Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
0iotwXRpGR.elf

Overview

General Information

Sample name:0iotwXRpGR.elf
renamed because original name is a hash value
Original sample name:1474701bef06a492df38e4354f544ec6.elf
Analysis ID:1532757
MD5:1474701bef06a492df38e4354f544ec6
SHA1:8d2a2564f1bb70100beffa2522f47aca64e9963c
SHA256:ae0af7bc6be80adce21c8e9a40a993a17193c7bcfabcbda707226edd6cb5bcd1
Tags:32elfintel
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Opens /proc/net/* files useful for finding connected devices and routers
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Sample contains only a LOAD segment without any section mappings
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1532757
Start date and time:2024-10-13 21:46:12 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:0iotwXRpGR.elf
renamed because original name is a hash value
Original Sample Name:1474701bef06a492df38e4354f544ec6.elf
Detection:MAL
Classification:mal64.spre.linELF@0/0@2/0
  • VT rate limit hit for: 0iotwXRpGR.elf
Command:/tmp/0iotwXRpGR.elf
PID:5534
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
based and botpilled
Standard Error:
  • system is lnxubuntu20
  • cleanup
SourceRuleDescriptionAuthorStrings
5534.1.0000000008048000.0000000008051000.r-x.sdmpLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0x4a1e:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
5534.1.0000000008048000.0000000008051000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x3517:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
5534.1.0000000008048000.0000000008051000.r-x.sdmpLinux_Trojan_Mirai_8aa7b5d3unknownunknown
  • 0x2ff2:$a: 8B 4C 24 14 8B 74 24 0C 8B 5C 24 10 85 C9 74 0D 31 D2 8A 04 1A 88
5535.1.0000000008048000.0000000008051000.r-x.sdmpLinux_Trojan_Mirai_389ee3e9unknownunknown
  • 0x4a1e:$a: 89 45 00 EB 2C 8B 4B 04 8B 13 8B 7B 18 8B 01 01 02 8B 02 83
5535.1.0000000008048000.0000000008051000.r-x.sdmpLinux_Trojan_Mirai_cc93863bunknownunknown
  • 0x3517:$a: C3 57 8B 44 24 0C 8B 4C 24 10 8B 7C 24 08 F3 AA 8B 44 24 08
Click to see the 1 entries
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 0iotwXRpGR.elfReversingLabs: Detection: 34%
Source: 0iotwXRpGR.elfJoe Sandbox ML: detected

Spreading

barindex
Source: /tmp/0iotwXRpGR.elf (PID: 5534)Opens: /proc/net/routeJump to behavior
Source: global trafficTCP traffic: 192.168.2.15:46770 -> 1.1.1.1:3074
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com

