Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
linux_mipsel.elf

Overview

General Information

Sample name:linux_mipsel.elf
Analysis ID:1562742
MD5:4327bd14ea43743b82ee3ef0d32e0252
SHA1:f92ad0e626c7d0f600b66846f6bb0a4335893cf8
SHA256:0ad31da8d8e01964d48280a5135e8399414dcf4ef18b18768a3105a5f16c8350
Tags:elfuser-abuse_ch
Infos:

Detection

Chaos
Score:56
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Chaos
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1562742
Start date and time:2024-11-25 23:58:45 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:linux_mipsel.elf
Detection:MAL
Classification:mal56.troj.linELF@0/0@0/0
  • VT rate limit hit for: linux_mipsel.elf
Command:/tmp/linux_mipsel.elf
PID:5515
Exit Code:2
Exit Code Info:
Killed:False
Standard Output:

Standard Error:fatal error: sigaction failed

runtime stack:
runtime.throw({0x3a34cf, 0x10})
/usr/lib/go-1.18/src/runtime/panic.go:992 +0x60
runtime.sysSigaction.func1()
/usr/lib/go-1.18/src/runtime/os_linux.go:529 +0x48
runtime.sysSigaction(0x41, 0x7ffffd10, 0x0)
/usr/lib/go-1.18/src/runtime/os_linux.go:528 +0x78
runtime.sigaction(0x41, 0x7ffffd10, 0x0)
/usr/lib/go-1.18/src/runtime/sigaction.go:15 +0x28
runtime.setsig(0x41, 0x6c884)
/usr/lib/go-1.18/src/runtime/os_linux.go:478 +0xb4
runtime.initsig(0x0)
/usr/lib/go-1.18/src/runtime/signal_unix.go:147 +0x294
runtime.mstartm0()
/usr/lib/go-1.18/src/runtime/proc.go:1442 +0x6c
runtime.mstart1()
/usr/lib/go-1.18/src/runtime/proc.go:1414 +0x90
runtime.mstart0()
/usr/lib/go-1.18/src/runtime/proc.go:1376 +0x74
runtime.mstart()
/usr/lib/go-1.18/src/runtime/asm_mipsx.s:89 +0x10

