Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
na.elf

Overview

General Information

Sample name:na.elf
Analysis ID:1532529
MD5:23f684775cd0ec77dbac5d3b06eaa2a3
SHA1:1c5dc968afd80b8641c7184a2ff5ab7072de33a7
SHA256:bb7b5ef114c9ab567852caa806c03672cac7aa3ef1c855609cba74c1b5d77957
Tags:elfuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Deletes system log files
Sample tries to access files in /etc/config/ (typical for OpenWRT routers)
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Executes the "systemctl" command used for controlling the systemd system and service manager
Found strings indicative of a multi-platform dropper
Reads system version information
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532529
Start date and time:2024-10-13 15:37:52 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 55s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:na.elf
Detection:MAL
Classification:mal60.troj.evad.linELF@0/0@2/0
Command:/tmp/na.elf
PID:5721
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
thIs wEek on xLaB lEarNs nOthinG xd
Standard Error:
  • system is lnxubuntu20
  • na.elf (PID: 5721, Parent: 5526, MD5: ae65271c943d3451b7f026d1fadccea6) Arguments: /tmp/na.elf
    • na.elf New Fork (PID: 5723, Parent: 5721)
    • na.elf New Fork (PID: 5724, Parent: 5721)
    • na.elf New Fork (PID: 5727, Parent: 5721)
  • systemd New Fork (PID: 5732, Parent: 1)
  • snap-failure (PID: 5732, Parent: 1, MD5: 69136a7d575731ce62349f2e4d3e5c36) Arguments: /usr/lib/snapd/snap-failure snapd
    • systemctl (PID: 5746, Parent: 5732, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl stop snapd.socket
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: na.elfReversingLabs: Detection: 21%
Source: na.elfString: ash|login|wget|curl|tftp|ntpdate
Source: na.elfString: /proc//exe|ash|login|wget|curl|tftp|ntpdate/fdsocket|proc/usr/bin/usr/sbin/system/mnt/mtd/app/org/z/zbin/home/app/dvr/bin/duksan/userfs/mnt/app/usr/etc/dvr/main/usr/local/var/bin/tmp/sqfs/z/bin/dvr/mnt/mtd/zconf/gm/bin/home/process/var/challenge/usr/lib/lib/systemd//usr/lib/systemd/system/system/bin//mnt//home/helper/home/davinci/usr/libexec//sbin//bin/

Networking

barindex
Source: global trafficTCP traffic: 38.60.249.66 ports 3,4,6,7,9,49376
Source: global trafficTCP traffic: 192.168.2.13:33626 -> 38.60.249.66:49376
Source: /tmp/na.elf (PID: 5721)Socket: 127.0.0.1:1234Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 38.60.249.66
Source: unknownTCP traffic detected without corresponding DNS query: 38.60.249.66
Source: unknownTCP traffic detected without corresponding DNS query: 38.60.249.66
Source: unknownTCP traffic detected without corresponding DNS query: 38.60.249.66
Source: unknownTCP traffic detected without corresponding DNS query: 38.60.249.66
Source: unknownTCP traffic detected without corresponding DNS query: 38.60.249.66
Source: unknownTCP traffic detected without corresponding DNS query: 38.60.249.66
Source: unknownTCP traffic detected without corresponding DNS query: 38.60.249.66
Source: unknownTCP traffic detected without corresponding DNS query: 38.60.249.66
Source: unknownTCP traffic detected without corresponding DNS query: 38.60.249.66
Source: unknownTCP traffic detected without corresponding DNS query: 38.60.249.66
Source: unknownUDP traffic detected without corresponding DNS query: 116.203.104.203
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/na.elf (PID: 5723)SIGKILL sent: pid: 1692, result: successfulJump to behavior
Source: classification engineClassification label: mal60.troj.evad.linELF@0/0@2/0

