/xfconfd
[DEBUG] Killing process: PID=3153, Path=/usr/bin/thunarpanelusevertryd4/xfconf/xfconfd
[DEBUG] Checking process: PID=3158, Path=/usr/bin/xfdesktopelusevertryd4/xfconf/xfconfd
[DEBUG] Killing process: PID=3158, Path=/usr/bin/xfdesktopelusevertryd4/xfconf/xfconfd
[DEBUG] Checking process: PID=3161, Path=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
[DEBUG] Killing process: PID=3161, Path=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
[DEBUG] Checking process: PID=3162, Path=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
[DEBUG] Checking process: PID=3163, Path=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
[DEBUG] Checking process: PID=3164, Path=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
[DEBUG] Checking process: PID=3165, Path=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
[DEBUG] Checking process: PID=3170, Path=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
[DEBUG] Checking process: PID=3181, Path=/usr/bin/python3.8nux-gnu/xfce4/panel/wrapper-2.0
[DEBUG] Killing process: PID=3181, Path=/usr/bin/python3.8nux-gnu/xfce4/panel/wrapper-2.0
[DEBUG] Checking process: PID=3182, Path=/usr/lib/x86_64-linux-gnu/tumbler-1/tumblerdr-2.0
[DEBUG] Killing process: PID=3182, Path=/usr/lib/x86_64-linux-gnu/tumbler-1/tumblerdr-2.0
[DEBUG] Checking process: PID=3183, Path=/usr/bin/nm-appletnux-gnu/tumbler-1/tumblerdr-2.0
[DEBUG] Killing process: PID=3183, Path=/usr/bin/nm-appletnux-gnu/tumbler-1/tumblerdr-2.0
[DEBUG] Checking process: PID=3185, Path=/usr/bin/python3.8nux-gnu/tumbler-1/tumblerdr-2.0
[DEBUG] Killing process: PID=3185, Path=/usr/bin/python3.8nux-gnu/tumbler-1/tumblerdr-2.0
[DEBUG] Checking process: PID=3203, Path=/usr/bin/xfce4-power-managermbler-1/tumblerdr-2.0
[DEBUG] Killing process: PID=3203, Path=/usr/bin/xfce4-power-managermbler-1/tumblerdr-2.0
[DEBUG] Checking process: PID=3208, Path=/usr/libexec/evolution-data-server/evolution-alarm-notify
[DEBUG] Killing process: PID=3208, Path=/usr/libexec/evolution-data-server/evolution-alarm-notify
[DEBUG] Checking process: PID=3209, Path=/usr/libexec/dconf-servicea-server/evolution-alarm-notify
[DEBUG] Killing process: PID=3209, Path=/usr/libexec/dconf-servicea-server/evolution-alarm-notify
[DEBUG] Checking process: PID=3212, Path=/usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifydtify
[DEBUG] Killing process: PID=3212, Path=/usr/lib/x86_64-linux-gnu/xfce4/notifyd/xfce4-notifydtify
[DEBUG] Checking process: PID=3220, Path=/usr/bin/xiccd4-linux-gnu/xfce4/notifyd/xfce4-notifydtify
[DEBUG] Killing process: PID=3220, Path=/usr/bin/xiccd4-linux-gnu/xfce4/notifyd/xfce4-notifydtify
[DEBUG] Checking process: PID=3225, Path=/usr/libexec/geoclue-2.0/demos/agentfyd/xfce4-notifydtify
[DEBUG] Killing process: PID=3225, Path=/usr/libexec/geoclue-2.0/demos/agentfyd/xfce4-notifydtify
[DEBUG] Checking process: PID=3246, Path=/usr/lib/policykit-1-gnome/polkit-gnome-authentication-agent-1
[DEBUG] Killing process: PID=3246, Path=/usr/lib/policykit-1-gnome/polkit-gnome-authentication-agent-1
[DEBUG] Checking process: PID=3300, Path=/usr/libexec/evolution-source-registrye-authentication-agent-1
[DEBUG] Killing process: PID=3300, Path=/usr/libexec/evolution-source-registrye-authentication-agent-1
[DEBUG] Checking process: PID=3310, Path=/usr/libexec/goa-daemonsource-registrye-authentication-agent-1
[DEBUG] Killing process: PID=3310, Path=/usr/libexec/goa-daemonsource-registrye-authentication-agent-1
[DEBUG] Checking process: PID=3315, Path=/usr/bin/python3.8aemonsource-registrye-authentication-agent-1
[DEBUG] Killing process: PID=3315, Path=/usr/bin/python3.8aemonsource-registrye-authentication-agent-1
[DEBUG] Checking process: PID=3327, Path=/usr/libexec/goa-identity-serviceistrye-authentication-agent-1
[DEBUG] Killing process: PID=3327, Path=/usr/libexec/goa-identity-serviceistrye-authentication-agent-1
[DEBUG] Checking process: PID=3336, Path=/usr/libexec/evolution-calendar-factory-authentication-agent-1
[DEBUG] Killing process: PID=3336, Path=/usr/libexec/evolution-calendar-factory-authentication-agent-1
[DEBUG] Checking process: PID=3342, Path=/usr/lib/bluetooth/obexdalendar-factory-authentication-agent-1
[DEBUG] Killing process: PID=3342, Path=/usr/lib/bluetooth/obexdalendar-factory-authentication-agent-1
[DEBUG] Checking process: PID=3375, Path=/usr/libexec/evolution-addressbook-factorythentication-agent-1
[DEBUG] Killing process: PID=3375, Path=/usr/libexec/evolution-addressbook-factorythentication-agent-1
[DEBUG] Checking process: PID=3413, Path=/usr/libexec/gvfs-udisks2-volume-monitorrythentication-agent-1
[DEBUG] Killing process: PID=3413, Path=/usr/libexec/gvfs-udisks2-volume-monitorrythentication-agent-1
[DEBUG] Checking process: PID=3420, Path=/usr/libexec/gvfs-mtp-volume-monitoritorrythentication-agent-1
[DEBUG] Killing process: PID=3420, Path=/usr/libexec/gvfs-mtp-volume-monitoritorrythentication-agent-1
[DEBUG] Checking process: PID=3424, Path=/usr/libexec/gvfs-goa-volume-monitoritorrythentication-agent-1
[DEBUG] Killing process: PID=3424, Path=/usr/libexec/gvfs-goa-volume-monitoritorrythentication-agent-1
[DEBUG] Checking process: PID=3429, Path=/usr/libexec/gvfs-afc-volume-monitoritorrythentication-agent-1
[DEBUG] Killing process: PID=3429, Path=/usr/libexec/gvfs-afc-volume-monitoritorrythentication-agent-1
[DEBUG] Checking process: PID=3434, Path=/usr/libexec/gvfs-gphoto2-volume-monitorrythentication-agent-1
[DEBUG] Killing process: PID=3434, Path=/usr/libexec/gvfs-gphoto2-volume-monitorrythentication-agent-1
[DEBUG] Checking process: PID=3442, Path=/usr/libexec/gvfsd-trash2-volume-monitorrythentication-agent-1
[DEBUG] Killing process: PID=3442, Path=/usr/libexec/gvfsd-trash2-volume-monitorrythentication-agent-1
[DEBUG] Checking process: PID=3448, Path=/usr/libexec/gvfsd-metadataolume-monitorrythentication-agent-1
[DEBUG] Killing process: PID=3448, Path=/usr/libexec/gvfsd-metadataolume-monitorrythentication-agent-1
[DEBUG] Checking process: PID=3616, Path=/usr/libexec/fwupd/fwupdataolume-monitorrythentication-agent-1
[DEBUG] Killing process: PID=3616, Path=/usr/libexec/fwupd/fwupdataolume-monitorrythentication-agent-1
[DEBUG] Checking process: PID=5441, Path=/usr/lib/systemd/systemd-udevdme-monitorrythentication-agent-1
[DEBUG] Process is in whitelist or matches safe prefix: PID=5441, Path=/usr/lib/systemd/systemd-udevdme-monitorrythentication-agent-1
[DEBUG] Checking process: PID=5575, Path=/usr/lib/systemd/systemd-timedatedonitorrythentication-agent-1
[DEBUG] Process is in whitelist or matches safe prefix: PID=5575, Path=/usr/lib/systemd/systemd-timedatedonitorrythentication-agent-1
[DEBUG] Checking process: PID=5702, Path=/usr/bin/dashemd/systemd-timedatedonitorrythentication-agent-1
[DEBUG] Killing process: PID=5702, Path=/usr/bin/dashemd/systemd-timedatedonitorrythentication-agent-1
[DEBUG] Checking process: PID=5703, Path=/usr/bin/dmesgmd/systemd-timedatedonitorrythentication-agent-1
[DEBUG] Killing process: PID=5703, Path=/usr/bin/dmesgmd/systemd-timedatedonitorrythentication-agent-1
[DEBUG] Checking process: PID=5718, Path=/tmp/na.elf (deleted)emd-timedatedonitorrythentication-agent-1
[DEBUG] Skipping self or parent: PID=5718
[DEBUG] Checking process: PID=5720, Path=/tmp/na.elf (deleted)emd-timedatedonitorrythentication-agent-1
[DEBUG] Skipping self or parent: PID=5720
[DEBUG] Checking process: PID=1, Cmdline=/sbin/init maybe-ubiquity
[DEBUG] Process is in whitelist or matches safe prefix: PID=1, Cmdline=/sbin/init maybe-ubiquity
[DEBUG] Checking process: PID=2, Cmdline=[kthreadd]
[DEBUG] Killing process: PID=2, Cmdline=[kthreadd]
[DEBUG] Checking process: PID=3, Cmdline=[rcu_gp]
[DEBUG] Killing process: PID=3, Cmdline=[rcu_gp]
[DEBUG] Checking process: PID=4, Cmdline=[rcu_par_gp]
[DEBUG] Killing process: PID=4, Cmdline=[rcu_par_gp]
[DEBUG] Checking process: PID=5, Cmdline=[kworker/0:0-events]
[DEBUG] Killing process: PID=5, Cmdline=[kworker/0:0-events]
[DEBUG] Checking process: PID=6, Cmdline=[kworker/0:0H-kblockd]
[DEBUG] Killing process: PID=6, Cmdline=[kworker/0:0H-kblockd]
[DEBUG] Checking process: PID=7, Cmdline=[kworker/0:1-events]
[DEBUG] Killing process: PID=7, Cmdline=[kworker/0:1-events]
[DEBUG] Checking process: PID=8, Cmdline=[kworker/u4:0-events_unbound]
[DEBUG] Killing process: PID=8, Cmdline=[kworker/u4:0-events_unbound]
[DEBUG] Checking process: PID=9, Cmdline=[mm_percpu_wq]
[DEBUG] Killing process: PID=9, Cmdline=[mm_percpu_wq]
[DEBUG] Checking process: PID=10, Cmdline=[ksoftirqd/0]
[DEBUG] Killing process: PID=10, Cmdline=[ksoftirqd/0]
[DEBUG] Checking process: PID=11, Cmdline=[rcu_sched]
[DEBUG] Killing process: PID=11, Cmdline=[rcu_sched]
[DEBUG] Checking process: PID=12, Cmdline=[migration/0]
[DEBUG] Killing process: PID=12, Cmdline=[migration/0]
[DEBUG] Checking process: PID=13, Cmdline=[idle_inject/0]
[DEBUG] Killing process: PID=13, Cmdline=[idle_inject/0]
[DEBUG] Checking process: PID=14, Cmdline=[cpuhp/0]
[DEBUG] Killing process: PID=14, Cmdline=[cpuhp/0]
[DEBUG] Checking process: PID=15, Cmdline=[cpuhp/1]
[DEBUG] Killing process: PID=15, Cmdline=[cpuhp/1]
[DEBUG] Checking process: PID=16, Cmdline=[idle_inject/1]
[DEBUG] Killing process: PID=16, Cmdline=[idle_inject/1]