goroutine 1 [runnable]:
runtime.main()
/usr/lib/go-1.18/src/runtime/proc.go:145
runtime.goexit()
/usr/lib/go-1.18/src/runtime/asm_mipsx.s:610 +0x4
  • system is lnxubuntu20
  • linux_mipsel.elf (PID: 5515, Parent: 5435, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/linux_mipsel.elf
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
ChaosMulti-functional malware written in Go, targeting both Linux and Windows, evolved from elf.kaiji.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.chaos
SourceRuleDescriptionAuthorStrings
linux_mipsel.elfJoeSecurity_ChaosGoYara detected ChaosJoe Security
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: linux_mipsel.elfReversingLabs: Detection: 42%
    Source: global trafficTCP traffic: 192.168.2.14:46540 -> 185.125.190.26:443
    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.190.26
    Source: linux_mipsel.elfString found in binary or memory: http2: Transport conn %p received error from processing frame %v: %vhttp2: Transport received unsolicited DATA frame; closing connectionhttp: message cannot contain multiple Content-Length headers; got %qpadding bytes must all be zeros unless AllowIllegalWrites is enabledreflect: reflect.Value.UnsafePointer on an invalid notinheap pointerhttp2: Transport closing idle conn %p (forSingleUse=%v, maxStream=%v)tls: handshake message of length %d bytes exceeds maximum of %d bytestls: peer doesn't support the certificate custom signature algorithmsbytes.Buffer: UnreadByte: previous operation was not a successful readcannot convert slice with length %y to pointer to array with length %xgot %s for stream %d; expected CONTINUATION following %s for stream %dx509: PKCS#8 wrapping contained private key with unknown algorithm: %vx509: certificate relies on legacy Common Name field, use SANs insteadMozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)Sogou Pic Spider/3.0(+http://www.sogou.com/docs/help/webmasters.htm#07)Sogou web spider/4.0(+http://www.sogou.com/docs/help/webmasters.htm#07)dynamic table size update MUST occur at the beginning of a header blockssh: no common algorithm for %s; client offered: %v, server offered: %vtls: peer doesn't support any of the certificate's signature algorithmstoo many concurrent operations on a single file or socket (max 1048575)x509: issuer has name constraints but leaf doesn't have a SAN extensionMozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)tls: server's certificate contains an unsupported type of public key: %Ttls: received unexpected handshake message of type %T when waiting for %T91289437fa036b34da55d57af6192768c27bd433fa012169d626d934e0051b24dd67dd3cf49d7cc827bc012d259d7ac226e70829239d7ac226e7082968de60d520eb433722c07fd236f6crypto/elliptic: internal error: Unmarshal rejected a valid point encodingmalformed response from server: malformed non-numeric status pseudo headernet/http: server replied with more than declared Content-Length; truncatedtls: certificate RSA key size too small for supported signature algorithmsUnsolicited response received on idle HTTP channel starting with %q; err=%vtls: internal error: attempted to read record with pending application datatls: failed to send closeNotify alert (but connection was closed anyway): %wtls: server certificate contains incorrect key type for selected ciphersuite((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})(\.((2(5[0-5]|[0-4]\d))|[0-1]?\d{1,2})){3}MapIter.Next called on an iterator that does not have an associated map Valuecrypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled115792089210356248762697446949407573529996955224135760342422259061068512044369115792089210356248762697446949407573530086143415290314195533631308867097853951ssh: internal error: algorithmSignerWrapper invoked with non-default algorithmssh: unable to authenticate, attempted methods %v, no supported methods remainx509: signature check attempt
    Source: linux_mipsel.elfString found in binary or memory: http: RoundTripper implementation (%T) returned a nil *Response with a nil errortls: either ServerName or InsecureSkipVerify must be specified in the tls.Configx509: invalid signature: parent certificate cannot sign this kind of certificaterefusing to use HTTP_PROXY value in CGI environment; see golang.org/s/cgihttpproxyx509: a root or intermediate certificate is not authorized to sign for this name: (possibly because of %q while trying to verify candidate authority certificate %q)Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)x509: issuer has name constraints but leaf contains unknown or unconstrained name: tls: downgrade attempt detected, possibly due to a MitM attack or a broken middleboxx509: signature algorithm specifies an %s public key, but have public key of type %Treflect.Value.Interface: cannot return value obtained from unexported field or methodx509: failed to parse private key (use ParseECPrivateKey instead for this key format)Mozilla/5.0 (compatible; YoudaoBot/1.0; http://www.youdao.com/help/webmaster/spider/;)reflect: New of type that may not be allocated in heap (possibly undefined cgo C type)x509: a root or intermediate certificate is not authorized for an extended key usage: fxfzUc6gtMGc/i26ld3KydGKy1k7QqyMMyxjbU1Rlk+F9LQxnaTeCHGHsDUpaBeOWDeY6l+2kHlB7EWTLcGwfg==whv+Kf1cEtOXzr+zuvmef2as0WfbUDm8l2LMWBMel10NDnbShg9CsMUt327VJhOTbXLoPYJVTKy8MBPCVwoT8A==x509: failed