Data Obfuscation

barindex
Source: /tmp/na.elf (PID: 5724)File: /etc/configJump to behavior
Source: /tmp/na.elf (PID: 5724)Directory: /root/.cacheJump to behavior
Source: /tmp/na.elf (PID: 5724)Directory: /root/.sshJump to behavior
Source: /tmp/na.elf (PID: 5724)Directory: /root/.configJump to behavior
Source: /tmp/na.elf (PID: 5724)Directory: /root/.localJump to behavior
Source: /tmp/na.elf (PID: 5724)Directory: /tmp/.X11-unixJump to behavior
Source: /tmp/na.elf (PID: 5724)Directory: /tmp/.Test-unixJump to behavior
Source: /tmp/na.elf (PID: 5724)Directory: /tmp/.font-unixJump to behavior
Source: /tmp/na.elf (PID: 5724)Directory: /tmp/.ICE-unixJump to behavior
Source: /tmp/na.elf (PID: 5724)Directory: /tmp/.XIM-unixJump to behavior
Source: /tmp/na.elf (PID: 5724)Directory: /etc/.javaJump to behavior
Source: /usr/lib/snapd/snap-failure (PID: 5746)Systemctl executable: /usr/bin/systemctl -> systemctl stop snapd.socketJump to behavior
Source: /usr/lib/snapd/snap-failure (PID: 5732)Reads version info: /proc/versionJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/na.elf (PID: 5724)Log files deleted: /var/log/kern.logJump to behavior
Source: /tmp/na.elf (PID: 5721)Queries kernel information via 'uname': Jump to behavior
Source: na.elf, 5721.1.00005585d0fd9000.00005585d1089000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc1
Source: na.elf, 5721.1.00007fffe29a8000.00007fffe29c9000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-ppc/tmp/na.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/na.elf
Source: na.elf, 5721.1.00005585d0fd9000.00005585d1089000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
Source: na.elf, 5721.1.00007fffe29a8000.00007fffe29c9000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Systemd Service
1
Systemd Service
1
Hidden Files and Directories
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Scripting
Boot or Logon Initialization Scripts1
Indicator Removal
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532529 Sample: na.elf Startdate: 13/10/2024 Architecture: LINUX Score: 60 22 38.60.249.66, 33626, 49376 COGENT-174US United States 2->22 24 116.203.104.203, 44550, 5353 HETZNER-ASDE Germany 2->24 26 daisy.ubuntu.com 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 Connects to many ports of the same IP (likely port scanning) 2->30 7 na.elf 2->7         started        9 systemd snap-failure 2->9         started        signatures3 process4 process5 11 na.elf 7->11         started        14 na.elf 7->14         started        16 na.elf 7->16         started        18 snap-failure systemctl 9->18         started        20 snap-failure 9->20         started        signatures6 32 Sample tries to access files in /etc/config/ (typical for OpenWRT routers) 11->32 34 Deletes system log files 11->34
SourceDetectionScannerLabelLink
na.elf21%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
SourceDetectionScannerLabelLink
daisy.ubuntu.com0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalseunknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
116.203.104.203
unknownGermany
24940HETZNER-ASDEfalse
38.60.249.66
unknownUnited States
174COGENT-174UStrue
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
116.203.104.203na.elfGet hashmaliciousUnknownBrowse
    na.elfGet hashmaliciousUnknownBrowse
      na.elfGet hashmaliciousUnknownBrowse
        na.elfGet hashmaliciousUnknownBrowse
          na.elfGet hashmaliciousUnknownBrowse
            na.elfGet hashmaliciousUnknownBrowse
              ssk7Ah3h5D.elfGet hashmaliciousUnknownBrowse
                na.elfGet hashmaliciousUnknownBrowse
                  na.elfGet hashmaliciousUnknownBrowse
                    na.elfGet hashmaliciousUnknownBrowse
                      38.60.249.66na.elfGet hashmaliciousUnknownBrowse
                        na.elfGet hashmaliciousUnknownBrowse
                          na.elfGet hashmaliciousUnknownBrowse
                            na.elfGet hashmaliciousUnknownBrowse
                              na.elfGet hashmaliciousUnknownBrowse
                                na.elfGet hashmaliciousUnknownBrowse
                                  na.elfGet hashmaliciousUnknownBrowse
                                    na.elfGet hashmaliciousUnknownBrowse
                                      na.elfGet hashmaliciousUnknownBrowse
                                        na.elfGet hashmaliciousUnknownBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          daisy.ubuntu.comna.elfGet hashmaliciousUnknownBrowse
                                          • 162.213.35.25
