Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
m68k.elf

Overview

General Information

Sample name:m68k.elf
Analysis ID:1540918
MD5:c70c53fc423e40b932c42b6e0fda55da
SHA1:843d1b38d10be44566715a554d828da16918a2e3
SHA256:ca10530505f78fcaf9954a2053259d754c1dc4c20bb97534f0a946f27081cfb1
Tags:elfuser-abuse_ch
Infos:

Detection

Mirai, Moobot
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Detected Mirai
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Mirai
Yara detected Moobot
Sample deletes itself
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1540918
Start date and time:2024-10-24 10:07:55 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 49s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:m68k.elf
Detection:MAL
Classification:mal100.troj.evad.linELF@0/0@2/0
  • VT rate limit hit for: m68k.elf
Command:/tmp/m68k.elf
PID:5575
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • m68k.elf (PID: 5575, Parent: 5494, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/m68k.elf
    • m68k.elf New Fork (PID: 5577, Parent: 5575)
      • m68k.elf New Fork (PID: 5579, Parent: 5577)
      • m68k.elf New Fork (PID: 5580, Parent: 5577)
        • m68k.elf New Fork (PID: 5583, Parent: 5580)
        • m68k.elf New Fork (PID: 5594, Parent: 5580)
          • m68k.elf New Fork (PID: 5596, Parent: 5594)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
NameDescriptionAttributionBlogpost URLsLink
MooBotNo Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.moobot
SourceRuleDescriptionAuthorStrings
m68k.elfJoeSecurity_MoobotYara detected MoobotJoe Security
    m68k.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
      m68k.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0xd313:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd327:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd33b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd34f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd363:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd377:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd38b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd39f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd3b3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd3c7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd3db:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd3ef:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd403:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd417:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd42b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd43f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd453:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd467:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd47b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd48f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0xd4a3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      SourceRuleDescriptionAuthorStrings
      5575.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
        5575.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5594.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmpJoeSecurity_MoobotYara detected MoobotJoe Security
            5575.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
            • 0xd313:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd327:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd33b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd34f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd363:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd377:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd38b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd39f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd3b3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd3c7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd3db:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd3ef:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd403:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd417:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd42b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd43f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd453:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd467:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd47b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd48f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            • 0xd4a3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
            5594.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              Click to see the 19 entries
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-24T10:08:56.733037+020020304911Malware Command and Control Activity Detected192.168.2.1449080156.238.253.5155650TCP
              2024-10-24T10:09:00.821370+020020304911Malware Command and Control Activity Detected192.168.2.1449082156.238.253.5155650TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: m68k.elfAvira: detected
              Source: m68k.elfReversingLabs: Detection: 60%

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:49082 -> 156.238.253.51:55650
              Source: Network trafficSuricata IDS: 2030491 - Severity 1 - ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+) : 192.168.2.14:49080 -> 156.238.253.51:55650
              Source: global trafficTCP traffic: 192.168.2.14:49080 -> 156.238.253.51:55650
              Source: global trafficDNS traffic detected: DNS query: flklin.com

