Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
linux_ppc64.elf

Overview

General Information

Sample name:linux_ppc64.elf
Analysis ID:1546609
MD5:02e830f608e70ba5d4f02389c974bdec
SHA1:a4553d4339656bf6974f93f0906ac16947fa452a
SHA256:8ba188f45ceb569dac23c7f1c42c4f7af2fcefd48f9ac702b6d090b4ab5b2b30
Tags:elfuser-abuse_ch
Infos:

Detection

Chaos
Score:56
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Chaos
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1546609
Start date and time:2024-11-01 08:42:10 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:linux_ppc64.elf
Detection:MAL
Classification:mal56.troj.linELF@0/0@0/0
Command:/tmp/linux_ppc64.elf
PID:6242
Exit Code:135
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • linux_ppc64.elf (PID: 6242, Parent: 6153, MD5: 744b5650a53264b22dda6f1b93b9164d) Arguments: /tmp/linux_ppc64.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
ChaosMulti-functional malware written in Go, targeting both Linux and Windows, evolved from elf.kaiji.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.chaos
SourceRuleDescriptionAuthorStrings
linux_ppc64.elfJoeSecurity_ChaosGoYara detected ChaosJoe Security
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: linux_ppc64.elfReversingLabs: Detection: 31%
    Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
    Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
    Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
    Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
    Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
    Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
    Source: linux_ppc64.elfString found in binary or memory: http2: Transport conn %p received error from processing frame %v: %vhttp2: Transport received unsolicited DATA frame; closing connectionhttp: message cannot contain multiple Content-Length headers; got %qpadding bytes must all be zeros unless AllowIllegalWrites is enabledreflect: reflect.Value.UnsafePointer on an invalid notinheap pointerhttp2: Transport closing idle conn %p (forSingleUse=%v, maxStream=%v)tls: handshake message of length %d bytes exceeds maximum of %d bytestls: peer doesn't support the certificate custom signature algorithmsbytes.Buffer: UnreadByte: previous operation was not a successful readcannot convert slice with length %y to pointer to array with length %xgot %s for stream %d; expected CONTINUATION following %s for stream %dx509: PKCS#8 wrapping contained private key with unknown algorithm: %vx509: certificate relies on legacy Common Name field, use SANs insteadMozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)Sogou Pic Spider/3.0(+http://www.sogou.com/docs/help/webmasters.htm#07)Sogou web spider/4.0(+http://www.sogou.com/docs/help/webmasters.htm#07)dynamic table size update MUST occur at the beginning of a header blockssh: no common algorithm for %s; client offered: %v, server offered: %vtls: peer doesn't support any of the certificate's signature algorithmstoo many concurrent operations on a single file or socket (max 1048575)x509: issuer has name constraints but leaf doesn't have a SAN extensionMozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)tls: server's certificate contains an unsupported type of public key: %Ttls: received unexpected handshake message of type %T when waiting for %T91289437fa036b34da55d57af6192768c27bd433fa012169d626d934e0051b24dd67dd3cf49d7cc827bc012d259d7ac226e70829239d7ac226e7082968de60d520eb433722c07fd236f6crypto/elliptic: internal error: Unmarshal rejected a valid point encodingmalformed response from server: malformed non-numeric status pseudo headernet/http: server replied with more than declared Content-Length; truncatedtls: certificate RSA key size too small for supported signature algorithmsUnsolicited response received on idle HTTP channel starting with %q; err=%vtls: internal error: attempted to read record with pending application datatls: failed to send closeNotify alert (but connection was closed anyway): %wtls: server certificate contains incorrect key type for selected ciphersuite((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})(\.((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})){3}MapIter.Next called on an iterator that does not have an associated map Valuecrypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled115792089210356248762697446949407573529996955224135760342422259061068512044369115792089210356248762697446949407573530086143415290314195533631308867097853951ssh: internal error: algorithmSignerWrapper invoked with non-default algorithmssh: unable to authenticate, attempted methods %v, no supported methods remainx509: signature check attempt