to parse private key (use ParsePKCS1PrivateKey instead for this key format)x509: failed to parse private key (use ParsePKCS8PrivateKey instead for this key format)Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)http2: server sent GOAWAY and closed the connection; LastStreamID=%v, ErrCode=%v, debug=%qapplication/xml,application/xhtml+xml,text/html;q=0.9, text/plain;q=0.8,image/png,*/*;q=0.5tls: handshake hash for a client certificate requested after discarding the handshake buffertls: unsupported certificate: private key is *ed25519.PrivateKey, expected ed25519.PrivateKey3617de4a96262c6f5d9e98bf9292dc29f8f41dbd289a147ce9da3113b5f0b8c00a60b1ce1d7e819d7a431d7c90ea0e5faa87ca22be8b05378eb1c71ef320ad746e1d3b628ba79b9859f741e082542a385502f25dbf55296c3a545e3872760ab7b3312fa7e23ee7e4988e056be3f82d19181d9c6efe8141120314088f5013875ac656398d8a2ed19d2a85c8edd3ec2aefhttp: RoundTripper implementation (%T) returned a *Response with content length %d but a nil BodyNoClientCertRequestClientCertRequireAnyClientCertVerifyClientCertIfGivenRequireAndVerifyClientCertcipher: the nonce can't have zero length, or the security of the key will be immediately compromisedssh<<RMS>> equals www.yahoo.com (Yahoo)
    Source: linux_mipsel.elfString found in binary or memory: http://help.yahoo.com/help/us/ysearch/slurp)x509:
    Source: linux_mipsel.elfString found in binary or memory: http://search.msn.com/msnbot.htm
    Source: linux_mipsel.elfString found in binary or memory: http://www.baidu.com/search/spider.html)
    Source: linux_mipsel.elfString found in binary or memory: http://www.baidu.com/search/spider.html)000102030405060708091011121314151617181920212223242526272829
    Source: linux_mipsel.elfString found in binary or memory: http://www.baidu.com/search/spider.html)Mozilla/5.0
    Source: linux_mipsel.elfString found in binary or memory: http://www.baidu.com/search/spider.html)http2:
    Source: linux_mipsel.elfString found in binary or memory: http://www.entireweb.com/about/search_tech/speedy_spider/)text/html
    Source: linux_mipsel.elfString found in binary or memory: http://www.google.com/mobile/adsbot.html)
    Source: linux_mipsel.elfString found in binary or memory: http://www.haosou.com/help/help_3_2.htmlMozilla/5.0
    Source: linux_mipsel.elfString found in binary or memory: http://www.huaweisymantec.com/cn/IRL/spider)Mozilla/5.0
    Source: linux_mipsel.elfString found in binary or memory: http://www.youdao.com/help/webmaster/spider/;)reflect:
    Source: linux_mipsel.elfString found in binary or memory: http://yandex.com/bots)http:
    Source: linux_mipsel.elfString found in binary or memory: https://search.yahoo.com/search?p=illegal
    Source: linux_mipsel.elfString found in binary or memory: https://www.baidu.com/s?wd=insufficient
    Source: linux_mipsel.elfString found in binary or memory: https://www.so.com/s?q=index
    Source: unknownNetwork traffic detected: HTTP traffic on port 46540 -> 443
    Source: ELF static info symbol of initial sample.symtab present: no
    Source: classification engineClassification label: mal56.troj.linELF@0/0@0/0
    Source: ELF file sectionSubmission: linux_mipsel.elf
    Source: /tmp/linux_mipsel.elf (PID: 5515)Queries kernel information via 'uname': Jump to behavior
    Source: linux_mipsel.elf, 5515.1.0000564477ccd000.0000564478018000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
    Source: linux_mipsel.elf, 5515.1.00007fff30d82000.00007fff30da3000.rw-.sdmpBinary or memory string: (x86_64/usr/bin/qemu-mipsel/tmp/linux_mipsel.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/linux_mipsel.elf
    Source: linux_mipsel.elf, 5515.1.0000564477ccd000.0000564478018000.rw-.sdmpBinary or memory string: wDV!/etc/qemu-binfmt/mipsel
    Source: linux_mipsel.elf, 5515.1.00007fff30d82000.00007fff30da3000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: linux_mipsel.elf, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: linux_mipsel.elf, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
    Security Software Discovery
    Remote ServicesData from Local System1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    No configs have been found
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    SourceDetectionScannerLabelLink
    linux_mipsel.elf42%ReversingLabsLinux.Trojan.Kaiji
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.baidu.com/search/spider.html)linux_mipsel.elffalse
      high
      http://search.msn.com/msnbot.htmlinux_mipsel.elffalse
        high
        http://www.baidu.com/search/spider.html)000102030405060708091011121314151617181920212223242526272829linux_mipsel.elffalse
          high
          https://www.so.com/s?q=indexlinux_mipsel.elffalse
            high
            http://help.yahoo.com/help/us/ysearch/slurp)x509:linux_mipsel.elffalse
              high
              http://www.google.com/mobile/adsbot.html)linux_mipsel.elffalse
                high
                http://www.huaweisymantec.com/cn/IRL/spider)Mozilla/5.0linux_mipsel.elffalse
                  high
                  http://www.baidu.com/search/spider.html)http2:linux_mipsel.elffalse
                    high
                    http://yandex.com/bots)http:linux_mipsel.elffalse
                      high
                      http://www.baidu.com/search/spider.html)Mozilla/5.0linux_mipsel.elffalse
                        high
