Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
ssk7Ah3h5D.elf

Overview

General Information

Sample name:ssk7Ah3h5D.elf
renamed because original name is a hash value
Original sample name:261d2f20496314ed0d2c0f61fff32168.elf
Analysis ID:1529279
MD5:261d2f20496314ed0d2c0f61fff32168
SHA1:e950602f9aa98aeee313f1da6667f812173dd981
SHA256:04142d7f8d6a95f13b4abeca0d6ca747eecc1390d4aa929db0f08310fb596745
Tags:32armelfmirai
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Sends malformed DNS queries
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1529279
Start date and time:2024-10-08 20:22:54 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 23s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ssk7Ah3h5D.elf
renamed because original name is a hash value
Original Sample Name:261d2f20496314ed0d2c0f61fff32168.elf
Detection:MAL
Classification:mal56.troj.linELF@0/1@5/0
  • VT rate limit hit for: ssk7Ah3h5D.elf
Command:/tmp/ssk7Ah3h5D.elf
PID:5811
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • sh (PID: 5849, Parent: 1498, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-sharing
  • gsd-sharing (PID: 5849, Parent: 1498, MD5: e29d9025d98590fbb69f89fdbd4438b3) Arguments: /usr/libexec/gsd-sharing
  • sh (PID: 5852, Parent: 1498, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/bin/gnome-shell
  • gnome-shell (PID: 5852, Parent: 1498, MD5: da7a257239677622fe4b3a65972c9e87) Arguments: /usr/bin/gnome-shell
  • gdm3 New Fork (PID: 5861, Parent: 1333)
  • Default (PID: 5861, Parent: 1333, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • gdm3 New Fork (PID: 5882, Parent: 1333)
  • Default (PID: 5882, Parent: 1333, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • systemd New Fork (PID: 5889, Parent: 1)
  • systemd-user-runtime-dir (PID: 5889, Parent: 1, MD5: d55f4b0847f88131dbcfb07435178e54) Arguments: /lib/systemd/systemd-user-runtime-dir stop 127
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ssk7Ah3h5D.elfReversingLabs: Detection: 31%