    Source: linux_ppc64.elfString found in binary or memory: http: RoundTripper implementation (%T) returned a nil *Response with a nil errortls: either ServerName or InsecureSkipVerify must be specified in the tls.Configx509: invalid signature: parent certificate cannot sign this kind of certificaterefusing to use HTTP_PROXY value in CGI environment; see golang.org/s/cgihttpproxyx509: a root or intermediate certificate is not authorized to sign for this name: (possibly because of %q while trying to verify candidate authority certificate %q)Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)x509: issuer has name constraints but leaf contains unknown or unconstrained name: tls: downgrade attempt detected, possibly due to a MitM attack or a broken middleboxx509: signature algorithm specifies an %s public key, but have public key of type %Treflect.Value.Interface: cannot return value obtained from unexported field or methodx509: failed to parse private key (use ParseECPrivateKey instead for this key format)Mozilla/5.0 (compatible; YoudaoBot/1.0; http://www.youdao.com/help/webmaster/spider/;)reflect: New of type that may not be allocated in heap (possibly undefined cgo C type)x509: a root or intermediate certificate is not authorized for an extended key usage: fxfzUc6gtMGc/i26ld3KydGKy1k7QqyMMyxjbU1Rlk+F9LQxnaTeCHGHsDUpaBeOWDeY6l+2kHlB7EWTLcGwfg==whv+Kf1cEtOXzr+zuvmef2as0WfbUDm8l2LMWBMel10NDnbShg9CsMUt327VJhOTbXLoPYJVTKy8MBPCVwoT8A==x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)http2: server sent GOAWAY and closed the connection; LastStreamID=%v, ErrCode=%v, debug=%qapplication/xml,application/xhtml+xml,text/html;q=0.9, text/plain;q=0.8,image/png,*/*;q=0.5tls: handshake hash for a client certificate requested after discarding the handshake buffertls: unsupported certificate: private key is *ed25519.PrivateKey, expected ed25519.PrivateKey3617de4a96262c6f5d9e98bf9292dc29f8f41dbd289a147ce9da3113b5f0b8c00a60b1ce1d7e819d7a431d7c90ea0e5faa87ca22be8b05378eb1c71ef320ad746e1d3b628ba79b9859f741e082542a385502f25dbf55296c3a545e3872760ab7b3312fa7e23ee7e4988e056be3f82d19181d9c6efe8141120314088f5013875ac656398d8a2ed19d2a85c8edd3ec2aefhttp: RoundTripper implementation (%T) returned a *Response with content length %d but a nil BodyNoClientCertRequestClientCertRequireAnyClientCertVerifyClientCertIfGivenRequireAndVerifyClientCertcipher: the nonce can't have zero length, or the security of the key will be immediately compromised1.0.3<<RMS>> equals www.yahoo.com (Yahoo)
    Source: linux_ppc64.elfString found in binary or memory: http://help.yahoo.com/help/us/ysearch/slurp)x509:
    Source: linux_ppc64.elfString found in binary or memory: http://search.msn.com/msnbot.htm
    Source: linux_ppc64.elfString found in binary or memory: http://www.baidu.com/search/spider.html)
    Source: linux_ppc64.elfString found in binary or memory: http://www.baidu.com/search/spider.html)000102030405060708091011121314151617181920212223242526272829
    Source: linux_ppc64.elfString found in binary or memory: http://www.baidu.com/search/spider.html)Mozilla/5.0
    Source: linux_ppc64.elfString found in binary or memory: http://www.baidu.com/search/spider.html)http2:
    Source: linux_ppc64.elfString found in binary or memory: http://www.entireweb.com/about/search_tech/speedy_spider/)text/html
    Source: linux_ppc64.elfString found in binary or memory: http://www.google.com/mobile/adsbot.html)
    Source: linux_ppc64.elfString found in binary or memory: http://www.haosou.com/help/help_3_2.htmlMozilla/5.0
    Source: linux_ppc64.elfString found in binary or memory: http://www.huaweisymantec.com/cn/IRL/spider)Mozilla/5.0
    Source: linux_ppc64.elfString found in binary or memory: http://www.youdao.com/help/webmaster/spider/;)reflect:
    Source: linux_ppc64.elfString found in binary or memory: http://yandex.com/bots)http:
    Source: linux_ppc64.elfString found in binary or memory: https://search.yahoo.com/search?p=illegal
    Source: linux_ppc64.elfString found in binary or memory: https://www.baidu.com/s?wd=insufficient
    Source: linux_ppc64.elfString found in binary or memory: https://www.so.com/s?q=index
    Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
    Source: ELF static info symbol of initial sample.symtab present: no
    Source: classification engineClassification label: mal56.troj.linELF@0/0@0/0
    Source: ELF file sectionSubmission: linux_ppc64.elf
    Source: /tmp/linux_ppc64.elf (PID: 6242)Queries kernel information via 'uname': Jump to behavior
    Source: linux_ppc64.elf, 6242.1.00007ffdf4b54000.00007ffdf4b75000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc64
    Source: linux_ppc64.elf, 6242.1.00007ffdf4b54000.00007ffdf4b75000.rw-.sdmpBinary or memory string: Lx86_64/usr/bin/qemu-ppc64/tmp/linux_ppc64.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/linux_ppc64.elf
    Source: linux_ppc64.elf, 6242.1.00005606bc30a000.00005606bc39f000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc64
    Source: linux_ppc64.elf, 6242.1.00005606bc30a000.00005606bc39f000.rw-.sdmpBinary or memory string: V!/etc/qemu-binfmt/ppc64