                        http://www.entireweb.com/about/search_tech/speedy_spider/)text/htmllinux_mipsel.elffalse
                          high
                          http://www.haosou.com/help/help_3_2.htmlMozilla/5.0linux_mipsel.elffalse
                            high
                            https://www.baidu.com/s?wd=insufficientlinux_mipsel.elffalse
                              high
                              http://www.youdao.com/help/webmaster/spider/;)reflect:linux_mipsel.elffalse
                                high
                                https://search.yahoo.com/search?p=illegallinux_mipsel.elffalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  185.125.190.26
                                  unknownUnited Kingdom
                                  41231CANONICAL-ASGBfalse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  185.125.190.26sshd.elfGet hashmaliciousUnknownBrowse
                                    pXdN91.armv4l.elfGet hashmaliciousMirai, GafgytBrowse
                                      hidakibest.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        main_x86.elfGet hashmaliciousMiraiBrowse
                                          main_arm.elfGet hashmaliciousMiraiBrowse
                                            UnHAnaAW.arm5.elfGet hashmaliciousUnknownBrowse
                                              la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                                                main_sh4.elfGet hashmaliciousMiraiBrowse
                                                  main_mpsl.elfGet hashmaliciousMiraiBrowse
                                                    main_mpsl.elfGet hashmaliciousMiraiBrowse
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      CANONICAL-ASGBlinux_amd64.elfGet hashmaliciousChaosBrowse
                                                      • 91.189.91.42
                                                      linux_mips.elfGet hashmaliciousChaosBrowse
                                                      • 91.189.91.42
                                                      linux_arm6.elfGet hashmaliciousChaosBrowse
                                                      • 91.189.91.42
                                                      x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                      • 91.189.91.42
                                                      fbot.arm5.elfGet hashmaliciousMiraiBrowse
                                                      • 91.189.91.42
                                                      sshd.elfGet hashmaliciousUnknownBrowse
                                                      • 91.189.91.42
                                                      iwir64.elfGet hashmaliciousMiraiBrowse
                                                      • 91.189.91.42
                                                      vwkjebwi686.elfGet hashmaliciousUnknownBrowse
                                                      • 91.189.91.42
                                                      la.bot.arc.elfGet hashmaliciousMiraiBrowse
                                                      • 91.189.91.42
                                                      loligang.m68k.elfGet hashmaliciousMiraiBrowse
                                                      • 91.189.91.42
                                                      No context
                                                      No context
                                                      No created / dropped files found
                                                      File type:ELF 32-bit LSB executable, MIPS, MIPS32 version 1 (SYSV), statically linked, Go BuildID=glC4xsoF8x1XxtAKb_A2/Mz20oUbBWtxO8TeYMv6w/xg4-s9T_SCpz5OIIIPY6/JkgdiA0NCZ4SR8btS7hW, stripped
                                                      Entropy (8bit):5.5077780399693275
                                                      TrID:
                                                      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                      File name:linux_mipsel.elf
                                                      File size:5'898'240 bytes
                                                      MD5:4327bd14ea43743b82ee3ef0d32e0252
                                                      SHA1:f92ad0e626c7d0f600b66846f6bb0a4335893cf8
                                                      SHA256:0ad31da8d8e01964d48280a5135e8399414dcf4ef18b18768a3105a5f16c8350
                                                      SHA512:9f9edd7a558547ffd0a271638cc9a77c83d3193589a28cf4582085023502c77e2b1ed9dbc556626181d08b21448fa0964b27ccfd06a97dc2966a053b45121ae7
                                                      SSDEEP:98304:yC91hAFxvW6WGVqq7g3JDCg76dAuE8iW5ay5mIOX+aaNcc8pNkxXkz8xBs3K4HU2:yC91hAFxvW6WGVqq7g3JDCg76dAuE8iF
                                                      TLSH:1356E704ADC56BA6C06C9B7584EBCE9523B06D044AF12B271664FEDAB8762747F07CCC
                                                      File Content Preview:.ELF....................L...4...4......P4. ...(.........4...4...4...................................d...d............................*2..*2...............3...4...4.,.".,."...............V...W...W.................Q.td...............................e.......