Networking

barindex
Source: global trafficTCP traffic: 154.205.144.234 ports 61543,1,3,4,5,6
Source: global trafficDNS traffic detected: malformed DNS query: subcarrace.indy. [malformed]
Source: global trafficTCP traffic: 192.168.2.15:35102 -> 154.205.144.234:61543
Source: /tmp/ssk7Ah3h5D.elf (PID: 5811)Socket: 127.0.0.1:1234Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.144.234
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.144.234
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.144.234
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.144.234
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.144.234
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.144.234
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.144.234
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.144.234
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.144.234
Source: unknownTCP traffic detected without corresponding DNS query: 154.205.144.234
Source: unknownUDP traffic detected without corresponding DNS query: 130.61.64.122
Source: unknownUDP traffic detected without corresponding DNS query: 63.231.92.27
Source: unknownUDP traffic detected without corresponding DNS query: 162.243.19.47
Source: unknownUDP traffic detected without corresponding DNS query: 185.84.81.194
Source: unknownUDP traffic detected without corresponding DNS query: 130.61.64.122
Source: unknownUDP traffic detected without corresponding DNS query: 116.203.104.203
Source: global trafficDNS traffic detected: DNS query: fortyfivehundred.dyn
Source: global trafficDNS traffic detected: DNS query: subcarrace.indy. [malformed]
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)SIGKILL sent: pid: 888, result: successfulJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)SIGKILL sent: pid: 1553, result: successfulJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)SIGKILL sent: pid: 1634, result: successfulJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)SIGKILL sent: pid: 1659, result: successfulJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)SIGKILL sent: pid: 5849, result: successfulJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)SIGKILL sent: pid: 5852, result: successfulJump to behavior
Source: classification engineClassification label: mal56.troj.linELF@0/1@5/0
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1333/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1333/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1695/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/911/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/911/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5930/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5815/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5815/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5815/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1591/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5828/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/2/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5829/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/4/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/6/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1585/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/7/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/8/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/9/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/803/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/804/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/804/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3407/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3407/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5840/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1484/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5838/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5839/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1479/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/931/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/931/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1595/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5830/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5831/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/812/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/812/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/933/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/933/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5832/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5833/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5834/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5835/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5836/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3419/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3419/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