              System Summary

              barindex
              Source: m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5575.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5594.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5583.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: 5596.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: m68k.elf PID: 5575, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: m68k.elf PID: 5583, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: m68k.elf PID: 5594, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: Process Memory Space: m68k.elf PID: 5596, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
              Source: ELF static info symbol of initial sample.symtab present: no
              Source: /tmp/m68k.elf (PID: 5580)SIGKILL sent: pid: 5583, result: no such processJump to behavior
              Source: /tmp/m68k.elf (PID: 5583)SIGKILL sent: pid: -5577, result: unknownJump to behavior
              Source: /tmp/m68k.elf (PID: 5594)SIGKILL sent: pid: 5580, result: successfulJump to behavior
              Source: /tmp/m68k.elf (PID: 5596)SIGKILL sent: pid: 1 (init), result: successfulJump to behavior
              Source: m68k.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5575.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5594.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5583.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: 5596.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: m68k.elf PID: 5575, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: m68k.elf PID: 5583, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: m68k.elf PID: 5594, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: Process Memory Space: m68k.elf PID: 5596, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
              Source: classification engineClassification label: mal100.troj.evad.linELF@0/0@2/0
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/3880/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/3760/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/3761/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/1583/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/2672/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/110/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/3759/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/111/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/112/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/113/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/234/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/1577/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/114/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/235/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/115/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/116/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/117/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/118/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/119/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/10/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/917/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/11/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/12/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/13/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/14/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/15/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/16/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/17/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/18/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/19/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/1593/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/240/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/120/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/3094/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/121/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/242/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/3406/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/1/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/122/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/243/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/2/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/123/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/244/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/1589/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/3/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/124/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/245/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/1588/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/125/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/4/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/246/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/3402/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/126/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/5/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/247/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/127/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/6/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/248/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/128/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/7/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/249/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/8/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/129/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/800/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/3762/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/9/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/801/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/803/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/20/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/806/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/21/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/807/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/928/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/22/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/23/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/24/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/25/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/26/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/27/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/28/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/29/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/3420/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/490/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/250/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/130/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/251/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/131/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/252/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/132/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/253/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/254/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/255/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/135/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/256/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/1599/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/257/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/378/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/258/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/3412/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/259/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/30/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/35/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/3672/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/1371/cmdlineJump to behavior
              Source: /tmp/m68k.elf (PID: 5579)File opened: /proc/260/cmdlineJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: /tmp/m68k.elf (PID: 5575)File: /tmp/m68k.elfJump to behavior
              Source: /tmp/m68k.elf (PID: 5575)Queries kernel information via 'uname': Jump to behavior
              Source: m68k.elf, 5575.1.000055aab9d9f000.000055aab9e24000.rw-.sdmp, m68k.elf, 5583.1.000055aab9d9f000.000055aab9e24000.rw-.sdmp, m68k.elf, 5594.1.000055aab9d9f000.000055aab9e24000.rw-.sdmp, m68k.elf, 5596.1.000055aab9d9f000.000055aab9e24000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/m68k