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 162.213.35.25
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 162.213.35.25
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 162.213.35.25
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 162.213.35.25
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 162.213.35.25
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 162.213.35.25
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 162.213.35.24
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 162.213.35.24
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 162.213.35.25
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          HETZNER-ASDEna.elfGet hashmaliciousUnknownBrowse
                                          • 116.203.104.203
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 116.203.104.203
                                          debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                                          • 197.242.86.253
                                          C5u5BZq8gj.exeGet hashmaliciousVidarBrowse
                                          • 116.203.12.50
                                          hD2EOjfpfW.exeGet hashmaliciousVidarBrowse
                                          • 116.203.12.50
                                          AVSicb6epR.exeGet hashmaliciousStealc, VidarBrowse
                                          • 95.217.125.57
                                          yQMBCvJVWp.elfGet hashmaliciousMiraiBrowse
                                          • 176.9.143.6
                                          file.exeGet hashmaliciousUnknownBrowse
                                          • 95.216.2.172
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 78.47.94.101
                                          http://coin-have.c0mGet hashmaliciousUnknownBrowse
                                          • 88.198.27.52
                                          COGENT-174USna.elfGet hashmaliciousUnknownBrowse
                                          • 38.60.249.66
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 38.60.249.66
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 38.60.249.66
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 38.60.249.66
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 38.60.249.66
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 38.60.249.66
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 38.60.249.66
                                          na.elfGet hashmaliciousUnknownBrowse
                                          • 38.60.249.66
                                          debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                                          • 204.243.128.148
                                          SecuriteInfo.com.Win32.TrojanX-gen.16449.26967.exeGet hashmaliciousUnknownBrowse
                                          • 149.104.74.87
                                          No context
                                          No context
                                          No created / dropped files found
                                          File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
                                          Entropy (8bit):5.970877153270427
                                          TrID:
                                          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                          File name:na.elf
                                          File size:54'548 bytes
                                          MD5:23f684775cd0ec77dbac5d3b06eaa2a3
                                          SHA1:1c5dc968afd80b8641c7184a2ff5ab7072de33a7
                                          SHA256:bb7b5ef114c9ab567852caa806c03672cac7aa3ef1c855609cba74c1b5d77957
                                          SHA512:928a31938ee855e30cf050c14f04a1542fe2d8f38bcc310525e941c3c3418170548f8c8d86662cf40b14d3eca5c25bd96d6a3140e30e204057a7e76213bd5afc
                                          SSDEEP:768:NralS0x47J3RDYHdtgqg/GjB+ur59bqH5N64ySY+Zozqothd2Qc4oSnYM:3BDqt3GG9Dr59bqfuIozqEv2luYM
                                          TLSH:8C330942B61C0847C1732EB0263B1BD0D3EBAAD222A4F288755FA75EC1B4E376585DDD
                                          File Content Preview:.ELF...........................4...4.....4. ...(.......................@...@..............................ET........dt.Q.............................!..|......$H...H......$8!. |...N.. .!..|.......?..........x..../...@..\?........+../...A..$8...})......N..