5837/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3310/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3310/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5849/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3303/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3303/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1486/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5841/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5842/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5843/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5844/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5861/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5862/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3440/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3440/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3316/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3316/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1498/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1497/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/1496/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5852/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3798/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3798/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3799/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3799/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5870/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5871/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5872/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/5873/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3332/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3332/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3210/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3210/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3205/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3205/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3201/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/3201/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/723/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5813)File opened: /proc/723/cmdlineJump to behavior
Source: /tmp/ssk7Ah3h5D.elf (PID: 5811)Queries kernel information via 'uname': Jump to behavior
Source: ssk7Ah3h5D.elf, 5811.1.00007fff4608d000.00007fff460ae000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/ssk7Ah3h5D.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/ssk7Ah3h5D.elf
Source: ssk7Ah3h5D.elf, 5811.1.000056530ca88000.000056530cbd7000.rw-.sdmpBinary or memory string: SV!/etc/qemu-binfmt/arm
Source: ssk7Ah3h5D.elf, 5811.1.000056530ca88000.000056530cbd7000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: ssk7Ah3h5D.elf, 5811.1.00007fff4608d000.00007fff460ae000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume Access1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1529279 Sample: ssk7Ah3h5D.elf Startdate: 08/10/2024 Architecture: LINUX Score: 56 19 subcarrace.indy. [malformed] 2->19 21 154.205.144.234, 35102, 61543 IKGUL-26484US Seychelles 2->21 23 4 other IPs or domains 2->23 25 Multi AV Scanner detection for submitted file 2->25 27 Connects to many ports of the same IP (likely port scanning) 2->27 7 ssk7Ah3h5D.elf 2->7         started        9 gnome-session-binary sh gsd-sharing 2->9         started        11 gnome-session-binary sh gnome-shell 2->11         started        13 3 other processes 2->13 signatures3 29 Sends malformed DNS queries 19->29 process4 process5 15 ssk7Ah3h5D.elf 7->15         started        17 ssk7Ah3h5D.elf 7->17         started       
SourceDetectionScannerLabelLink
ssk7Ah3h5D.elf32%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    unknown
    fortyfivehundred.dyn
    unknown
    unknownfalse
      unknown
      subcarrace.indy. [malformed]
      unknown
      unknowntrue
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        162.243.19.47
        unknownUnited States
        14061DIGITALOCEAN-ASNUSfalse
        154.205.144.234
        unknownSeychelles
        26484IKGUL-26484UStrue
        116.203.104.203
        unknownGermany
        24940HETZNER-ASDEfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        162.243.19.47na.elfGet hashmaliciousUnknownBrowse
          na.elfGet hashmaliciousUnknownBrowse
            SecuriteInfo.com.Linux.Mirai.5074.20408.25222.elfGet hashmaliciousUnknownBrowse
              SecuriteInfo.com.Linux.Mirai.5074.27008.26400.elfGet hashmaliciousUnknownBrowse
                10cF92lE99.elfGet hashmaliciousUnknownBrowse
                  O8s0ONHbkg.elfGet hashmaliciousUnknownBrowse
                    la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                      154.205.144.234na.elfGet hashmaliciousUnknownBrowse
                        na.elfGet hashmaliciousUnknownBrowse
                          na.elfGet hashmaliciousUnknownBrowse