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: linux_ppc64.elf, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: linux_ppc64.elf, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
    Security Software Discovery
    Remote ServicesData from Local System1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    No configs have been found
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    SourceDetectionScannerLabelLink
    linux_ppc64.elf32%ReversingLabsLinux.Trojan.Multiverze
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.baidu.com/search/spider.html)linux_ppc64.elffalse
      unknown
      http://search.msn.com/msnbot.htmlinux_ppc64.elffalse
        unknown
        http://www.baidu.com/search/spider.html)000102030405060708091011121314151617181920212223242526272829linux_ppc64.elffalse
          unknown
          https://www.so.com/s?q=indexlinux_ppc64.elffalse
            unknown
            http://help.yahoo.com/help/us/ysearch/slurp)x509:linux_ppc64.elffalse
              unknown
              http://www.google.com/mobile/adsbot.html)linux_ppc64.elffalse
                unknown
                http://www.huaweisymantec.com/cn/IRL/spider)Mozilla/5.0linux_ppc64.elffalse
                  unknown
                  http://www.baidu.com/search/spider.html)http2:linux_ppc64.elffalse
                    unknown
                    http://yandex.com/bots)http:linux_ppc64.elffalse
                      unknown
                      http://www.baidu.com/search/spider.html)Mozilla/5.0linux_ppc64.elffalse
                        unknown
                        http://www.entireweb.com/about/search_tech/speedy_spider/)text/htmllinux_ppc64.elffalse
                          unknown
                          http://www.haosou.com/help/help_3_2.htmlMozilla/5.0linux_ppc64.elffalse
                            unknown
                            https://www.baidu.com/s?wd=insufficientlinux_ppc64.elffalse
                              unknown
                              http://www.youdao.com/help/webmaster/spider/;)reflect:linux_ppc64.elffalse
                                unknown
                                https://search.yahoo.com/search?p=illegallinux_ppc64.elffalse
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  109.202.202.202
                                  unknownSwitzerland
                                  13030INIT7CHfalse
                                  91.189.91.43
                                  unknownUnited Kingdom
                                  41231CANONICAL-ASGBfalse
                                  91.189.91.42
                                  unknownUnited Kingdom
                                  41231CANONICAL-ASGBfalse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  109.202.202.202kpLwzBouH4.elfGet hashmaliciousUnknownBrowse
                                  • ch.archive.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_92.0%2bbuild3-0ubuntu0.20.04.1_amd64.deb
                                  91.189.91.43.i.elfGet hashmaliciousUnknownBrowse
                                    armv6l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        i686.elfGet hashmaliciousGafgyt, MiraiBrowse
                                          boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                            armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              .i.elfGet hashmaliciousUnknownBrowse
                                                harm4.elfGet hashmaliciousUnknownBrowse
                                                  shngijernbh.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                    shngijernbh.ppc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                      91.189.91.42.i.elfGet hashmaliciousUnknownBrowse
                                                        armv6l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                          m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                            i686.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                              armv4l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                                                  armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                    .i.elfGet hashmaliciousUnknownBrowse
                                                                      harm4.elfGet hashmaliciousUnknownBrowse
                                                                        shngijernbh.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          No context
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          CANONICAL-ASGB.i.elfGet hashmaliciousUnknownBrowse
                                                                          • 91.189.91.42
                                                                          armv6l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 91.189.91.42
                                                                          m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 91.189.91.42
                                                                          i686.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 91.189.91.42
                                                                          armv4l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 91.189.91.42
                                                                          boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                                                          • 91.189.91.42
                                                                          armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 91.189.91.42
                                                                          boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                                                          • 185.125.190.26
                                                                          .i.elfGet hashmaliciousUnknownBrowse