              Source: m68k.elf, 5575.1.00007ffe9ae37000.00007ffe9ae58000.rw-.sdmp, m68k.elf, 5583.1.00007ffe9ae37000.00007ffe9ae58000.rw-.sdmp, m68k.elf, 5594.1.00007ffe9ae37000.00007ffe9ae58000.rw-.sdmp, m68k.elf, 5596.1.00007ffe9ae37000.00007ffe9ae58000.rw-.sdmpBinary or memory string: m}Px86_64/usr/bin/qemu-m68k/tmp/m68k.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/m68k.elf
              Source: m68k.elf, 5575.1.00007ffe9ae37000.00007ffe9ae58000.rw-.sdmp, m68k.elf, 5583.1.00007ffe9ae37000.00007ffe9ae58000.rw-.sdmp, m68k.elf, 5594.1.00007ffe9ae37000.00007ffe9ae58000.rw-.sdmp, m68k.elf, 5596.1.00007ffe9ae37000.00007ffe9ae58000.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
              Source: m68k.elf, 5575.1.000055aab9d9f000.000055aab9e24000.rw-.sdmp, m68k.elf, 5583.1.000055aab9d9f000.000055aab9e24000.rw-.sdmp, m68k.elf, 5594.1.000055aab9d9f000.000055aab9e24000.rw-.sdmp, m68k.elf, 5596.1.000055aab9d9f000.000055aab9e24000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: m68k.elf, type: SAMPLE
              Source: Yara matchFile source: 5575.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5594.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5583.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5596.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5575, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5583, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5594, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5596, type: MEMORYSTR
              Source: Yara matchFile source: m68k.elf, type: SAMPLE
              Source: Yara matchFile source: 5575.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5594.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5583.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5596.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5575, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5583, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5594, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5596, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: TrafficSuricata IDS: ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)
              Source: Yara matchFile source: m68k.elf, type: SAMPLE
              Source: Yara matchFile source: 5575.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5594.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5583.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5596.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5575, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5583, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5594, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5596, type: MEMORYSTR
              Source: Yara matchFile source: m68k.elf, type: SAMPLE
              Source: Yara matchFile source: 5575.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5594.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5583.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: 5596.1.00007fd7a0001000.00007fd7a0010000.r-x.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5575, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5583, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5594, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: m68k.elf PID: 5596, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
              File Deletion
              1
              OS Credential Dumping
              11
              Security Software Discovery
              Remote ServicesData from Local System1
              Non-Standard Port
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              No configs have been found
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Number of created Files
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1540918 Sample: m68k.elf Startdate: 24/10/2024 Architecture: LINUX Score: 100 25 flklin.com 156.238.253.51, 49080, 49082, 55650 XHOSTSERVERUS Seychelles 2->25 27 Suricata IDS alerts for network traffic 2->27 29 Malicious sample detected (through community Yara rule) 2->29 31 Antivirus / Scanner detection for submitted sample 2->31 33 4 other signatures 2->33 10 m68k.elf 2->10         started        signatures3 process4 signatures5 35 Sample deletes itself 10->35 13 m68k.elf 10->13         started        process6 process7 15 m68k.elf 13->15         started        17 m68k.elf 13->17         started        process8 19 m68k.elf 15->19         started        21 m68k.elf 15->21         started        process9 23 m68k.elf 19->23         started       
              SourceDetectionScannerLabelLink
              m68k.elf61%ReversingLabsLinux.Trojan.Mirai
              m68k.elf100%AviraEXP/ELF.Mirai.Z.A
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              flklin.com
              156.238.253.51
              truetrue
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                156.238.253.51
                flklin.comSeychelles
                394281XHOSTSERVERUStrue
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                156.238.253.51debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                  mips.elfGet hashmaliciousMirai, MoobotBrowse
                    arm7.elfGet hashmaliciousMirai, MoobotBrowse
                      sh4.elfGet hashmaliciousMirai, MoobotBrowse
                        mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          flklin.comdebug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                          • 156.238.253.51
                          mips.elfGet hashmaliciousMirai, MoobotBrowse
                          • 156.238.253.51
                          arm7.elfGet hashmaliciousMirai, MoobotBrowse
                          • 156.238.253.51
                          sh4.elfGet hashmaliciousMirai, MoobotBrowse
                          • 156.238.253.51
                          mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                          • 156.238.253.51
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          XHOSTSERVERUSdebug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                          • 156.238.253.51
                          garm.elfGet hashmaliciousMiraiBrowse
                          • 156.254.22.206
                          mips.elfGet hashmaliciousMirai, MoobotBrowse
                          • 156.238.253.51
                          arm7.elfGet hashmaliciousMirai, MoobotBrowse
                          • 156.238.253.51
                          sh4.elfGet hashmaliciousMirai, MoobotBrowse
                          • 156.238.253.51
                          mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                          • 156.238.253.51
                          4sRsB4QVzE.elfGet hashmaliciousMiraiBrowse
                          • 156.238.224.214
                          LsR22LZMVs.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 156.238.224.214
                          OocBsRyXoT.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 156.238.224.214
                          HNzkADzkE2.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 156.238.224.214
                          No context
                          No context
                          No created / dropped files found
                          File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
                          Entropy (8bit):6.207257223257148
                          TrID:
                          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                          File name:m68k.elf
                          File size:61'700 bytes
                          MD5:c70c53fc423e40b932c42b6e0fda55da
                          SHA1:843d1b38d10be44566715a554d828da16918a2e3
                          SHA256:ca10530505f78fcaf9954a2053259d754c1dc4c20bb97534f0a946f27081cfb1
                          SHA512:6556a77b231b7fa3240d245d1265f948cdc3a567f8e43c65b39731731562c44f0b79717a53e252271907715fa87d9ea9df6ff20d7f65a71696b398a23ba402bd
                          SSDEEP:1536:m7Eg48H4K+3a38/yph8Ci+HaJEc7DnbaNmMaW8Y3i:m7E98Yl3a48h8mHwEcfSv8Y3i
                          TLSH:4A532B9AF801CE7DF85BD77B4457090AB532B3D112831B3623A7B997BC731A41D22E85
                          File Content Preview:.ELF.......................D...4...t.....4. ...(.................................. ....................d..%$...... .dt.Q............................NV..a....da....dN^NuNV..J9...4f>"y.... QJ.g.X.#.....N."y.... QJ.f.A.....J.g.Hy....N.X........4N^NuNV..N^NuN