                            116.203.104.203na.elfGet hashmaliciousUnknownBrowse
                              na.elfGet hashmaliciousUnknownBrowse
                                na.elfGet hashmaliciousUnknownBrowse
                                  na.elfGet hashmaliciousUnknownBrowse
                                    GAP5uekzm4.elfGet hashmaliciousUnknownBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      daisy.ubuntu.com4Vw4aRxxGu.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.25
                                      5FteLLQ1oY.elfGet hashmaliciousUnknownBrowse
                                      • 162.213.35.24
                                      gMYQFxufu0.elfGet hashmaliciousMiraiBrowse
                                      • 162.213.35.24
                                      k49syyxi7V.elfGet hashmaliciousUnknownBrowse
                                      • 162.213.35.24
                                      4LbWi40g57.elfGet hashmaliciousUnknownBrowse
                                      • 162.213.35.24
                                      NLHiAJgSnj.elfGet hashmaliciousUnknownBrowse
                                      • 162.213.35.24
                                      irods-runtime-4.1.9-centos7-x86_64.rpmGet hashmaliciousXmrigBrowse
                                      • 162.213.35.24
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 162.213.35.25
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 162.213.35.24
                                      logrotate_malware.elfGet hashmaliciousXmrigBrowse
                                      • 162.213.35.25
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      HETZNER-ASDEhttps://hnt.zkg.mybluehost.me/CA/LETGet hashmaliciousHTMLPhisherBrowse
                                      • 135.181.58.223
                                      SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                                      • 136.243.38.220
                                      SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                                      • 136.243.38.220
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 138.201.28.181
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 116.203.104.203
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 116.203.104.203
                                      reswnop.exeGet hashmaliciousEmotetBrowse
                                      • 138.201.140.110
                                      7AeSqNv1rC.exeGet hashmaliciousMicroClip, VidarBrowse
                                      • 49.12.106.214
                                      STlUEqhwpx.exeGet hashmaliciousQuasarBrowse
                                      • 195.201.57.90
                                      https://url.avanan.click/v2/r01/___https://www.tiktok.com/qnspdA7?fni=6cbb&qfsl=js&xhjsj=gnt_zwq&yfwljy=myyux:ddBBB.lttlqj.ht.zpdzwq?v=frudxdBjlfmjfqymhfwj.ht.pjd.kwjsy___.YXAzOnNvdXRoZXJua2l0Y2hlbmFuZGdyaWxsOmE6bzpiNGZlZGFhNjcxOTBhYjU4MTE5MjBlZTRiYTAxZmUwMTo3OmIxYWM6MDg1ODNlNjljZDkwNThkM2ZiM2RjYTI4MzFjZGY4NGFmMTYyZTlhYmVjYWYxY2Q4MmNkZDhiNmFmOWVkOWUxOTpoOlQ6VA#Sm9hbi5LbmlwcGVuQEVsa2F5LkNvbQ==Get hashmaliciousUnknownBrowse
                                      • 46.4.98.169
                                      IKGUL-26484USn9q8iS3aIJ.elfGet hashmaliciousMiraiBrowse
                                      • 156.249.34.126
                                      2LgQzImW3E.elfGet hashmaliciousMiraiBrowse
                                      • 156.238.135.164
                                      Hys3ySfAxL.elfGet hashmaliciousMiraiBrowse
                                      • 156.247.139.162
                                      nullnet_load.arm.elfGet hashmaliciousMiraiBrowse
                                      • 156.238.135.172
                                      oLCnCWQDhK.exeGet hashmaliciousFormBookBrowse
                                      • 198.44.251.203
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 154.205.144.234
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 154.205.144.234
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 154.205.144.234
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 156.252.161.152
                                      SOA SEPT 2024.exeGet hashmaliciousFormBookBrowse
                                      • 198.44.251.203
                                      DIGITALOCEAN-ASNUSKnVNqZH8O4.elfGet hashmaliciousUnknownBrowse
                                      • 174.138.12.44
                                      https://yourferguson.org/court-watch-october-30-2023/?fbclid=IwZXh0bgNhZW0CMTEAAR3dOwpQMI1HpEJMcLfneo2Ce-TuuXHtVI8-78YDrHW9adORVlMEABT0ELU_aem_CL7dDvEuGMkB8YFGhVQWUgGet hashmaliciousUnknownBrowse
                                      • 164.90.194.65
                                      SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                                      • 192.241.242.33