                                                                          • 91.189.91.42
                                                                          harm4.elfGet hashmaliciousUnknownBrowse
                                                                          • 91.189.91.42
                                                                          CANONICAL-ASGB.i.elfGet hashmaliciousUnknownBrowse
                                                                          • 91.189.91.42
                                                                          armv6l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 91.189.91.42
                                                                          m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 91.189.91.42
                                                                          i686.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 91.189.91.42
                                                                          armv4l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 91.189.91.42
                                                                          boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                                                          • 91.189.91.42
                                                                          armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 91.189.91.42
                                                                          boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                                                                          • 185.125.190.26
                                                                          .i.elfGet hashmaliciousUnknownBrowse
                                                                          • 91.189.91.42
                                                                          harm4.elfGet hashmaliciousUnknownBrowse
                                                                          • 91.189.91.42
                                                                          INIT7CH.i.elfGet hashmaliciousUnknownBrowse
                                                                          • 109.202.202.202
                                                                          armv6l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 109.202.202.202
                                                                          m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 109.202.202.202
                                                                          i686.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 109.202.202.202
                                                                          armv4l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 109.202.202.202
                                                                          boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                                                          • 109.202.202.202
                                                                          armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 109.202.202.202
                                                                          .i.elfGet hashmaliciousUnknownBrowse
                                                                          • 109.202.202.202
                                                                          harm4.elfGet hashmaliciousUnknownBrowse
                                                                          • 109.202.202.202
                                                                          shngijernbh.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                          • 109.202.202.202
                                                                          No context
                                                                          No context
                                                                          No created / dropped files found
                                                                          File type:ELF 64-bit MSB executable, 64-bit PowerPC or cisco 7500, Power ELF V1 ABI, version 1 (SYSV), statically linked, Go BuildID=emrxAtiCfcvlMC36v2EI/R0yv_qqxcAUW7iPuCa74/Pov6-1O8tKDLlb41a6HX/4L5pUbEEMCyxTlloYQpl, stripped
                                                                          Entropy (8bit):5.978579164836054
                                                                          TrID:
                                                                          • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                                          File name:linux_ppc64.elf
                                                                          File size:3'745'480 bytes
                                                                          MD5:02e830f608e70ba5d4f02389c974bdec
                                                                          SHA1:a4553d4339656bf6974f93f0906ac16947fa452a
                                                                          SHA256:8ba188f45ceb569dac23c7f1c42c4f7af2fcefd48f9ac702b6d090b4ab5b2b30
                                                                          SHA512:d7ec910e281a780c0434599b8715963503246fa34aee2e217c82f355d9223c2c6688d4c224eee570fad49c7943a87e464bd3ca8baa384c33392b8baeff71c0fe
                                                                          SSDEEP:49152:UbfIMWeDTyKn8Nrwtt56e3JLxKYzYR2iLHwOng/KosjiwoNi5bS:MgMWeDTyK86t53txKSi21S7W
                                                                          TLSH:1D062BD0BB4CD138EE8B0A7149738F6063517A4280F4D96B771AAB6F05B09F7560FEA4
                                                                          File Content Preview:.ELF..........................R........@.............@.8...@...................@.......@.......@...............................................................d.......d.............................................%.4.....%.4.....................&.......'.