                                          ELF header

                                          Class:ELF32
                                          Data:2's complement, big endian
                                          Version:1 (current)
                                          Machine:PowerPC
                                          Version Number:0x1
                                          Type:EXEC (Executable file)
                                          OS/ABI:UNIX - System V
                                          ABI Version:0
                                          Entry Point Address:0x100001f0
                                          Flags:0x0
                                          ELF Header Size:52
                                          Program Header Offset:52
                                          Program Header Size:32
                                          Number of Program Headers:3
                                          Section Header Offset:54068
                                          Section Header Size:40
                                          Number of Section Headers:12
                                          Header String Table Index:11
                                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                          NULL0x00x00x00x00x0000
                                          .initPROGBITS0x100000940x940x240x00x6AX004
                                          .textPROGBITS0x100000b80xb80xb9400x00x6AX004
                                          .finiPROGBITS0x1000b9f80xb9f80x200x00x6AX004
                                          .rodataPROGBITS0x1000ba180xba180x11280x00x2A004
                                          .ctorsPROGBITS0x1001d0000xd0000x80x00x3WA004
                                          .dtorsPROGBITS0x1001d0080xd0080x80x00x3WA004
                                          .dataPROGBITS0x1001d0180xd0180x2b40x00x3WA008
                                          .sdataPROGBITS0x1001d2cc0xd2cc0x1c0x00x3WA004
                                          .sbssNOBITS0x1001d2e80xd2e80x900x00x3WA004
                                          .bssNOBITS0x1001d3780xd2e80x41dc0x00x3WA004
                                          .shstrtabSTRTAB0x00xd2e80x4b0x00x0001
                                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                          LOAD0x00x100000000x100000000xcb400xcb406.09640x5R E0x10000.init .text .fini .rodata
                                          LOAD0xd0000x1001d0000x1001d0000x2e80x45543.81300x6RW 0x10000.ctors .dtors .data .sdata .sbss .bss
                                          GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 13, 2024 15:39:32.556184053 CEST3362649376192.168.2.1338.60.249.66
                                          Oct 13, 2024 15:39:32.561157942 CEST493763362638.60.249.66192.168.2.13
                                          Oct 13, 2024 15:39:32.561211109 CEST3362649376192.168.2.1338.60.249.66
                                          Oct 13, 2024 15:39:32.571738958 CEST3362649376192.168.2.1338.60.249.66
                                          Oct 13, 2024 15:39:32.576714993 CEST493763362638.60.249.66192.168.2.13
                                          Oct 13, 2024 15:39:47.586539984 CEST3362649376192.168.2.1338.60.249.66
                                          Oct 13, 2024 15:39:47.592371941 CEST493763362638.60.249.66192.168.2.13
                                          Oct 13, 2024 15:39:49.493077993 CEST493763362638.60.249.66192.168.2.13
                                          Oct 13, 2024 15:39:49.493123055 CEST493763362638.60.249.66192.168.2.13
                                          Oct 13, 2024 15:39:49.493233919 CEST3362649376192.168.2.1338.60.249.66
                                          Oct 13, 2024 15:39:49.493233919 CEST3362649376192.168.2.1338.60.249.66
                                          Oct 13, 2024 15:40:24.809000015 CEST493763362638.60.249.66192.168.2.13
                                          Oct 13, 2024 15:40:24.809467077 CEST3362649376192.168.2.1338.60.249.66
                                          Oct 13, 2024 15:41:01.749106884 CEST493763362638.60.249.66192.168.2.13
                                          Oct 13, 2024 15:41:01.749536991 CEST3362649376192.168.2.1338.60.249.66
                                          Oct 13, 2024 15:41:31.777920961 CEST3362649376192.168.2.1338.60.249.66
                                          Oct 13, 2024 15:41:31.783792019 CEST493763362638.60.249.66192.168.2.13
                                          Oct 13, 2024 15:42:13.831686020 CEST493763362638.60.249.66192.168.2.13
                                          Oct 13, 2024 15:42:13.831909895 CEST3362649376192.168.2.1338.60.249.66
                                          Oct 13, 2024 15:42:15.331813097 CEST3480253192.168.2.138.8.8.8
                                          Oct 13, 2024 15:42:15.526096106 CEST53348028.8.8.8192.168.2.13
                                          Oct 13, 2024 15:42:15.530283928 CEST3480253192.168.2.138.8.8.8
                                          Oct 13, 2024 15:42:15.530283928 CEST3480253192.168.2.138.8.8.8
                                          Oct 13, 2024 15:42:15.530283928 CEST3480253192.168.2.138.8.8.8
                                          Oct 13, 2024 15:42:15.535530090 CEST53348028.8.8.8192.168.2.13
                                          Oct 13, 2024 15:42:15.535561085 CEST53348028.8.8.8192.168.2.13
                                          Oct 13, 2024 15:42:16.004868984 CEST53348028.8.8.8192.168.2.13
                                          Oct 13, 2024 15:42:16.005088091 CEST3480253192.168.2.138.8.8.8
                                          Oct 13, 2024 15:42:16.139568090 CEST53348028.8.8.8192.168.2.13
                                          Oct 13, 2024 15:42:16.139661074 CEST3480253192.168.2.138.8.8.8
                                          Oct 13, 2024 15:42:17.065774918 CEST493763362638.60.249.66192.168.2.13
                                          Oct 13, 2024 15:42:17.065942049 CEST3362649376192.168.2.1338.60.249.66
                                          Oct 13, 2024 15:42:18.006133080 CEST53348028.8.8.8192.168.2.13
                                          Oct 13, 2024 15:42:18.006531954 CEST3480253192.168.2.138.8.8.8
                                          Oct 13, 2024 15:42:18.012227058 CEST53348028.8.8.8192.168.2.13
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 13, 2024 15:39:31.983282089 CEST445505353192.168.2.13116.203.104.203
                                          Oct 13, 2024 15:39:32.545881033 CEST535344550116.203.104.203192.168.2.13
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Oct 13, 2024 15:42:15.530283928 CEST192.168.2.138.8.8.80x269Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                          Oct 13, 2024 15:42:15.530283928 CEST192.168.2.138.8.8.80x79fcStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Oct 13, 2024 15:42:16.139568090 CEST8.8.8.8192.168.2.130x269No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                                          Oct 13, 2024 15:42:16.139568090 CEST8.8.8.8192.168.2.130x269No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                                          System Behavior