                                      SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                                      • 192.241.242.33
                                      http://nbxvavlbbnks0ockyfxgnbxva.feedbackfusion.site/4nbXVA123415bxwz821wfgqkoqbno9030GRUYZVSMVMDWDTG236348/3210Y21Get hashmaliciousUnknownBrowse
                                      • 64.227.64.62
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 162.243.19.47
                                      na.elfGet hashmaliciousUnknownBrowse
                                      • 95.85.37.130
                                      reswnop.exeGet hashmaliciousEmotetBrowse
                                      • 104.236.246.93
                                      STlUEqhwpx.exeGet hashmaliciousQuasarBrowse
                                      • 165.22.194.189
                                      https://statics.teams.cdn.office.net/evergreen-assets/safelinks/1/atp-safelinks.html?url=https%3A%2F%2Fphpstack-1335745-4931432.cloudwaysapps.com%2F%23%26%26%2B~XanJlZEBwcm9hZy5jb20=&locale=en-us&dest=https%3A%2F%2Fteams.microsoft.com%2Fapi%2Fmt%2Fpart%2Famer-03%2Fbeta%2Fatpsafelinks%2Fgeturlreputationsitev2%2F&pc=dqIG3sYngZE8N2eRBkF7CAkOWKg5g3tGjnQGJGQlc61U8QGlKCs5AzH6JKtW7FyetS1g5oEXSNBKJVlJbTCgrea0O041dBSjafsPfOc5KxbMkQRnpwalZQdhHfcjoeWL7rzuDGG%252fj2e7scaAUTCy2PY0WmBb87rgNNPdmEQne%252f00jq9aOpwCvhJrGkNK5f8MP5jaUwccFhr9IIoVaCOrXUhSnuRv%252fw%252bxhUGpneOsAgBs7CjJQbmepBIHfEqwCkqvDbYbxYB4Hm9sLVAOFaz9VFMFSXPJt4MqeWAChikWLAZATmvniptR3h97WVF%252fZtjtm3RxdNyPROzhUvL92w9fdWmSw%252bHBxn5rMHOUpaQU16ZpcfATiVaU51fqKaYO2v4ZnK7axAavLgOpgAJivuE6JO2sqksPH41Z6PVam5c4J%252bwwz5Z2pqrOSxPxEcPGeDff%252bxp9PApNxpvURRLl98WzRw%252ftZEOu%252foKPhjN0OiTGAQDLRWTF%252bMCzSQg37tk7ZYUYYc0Ycs4xDjchhFprJCCSfrZ8WyHq6cjqmnbgDKRQig28xGNFnSDEeWMDBQeeeVyNqDv0FAAxkSAMO%252b7t4Qu1y0h0MHJYEb5pxfOYe8Pyfcsn7pyR%252fkKEqziEQVGlIETrpjVMNyrhJrnX9S%252flWaxf0H3tD%252fqMhzPysO9QdPSJTG054WE4jq5GRqTKu8P25t4KJLY15Oz2j5iCg7Bd5lczhgv4PQevplLuCGckM%252fs5EPk2r2FkSOxHF51EB5FR2TgXQR5UAp2BbaWTm9irKwSSUK5z1MsGMDokVMEB4bQ9mpZrl1%252bDMixJ1mQyyLXpelmEyN8zw1nTsbXAvDQgIvPLPj0QUtphEMnmVEXMkQHiw2WHWUSxIxYcY%252fltyp6bnMrankPAnpChbWQmk95rKsUz8tqtLjNDclK1y1FLy%252fh7sed9duxDDFupXnhmXxGJOmUV6FG1arxXL8urm1F98thG8anfchv3DafKsyVHHgmdUFNH6Uhcu4sB8fo0kqm2y7IWS96w5BeG334JvnFDJPLDPvtK5ojeXfDXh%252boKJdBxXGC9NmPwgDp8XeOavQnNlJRfUAXkhukdjDg1EHGF%252b9luUuTH%252fEbKHniTzx4OvIWUnDvXcdpuEIAnW8mDJzMXpmxpl3nwtTqeQWMeSNzjute9yTZEU%252beQk498EMyU%252fuPUg%252fSOH5r%252fwjGCsPpm%252f%252bUA00SsNvWuDD0AbNIKYubFuNKQ3SX6N7M11wOksoUG%252fz9IheWtOawwl7F0lqN3xkTQhfiiHovdudAPiB%252fzt25Im27XxPQ9s1c%252bnOWOPh6m%252bvaCQcj6bcwkFbNl5Y1KL7XQvirYSFsNXnrYuQvTPMk1n5CRq6dxsl9FRGV9MMdrZduC%252bG4B0zxLA58d8fTW2zfEXnRcMTgQKLK%252fmeZT7K3wwAvQiA%253d%253d%3B%20expires%3DWed%2C%2009%20Oct%202024%2014%3A05%3A23%20GMT%3B%20path%3D%2F%3B%20SameSite%3DNone%3B%20secuGet hashmaliciousHTMLPhisherBrowse
                                      • 138.197.99.28
                                      No context
                                      No context
                                      Process:/usr/libexec/gsd-sharing
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:93B885ADFE0DA089CDF634904FD59F71
                                      SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                      SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                      SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:.
                                      File type:ELF 32-bit LSB executable, ARM, version 1 (ARM), statically linked, stripped
                                      Entropy (8bit):5.919366869975419
                                      TrID:
                                      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                      File name:ssk7Ah3h5D.elf
                                      File size:46'488 bytes
                                      MD5:261d2f20496314ed0d2c0f61fff32168
                                      SHA1:e950602f9aa98aeee313f1da6667f812173dd981
                                      SHA256:04142d7f8d6a95f13b4abeca0d6ca747eecc1390d4aa929db0f08310fb596745
                                      SHA512:bb275d61f4524c6f07e5c1efd855d044bd5ee0b6f24e12a464206c69cfa8b23db59c09a0fc3d1219fd5532ebc499dfd69c6a3d7d41b3f8c72b480f92b7862db4
                                      SSDEEP:768:dXd2Q45NNn6lQvagWqqyHSXbtCnm/TdJDuwD6JRgRm0+wsOtcfWdKQXLGpb:VNBC6IEfDYS7+YmWdH
                                      TLSH:5A23E791BD819A0BCAD5037BFA1E42CD37267798F2DE3203DE256F5137CA92B096A141
                                      File Content Preview:.ELF...a..........(.........4...........4. ...(.....................................................4....S..........Q.td..................................-...L."...R*..........0@-.\P...0....S.0...P@...0... ....R......0...0...........0... ....R..... 0....S