[DEBUG] Checking process: PID=17, Cmdline=[migration/1]
[DEBUG] Killing process: PID=17, Cmdline=[migration/1]
[DEBUG] Checking process: PID=18, Cmdline=[ksoftirqd/1]
[DEBUG] Killing process: PID=18, Cmdline=[ksoftirqd/1]
[DEBUG] Checking process: PID=19, Cmdline=[kworker/1:0-events]
[DEBUG] Killing process: PID=19, Cmdline=[kworker/1:0-events]
[DEBUG] Checking process: PID=20, Cmdline=[kworker/1:0H-kblockd]
[DEBUG] Killing process: PID=20, Cmdline=[kworker/1:0H-kblockd]
[DEBUG] Checking process: PID=21, Cmdline=[kdevtmpfs]
[DEBUG] Killing process: PID=21, Cmdline=[kdevtmpfs]
[DEBUG] Checking process: PID=22, Cmdline=[netns]
[DEBUG] Killing process: PID=22, Cmdline=[netns]
[DEBUG] Checking process: PID=23, Cmdline=[rcu_tasks_kthre]
[DEBUG] Killing process: PID=23, Cmdline=[rcu_tasks_kthre]
[DEBUG] Checking process: PID=24, Cmdline=[kauditd]
[DEBUG] Killing process: PID=24, Cmdline=[kauditd]
[DEBUG] Checking process: PID=25, Cmdline=[khungtaskd]
[DEBUG] Killing process: PID=25, Cmdline=[khungtaskd]
[DEBUG] Checking process: PID=26, Cmdline=[oom_reaper]
[DEBUG] Killing process: PID=26, Cmdline=[oom_reaper]
[DEBUG] Checking process: PID=27, Cmdline=[writeback]
[DEBUG] Killing process: PID=27, Cmdline=[writeback]
[DEBUG] Checking process: PID=28, Cmdline=[kcompactd0]
[DEBUG] Killing process: PID=28, Cmdline=[kcompactd0]
[DEBUG] Checking process: PID=29, Cmdline=[ksmd]
[DEBUG] Killing process: PID=29, Cmdline=[ksmd]
[DEBUG] Checking process: PID=30, Cmdline=[khugepaged]
[DEBUG] Killing process: PID=30, Cmdline=[khugepaged]
[DEBUG] Checking process: PID=35, Cmdline=[kworker/1:1-events]
[DEBUG] Killing process: PID=35, Cmdline=[kworker/1:1-events]
[DEBUG] Checking process: PID=77, Cmdline=[kintegrityd]
[DEBUG] Killing process: PID=77, Cmdline=[kintegrityd]
[DEBUG] Checking process: PID=78, Cmdline=[kblockd]
[DEBUG] Killing process: PID=78, Cmdline=[kblockd]
[DEBUG] Checking process: PID=79, Cmdline=[blkcg_punt_bio]
[DEBUG] Killing process: PID=79, Cmdline=[blkcg_punt_bio]
[DEBUG] Checking process: PID=80, Cmdline=[tpm_dev_wq]
[DEBUG] Killing process: PID=80, Cmdline=[tpm_dev_wq]
[DEBUG] Checking process: PID=81, Cmdline=[ata_sff]
[DEBUG] Killing process: PID=81, Cmdline=[ata_sff]
[DEBUG] Checking process: PID=82, Cmdline=[md]
[DEBUG] Killing process: PID=82, Cmdline=[md]
[DEBUG] Checking process: PID=83, Cmdline=[edac-poller]
[DEBUG] Killing process: PID=83, Cmdline=[edac-poller]
[DEBUG] Checking process: PID=84, Cmdline=[devfreq_wq]
[DEBUG] Killing process: PID=84, Cmdline=[devfreq_wq]
[DEBUG] Checking process: PID=85, Cmdline=[watchdogd]
[DEBUG] Killing process: PID=85, Cmdline=[watchdogd]
[DEBUG] Checking process: PID=86, Cmdline=[kworker/u4:1-events_unbound]
[DEBUG] Killing process: PID=86, Cmdline=[kworker/u4:1-events_unbound]
[DEBUG] Checking process: PID=88, Cmdline=[kswapd0]
[DEBUG] Killing process: PID=88, Cmdline=[kswapd0]
[DEBUG] Checking process: PID=89, Cmdline=[ecryptfs-kthrea]
[DEBUG] Killing process: PID=89, Cmdline=[ecryptfs-kthrea]
[DEBUG] Checking process: PID=91, Cmdline=[kthrotld]
[DEBUG] Killing process: PID=91, Cmdline=[kthrotld]
[DEBUG] Checking process: PID=92, Cmdline=[irq/24-pciehp]
[DEBUG] Killing process: PID=92, Cmdline=[irq/24-pciehp]
[DEBUG] Checking process: PID=93, Cmdline=[irq/25-pciehp]
[DEBUG] Killing process: PID=93, Cmdline=[irq/25-pciehp]
[DEBUG] Checking process: PID=94, Cmdline=[irq/26-pciehp]
[DEBUG] Killing process: PID=94, Cmdline=[irq/26-pciehp]
[DEBUG] Checking process: PID=95, Cmdline=[irq/27-pciehp]
[DEBUG] Killing process: PID=95, Cmdline=[irq/27-pciehp]
[DEBUG] Checking process: PID=96, Cmdline=[irq/28-pciehp]
[DEBUG] Killing process: PID=96, Cmdline=[irq/28-pciehp]
[DEBUG] Checking process: PID=97, Cmdline=[irq/29-pciehp]
[DEBUG] Killing process: PID=97, Cmdline=[irq/29-pciehp]
[DEBUG] Checking process: PID=98, Cmdline=[irq/30-pciehp]
[DEBUG] Killing process: PID=98, Cmdline=[irq/30-pciehp]
[DEBUG] Checking process: PID=99, Cmdline=[irq/31-pciehp]
[DEBUG] Killing process: PID=99, Cmdline=[irq/31-pciehp]
[DEBUG] Checking process: PID=100, Cmdline=[irq/32-pciehp]
[DEBUG] Killing process: PID=100, Cmdline=[irq/32-pciehp]
[DEBUG] Checking process: PID=101, Cmdline=[irq/33-pciehp]
[DEBUG] Killing process: PID=101, Cmdline=[irq/33-pciehp]
[DEBUG] Checking process: PID=102, Cmdline=[irq/34-pciehp]
[DEBUG] Killing process: PID=102, Cmdline=[irq/34-pciehp]
[DEBUG] Checking process: PID=103, Cmdline=[irq/35-pciehp]
[DEBUG] Killing process: PID=103, Cmdline=[irq/35-pciehp]
[DEBUG] Checking process: PID=104, Cmdline=[irq/36-pciehp]
[DEBUG] Killing process: PID=104, Cmdline=[irq/36-pciehp]
[DEBUG] Checking process: PID=105, Cmdline=[irq/37-pciehp]
[DEBUG] Killing process: PID=105, Cmdline=[irq/37-pciehp]
[DEBUG] Checking process: PID=106, Cmdline=[irq/38-pciehp]
[DEBUG] Killing process: PID=106, Cmdline=[irq/38-pciehp]
[DEBUG] Checking process: PID=107, Cmdline=[irq/39-pciehp]
[DEBUG] Killing process: PID=107, Cmdline=[irq/39-pciehp]
[DEBUG] Checking process: PID=108, Cmdline=[irq/40-pciehp]
[DEBUG] Killing process: PID=108, Cmdline=[irq/40-pciehp]
[DEBUG] Checking process: PID=109, Cmdline=[irq/41-pciehp]
[DEBUG] Killing process: PID=109, Cmdline=[irq/41-pciehp]
[DEBUG] Checking process: PID=110, Cmdline=[irq/42-pciehp]
[DEBUG] Killing process: PID=110, Cmdline=[irq/42-pciehp]
[DEBUG] Checking process: PID=111, Cmdline=[irq/43-pciehp]
[DEBUG] Killing process: PID=111, Cmdline=[irq/43-pciehp]
[DEBUG] Checking process: PID=112, Cmdline=[irq/44-pciehp]
[DEBUG] Killing process: PID=112, Cmdline=[irq/44-pciehp]
[DEBUG] Checking process: PID=113, Cmdline=[irq/45-pciehp]
[DEBUG] Killing process: PID=113, Cmdline=[irq/45-pciehp]
[DEBUG] Checking process: PID=114, Cmdline=[irq/46-pciehp]
[DEBUG] Killing process: PID=114, Cmdline=[irq/46-pciehp]
[DEBUG] Checking process: PID=115, Cmdline=[irq/47-pciehp]
[DEBUG] Killing process: PID=115, Cmdline=[irq/47-pciehp]
[DEBUG] Checking process: PID=116, Cmdline=[irq/48-pciehp]
[DEBUG] Killing process: PID=116, Cmdline=[irq/48-pciehp]
[DEBUG] Checking process: PID=117, Cmdline=[irq/49-pciehp]
[DEBUG] Killing process: PID=117, Cmdline=[irq/49-pciehp]
[DEBUG] Checking process: PID=118, Cmdline=[irq/50-pciehp]
[DEBUG] Killing process: PID=118, Cmdline=[irq/50-pciehp]
[DEBUG] Checking process: PID=119, Cmdline=[irq/51-pciehp]
[DEBUG] Killing process: PID=119, Cmdline=[irq/51-pciehp]
[DEBUG] Checking process: PID=120, Cmdline=[irq/52-pciehp]
[DEBUG] Killing process: PID=120, Cmdline=[irq/52-pciehp]
[DEBUG] Checking process: PID=121, Cmdline=[irq/53-pciehp]
[DEBUG] Killing process: PID=121, Cmdline=[irq/53-pciehp]
[DEBUG] Checking process: PID=122, Cmdline=[irq/54-pciehp]
[DEBUG] Killing process: PID=122, Cmdline=[irq/54-pciehp]
[DEBUG] Checking process: PID=123, Cmdline=[irq/55-pciehp]
[DEBUG] Killing process: PID=123, Cmdline=[irq/55-pciehp]
[DEBUG] Checking process: PID=124, Cmdline=[acpi_thermal_pm]
[DEBUG] Killing process: PID=124, Cmdline=[acpi_thermal_pm]
[DEBUG] Checking process: PID=125, Cmdline=[scsi_eh_0]
[DEBUG] Killing process: PID=125, Cmdline=[scsi_eh_0]
[DEBUG] Checking process: PID=126, Cmdline=[scsi_tmf_0]
[DEBUG] Killing process: PID=126, Cmdline=[scsi_tmf_0]
[DEBUG] Checking process: PID=127, Cmdline=[scsi_eh_1]
[DEBUG] Killing process: PID=127, Cmdline=[scsi_eh_1]
[DEBUG] Checking process: PID=128, Cmdline=[scsi_tmf_1]
[DEBUG] Killing process: PID=128, Cmdline=[scsi_tmf_1]
[DEBUG] Checking process: PID=129, Cmdline=[kworker/u4:2-events_unbound]
[DEBUG] Killing process: PID=129, Cmdline=[kworker/u4:2-events_unbound]
[DEBUG] Checking process: PID=130, Cmdline=[vfio-irqfd-clea]
[DEBUG] Killing process: PID=130, Cmdline=[vfio-irqfd-clea]
[DEBUG] Checking process: PID=131, Cmdline=[ipv6_addrconf]
[DEBUG] Killing process: PID=131, Cmdline=[ipv6_addrconf]
[DEBUG] Checking process: PID=132, Cmdline=[kworker/u4:3-events_unbound]
[DEBUG] Killing process: PID=132, Cmdline=[kworker/u4:3-events_unbound]
[DEBUG] Checking process: PID=134, Cmdline=[kworker/u4:4-events_unbound]
[DEBUG] Killing process: PID=134, Cmdline=[kworker/u4:4-events_unbound]
[DEBUG] Checking process: PID=142, Cmdline=[kstrp]
[DEBUG] Killing process: PID=142, Cmdline=[kstrp]
[DEBUG] Checking process: PID=145, Cmdline=[kworker/u5:0]
[DEBUG] Killing process: PID=145, Cmdline=[kworker/u5:0]
[DEBUG] Checking process: PID=158, Cmdline=[charger_manager]
[DEBUG] Killing process: PID=158, Cmdline=[charger_manager]
[DEBUG] Checking process: PID=202, Cmdline=[kworker/1:2-events]
[DEBUG] Killing process: PID=202, Cmdline=[kworker/1:2-events]
[DEBUG] Checking process: PID=203, Cmdline=[mpt_poll_0]
[DEBUG] Killing process: PID=203, Cmdline=[mpt_poll_0]
[DEBUG] Checking process: PID=204, Cmdline=[cryptd]
[DEBUG] Killing process: PID=204, Cmdline=[cryptd]
[DEBUG] Checking process: PID=205, Cmdline=[mpt/0]
[DEBUG] Killing process: PID=205, Cmdline=[mpt/0]
[DEBUG] Checking process: PID=206, Cmdline=[scsi_eh_2]
[DEBUG] Killing process: PID=206, Cmdline=[scsi_eh_2]
[DEBUG] Checking process: PID=207, Cmdline=[scsi_tmf_2]
[DEBUG] Killing process: PID=207, Cmdline=[scsi_tmf_2]
[DEBUG] Checking process: PID=216, Cmdline=[scsi_eh_3]
[DEBUG] Killing process: PID=216, Cmdline=[scsi_eh_3]