                          ELF header

                          Class:ELF32
                          Data:2's complement, big endian
                          Version:1 (current)
                          Machine:MC68000
                          Version Number:0x1
                          Type:EXEC (Executable file)
                          OS/ABI:UNIX - System V
                          ABI Version:0
                          Entry Point Address:0x80000144
                          Flags:0x0
                          ELF Header Size:52
                          Program Header Offset:52
                          Program Header Size:32
                          Number of Program Headers:3
                          Section Header Offset:61300
                          Section Header Size:40
                          Number of Section Headers:10
                          Header String Table Index:9
                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                          NULL0x00x00x00x00x0000
                          .initPROGBITS0x800000940x940x140x00x6AX002
                          .textPROGBITS0x800000a80xa80xd18e0x00x6AX004
                          .finiPROGBITS0x8000d2360xd2360xe0x00x6AX002
                          .rodataPROGBITS0x8000d2440xd2440x19860x00x2A002
                          .ctorsPROGBITS0x80010bd00xebd00x80x00x3WA004
                          .dtorsPROGBITS0x80010bd80xebd80x80x00x3WA004
                          .dataPROGBITS0x80010be40xebe40x3500x00x3WA004
                          .bssNOBITS0x80010f340xef340x21c00x00x3WA004
                          .shstrtabSTRTAB0x00xef340x3e0x00x0001
                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                          LOAD0x00x800000000x800000000xebca0xebca6.24740x5R E0x2000.init .text .fini .rodata
                          LOAD0xebd00x80010bd00x80010bd00x3640x25242.80850x6RW 0x2000.ctors .dtors .data .bss
                          GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2024-10-24T10:08:56.733037+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1449080156.238.253.5155650TCP
                          2024-10-24T10:09:00.821370+02002030491ET MALWARE ELF/MooBot Mirai DDoS Variant CnC Checkin M2 (Group String Len 2+)1192.168.2.1449082156.238.253.5155650TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 24, 2024 10:08:56.725985050 CEST4908055650192.168.2.14156.238.253.51
                          Oct 24, 2024 10:08:56.731379032 CEST5565049080156.238.253.51192.168.2.14
                          Oct 24, 2024 10:08:56.731458902 CEST4908055650192.168.2.14156.238.253.51
                          Oct 24, 2024 10:08:56.733036995 CEST4908055650192.168.2.14156.238.253.51
                          Oct 24, 2024 10:08:56.738526106 CEST5565049080156.238.253.51192.168.2.14
                          Oct 24, 2024 10:08:58.455744028 CEST5565049080156.238.253.51192.168.2.14
                          Oct 24, 2024 10:08:58.455848932 CEST4908055650192.168.2.14156.238.253.51
                          Oct 24, 2024 10:08:58.457664967 CEST4908055650192.168.2.14156.238.253.51
                          Oct 24, 2024 10:08:58.463689089 CEST5565049080156.238.253.51192.168.2.14
                          Oct 24, 2024 10:08:58.463748932 CEST4908055650192.168.2.14156.238.253.51
                          Oct 24, 2024 10:09:00.814270020 CEST4908255650192.168.2.14156.238.253.51
                          Oct 24, 2024 10:09:00.820180893 CEST5565049082156.238.253.51192.168.2.14
                          Oct 24, 2024 10:09:00.820252895 CEST4908255650192.168.2.14156.238.253.51
                          Oct 24, 2024 10:09:00.821369886 CEST4908255650192.168.2.14156.238.253.51
                          Oct 24, 2024 10:09:00.826844931 CEST5565049082156.238.253.51192.168.2.14
                          Oct 24, 2024 10:09:02.543241978 CEST5565049082156.238.253.51192.168.2.14
                          Oct 24, 2024 10:09:02.543422937 CEST4908255650192.168.2.14156.238.253.51
                          Oct 24, 2024 10:09:02.545533895 CEST4908255650192.168.2.14156.238.253.51
                          Oct 24, 2024 10:09:02.552633047 CEST5565049082156.238.253.51192.168.2.14
                          Oct 24, 2024 10:09:02.552731037 CEST4908255650192.168.2.14156.238.253.51
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 24, 2024 10:08:56.441302061 CEST4155253192.168.2.148.8.8.8
                          Oct 24, 2024 10:08:56.724719048 CEST53415528.8.8.8192.168.2.14
                          Oct 24, 2024 10:09:00.455353975 CEST3972053192.168.2.148.8.8.8
                          Oct 24, 2024 10:09:00.812984943 CEST53397208.8.8.8192.168.2.14
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Oct 24, 2024 10:08:56.441302061 CEST192.168.2.148.8.8.80xa068Standard query (0)flklin.comA (IP address)IN (0x0001)false
                          Oct 24, 2024 10:09:00.455353975 CEST192.168.2.148.8.8.80xa068Standard query (0)flklin.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Oct 24, 2024 10:08:56.724719048 CEST8.8.8.8192.168.2.140xa068No error (0)flklin.com156.238.253.51A (IP address)IN (0x0001)false
                          Oct 24, 2024 10:09:00.812984943 CEST8.8.8.8192.168.2.140xa068No error (0)flklin.com156.238.253.51A (IP address)IN (0x0001)false