                                      ELF header

                                      Class:ELF32
                                      Data:2's complement, little endian
                                      Version:1 (current)
                                      Machine:ARM
                                      Version Number:0x1
                                      Type:EXEC (Executable file)
                                      OS/ABI:ARM - ABI
                                      ABI Version:0
                                      Entry Point Address:0x8190
                                      Flags:0x202
                                      ELF Header Size:52
                                      Program Header Offset:52
                                      Program Header Size:32
                                      Number of Program Headers:3
                                      Section Header Offset:46088
                                      Section Header Size:40
                                      Number of Section Headers:10
                                      Header String Table Index:9
                                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                      NULL0x00x00x00x00x0000
                                      .initPROGBITS0x80940x940x180x00x6AX004
                                      .textPROGBITS0x80b00xb00xa9800x00x6AX0016
                                      .finiPROGBITS0x12a300xaa300x140x00x6AX004
                                      .rodataPROGBITS0x12a440xaa440x74c0x00x2A004
                                      .ctorsPROGBITS0x1b1940xb1940x80x00x3WA004
                                      .dtorsPROGBITS0x1b19c0xb19c0x80x00x3WA004
                                      .dataPROGBITS0x1b1a80xb1a80x2200x00x3WA004
                                      .bssNOBITS0x1b3c80xb3c80x515c0x00x3WA004
                                      .shstrtabSTRTAB0x00xb3c80x3e0x00x0001
                                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                      LOAD0x00x80000x80000xb1900xb1905.94940x5R E0x8000.init .text .fini .rodata
                                      LOAD0xb1940x1b1940x1b1940x2340x53902.91390x6RW 0x8000.ctors .dtors .data .bss
                                      GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 8, 2024 20:24:16.709109068 CEST3510261543192.168.2.15154.205.144.234
                                      Oct 8, 2024 20:24:16.714499950 CEST6154335102154.205.144.234192.168.2.15
                                      Oct 8, 2024 20:24:16.714550972 CEST3510261543192.168.2.15154.205.144.234
                                      Oct 8, 2024 20:24:16.716133118 CEST3510261543192.168.2.15154.205.144.234
                                      Oct 8, 2024 20:24:16.721278906 CEST6154335102154.205.144.234192.168.2.15
                                      Oct 8, 2024 20:24:31.730575085 CEST3510261543192.168.2.15154.205.144.234
                                      Oct 8, 2024 20:24:31.735575914 CEST6154335102154.205.144.234192.168.2.15
                                      Oct 8, 2024 20:24:38.837025881 CEST6154335102154.205.144.234192.168.2.15
                                      Oct 8, 2024 20:24:38.837088108 CEST3510261543192.168.2.15154.205.144.234
                                      Oct 8, 2024 20:24:40.372708082 CEST6154335102154.205.144.234192.168.2.15
                                      Oct 8, 2024 20:24:40.372755051 CEST3510261543192.168.2.15154.205.144.234
                                      Oct 8, 2024 20:25:50.403090000 CEST6154335102154.205.144.234192.168.2.15
                                      Oct 8, 2024 20:25:50.403254032 CEST3510261543192.168.2.15154.205.144.234
                                      Oct 8, 2024 20:26:19.859920979 CEST6154335102154.205.144.234192.168.2.15
                                      Oct 8, 2024 20:26:19.860030890 CEST3510261543192.168.2.15154.205.144.234
                                      Oct 8, 2024 20:26:34.863668919 CEST3510261543192.168.2.15154.205.144.234
                                      Oct 8, 2024 20:26:34.868659973 CEST6154335102154.205.144.234192.168.2.15
                                      Oct 8, 2024 20:26:42.483697891 CEST5576253192.168.2.158.8.8.8
                                      Oct 8, 2024 20:26:42.488708973 CEST53557628.8.8.8192.168.2.15
                                      Oct 8, 2024 20:26:42.488775969 CEST5576253192.168.2.158.8.8.8
                                      Oct 8, 2024 20:26:42.488800049 CEST5576253192.168.2.158.8.8.8
                                      Oct 8, 2024 20:26:42.488833904 CEST5576253192.168.2.158.8.8.8
                                      Oct 8, 2024 20:26:42.493899107 CEST53557628.8.8.8192.168.2.15
                                      Oct 8, 2024 20:26:42.493910074 CEST53557628.8.8.8192.168.2.15
                                      Oct 8, 2024 20:26:42.943010092 CEST53557628.8.8.8192.168.2.15
                                      Oct 8, 2024 20:26:42.943119049 CEST5576253192.168.2.158.8.8.8
                                      Oct 8, 2024 20:26:43.072010040 CEST53557628.8.8.8192.168.2.15
                                      Oct 8, 2024 20:26:43.072077036 CEST5576253192.168.2.158.8.8.8
                                      Oct 8, 2024 20:26:44.942897081 CEST53557628.8.8.8192.168.2.15
                                      Oct 8, 2024 20:26:44.943624020 CEST5576253192.168.2.158.8.8.8
                                      Oct 8, 2024 20:26:44.948514938 CEST53557628.8.8.8192.168.2.15
                                      Oct 8, 2024 20:27:07.424134016 CEST6154335102154.205.144.234192.168.2.15
                                      Oct 8, 2024 20:27:07.424323082 CEST3510261543192.168.2.15154.205.144.234
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 8, 2024 20:24:01.103907108 CEST546475353192.168.2.15130.61.64.122
                                      Oct 8, 2024 20:24:06.110235929 CEST5500753192.168.2.1563.231.92.27
                                      Oct 8, 2024 20:24:11.116127968 CEST358195353192.168.2.15162.243.19.47
                                      Oct 8, 2024 20:24:16.121260881 CEST3809753192.168.2.15185.84.81.194
                                      Oct 8, 2024 20:24:16.131514072 CEST5338097185.84.81.194192.168.2.15
                                      Oct 8, 2024 20:24:16.132756948 CEST5246553192.168.2.15130.61.64.122
                                      Oct 8, 2024 20:24:16.139585972 CEST5352465130.61.64.122192.168.2.15
                                      Oct 8, 2024 20:24:16.140774012 CEST368855353192.168.2.15116.203.104.203
                                      Oct 8, 2024 20:24:16.708385944 CEST535336885116.203.104.203192.168.2.15
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 8, 2024 20:24:06.110235929 CEST192.168.2.1563.231.92.270x2d70Standard query (0)fortyfivehundred.dynA (IP address)IN (0x0001)false
                                      Oct 8, 2024 20:24:16.121260881 CEST192.168.2.15185.84.81.1940xc63cStandard query (0)subcarrace.indy. [malformed]256464false
                                      Oct 8, 2024 20:24:16.132756948 CEST192.168.2.15130.61.64.1220x864fStandard query (0)subcarrace.indy. [malformed]256464false
                                      Oct 8, 2024 20:26:42.488800049 CEST192.168.2.158.8.8.80x374bStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                      Oct 8, 2024 20:26:42.488833904 CEST192.168.2.158.8.8.80x1dd7Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 8, 2024 20:26:43.072010040 CEST8.8.8.8192.168.2.150x374bNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                                      Oct 8, 2024 20:26:43.072010040 CEST8.8.8.8192.168.2.150x374bNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                                      System Behavior