System Summary

barindex
Source: 5534.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5534.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5534.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: 5535.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 Author: unknown
Source: 5535.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b Author: unknown
Source: 5535.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 Author: unknown
Source: LOAD without section mappingsProgram segment: 0x8048000
Source: 5534.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5534.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5534.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: 5535.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_389ee3e9 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 59f2359dc1f41d385d639d157b4cd9fc73d76d8abb7cc09d47632bb4c9a39e6e, id = 389ee3e9-70c1-4c93-a999-292cf6ff1652, last_modified = 2022-01-26
Source: 5535.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_cc93863b reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = f3ecd30f0b511a8e92cfa642409d559e7612c3f57a1659ca46c77aca809a00ac, id = cc93863b-1050-40ba-9d02-5ec9ce6a3a28, last_modified = 2022-01-26
Source: 5535.1.0000000008048000.0000000008051000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Mirai_8aa7b5d3 reference_sample = 5217f2a46cb93946e04ab00e385ad0fe0a2844b6ea04ef75ee9187aac3f3d52f, os = linux, severity = x86, creation_date = 2022-01-05, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Mirai, fingerprint = 02a2c18c362df4b1fceb33f3b605586514ba9a00c7afedf71c04fa54d8146444, id = 8aa7b5d3-e1eb-4b55-b36a-0d3a242c06e9, last_modified = 2022-01-26
Source: classification engineClassification label: mal64.spre.linELF@0/0@2/0
Source: 0iotwXRpGR.elfSubmission file: segment LOAD with 7.8227 entropy (max. 8.0)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Obfuscated Files or Information
OS Credential Dumping1
Remote System Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
0iotwXRpGR.elf34%ReversingLabsLinux.Trojan.Mirai
0iotwXRpGR.elf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.25
truefalse
    unknown
    No contacted IP infos
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    daisy.ubuntu.comna.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 162.213.35.25
    na.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 162.213.35.25
    na.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 162.213.35.24
    na.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 162.213.35.24
    na.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 162.213.35.24
    na.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 162.213.35.25
    na.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 162.213.35.24
    na.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 162.213.35.25
    na.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 162.213.35.24
    na.elfGet hashmaliciousUnknownBrowse
    • 162.213.35.24
    No context
    No context
    No context
    No created / dropped files found
    File type:ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, no section header
    Entropy (8bit):7.816046150705907
    TrID:
    • ELF Executable and Linkable format (Linux) (4029/14) 50.16%
    • ELF Executable and Linkable format (generic) (4004/1) 49.84%
    File name:0iotwXRpGR.elf
    File size:22'064 bytes
    MD5:1474701bef06a492df38e4354f544ec6
    SHA1:8d2a2564f1bb70100beffa2522f47aca64e9963c
    SHA256:ae0af7bc6be80adce21c8e9a40a993a17193c7bcfabcbda707226edd6cb5bcd1
    SHA512:9d1212c2456e09310bbb1cba5da30686c3ae0dc98a4f1a39e2ed74384ea8919ba4ff32724ddaa3e6fc6f7ffcb4c64ea38845ab1cd7b60934415a7e1ccf258016
    SSDEEP:384:MeoNufGrQtUovQYGcQh36/Z3ppo/w593u2MH+fi55OP/olRRhKe/:rlfGrQt71J3/l3oW9+2i+fi55OPQnR9/
    TLSH:B7A2E1290A741312C6864379345F2C4277739AA55B1A4BCC9E13E7306EF31D4D7C7A9B
    File Content Preview:.ELF........................4...........4. ...(......................U...U..........................................Q.td................................YTS.$...................a........?d..ELF.......d...m...4..... .(.....~m..-.#.....}..................T..