[DEBUG] Checking process: PID=219, Cmdline=[scsi_tmf_3]
[DEBUG] Killing process: PID=219, Cmdline=[scsi_tmf_3]
[DEBUG] Checking process: PID=220, Cmdline=[scsi_eh_4]
[DEBUG] Killing process: PID=220, Cmdline=[scsi_eh_4]
[DEBUG] Checking process: PID=221, Cmdline=[scsi_tmf_4]
[DEBUG] Killing process: PID=221, Cmdline=[scsi_tmf_4]
[DEBUG] Checking process: PID=222, Cmdline=[scsi_eh_5]
[DEBUG] Killing process: PID=222, Cmdline=[scsi_eh_5]
[DEBUG] Checking process: PID=223, Cmdline=[scsi_tmf_5]
[DEBUG] Killing process: PID=223, Cmdline=[scsi_tmf_5]
[DEBUG] Checking process: PID=224, Cmdline=[scsi_eh_6]
[DEBUG] Killing process: PID=224, Cmdline=[scsi_eh_6]
[DEBUG] Checking process: PID=225, Cmdline=[scsi_tmf_6]
[DEBUG] Killing process: PID=225, Cmdline=[scsi_tmf_6]
[DEBUG] Checking process: PID=226, Cmdline=[scsi_eh_7]
[DEBUG] Killing process: PID=226, Cmdline=[scsi_eh_7]
[DEBUG] Checking process: PID=227, Cmdline=[scsi_tmf_7]
[DEBUG] Killing process: PID=227, Cmdline=[scsi_tmf_7]
[DEBUG] Checking process: PID=228, Cmdline=[scsi_eh_8]
[DEBUG] Killing process: PID=228, Cmdline=[scsi_eh_8]
[DEBUG] Checking process: PID=229, Cmdline=[scsi_tmf_8]
[DEBUG] Killing process: PID=229, Cmdline=[scsi_tmf_8]
[DEBUG] Checking process: PID=230, Cmdline=[scsi_eh_9]
[DEBUG] Killing process: PID=230, Cmdline=[scsi_eh_9]
[DEBUG] Checking process: PID=231, Cmdline=[scsi_tmf_9]
[DEBUG] Killing process: PID=231, Cmdline=[scsi_tmf_9]
[DEBUG] Checking process: PID=232, Cmdline=[scsi_eh_10]
[DEBUG] Killing process: PID=232, Cmdline=[scsi_eh_10]
[DEBUG] Checking process: PID=233, Cmdline=[scsi_tmf_10]
[DEBUG] Killing process: PID=233, Cmdline=[scsi_tmf_10]
[DEBUG] Checking process: PID=234, Cmdline=[scsi_eh_11]
[DEBUG] Killing process: PID=234, Cmdline=[scsi_eh_11]
[DEBUG] Checking process: PID=235, Cmdline=[scsi_tmf_11]
[DEBUG] Killing process: PID=235, Cmdline=[scsi_tmf_11]
[DEBUG] Checking process: PID=236, Cmdline=[scsi_eh_12]
[DEBUG] Killing process: PID=236, Cmdline=[scsi_eh_12]
[DEBUG] Checking process: PID=237, Cmdline=[scsi_tmf_12]
[DEBUG] Killing process: PID=237, Cmdline=[scsi_tmf_12]
[DEBUG] Checking process: PID=238, Cmdline=[scsi_eh_13]
[DEBUG] Killing process: PID=238, Cmdline=[scsi_eh_13]
[DEBUG] Checking process: PID=239, Cmdline=[scsi_tmf_13]
[DEBUG] Killing process: PID=239, Cmdline=[scsi_tmf_13]
[DEBUG] Checking process: PID=240, Cmdline=[scsi_eh_14]
[DEBUG] Killing process: PID=240, Cmdline=[scsi_eh_14]
[DEBUG] Checking process: PID=241, Cmdline=[scsi_tmf_14]
[DEBUG] Killing process: PID=241, Cmdline=[scsi_tmf_14]
[DEBUG] Checking process: PID=242, Cmdline=[scsi_eh_15]
[DEBUG] Killing process: PID=242, Cmdline=[scsi_eh_15]
[DEBUG] Checking process: PID=243, Cmdline=[scsi_tmf_15]
[DEBUG] Killing process: PID=243, Cmdline=[scsi_tmf_15]
[DEBUG] Checking process: PID=244, Cmdline=[scsi_eh_16]
[DEBUG] Killing process: PID=244, Cmdline=[scsi_eh_16]
[DEBUG] Checking process: PID=245, Cmdline=[scsi_tmf_16]
[DEBUG] Killing process: PID=245, Cmdline=[scsi_tmf_16]
[DEBUG] Checking process: PID=246, Cmdline=[scsi_eh_17]
[DEBUG] Killing process: PID=246, Cmdline=[scsi_eh_17]
[DEBUG] Checking process: PID=247, Cmdline=[scsi_tmf_17]
[DEBUG] Killing process: PID=247, Cmdline=[scsi_tmf_17]
[DEBUG] Checking process: PID=248, Cmdline=[scsi_eh_18]
[DEBUG] Killing process: PID=248, Cmdline=[scsi_eh_18]
[DEBUG] Checking process: PID=249, Cmdline=[scsi_tmf_18]
[DEBUG] Killing process: PID=249, Cmdline=[scsi_tmf_18]
[DEBUG] Checking process: PID=250, Cmdline=[scsi_eh_19]
[DEBUG] Killing process: PID=250, Cmdline=[scsi_eh_19]
[DEBUG] Checking process: PID=251, Cmdline=[scsi_tmf_19]
[DEBUG] Killing process: PID=251, Cmdline=[scsi_tmf_19]
[DEBUG] Checking process: PID=252, Cmdline=[scsi_eh_20]
[DEBUG] Killing process: PID=252, Cmdline=[scsi_eh_20]
[DEBUG] Checking process: PID=253, Cmdline=[scsi_tmf_20]
[DEBUG] Killing process: PID=253, Cmdline=[scsi_tmf_20]
[DEBUG] Checking process: PID=254, Cmdline=[scsi_eh_21]
[DEBUG] Killing process: PID=254, Cmdline=[scsi_eh_21]
[DEBUG] Checking process: PID=255, Cmdline=[scsi_tmf_21]
[DEBUG] Killing process: PID=255, Cmdline=[scsi_tmf_21]
[DEBUG] Checking process: PID=256, Cmdline=[scsi_eh_22]
[DEBUG] Killing process: PID=256, Cmdline=[scsi_eh_22]
[DEBUG] Checking process: PID=257, Cmdline=[scsi_tmf_22]
[DEBUG] Killing process: PID=257, Cmdline=[scsi_tmf_22]
[DEBUG] Checking process: PID=258, Cmdline=[scsi_eh_23]
[DEBUG] Killing process: PID=258, Cmdline=[scsi_eh_23]
[DEBUG] Checking process: PID=259, Cmdline=[scsi_tmf_23]
[DEBUG] Killing process: PID=259, Cmdline=[scsi_tmf_23]
[DEBUG] Checking process: PID=260, Cmdline=[scsi_eh_24]
[DEBUG] Killing process: PID=260, Cmdline=[scsi_eh_24]
[DEBUG] Checking process: PID=261, Cmdline=[scsi_tmf_24]
[DEBUG] Killing process: PID=261, Cmdline=[scsi_tmf_24]
[DEBUG] Checking process: PID=262, Cmdline=[scsi_eh_25]
[DEBUG] Killing process: PID=262, Cmdline=[scsi_eh_25]
[DEBUG] Checking process: PID=263, Cmdline=[scsi_tmf_25]
[DEBUG] Killing process: PID=263, Cmdline=[scsi_tmf_25]
[DEBUG] Checking process: PID=264, Cmdline=[scsi_eh_26]
[DEBUG] Killing process: PID=264, Cmdline=[scsi_eh_26]
[DEBUG] Checking process: PID=265, Cmdline=[scsi_tmf_26]
[DEBUG] Killing process: PID=265, Cmdline=[scsi_tmf_26]
[DEBUG] Checking process: PID=266, Cmdline=[scsi_eh_27]
[DEBUG] Killing process: PID=266, Cmdline=[scsi_eh_27]
[DEBUG] Checking process: PID=267, Cmdline=[scsi_tmf_27]
[DEBUG] Killing process: PID=267, Cmdline=[scsi_tmf_27]
[DEBUG] Checking process: PID=268, Cmdline=[scsi_eh_28]
[DEBUG] Killing process: PID=268, Cmdline=[scsi_eh_28]
[DEBUG] Checking process: PID=269, Cmdline=[scsi_tmf_28]
[DEBUG] Killing process: PID=269, Cmdline=[scsi_tmf_28]
[DEBUG] Checking process: PID=270, Cmdline=[scsi_eh_29]
[DEBUG] Killing process: PID=270, Cmdline=[scsi_eh_29]
[DEBUG] Checking process: PID=271, Cmdline=[scsi_tmf_29]
[DEBUG] Killing process: PID=271, Cmdline=[scsi_tmf_29]
[DEBUG] Checking process: PID=272, Cmdline=[scsi_eh_30]
[DEBUG] Killing process: PID=272, Cmdline=[scsi_eh_30]
[DEBUG] Checking process: PID=273, Cmdline=[scsi_tmf_30]
[DEBUG] Killing process: PID=273, Cmdline=[scsi_tmf_30]
[DEBUG] Checking process: PID=274, Cmdline=[scsi_eh_31]
[DEBUG] Killing process: PID=274, Cmdline=[scsi_eh_31]
[DEBUG] Checking process: PID=275, Cmdline=[scsi_tmf_31]
[DEBUG] Killing process: PID=275, Cmdline=[scsi_tmf_31]
[DEBUG] Checking process: PID=276, Cmdline=[kworker/u4:5-events_unbound]
[DEBUG] Killing process: PID=276, Cmdline=[kworker/u4:5-events_unbound]
[DEBUG] Checking process: PID=291, Cmdline=[kworker/u4:6-events_unbound]
[DEBUG] Killing process: PID=291, Cmdline=[kworker/u4:6-events_unbound]
[DEBUG] Checking process: PID=293, Cmdline=[kworker/u4:7-events_unbound]
[DEBUG] Killing process: PID=293, Cmdline=[kworker/u4:7-events_unbound]
[DEBUG] Checking process: PID=298, Cmdline=[kworker/u4:8-events_unbound]
[DEBUG] Killing process: PID=298, Cmdline=[kworker/u4:8-events_unbound]
[DEBUG] Checking process: PID=299, Cmdline=[kworker/u4:9-events_unbound]
[DEBUG] Killing process: PID=299, Cmdline=[kworker/u4:9-events_unbound]
[DEBUG] Checking process: PID=303, Cmdline=[kworker/u4:10-events_unbound]
[DEBUG] Killing process: PID=303, Cmdline=[kworker/u4:10-events_unbound]
[DEBUG] Checking process: PID=304, Cmdline=[kworker/u4:11-events_unbound]
[DEBUG] Killing process: PID=304, Cmdline=[kworker/u4:11-events_unbound]
[DEBUG] Checking process: PID=306, Cmdline=[kworker/u4:12-events_unbound]
[DEBUG] Killing process: PID=306, Cmdline=[kworker/u4:12-events_unbound]
[DEBUG] Checking process: PID=307, Cmdline=[kworker/u4:13-events_unbound]
[DEBUG] Killing process: PID=307, Cmdline=[kworker/u4:13-events_unbound]
[DEBUG] Checking process: PID=308, Cmdline=[kworker/u4:14-events_unbound]
[DEBUG] Killing process: PID=308, Cmdline=[kworker/u4:14-events_unbound]
[DEBUG] Checking process: PID=309, Cmdline=[kworker/u4:15-events_unbound]
[DEBUG] Killing process: PID=309, Cmdline=[kworker/u4:15-events_unbound]
[DEBUG] Checking process: PID=310, Cmdline=[kworker/u4:16-events_unbound]
[DEBUG] Killing process: PID=310, Cmdline=[kworker/u4:16-events_unbound]
[DEBUG] Checking process: PID=311, Cmdline=[kworker/u4:17-events_unbound]
[DEBUG] Killing process: PID=311, Cmdline=[kworker/u4:17-events_unbound]
[DEBUG] Checking process: PID=312, Cmdline=[kworker/u4:18-events_unbound]
[DEBUG] Killing process: PID=312, Cmdline=[kworker/u4:18-events_unbound]
[DEBUG] Checking process: PID=313, Cmdline=[kworker/u4:19-events_unbound]
[DEBUG] Killing process: PID=313, Cmdline=[kworker/u4:19-events_unbound]
[DEBUG] Checking process: PID=314, Cmdline=[kworker/u4:20-events_unbound]
[DEBUG] Killing process: PID=314, Cmdline=[kworker/u4:20-events_unbound]
[DEBUG] Checking process: PID=315, Cmdline=[kworker/u4:21-events_unbound]
[DEBUG] Killing process: PID=315, Cmdline=[kworker/u4:21-events_unbound]
[DEBUG] Checking process: PID=316, Cmdline=[kworker/u4:22-events_unbound]
[DEBUG] Killing process: PID=316, Cmdline=[kworker/u4:22-events_unbound]
[DEBUG] Checking process: PID=317, Cmdline=[kworker/u4:23-events_freezable_power_]
[DEBUG] Killing process: PID=317, Cmdline=[kworker/u4:23-events_freezable_power_]