                                          Start time (UTC):13:39:29
                                          Start date (UTC):13/10/2024
                                          Path:/tmp/na.elf
                                          Arguments:/tmp/na.elf
                                          File size:5388968 bytes
                                          MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                          Start time (UTC):13:39:30
                                          Start date (UTC):13/10/2024
                                          Path:/tmp/na.elf
                                          Arguments:-
                                          File size:5388968 bytes
                                          MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                          Start time (UTC):13:39:30
                                          Start date (UTC):13/10/2024
                                          Path:/tmp/na.elf
                                          Arguments:-
                                          File size:5388968 bytes
                                          MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                          Start time (UTC):13:39:30
                                          Start date (UTC):13/10/2024
                                          Path:/tmp/na.elf
                                          Arguments:-
                                          File size:5388968 bytes
                                          MD5 hash:ae65271c943d3451b7f026d1fadccea6

                                          Start time (UTC):13:39:31
                                          Start date (UTC):13/10/2024
                                          Path:/usr/lib/systemd/systemd
                                          Arguments:-
                                          File size:1620224 bytes
                                          MD5 hash:9b2bec7092a40488108543f9334aab75

                                          Start time (UTC):13:39:31
                                          Start date (UTC):13/10/2024
                                          Path:/usr/lib/snapd/snap-failure
                                          Arguments:/usr/lib/snapd/snap-failure snapd
                                          File size:4764904 bytes
                                          MD5 hash:69136a7d575731ce62349f2e4d3e5c36

                                          Start time (UTC):13:39:31
                                          Start date (UTC):13/10/2024
                                          Path:/usr/lib/snapd/snap-failure
                                          Arguments:-
                                          File size:4764904 bytes
                                          MD5 hash:69136a7d575731ce62349f2e4d3e5c36

                                          Start time (UTC):13:39:31
                                          Start date (UTC):13/10/2024
                                          Path:/usr/bin/systemctl
                                          Arguments:systemctl stop snapd.socket
                                          File size:996584 bytes
                                          MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                                          Start time (UTC):13:39:32
                                          Start date (UTC):13/10/2024
                                          Path:/usr/lib/snapd/snap-failure
                                          Arguments:-
                                          File size:4764904 bytes
                                          MD5 hash:69136a7d575731ce62349f2e4d3e5c36