                          System Behavior

                          Start time (UTC):08:08:55
                          Start date (UTC):24/10/2024
                          Path:/tmp/m68k.elf
                          Arguments:/tmp/m68k.elf
                          File size:4463432 bytes
                          MD5 hash:cd177594338c77b895ae27c33f8f86cc

                          Start time (UTC):08:08:55
                          Start date (UTC):24/10/2024
                          Path:/tmp/m68k.elf
                          Arguments:-
                          File size:4463432 bytes
                          MD5 hash:cd177594338c77b895ae27c33f8f86cc

                          Start time (UTC):08:08:55
                          Start date (UTC):24/10/2024
                          Path:/tmp/m68k.elf
                          Arguments:-
                          File size:4463432 bytes
                          MD5 hash:cd177594338c77b895ae27c33f8f86cc

                          Start time (UTC):08:08:55
                          Start date (UTC):24/10/2024
                          Path:/tmp/m68k.elf
                          Arguments:-
                          File size:4463432 bytes
                          MD5 hash:cd177594338c77b895ae27c33f8f86cc

                          Start time (UTC):08:08:55
                          Start date (UTC):24/10/2024
                          Path:/tmp/m68k.elf
                          Arguments:-
                          File size:4463432 bytes
                          MD5 hash:cd177594338c77b895ae27c33f8f86cc

                          Start time (UTC):08:08:59
                          Start date (UTC):24/10/2024
                          Path:/tmp/m68k.elf
                          Arguments:-
                          File size:4463432 bytes
                          MD5 hash:cd177594338c77b895ae27c33f8f86cc

                          Start time (UTC):08:08:59
                          Start date (UTC):24/10/2024
                          Path:/tmp/m68k.elf
                          Arguments:-
                          File size:4463432 bytes
                          MD5 hash:cd177594338c77b895ae27c33f8f86cc