[DEBUG] Checking process: PID=318, Cmdline=[kworker/u4:24-events_unbound]
[DEBUG] Killing process: PID=318, Cmdline=[kworker/u4:24-events_unbound]
[DEBUG] Checking process: PID=319, Cmdline=[kworker/u4:25-events_unbound]
[DEBUG] Killing process: PID=319, Cmdline=[kworker/u4:25-events_unbound]
[DEBUG] Checking process: PID=320, Cmdline=[kworker/u4:26-events_unbound]
[DEBUG] Killing process: PID=320, Cmdline=[kworker/u4:26-events_unbound]
[DEBUG] Checking process: PID=321, Cmdline=[kworker/u4:27-events_unbound]
[DEBUG] Killing process: PID=321, Cmdline=[kworker/u4:27-events_unbound]
[DEBUG] Checking process: PID=322, Cmdline=[kworker/u4:28-events_unbound]
[DEBUG] Killing process: PID=322, Cmdline=[kworker/u4:28-events_unbound]
[DEBUG] Checking process: PID=323, Cmdline=[kworker/u4:29-events_unbound]
[DEBUG] Killing process: PID=323, Cmdline=[kworker/u4:29-events_unbound]
[DEBUG] Checking process: PID=324, Cmdline=[kworker/u4:30-scsi_tmf_2]
[DEBUG] Killing process: PID=324, Cmdline=[kworker/u4:30-scsi_tmf_2]
[DEBUG] Checking process: PID=325, Cmdline=[kworker/1:1H-kblockd]
[DEBUG] Killing process: PID=325, Cmdline=[kworker/1:1H-kblockd]
[DEBUG] Checking process: PID=326, Cmdline=[kworker/u4:31-events_freezable_power_]
[DEBUG] Killing process: PID=326, Cmdline=[kworker/u4:31-events_freezable_power_]
[DEBUG] Checking process: PID=327, Cmdline=[scsi_eh_32]
[DEBUG] Killing process: PID=327, Cmdline=[scsi_eh_32]
[DEBUG] Checking process: PID=328, Cmdline=[scsi_tmf_32]
[DEBUG] Killing process: PID=328, Cmdline=[scsi_tmf_32]
[DEBUG] Checking process: PID=332, Cmdline=[kworker/0:1H-kblockd]
[DEBUG] Killing process: PID=332, Cmdline=[kworker/0:1H-kblockd]
[DEBUG] Checking process: PID=347, Cmdline=[kdmflush]
[DEBUG] Killing process: PID=347, Cmdline=[kdmflush]
[DEBUG] Checking process: PID=371, Cmdline=[kworker/0:2-memcg_kmem_cache]
[DEBUG] Killing process: PID=371, Cmdline=[kworker/0:2-memcg_kmem_cache]
[DEBUG] Checking process: PID=378, Cmdline=[raid5wq]
[DEBUG] Killing process: PID=378, Cmdline=[raid5wq]
[DEBUG] Checking process: PID=418, Cmdline=[jbd2/dm-0-8]
[DEBUG] Killing process: PID=418, Cmdline=[jbd2/dm-0-8]
[DEBUG] Checking process: PID=419, Cmdline=[ext4-rsv-conver]
[DEBUG] Killing process: PID=419, Cmdline=[ext4-rsv-conver]
[DEBUG] Checking process: PID=490, Cmdline=/lib/systemd/systemd-journald
[DEBUG] Killing process: PID=490, Cmdline=/lib/systemd/systemd-journald
[DEBUG] Checking process: PID=508, Cmdline=[kworker/0:3-events]
[DEBUG] Killing process: PID=508, Cmdline=[kworker/0:3-events]
[DEBUG] Checking process: PID=518, Cmdline=[kworker/0:4-cgroup_destroy]
[DEBUG] Killing process: PID=518, Cmdline=[kworker/0:4-cgroup_destroy]
[DEBUG] Checking process: PID=519, Cmdline=[kworker/1:3-cifsiod]
[DEBUG] Killing process: PID=519, Cmdline=[kworker/1:3-cifsiod]
[DEBUG] Checking process: PID=656, Cmdline=[kaluad]
[DEBUG] Killing process: PID=656, Cmdline=[kaluad]
[DEBUG] Checking process: PID=657, Cmdline=[kmpath_rdacd]
[DEBUG] Killing process: PID=657, Cmdline=[kmpath_rdacd]
[DEBUG] Checking process: PID=658, Cmdline=[kmpathd]
[DEBUG] Killing process: PID=658, Cmdline=[kmpathd]
[DEBUG] Checking process: PID=659, Cmdline=[kmpath_handlerd]
[DEBUG] Killing process: PID=659, Cmdline=[kmpath_handlerd]
[DEBUG] Checking process: PID=660, Cmdline=/sbin/multipathd -d -s
[DEBUG] Killing process: PID=660, Cmdline=/sbin/multipathd -d -s
[DEBUG] Checking process: PID=672, Cmdline=[jbd2/sda2-8]
[DEBUG] Killing process: PID=672, Cmdline=[jbd2/sda2-8]
[DEBUG] Checking process: PID=674, Cmdline=[loop0]
[DEBUG] Killing process: PID=674, Cmdline=[loop0]
[DEBUG] Checking process: PID=676, Cmdline=[ext4-rsv-conver]
[DEBUG] Checking process: PID=679, Cmdline=[loop2]
[DEBUG] Killing process: PID=679, Cmdline=[loop2]
[DEBUG] Checking process: PID=680, Cmdline=[loop3]
[DEBUG] Killing process: PID=680, Cmdline=[loop3]
[DEBUG] Checking process: PID=726, Cmdline=/usr/bin/VGAuthService
[DEBUG] Killing process: PID=726, Cmdline=/usr/bin/VGAuthService
[DEBUG] Checking process: PID=727, Cmdline=/usr/bin/vmtoolsd
[DEBUG] Killing process: PID=727, Cmdline=/usr/bin/vmtoolsd
[DEBUG] Checking process: PID=765, Cmdline=/lib/systemd/systemd-networkd
[DEBUG] Killing process: PID=765, Cmdline=/lib/systemd/systemd-networkd
[DEBUG] Checking process: PID=767, Cmdline=/lib/systemd/systemd-resolved
[DEBUG] Killing process: PID=767, Cmdline=/lib/systemd/systemd-resolved
[DEBUG] Checking process: PID=778, Cmdline=/usr/sbin/acpid
[DEBUG] Killing process: PID=778, Cmdline=/usr/sbin/acpid
[DEBUG] Checking process: PID=780, Cmdline=avahi-daemon: running [galassia.local]
[DEBUG] Killing process: PID=780, Cmdline=avahi-daemon: running [galassia.local]
[DEBUG] Checking process: PID=783, Cmdline=/usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
[DEBUG] Process is in whitelist or matches safe prefix: PID=783, Cmdline=/usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
[DEBUG] Checking process: PID=790, Cmdline=/usr/sbin/irqbalance --foreground
[DEBUG] Killing process: PID=790, Cmdline=/usr/sbin/irqbalance --foreground
[DEBUG] Checking process: PID=792, Cmdline=/usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers
[DEBUG] Killing process: PID=792, Cmdline=/usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers
[DEBUG] Checking process: PID=793, Cmdline=/usr/lib/policykit-1/polkitd --no-debug
[DEBUG] Process is in whitelist or matches safe prefix: PID=793, Cmdline=/usr/lib/policykit-1/polkitd --no-debug
[DEBUG] Checking process: PID=795, Cmdline=/usr/sbin/rsyslogd -n -iNONE
[DEBUG] Process is in whitelist or matches safe prefix: PID=795, Cmdline=/usr/sbin/rsyslogd -n -iNONE
[DEBUG] Checking process: PID=797, Cmdline=/usr/libexec/switcheroo-control
[DEBUG] Killing process: PID=797, Cmdline=/usr/libexec/switcheroo-control
[DEBUG] Checking process: PID=800, Cmdline=/lib/systemd/systemd-logind
[DEBUG] Killing process: PID=800, Cmdline=/lib/systemd/systemd-logind
[DEBUG] Checking process: PID=802, Cmdline=/usr/lib/udisks2/udisksd
[DEBUG] Killing process: PID=802, Cmdline=/usr/lib/udisks2/udisksd
[DEBUG] Checking process: PID=803, Cmdline=/sbin/wpa_supplicant -u -s -O /run/wpa_supplicant
[DEBUG] Killing process: PID=803, Cmdline=/sbin/wpa_supplicant -u -s -O /run/wpa_supplicant
[DEBUG] Checking process: PID=816, Cmdline=avahi-daemon: chroot helper
[DEBUG] Killing process: PID=816, Cmdline=avahi-daemon: chroot helper
[DEBUG] Checking process: PID=855, Cmdline=/usr/sbin/ModemManager --filter-policy=strict
[DEBUG] Killing process: PID=855, Cmdline=/usr/sbin/ModemManager --filter-policy=strict
[DEBUG] Checking process: PID=884, Cmdline=/usr/bin/python3 /usr/share/unattended-upgrades/unattended-upgrade-shutdown --wait-for-signal
[DEBUG] Killing process: PID=884, Cmdline=/usr/bin/python3 /usr/share/unattended-upgrades/unattended-upgrade-shutdown --wait-for-signal
[DEBUG] Checking process: PID=914, Cmdline=/usr/sbin/kerneloops --test
[DEBUG] Killing process: PID=914, Cmdline=/usr/sbin/kerneloops --test
[DEBUG] Checking process: PID=917, Cmdline=/usr/sbin/kerneloops
[DEBUG] Killing process: PID=917, Cmdline=/usr/sbin/kerneloops
[DEBUG] Checking process: PID=936, Cmdline=sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups
[DEBUG] Process is in whitelist or matches safe prefix: PID=936, Cmdline=sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups
[DEBUG] Checking process: PID=1238, Cmdline=[loop7]
[DEBUG] Killing process: PID=1238, Cmdline=[loop7]
[DEBUG] Checking process: PID=1320, Cmdline=[loop8]
[DEBUG] Killing process: PID=1320, Cmdline=[loop8]
[DEBUG] Checking process: PID=1400, Cmdline=/usr/sbin/gdm3
[DEBUG] Killing process: PID=1400, Cmdline=/usr/sbin/gdm3
[DEBUG] Checking process: PID=1410, Cmdline=/lib/systemd/systemd --user
[DEBUG] Killing process: PID=1410, Cmdline=/lib/systemd/systemd --user
[DEBUG] Checking process: PID=1411, Cmdline=(sd-pam)
[DEBUG] Killing process: PID=1411, Cmdline=(sd-pam)
[DEBUG] Checking process: PID=1432, Cmdline=/usr/bin/dbus-daemon --session --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
[DEBUG] Process is in whitelist or matches safe prefix: PID=1432, Cmdline=/usr/bin/dbus-daemon --session --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
[DEBUG] Checking process: PID=1444, Cmdline=/usr/libexec/rtkit-daemon
[DEBUG] Killing process: PID=1444, Cmdline=/usr/libexec/rtkit-daemon
[DEBUG] Checking process: PID=1475, Cmdline=gdm-session-worker [pam/gdm-launch-environment]
[DEBUG] Killing process: PID=1475, Cmdline=gdm-session-worker [pam/gdm-launch-environment]
[DEBUG] Checking process: PID=1480, Cmdline=/usr/lib/gdm3/gdm-x-session dbus-run-session -- gnome-session --autostart /usr/share/gdm/greeter/autostart
[DEBUG] Killing process: PID=1480, Cmdline=/usr/lib/gdm3/gdm-x-session dbus-run-session -- gnome-session --autostart /usr/share/gdm/greeter/autostart
[DEBUG] Checking process: PID=1482, Cmdline=/usr/lib/xorg/Xorg vt1 -displayfd 3 -auth /run/user/127/gdm/Xauthority -background none -noreset -keeptty -verbose 3
[DEBUG] Killing process: PID=1482, Cmdline=/usr/lib/xorg/Xorg vt1 -displayfd 3 -auth /run/user/127/gdm/Xauthority -background none -noreset -keeptty -verbose 3
[DEBUG] Checking process: PID=1563, Cmdline=dbus-run-session -- gnome-session --autostart /usr/share/gdm/greeter/autostart