                                      Start time (UTC):18:23:57
                                      Start date (UTC):08/10/2024
                                      Path:/tmp/ssk7Ah3h5D.elf
                                      Arguments:/tmp/ssk7Ah3h5D.elf
                                      File size:4956856 bytes
                                      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                      Start time (UTC):18:24:00
                                      Start date (UTC):08/10/2024
                                      Path:/tmp/ssk7Ah3h5D.elf
                                      Arguments:-
                                      File size:4956856 bytes
                                      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                      Start time (UTC):18:24:00
                                      Start date (UTC):08/10/2024
                                      Path:/tmp/ssk7Ah3h5D.elf
                                      Arguments:-
                                      File size:4956856 bytes
                                      MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                      Start time (UTC):18:24:30
                                      Start date (UTC):08/10/2024
                                      Path:/usr/libexec/gnome-session-binary
                                      Arguments:-
                                      File size:334664 bytes
                                      MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                      Start time (UTC):18:24:30
                                      Start date (UTC):08/10/2024
                                      Path:/bin/sh
                                      Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-sharing
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):18:24:30
                                      Start date (UTC):08/10/2024
                                      Path:/usr/libexec/gsd-sharing
                                      Arguments:/usr/libexec/gsd-sharing
                                      File size:35424 bytes
                                      MD5 hash:e29d9025d98590fbb69f89fdbd4438b3

                                      Start time (UTC):18:24:30
                                      Start date (UTC):08/10/2024
                                      Path:/usr/libexec/gnome-session-binary
                                      Arguments:-
                                      File size:334664 bytes
                                      MD5 hash:d9b90be4f7db60cb3c2d3da6a1d31bfb

                                      Start time (UTC):18:24:30
                                      Start date (UTC):08/10/2024
                                      Path:/bin/sh
                                      Arguments:/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/bin/gnome-shell
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):18:24:30
                                      Start date (UTC):08/10/2024
                                      Path:/usr/bin/gnome-shell
                                      Arguments:/usr/bin/gnome-shell
                                      File size:23168 bytes
                                      MD5 hash:da7a257239677622fe4b3a65972c9e87

                                      Start time (UTC):18:24:31
                                      Start date (UTC):08/10/2024
                                      Path:/usr/sbin/gdm3
                                      Arguments:-
                                      File size:453296 bytes
                                      MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                      Start time (UTC):18:24:31
                                      Start date (UTC):08/10/2024
                                      Path:/etc/gdm3/PrimeOff/Default
                                      Arguments:/etc/gdm3/PrimeOff/Default
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):18:24:31
                                      Start date (UTC):08/10/2024
                                      Path:/usr/sbin/gdm3
                                      Arguments:-
                                      File size:453296 bytes
                                      MD5 hash:2492e2d8d34f9377e3e530a61a15674f

                                      Start time (UTC):18:24:31
                                      Start date (UTC):08/10/2024
                                      Path:/etc/gdm3/PrimeOff/Default
                                      Arguments:/etc/gdm3/PrimeOff/Default
                                      File size:129816 bytes
                                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                      Start time (UTC):18:24:41
                                      Start date (UTC):08/10/2024
                                      Path:/usr/lib/systemd/systemd
                                      Arguments:-
                                      File size:1620224 bytes
                                      MD5 hash:9b2bec7092a40488108543f9334aab75

                                      Start time (UTC):18:24:41
                                      Start date (UTC):08/10/2024
                                      Path:/lib/systemd/systemd-user-runtime-dir
                                      Arguments:/lib/systemd/systemd-user-runtime-dir stop 127
                                      File size:22672 bytes
                                      MD5 hash:d55f4b0847f88131dbcfb07435178e54