                                                      ELF header

                                                      Class:ELF32
                                                      Data:2's complement, little endian
                                                      Version:1 (current)
                                                      Machine:MIPS R3000
                                                      Version Number:0x1
                                                      Type:EXEC (Executable file)
                                                      OS/ABI:UNIX - System V
                                                      ABI Version:0
                                                      Entry Point Address:0x8c74c
                                                      Flags:0x50001004
                                                      ELF Header Size:52
                                                      Program Header Offset:52
                                                      Program Header Size:32
                                                      Number of Program Headers:8
                                                      Section Header Offset:308
                                                      Section Header Size:40
                                                      Number of Section Headers:16
                                                      Header String Table Index:4
                                                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                      NULL0x00x00x00x00x0000
                                                      .textPROGBITS0x110000x10000x321a040x00x6AX004
                                                      .rodataPROGBITS0x3400000x3300000xdc0230x00x2A0032
                                                      .gnu.attributesGNU_ATTRIBUTES0x00x40c0300x100x00x0001
                                                      .shstrtabSTRTAB0x00x40c0400xc40x00x0001
                                                      .typelinkPROGBITS0x41c1200x40c1200x17bc0x00x2A0032
                                                      .itablinkPROGBITS0x41d8e00x40d8e00x4a40x00x2A0032
                                                      .gosymtabPROGBITS0x41dd840x40dd840x00x00x2A001
                                                      .gopclntabPROGBITS0x41dda00x40dda00x14a48c0x00x2A0032
                                                      .go.buildinfoPROGBITS0x5700000x5600000xe00x00x3WA0016
                                                      .noptrdataPROGBITS0x5700e00x5600e00x301d80x00x3WA0032
                                                      .dataPROGBITS0x5a02c00x5902c00x81b00x00x3WA0032
                                                      .bssNOBITS0x5a84800x5984800x1347c0x00x3WA0032
                                                      .noptrbssNOBITS0x5bb9000x5ab9000xe7ec0x00x3WA0032
                                                      .note.go.buildidNOTE0x10f9c0xf9c0x640x00x2A004
                                                      .MIPS.abiflagsMIPS_ABIFLAGS0x10f840xf840x180x00x2A008
                                                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                      PHDR0x340x100340x100340x1000x1002.30860x4R 0x10000
                                                      NOTE0xf9c0x10f9c0x10f9c0x640x645.30210x4R 0x4.note.go.buildid
                                                      LOAD0x00x100000x100000x322a040x322a045.16240x5R E0x10000.text .note.go.buildid .MIPS.abiflags
                                                      LOAD0x3300000x3400000x3400000x22822c0x22822c5.59950x4R 0x10000.rodata .typelink .itablink .gosymtab .gopclntab
                                                      LOAD0x5600000x5700000x5700000x384800x5a0ec5.67190x6RW 0x10000.go.buildinfo .noptrdata .data .bss .noptrbss
                                                      GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
                                                      LOOS+50415800x00x00x00x00x00.00000x2a00 0x4
                                                      ABIFLAGS0xf840x10f840x10f840x180x180.88870x4R 0x8.MIPS.abiflags
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Nov 25, 2024 23:59:48.535399914 CET46540443192.168.2.14185.125.190.26
                                                      Nov 26, 2024 00:00:19.766119003 CET46540443192.168.2.14185.125.190.26

                                                      System Behavior

                                                      Start time (UTC):22:59:36
                                                      Start date (UTC):25/11/2024
                                                      Path:/tmp/linux_mipsel.elf
                                                      Arguments:/tmp/linux_mipsel.elf
                                                      File size:5773336 bytes
                                                      MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9