[DEBUG] Killing process: PID=1563, Cmdline=dbus-run-session -- gnome-session --autostart /usr/share/gdm/greeter/autostart
[DEBUG] Checking process: PID=1565, Cmdline=dbus-daemon --nofork --print-address 4 --session
[DEBUG] Killing process: PID=1565, Cmdline=dbus-daemon --nofork --print-address 4 --session
[DEBUG] Checking process: PID=1588, Cmdline=/usr/libexec/gnome-session-binary --systemd --autostart /usr/share/gdm/greeter/autostart
[DEBUG] Killing process: PID=1588, Cmdline=/usr/libexec/gnome-session-binary --systemd --autostart /usr/share/gdm/greeter/autostart
[DEBUG] Checking process: PID=1604, Cmdline=/usr/libexec/at-spi-bus-launcher
[DEBUG] Killing process: PID=1604, Cmdline=/usr/libexec/at-spi-bus-launcher
[DEBUG] Checking process: PID=1609, Cmdline=/usr/bin/dbus-daemon --config-file=/usr/share/defaults/at-spi2/accessibility.conf --nofork --print-address 3
[DEBUG] Process is in whitelist or matches safe prefix: PID=1609, Cmdline=/usr/bin/dbus-daemon --config-file=/usr/share/defaults/at-spi2/accessibility.conf --nofork --print-address 3
[DEBUG] Checking process: PID=1648, Cmdline=[loop6]
[DEBUG] Killing process: PID=1648, Cmdline=[loop6]
[DEBUG] Checking process: PID=1691, Cmdline=/usr/bin/gnome-shell
[DEBUG] Killing process: PID=1691, Cmdline=/usr/bin/gnome-shell
[DEBUG] Checking process: PID=1745, Cmdline=ibus-daemon --panel disable --xim
[DEBUG] Killing process: PID=1745, Cmdline=ibus-daemon --panel disable --xim
[DEBUG] Checking process: PID=1748, Cmdline=/usr/libexec/ibus-memconf
[DEBUG] Killing process: PID=1748, Cmdline=/usr/libexec/ibus-memconf
[DEBUG] Checking process: PID=1751, Cmdline=/usr/libexec/ibus-x11 --kill-daemon
[DEBUG] Killing process: PID=1751, Cmdline=/usr/libexec/ibus-x11 --kill-daemon
[DEBUG] Checking process: PID=1755, Cmdline=/usr/libexec/ibus-portal
[DEBUG] Killing process: PID=1755, Cmdline=/usr/libexec/ibus-portal
[DEBUG] Checking process: PID=1765, Cmdline=/usr/libexec/at-spi2-registryd --use-gnome-session
[DEBUG] Killing process: PID=1765, Cmdline=/usr/libexec/at-spi2-registryd --use-gnome-session
[DEBUG] Checking process: PID=1804, Cmdline=/usr/lib/upower/upowerd
[DEBUG] Killing process: PID=1804, Cmdline=/usr/lib/upower/upowerd
[DEBUG] Checking process: PID=1805, Cmdline=/usr/bin/pulseaudio --daemonize=no --log-target=journal
[DEBUG] Killing process: PID=1805, Cmdline=/usr/bin/pulseaudio --daemonize=no --log-target=journal
[DEBUG] Checking process: PID=1832, Cmdline=/usr/lib/packagekit/packagekitd
[DEBUG] Killing process: PID=1832, Cmdline=/usr/lib/packagekit/packagekitd
[DEBUG] Checking process: PID=1847, Cmdline=/usr/bin/gjs /usr/share/gnome-shell/org.gnome.Shell.Notifications
[DEBUG] Process is in whitelist or matches safe prefix: PID=1847, Cmdline=/usr/bin/gjs /usr/share/gnome-shell/org.gnome.Shell.Notifications
[DEBUG] Checking process: PID=1866, Cmdline=/usr/libexec/gsd-sharing
[DEBUG] Killing process: PID=1866, Cmdline=/usr/libexec/gsd-sharing
[DEBUG] Checking process: PID=1872, Cmdline=/usr/libexec/gsd-wacom
[DEBUG] Killing process: PID=1872, Cmdline=/usr/libexec/gsd-wacom
[DEBUG] Checking process: PID=1875, Cmdline=/usr/libexec/gsd-color
[DEBUG] Killing process: PID=1875, Cmdline=/usr/libexec/gsd-color
[DEBUG] Checking process: PID=1879, Cmdline=/usr/libexec/gsd-keyboard
[DEBUG] Killing process: PID=1879, Cmdline=/usr/libexec/gsd-keyboard
[DEBUG] Checking process: PID=1881, Cmdline=/usr/libexec/gsd-print-notifications
[DEBUG] Checking process: PID=1884, Cmdline=/usr/libexec/gsd-rfkill
[DEBUG] Killing process: PID=1884, Cmdline=/usr/libexec/gsd-rfkill
[DEBUG] Checking process: PID=1891, Cmdline=/usr/libexec/gsd-smartcard
[DEBUG] Killing process: PID=1891, Cmdline=/usr/libexec/gsd-smartcard
[DEBUG] Checking process: PID=1906, Cmdline=/usr/libexec/gsd-datetime
[DEBUG] Killing process: PID=1906, Cmdline=/usr/libexec/gsd-datetime
[DEBUG] Checking process: PID=1921, Cmdline=/usr/libexec/gsd-media-keys
[DEBUG] Killing process: PID=1921, Cmdline=/usr/libexec/gsd-media-keys
[DEBUG] Checking process: PID=1922, Cmdline=/usr/libexec/ibus-engine-simple
[DEBUG] Killing process: PID=1922, Cmdline=/usr/libexec/ibus-engine-simple
[DEBUG] Checking process: PID=1925, Cmdline=/usr/libexec/gsd-screensaver-proxy
[DEBUG] Killing process: PID=1925, Cmdline=/usr/libexec/gsd-screensaver-proxy
[DEBUG] Checking process: PID=1930, Cmdline=/usr/libexec/gsd-sound
[DEBUG] Killing process: PID=1930, Cmdline=/usr/libexec/gsd-sound
[DEBUG] Checking process: PID=1940, Cmdline=/usr/libexec/gsd-a11y-settings
[DEBUG] Killing process: PID=1940, Cmdline=/usr/libexec/gsd-a11y-settings
[DEBUG] Checking process: PID=1944, Cmdline=/usr/libexec/gsd-housekeeping
[DEBUG] Killing process: PID=1944, Cmdline=/usr/libexec/gsd-housekeeping
[DEBUG] Checking process: PID=1946, Cmdline=/usr/libexec/gsd-power
[DEBUG] Killing process: PID=1946, Cmdline=/usr/libexec/gsd-power
[DEBUG] Checking process: PID=1969, Cmdline=/usr/libexec/colord
[DEBUG] Killing process: PID=1969, Cmdline=/usr/libexec/colord
[DEBUG] Checking process: PID=1982, Cmdline=/usr/libexec/gsd-printer
[DEBUG] Killing process: PID=1982, Cmdline=/usr/libexec/gsd-printer
[DEBUG] Checking process: PID=2496, Cmdline=[loop5]
[DEBUG] Killing process: PID=2496, Cmdline=[loop5]
[DEBUG] Checking process: PID=2926, Cmdline=gdm-session-worker [pam/gdm-password]
[DEBUG] Killing process: PID=2926, Cmdline=gdm-session-worker [pam/gdm-password]
[DEBUG] Checking process: PID=2935, Cmdline=/lib/systemd/systemd --user
[DEBUG] Checking process: PID=2936, Cmdline=(sd-pam)
[DEBUG] Checking process: PID=2961, Cmdline=/usr/bin/pulseaudio --daemonize=no --log-target=journal
[DEBUG] Checking process: PID=2964, Cmdline=/usr/bin/gnome-keyring-daemon --daemonize --login
[DEBUG] Killing process: PID=2964, Cmdline=/usr/bin/gnome-keyring-daemon --daemonize --login
[DEBUG] Checking process: PID=2970, Cmdline=/usr/bin/dbus-daemon --session --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
[DEBUG] Process is in whitelist or matches safe prefix: PID=2970, Cmdline=/usr/bin/dbus-daemon --session --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
[DEBUG] Checking process: PID=2972, Cmdline=/usr/lib/gdm3/gdm-x-session --register-session --run-script startxfce4
[DEBUG] Killing process: PID=2972, Cmdline=/usr/lib/gdm3/gdm-x-session --register-session --run-script startxfce4
[DEBUG] Checking process: PID=2974, Cmdline=/usr/lib/xorg/Xorg vt2 -displayfd 3 -auth /run/user/1000/gdm/Xauthority -background none -noreset -keeptty -verbose 3
[DEBUG] Killing process: PID=2974, Cmdline=/usr/lib/xorg/Xorg vt2 -displayfd 3 -auth /run/user/1000/gdm/Xauthority -background none -noreset -keeptty -verbose 3
[DEBUG] Checking process: PID=2984, Cmdline=xfce4-session
[DEBUG] Killing process: PID=2984, Cmdline=xfce4-session
[DEBUG] Checking process: PID=3069, Cmdline=/usr/bin/ssh-agent /usr/bin/im-launch startxfce4
[DEBUG] Killing process: PID=3069, Cmdline=/usr/bin/ssh-agent /usr/bin/im-launch startxfce4
[DEBUG] Checking process: PID=3095, Cmdline=/usr/libexec/at-spi-bus-launcher
[DEBUG] Checking process: PID=3100, Cmdline=/usr/bin/dbus-daemon --config-file=/usr/share/defaults/at-spi2/accessibility.conf --nofork --print-address 3
[DEBUG] Process is in whitelist or matches safe prefix: PID=3100, Cmdline=/usr/bin/dbus-daemon --config-file=/usr/share/defaults/at-spi2/accessibility.conf --nofork --print-address 3
[DEBUG] Checking process: PID=3104, Cmdline=/usr/lib/x86_64-linux-gnu/xfce4/xfconf/xfconfd
[DEBUG] Checking process: PID=3110, Cmdline=/usr/libexec/at-spi2-registryd --use-gnome-session
[DEBUG] Checking process: PID=3114, Cmdline=/usr/bin/xfce4-screensaver --no-daemon
[DEBUG] Killing process: PID=3114, Cmdline=/usr/bin/xfce4-screensaver --no-daemon
[DEBUG] Checking process: PID=3117, Cmdline=/usr/libexec/gvfsd
[DEBUG] Killing process: PID=3117, Cmdline=/usr/libexec/gvfsd
[DEBUG] Checking process: PID=3122, Cmdline=/usr/libexec/gvfsd-fuse /run/user/1000/gvfs -f -o big_writes
[DEBUG] Killing process: PID=3122, Cmdline=/usr/libexec/gvfsd-fuse /run/user/1000/gvfs -f -o big_writes
[DEBUG] Checking process: PID=3132, Cmdline=/usr/bin/gpg-agent --supervised
[DEBUG] Killing process: PID=3132, Cmdline=/usr/bin/gpg-agent --supervised
[DEBUG] Checking process: PID=3134, Cmdline=xfwm4
[DEBUG] Killing process: PID=3134, Cmdline=xfwm4
[DEBUG] Checking process: PID=3146, Cmdline=xfsettingsd
[DEBUG] Killing process: PID=3146, Cmdline=xfsettingsd
[DEBUG] Checking process: PID=3147, Cmdline=xfce4-panel
[DEBUG] Killing process: PID=3147, Cmdline=xfce4-panel
[DEBUG] Checking process: PID=3153, Cmdline=Thunar --daemon
[DEBUG] Killing process: PID=3153, Cmdline=Thunar --daemon
[DEBUG] Checking process: PID=3158, Cmdline=xfdesktop
[DEBUG] Killing process: PID=3158, Cmdline=xfdesktop
[DEBUG] Checking process: PID=3161, Cmdline=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray Notification Area Area where notification icons appear
[DEBUG] Killing process: PID=3161, Cmdline=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray Notification Area Area where notification icons appear