                                                                          ELF header

                                                                          Class:ELF64
                                                                          Data:2's complement, big endian
                                                                          Version:1 (current)
                                                                          Machine:PowerPC64
                                                                          Version Number:0x1
                                                                          Type:EXEC (Executable file)
                                                                          OS/ABI:UNIX - System V
                                                                          ABI Version:0
                                                                          Entry Point Address:0x752b0
                                                                          Flags:0x1
                                                                          ELF Header Size:64
                                                                          Program Header Offset:64
                                                                          Program Header Size:56
                                                                          Number of Program Headers:7
                                                                          Section Header Offset:456
                                                                          Section Header Size:64
                                                                          Number of Section Headers:14
                                                                          Header String Table Index:3
                                                                          NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                                          NULL0x00x00x00x00x0000
                                                                          .textPROGBITS0x110000x10000x25de340x00x6AX0016
                                                                          .rodataPROGBITS0x2700000x2600000xf07370x00x2A0032
                                                                          .shstrtabSTRTAB0x00x3507400xa50x00x0001
                                                                          .typelinkPROGBITS0x3608000x3508000x17c40x00x2A0032
                                                                          .itablinkPROGBITS0x361fe00x351fe00x9480x00x2A0032
                                                                          .gosymtabPROGBITS0x3629280x3529280x00x00x2A001
                                                                          .gopclntabPROGBITS0x3629400x3529400x1488c00x00x2A0032
                                                                          .go.buildinfoPROGBITS0x4b00000x4a00000xe00x00x3WA0016
                                                                          .noptrdataPROGBITS0x4b00e00x4a00e00x31d180x00x3WA0032
                                                                          .dataPROGBITS0x4e1e000x4d1e000xb9f00x00x3WA0032
                                                                          .bssNOBITS0x4ed8000x4dd8000x381800x00x3WA0032
                                                                          .noptrbssNOBITS0x5259800x5159800xf7100x00x3WA0032
                                                                          .note.go.buildidNOTE0x10f9c0xf9c0x640x00x2A004
                                                                          TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                                          PHDR0x400x100400x100400x1880x1881.44390x4R 0x10000
                                                                          NOTE0xf9c0x10f9c0x10f9c0x640x645.33230x4R 0x4.note.go.buildid
                                                                          LOAD0x00x100000x100000x25ee340x25ee346.12880x5R E0x10000.text .note.go.buildid
                                                                          LOAD0x2600000x2700000x2700000x23b2000x23b2004.95330x4R 0x10000.rodata .typelink .itablink .gosymtab .gopclntab
                                                                          LOAD0x4a00000x4b00000x4b00000x3d8000x850900.00000x6RW 0x10000.go.buildinfo .noptrdata .data .bss .noptrbss
                                                                          GNU_STACK0x00x00x00x00x00.00000x6RW 0x8
                                                                          LOOS+50415800x00x00x00x00x00.00000x2a00 0x8
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Nov 1, 2024 08:42:57.338311911 CET43928443192.168.2.2391.189.91.42
                                                                          Nov 1, 2024 08:43:02.969578981 CET42836443192.168.2.2391.189.91.43
                                                                          Nov 1, 2024 08:43:04.249568939 CET4251680192.168.2.23109.202.202.202
                                                                          Nov 1, 2024 08:43:18.583971024 CET43928443192.168.2.2391.189.91.42
                                                                          Nov 1, 2024 08:43:28.821999073 CET42836443192.168.2.2391.189.91.43
                                                                          Nov 1, 2024 08:43:34.965261936 CET4251680192.168.2.23109.202.202.202
                                                                          Nov 1, 2024 08:43:59.537945986 CET43928443192.168.2.2391.189.91.42
                                                                          Nov 1, 2024 08:44:20.015120983 CET42836443192.168.2.2391.189.91.43

                                                                          System Behavior

                                                                          Start time (UTC):07:42:55
                                                                          Start date (UTC):01/11/2024
                                                                          Path:/tmp/linux_ppc64.elf
                                                                          Arguments:/tmp/linux_ppc64.elf
                                                                          File size:5452360 bytes
                                                                          MD5 hash:744b5650a53264b22dda6f1b93b9164d