    ELF header

    Class:ELF32
    Data:2's complement, little endian
    Version:1 (current)
    Machine:Intel 80386
    Version Number:0x1
    Type:EXEC (Executable file)
    OS/ABI:UNIX - Linux
    ABI Version:0
    Entry Point Address:0x804cd00
    Flags:0x0
    ELF Header Size:52
    Program Header Offset:52
    Program Header Size:32
    Number of Program Headers:3
    Section Header Offset:0
    Section Header Size:40
    Number of Section Headers:0
    Header String Table Index:0
    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
    LOAD0x00x80480000x80480000x55170x55177.82270x5R E0x1000
    LOAD0x00x804e0000x804e0000x00x99a40.00000x6RW 0x1000
    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
    TimestampSource PortDest PortSource IPDest IP
    Oct 13, 2024 21:46:59.758858919 CEST467703074192.168.2.151.1.1.1
    Oct 13, 2024 21:46:59.764415979 CEST3074467701.1.1.1192.168.2.15
    Oct 13, 2024 21:46:59.764472008 CEST467703074192.168.2.151.1.1.1
    Oct 13, 2024 21:46:59.764517069 CEST467703074192.168.2.151.1.1.1
    Oct 13, 2024 21:46:59.769915104 CEST3074467701.1.1.1192.168.2.15
    Oct 13, 2024 21:47:21.137279034 CEST3074467701.1.1.1192.168.2.15
    Oct 13, 2024 21:47:21.137748957 CEST467723074192.168.2.151.1.1.1
    Oct 13, 2024 21:47:21.137780905 CEST467703074192.168.2.151.1.1.1
    Oct 13, 2024 21:47:21.143821001 CEST3074467721.1.1.1192.168.2.15
    Oct 13, 2024 21:47:21.143870115 CEST3074467701.1.1.1192.168.2.15
    Oct 13, 2024 21:47:21.144308090 CEST467723074192.168.2.151.1.1.1
    Oct 13, 2024 21:47:21.144308090 CEST467723074192.168.2.151.1.1.1
    Oct 13, 2024 21:47:21.152457952 CEST3074467721.1.1.1192.168.2.15
    Oct 13, 2024 21:47:42.543669939 CEST3074467721.1.1.1192.168.2.15
    Oct 13, 2024 21:47:42.544389963 CEST467723074192.168.2.151.1.1.1
    Oct 13, 2024 21:47:42.544389963 CEST467743074192.168.2.151.1.1.1
    Oct 13, 2024 21:47:42.549520016 CEST3074467741.1.1.1192.168.2.15
    Oct 13, 2024 21:47:42.549546957 CEST3074467721.1.1.1192.168.2.15
    Oct 13, 2024 21:47:42.550064087 CEST467743074192.168.2.151.1.1.1
    Oct 13, 2024 21:47:42.550064087 CEST467743074192.168.2.151.1.1.1
    Oct 13, 2024 21:47:42.556288004 CEST3074467741.1.1.1192.168.2.15
    Oct 13, 2024 21:48:03.936908960 CEST3074467741.1.1.1192.168.2.15
    Oct 13, 2024 21:48:03.937510014 CEST467763074192.168.2.151.1.1.1
    Oct 13, 2024 21:48:03.937621117 CEST467743074192.168.2.151.1.1.1
    Oct 13, 2024 21:48:03.943028927 CEST3074467761.1.1.1192.168.2.15
    Oct 13, 2024 21:48:03.943079948 CEST3074467741.1.1.1192.168.2.15
    Oct 13, 2024 21:48:03.943584919 CEST467763074192.168.2.151.1.1.1
    Oct 13, 2024 21:48:03.943584919 CEST467763074192.168.2.151.1.1.1
    Oct 13, 2024 21:48:03.949450016 CEST3074467761.1.1.1192.168.2.15
    Oct 13, 2024 21:48:25.314654112 CEST3074467761.1.1.1192.168.2.15
    Oct 13, 2024 21:48:25.315502882 CEST467763074192.168.2.151.1.1.1
    Oct 13, 2024 21:48:25.315817118 CEST467783074192.168.2.151.1.1.1
    Oct 13, 2024 21:48:25.321235895 CEST3074467761.1.1.1192.168.2.15
    Oct 13, 2024 21:48:25.321285963 CEST3074467781.1.1.1192.168.2.15
    Oct 13, 2024 21:48:25.321619034 CEST467783074192.168.2.151.1.1.1
    Oct 13, 2024 21:48:25.321619034 CEST467783074192.168.2.151.1.1.1
    Oct 13, 2024 21:48:25.326930046 CEST3074467781.1.1.1192.168.2.15
    Oct 13, 2024 21:48:46.738188982 CEST3074467781.1.1.1192.168.2.15
    Oct 13, 2024 21:48:46.738560915 CEST467783074192.168.2.151.1.1.1
    Oct 13, 2024 21:48:46.738651991 CEST467803074192.168.2.151.1.1.1
    Oct 13, 2024 21:48:46.744079113 CEST3074467781.1.1.1192.168.2.15
    Oct 13, 2024 21:48:46.744128942 CEST3074467801.1.1.1192.168.2.15
    Oct 13, 2024 21:48:46.744277000 CEST467803074192.168.2.151.1.1.1
    Oct 13, 2024 21:48:46.744366884 CEST467803074192.168.2.151.1.1.1
    Oct 13, 2024 21:48:46.749912977 CEST3074467801.1.1.1192.168.2.15
    Oct 13, 2024 21:49:08.141422987 CEST3074467801.1.1.1192.168.2.15
    Oct 13, 2024 21:49:08.141982079 CEST467803074192.168.2.151.1.1.1
    Oct 13, 2024 21:49:08.142112970 CEST467823074192.168.2.151.1.1.1