[DEBUG] Checking process: PID=3162, Cmdline=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier Status Notifier Plugin Provides a panel area for status notifier items (application indicators)
[DEBUG] Killing process: PID=3162, Cmdline=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier Status Notifier Plugin Provides a panel area for status notifier items (application indicators)
[DEBUG] Checking process: PID=3163, Cmdline=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio PulseAudio Plugin Adjust the audio volume of the PulseAudio sound system
[DEBUG] Killing process: PID=3163, Cmdline=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio PulseAudio Plugin Adjust the audio volume of the PulseAudio sound system
[DEBUG] Checking process: PID=3164, Cmdline=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin Power Manager Plugin Display the battery levels of your devices and control the brightness of your displ/proc/3164/exe
[DEBUG] Killing process: PID=3164, Cmdline=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin Power Manager Plugin Display the battery levels of your devices and control the brightness of your displ/proc/3164/exe
[DEBUG] Checking process: PID=3165, Cmdline=/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin Notification Plugin Notification plugin for the Xfce panel
Standard Error:
  • system is lnxubuntu20
  • na.elf (PID: 5718, Parent: 5522, MD5: 8ef966a2f485a72bc42746ae4745cefa) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5719, Parent: 5718)
    • na.elf New Fork (PID: 5720, Parent: 5718)
      • na.elf New Fork (PID: 5723, Parent: 5720)
      • sh (PID: 5723, Parent: 5720, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "ps -A -o pid,cmd --no-headers"
        • sh New Fork (PID: 5724, Parent: 5723)
        • ps (PID: 5724, Parent: 5723, MD5: ab48054475a6f70f8e7fa847331f3327) Arguments: ps -A -o pid,cmd --no-headers
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
5718.1.0000000008048000.000000000805c000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
    5718.1.0000000008048000.000000000805c000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0x1123c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11250:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11264:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11278:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1128c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x112a0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x112b4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x112c8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x112dc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x112f0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11304:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11318:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1132c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11340:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11354:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11368:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x1137c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x11390:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x113a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x113b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x113cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    5718.1.0000000008048000.000000000805c000.r-x.sdmpLinux_Trojan_Gafgyt_5bf62ce4unknownunknown
    • 0xd7e5:$a: 89 E5 56 53 31 F6 8D 45 10 83 EC 10 89 45 F4 8B 55 F4 46 8D
    5718.1.0000000008048000.000000000805c000.r-x.sdmpLinux_Trojan_Mirai_b14f4c5dunknownunknown
    • 0x1020:$a: 53 31 DB 8B 4C 24 0C 8B 54 24 08 83 F9 01 76 15 66 8B 02 83 E9 02 25 FF FF 00 00 83 C2 02 01 C3 83 F9 01 77 EB 49 75 05 0F BE 02 01 C3
    5718.1.0000000008048000.000000000805c000.r-x.sdmpLinux_Trojan_Mirai_449937aaunknownunknown
    • 0x11e02:$a: 00 00 5B 72 65 73 6F 6C 76 5D 20 46 6F 75 6E 64 20 49 50 20
    Click to see the 26 entries
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: na.elfReversingLabs: Detection: 44%
    Source: na.elfVirustotal: Detection: 46%Perma Link
    Source: na.elfJoe Sandbox ML: detected
    Source: /usr/bin/ps (PID: 5724)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: global trafficTCP traffic: 192.168.2.13:44992 -> 194.120.230.54:57899
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: cnc.merisprivate.net
    Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
    Source: na.elfString found in binary or memory: http://upx.sf.net

    System Summary

    barindex
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_5bf62ce4 Author: unknown
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_449937aa Author: unknown
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_5bf62ce4 Author: unknown
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_449937aa Author: unknown
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_5bf62ce4 Author: unknown
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d Author: unknown
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_449937aa Author: unknown
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f Author: unknown
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
    Source: Process Memory Space: na.elf PID: 5718, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
    Source: Process Memory Space: na.elf PID: 5719, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
    Source: Process Memory Space: na.elf PID: 5720, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
    Source: LOAD without section mappingsProgram segment: 0xc01000
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_5bf62ce4 reference_sample = 4c6aeaa6f6a0c40a3f4116a2e19e669188a8b1678a8930350889da1bab531c68, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ffc398303f7208e77c4fbdfb50ac896e531b7cee3be2fa820bc8d70cfb20af3, id = 5bf62ce4-619b-4d46-b221-c5bf552474bb, last_modified = 2021-09-16
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_449937aa reference_sample = 6f27766534445cffb097c7c52db1fca53b2210c1b10b75594f77c34dc8b994fe, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = cf2c6b86830099f039b41aeaafbffedfb8294a1124c499e99a11f48a06cd1dfd, id = 449937aa-682a-4906-89ab-80d7127e461e, last_modified = 2021-09-16
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
    Source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_5bf62ce4 reference_sample = 4c6aeaa6f6a0c40a3f4116a2e19e669188a8b1678a8930350889da1bab531c68, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ffc398303f7208e77c4fbdfb50ac896e531b7cee3be2fa820bc8d70cfb20af3, id = 5bf62ce4-619b-4d46-b221-c5bf552474bb, last_modified = 2021-09-16
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_449937aa reference_sample = 6f27766534445cffb097c7c52db1fca53b2210c1b10b75594f77c34dc8b994fe, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = cf2c6b86830099f039b41aeaafbffedfb8294a1124c499e99a11f48a06cd1dfd, id = 449937aa-682a-4906-89ab-80d7127e461e, last_modified = 2021-09-16
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
    Source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_5bf62ce4 reference_sample = 4c6aeaa6f6a0c40a3f4116a2e19e669188a8b1678a8930350889da1bab531c68, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = 3ffc398303f7208e77c4fbdfb50ac896e531b7cee3be2fa820bc8d70cfb20af3, id = 5bf62ce4-619b-4d46-b221-c5bf552474bb, last_modified = 2021-09-16
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_b14f4c5d os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = a70d052918dd2fbc66db241da6438015130f0fb6929229bfe573546fe98da817, id = b14f4c5d-054f-46e6-9fa8-3588f1ef68b7, last_modified = 2021-09-16
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_449937aa reference_sample = 6f27766534445cffb097c7c52db1fca53b2210c1b10b75594f77c34dc8b994fe, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = cf2c6b86830099f039b41aeaafbffedfb8294a1124c499e99a11f48a06cd1dfd, id = 449937aa-682a-4906-89ab-80d7127e461e, last_modified = 2021-09-16
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_88de437f reference_sample = 8dc745a6de6f319cd6021c3e147597315cc1be02099d78fc8aae94de0e1e4bc6, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = c19eb595c2b444a809bef8500c20342c9f46694d3018e268833f9b884133a1ea, id = 88de437f-9c98-4e1d-96c0-7b433c99886a, last_modified = 2021-09-16
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
    Source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
    Source: Process Memory Space: na.elf PID: 5718, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
    Source: Process Memory Space: na.elf PID: 5719, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
    Source: Process Memory Space: na.elf PID: 5720, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
    Source: classification engineClassification label: mal76.troj.evad.linELF@0/0@3/0

    Data Obfuscation

    barindex
    Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
    Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
    Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/230/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/230/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/230/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/110/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/110/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/110/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/231/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/231/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/231/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/111/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/111/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/111/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/232/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/232/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/232/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/112/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/112/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/112/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/233/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/233/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/233/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/113/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/113/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/113/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/234/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/234/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/234/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/114/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/114/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/114/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/235/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/235/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/235/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/115/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/115/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/115/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/236/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/236/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/236/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/116/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/116/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/116/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/237/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/237/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/237/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/117/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/117/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/117/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/238/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/238/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/238/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/118/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/118/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/118/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/239/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/239/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/239/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/119/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/119/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/119/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/914/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/914/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/914/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/10/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/10/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/10/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/917/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/917/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/917/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/11/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/11/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/11/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/12/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/12/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/12/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/13/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/13/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/13/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/14/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/14/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/14/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/15/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/15/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/15/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/16/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/16/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/16/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/17/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/17/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/17/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/18/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/18/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/18/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/19/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/19/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/19/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/240/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/240/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/240/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/3095/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/3095/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/3095/cmdlineJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/120/statJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/120/statusJump to behavior
    Source: /usr/bin/ps (PID: 5724)File opened: /proc/120/cmdlineJump to behavior
    Source: /tmp/na.elf (PID: 5723)Shell command executed: sh -c "ps -A -o pid,cmd --no-headers"Jump to behavior
    Source: /bin/sh (PID: 5724)Ps executable: /usr/bin/ps -> ps -A -o pid,cmd --no-headersJump to behavior
    Source: /usr/bin/ps (PID: 5724)Reads from proc file: /proc/meminfoJump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: /tmp/na.elf (PID: 5718)File: /tmp/na.elfJump to behavior
    Source: na.elfSubmission file: segment LOAD with 7.9673 entropy (max. 8.0)
    Source: /usr/bin/ps (PID: 5724)Reads CPU info from /sys: /sys/devices/system/cpu/onlineJump to behavior
    Source: na.elf, 5720.1.0000000008a98000.0000000008ab1000.rw-.sdmpBinary or memory string: /usr/bin/vmtoolsd
    Source: na.elf, 5720.1.0000000008a97000.0000000008a98000.rw-.sdmpBinary or memory string: /usr/bin/vmtoolsdrvicemd-journald
    Source: na.elf, 5720.1.0000000008a98000.0000000008ab1000.rw-.sdmpBinary or memory string: /usr/bin/vmtoolsd

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: na.elf PID: 5720, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 5718.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5720.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: 5719.1.0000000008048000.000000000805c000.r-x.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: na.elf PID: 5720, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information1
    Scripting
    Valid AccountsWindows Management Instrumentation1
    Scripting
    Path Interception11
    Obfuscated Files or Information
    1
    OS Credential Dumping
    1
    Security Software Discovery
    Remote ServicesData from Local System1
    Non-Standard Port
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    File Deletion
    LSASS Memory1
    Process Discovery
    Remote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared Drive1
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    No configs have been found
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1528836 Sample: na.elf Startdate: 08/10/2024 Architecture: LINUX Score: 76 20 cnc.merisprivate.net 194.120.230.54, 44992, 57899 HKKFGL-AS-APHKKwaifongGroupLimitedHK unknown 2->20 22 daisy.ubuntu.com 2->22 24 Malicious sample detected (through community Yara rule) 2->24 26 Multi AV Scanner detection for submitted file 2->26 28 Yara detected Mirai 2->28 30 2 other signatures 2->30 9 na.elf 2->9         started        signatures3 process4 signatures5 32 Sample deletes itself 9->32 12 na.elf 9->12         started        14 na.elf 9->14         started        process6 process7 16 na.elf sh 12->16         started        process8 18 sh ps 16->18         started       
    SourceDetectionScannerLabelLink
    na.elf45%ReversingLabsLinux.Trojan.Mirai
    na.elf47%VirustotalBrowse
    na.elf100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    daisy.ubuntu.com
    162.213.35.25
    truefalse
      unknown
      cnc.merisprivate.net
      194.120.230.54
      truefalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://upx.sf.netna.elftrue
        • URL Reputation: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        194.120.230.54
        cnc.merisprivate.netunknown
        133115HKKFGL-AS-APHKKwaifongGroupLimitedHKfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        194.120.230.54na.elfGet hashmaliciousMiraiBrowse