    Oct 13, 2024 21:49:08.148111105 CEST3074467801.1.1.1192.168.2.15
    Oct 13, 2024 21:49:08.148169041 CEST3074467821.1.1.1192.168.2.15
    Oct 13, 2024 21:49:08.148528099 CEST467823074192.168.2.151.1.1.1
    Oct 13, 2024 21:49:08.148642063 CEST467823074192.168.2.151.1.1.1
    Oct 13, 2024 21:49:08.154310942 CEST3074467821.1.1.1192.168.2.15
    Oct 13, 2024 21:49:29.532092094 CEST3074467821.1.1.1192.168.2.15
    Oct 13, 2024 21:49:29.532355070 CEST467843074192.168.2.151.1.1.1
    Oct 13, 2024 21:49:29.532454014 CEST467823074192.168.2.151.1.1.1
    Oct 13, 2024 21:49:29.537820101 CEST3074467841.1.1.1192.168.2.15
    Oct 13, 2024 21:49:29.537866116 CEST3074467821.1.1.1192.168.2.15
    Oct 13, 2024 21:49:29.538029909 CEST467843074192.168.2.151.1.1.1
    Oct 13, 2024 21:49:29.538186073 CEST467843074192.168.2.151.1.1.1
    Oct 13, 2024 21:49:29.543582916 CEST3074467841.1.1.1192.168.2.15
    Oct 13, 2024 21:49:50.938600063 CEST3074467841.1.1.1192.168.2.15
    Oct 13, 2024 21:49:50.939078093 CEST467843074192.168.2.151.1.1.1
    Oct 13, 2024 21:49:50.939263105 CEST467863074192.168.2.151.1.1.1
    Oct 13, 2024 21:49:50.944489002 CEST3074467841.1.1.1192.168.2.15
    Oct 13, 2024 21:49:50.945157051 CEST3074467861.1.1.1192.168.2.15
    Oct 13, 2024 21:49:50.945379019 CEST467863074192.168.2.151.1.1.1
    Oct 13, 2024 21:49:50.945470095 CEST467863074192.168.2.151.1.1.1
    Oct 13, 2024 21:49:50.950825930 CEST3074467861.1.1.1192.168.2.15
    Oct 13, 2024 21:50:12.365413904 CEST3074467861.1.1.1192.168.2.15
    Oct 13, 2024 21:50:12.366209030 CEST467863074192.168.2.151.1.1.1
    Oct 13, 2024 21:50:12.366589069 CEST467883074192.168.2.151.1.1.1
    Oct 13, 2024 21:50:12.371203899 CEST3074467861.1.1.1192.168.2.15
    Oct 13, 2024 21:50:12.371767998 CEST3074467881.1.1.1192.168.2.15
    Oct 13, 2024 21:50:12.372435093 CEST467883074192.168.2.151.1.1.1
    Oct 13, 2024 21:50:12.372529030 CEST467883074192.168.2.151.1.1.1
    Oct 13, 2024 21:50:12.378119946 CEST3074467881.1.1.1192.168.2.15
    Oct 13, 2024 21:50:33.750488043 CEST3074467881.1.1.1192.168.2.15
    Oct 13, 2024 21:50:33.751106977 CEST467883074192.168.2.151.1.1.1
    Oct 13, 2024 21:50:33.751298904 CEST467903074192.168.2.151.1.1.1
    Oct 13, 2024 21:50:33.756768942 CEST3074467881.1.1.1192.168.2.15
    Oct 13, 2024 21:50:33.756814003 CEST3074467901.1.1.1192.168.2.15
    Oct 13, 2024 21:50:33.757077932 CEST467903074192.168.2.151.1.1.1
    Oct 13, 2024 21:50:33.757077932 CEST467903074192.168.2.151.1.1.1
    Oct 13, 2024 21:50:33.762433052 CEST3074467901.1.1.1192.168.2.15
    TimestampSource PortDest PortSource IPDest IP
    Oct 13, 2024 21:49:41.746067047 CEST5993153192.168.2.151.1.1.1
    Oct 13, 2024 21:49:41.746121883 CEST4112853192.168.2.151.1.1.1
    Oct 13, 2024 21:49:41.754617929 CEST53411281.1.1.1192.168.2.15
    Oct 13, 2024 21:49:41.755531073 CEST53599311.1.1.1192.168.2.15
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Oct 13, 2024 21:49:41.746067047 CEST192.168.2.151.1.1.10x177eStandard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
    Oct 13, 2024 21:49:41.746121883 CEST192.168.2.151.1.1.10x75aStandard query (0)daisy.ubuntu.com28IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Oct 13, 2024 21:49:41.755531073 CEST1.1.1.1192.168.2.150x177eNo error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
    Oct 13, 2024 21:49:41.755531073 CEST1.1.1.1192.168.2.150x177eNo error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

    System Behavior

    Start time (UTC):19:46:58
    Start date (UTC):13/10/2024
    Path:/tmp/0iotwXRpGR.elf
    Arguments:/tmp/0iotwXRpGR.elf
    File size:22064 bytes
    MD5 hash:1474701bef06a492df38e4354f544ec6

    Start time (UTC):19:46:58
    Start date (UTC):13/10/2024
    Path:/tmp/0iotwXRpGR.elf
    Arguments:-
    File size:22064 bytes
    MD5 hash:1474701bef06a492df38e4354f544ec6

    Start time (UTC):19:46:58
    Start date (UTC):13/10/2024
    Path:/tmp/0iotwXRpGR.elf
    Arguments:-
    File size:22064 bytes
    MD5 hash:1474701bef06a492df38e4354f544ec6