          na.elfGet hashmaliciousUnknownBrowse
            r3M3VGE5AG.elfGet hashmaliciousUnknownBrowse
              na.elfGet hashmaliciousUnknownBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                daisy.ubuntu.comna.elfGet hashmaliciousMiraiBrowse
                • 162.213.35.25
                na.elfGet hashmaliciousUnknownBrowse
                • 162.213.35.24
                na.elfGet hashmaliciousMiraiBrowse
                • 162.213.35.25
                na.elfGet hashmaliciousUnknownBrowse
                • 162.213.35.25
                na.elfGet hashmaliciousUnknownBrowse
                • 162.213.35.25
                na.elfGet hashmaliciousUnknownBrowse
                • 162.213.35.24
                na.elfGet hashmaliciousUnknownBrowse
                • 162.213.35.24
                na.elfGet hashmaliciousUnknownBrowse
                • 162.213.35.25
                na.elfGet hashmaliciousUnknownBrowse
                • 162.213.35.25
                na.elfGet hashmaliciousUnknownBrowse
                • 162.213.35.25
                cnc.merisprivate.netna.elfGet hashmaliciousUnknownBrowse
                • 194.120.230.54
                na.elfGet hashmaliciousUnknownBrowse
                • 194.120.230.54
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                HKKFGL-AS-APHKKwaifongGroupLimitedHKna.elfGet hashmaliciousMiraiBrowse
                • 194.120.230.54
                na.elfGet hashmaliciousUnknownBrowse
                • 194.120.230.54
                r3M3VGE5AG.elfGet hashmaliciousUnknownBrowse
                • 194.120.230.54
                na.elfGet hashmaliciousGafgytBrowse
                • 103.218.208.171
                na.elfGet hashmaliciousGafgytBrowse
                • 103.218.19.2
                na.elfGet hashmaliciousGafgytBrowse
                • 103.218.19.0
                na.elfGet hashmaliciousGafgytBrowse
                • 103.218.208.182
                na.elfGet hashmaliciousGafgytBrowse
                • 103.218.89.105
                na.elfGet hashmaliciousGafgytBrowse
                • 103.218.208.188
                na.elfGet hashmaliciousUnknownBrowse
                • 194.120.230.54
                No context
                No context
                No created / dropped files found
                File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
                Entropy (8bit):7.965567253340173
                TrID:
                • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
                • ELF Executable and Linkable format (generic) (4004/1) 49.84%
                File name:na.elf
                File size:39'352 bytes
                MD5:8ef966a2f485a72bc42746ae4745cefa
                SHA1:1ce26f48ab05a314fb9ddb9818c634e6617ca4a7
                SHA256:56ccebabf40f7191e11afdf659584d9c15bb12070ec9e01293cabc78d78cf0c2
                SHA512:a91c7d6978161108bbe1ac1733cfb1bdc80712997404e45adcb89bb6fa61ef94aca66877a4eb598c12276b645981d7008f6a00a68260f5ca6dca54073c592901
                SSDEEP:768:Ux+rEJ4L0ZZz6XLcx7EN589RyQ3TKWqvvnwOR6FZjszsRgnbcuyD7UoQRjq:Ugrdn410qyWKWqvvwDFmsRgnouy8oy2
                TLSH:EE03F257C0185368EBFA11B2F9DFFD5F4940D907206D67A202E160BE89607627FAA3CC
                File Content Preview:.ELF........................4...........4. ...(.........................................`...`...`...................Q.td.............................$.4UPX!........pE..pE......U..........?..k.I/.j....\.d*nlz.e..p.....4.0.N..9..y..R.A..5>S!..l....6.3W.6T.-

                ELF header

                Class:ELF32
                Data:2's complement, little endian
                Version:1 (current)
                Machine:Intel 80386
                Version Number:0x1
                Type:EXEC (Executable file)
                OS/ABI:UNIX - Linux
                ABI Version:0
                Entry Point Address:0xc096e0
                Flags:0x0
                ELF Header Size:52
                Program Header Offset:52
                Program Header Size:32
                Number of Program Headers:3
                Section Header Offset:0
                Section Header Size:40
                Number of Section Headers:0
                Header String Table Index:0
                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                LOAD0x00xc010000xc010000x98bc0x98bc7.96730x5R E0x1000
                LOAD0x9600x805e9600x805e9600x00x00.00000x6RW 0x1000
                GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                TimestampSource PortDest PortSource IPDest IP
                Oct 8, 2024 11:35:10.322221041 CEST4499257899192.168.2.13194.120.230.54
                Oct 8, 2024 11:35:10.327223063 CEST5789944992194.120.230.54192.168.2.13
                Oct 8, 2024 11:35:10.327311993 CEST4499257899192.168.2.13194.120.230.54
                Oct 8, 2024 11:35:10.327358961 CEST4499257899192.168.2.13194.120.230.54
                Oct 8, 2024 11:35:10.332288027 CEST5789944992194.120.230.54192.168.2.13
                Oct 8, 2024 11:35:10.332343102 CEST4499257899192.168.2.13194.120.230.54
                Oct 8, 2024 11:35:10.337227106 CEST5789944992194.120.230.54192.168.2.13
                Oct 8, 2024 11:35:20.374761105 CEST4499257899192.168.2.13194.120.230.54
                Oct 8, 2024 11:35:20.379856110 CEST5789944992194.120.230.54192.168.2.13
                Oct 8, 2024 11:35:20.547559977 CEST5789944992194.120.230.54192.168.2.13
                Oct 8, 2024 11:35:20.547832966 CEST4499257899192.168.2.13194.120.230.54
                Oct 8, 2024 11:35:20.841959000 CEST5789944992194.120.230.54192.168.2.13
                Oct 8, 2024 11:35:20.842262030 CEST4499257899192.168.2.13194.120.230.54
                Oct 8, 2024 11:35:54.922605991 CEST4499257899192.168.2.13194.120.230.54
                Oct 8, 2024 11:35:54.928215027 CEST5789944992194.120.230.54192.168.2.13
                Oct 8, 2024 11:35:54.928451061 CEST4499257899192.168.2.13194.120.230.54
                TimestampSource PortDest PortSource IPDest IP
                Oct 8, 2024 11:35:10.056881905 CEST3636853192.168.2.138.8.8.8
                Oct 8, 2024 11:35:10.172442913 CEST53363688.8.8.8192.168.2.13
                Oct 8, 2024 11:37:54.328736067 CEST5435053192.168.2.131.1.1.1
                Oct 8, 2024 11:37:54.328737020 CEST3669953192.168.2.131.1.1.1
                Oct 8, 2024 11:37:54.336222887 CEST53366991.1.1.1192.168.2.13
                Oct 8, 2024 11:37:54.336266994 CEST53543501.1.1.1192.168.2.13
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Oct 8, 2024 11:35:10.056881905 CEST192.168.2.138.8.8.80x0Standard query (0)cnc.merisprivate.netA (IP address)IN (0x0001)false
                Oct 8, 2024 11:37:54.328736067 CEST192.168.2.131.1.1.10x52c8Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                Oct 8, 2024 11:37:54.328737020 CEST192.168.2.131.1.1.10xed15Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Oct 8, 2024 11:35:10.172442913 CEST8.8.8.8192.168.2.130x0No error (0)cnc.merisprivate.net194.120.230.54A (IP address)IN (0x0001)false
                Oct 8, 2024 11:37:54.336266994 CEST1.1.1.1192.168.2.130x52c8No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                Oct 8, 2024 11:37:54.336266994 CEST1.1.1.1192.168.2.130x52c8No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                System Behavior

                Start time (UTC):09:35:08
                Start date (UTC):08/10/2024
                Path:/tmp/na.elf
                Arguments:/tmp/na.elf
                File size:39352 bytes
                MD5 hash:8ef966a2f485a72bc42746ae4745cefa

                Start time (UTC):09:35:08
                Start date (UTC):08/10/2024
                Path:/tmp/na.elf
                Arguments:-
                File size:39352 bytes
                MD5 hash:8ef966a2f485a72bc42746ae4745cefa

                Start time (UTC):09:35:08
                Start date (UTC):08/10/2024
                Path:/tmp/na.elf
                Arguments:-
                File size:39352 bytes
                MD5 hash:8ef966a2f485a72bc42746ae4745cefa

                Start time (UTC):09:35:11
                Start date (UTC):08/10/2024
                Path:/tmp/na.elf
                Arguments:-
                File size:39352 bytes
                MD5 hash:8ef966a2f485a72bc42746ae4745cefa

                Start time (UTC):09:35:11
                Start date (UTC):08/10/2024
                Path:/bin/sh
                Arguments:sh -c "ps -A -o pid,cmd --no-headers"
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):09:35:11
                Start date (UTC):08/10/2024
                Path:/bin/sh
                Arguments:-
                File size:129816 bytes
                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                Start time (UTC):09:35:11
                Start date (UTC):08/10/2024
                Path:/usr/bin/ps
                Arguments:ps -A -o pid,cmd --no-headers
                File size:137688 bytes
                MD5 hash:ab48054475a6f70f8e7fa847331f3327