Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-22.04_amd64 -
resource
ubuntu2204-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu2204-amd64-20240611-enkernel:5.15.0-105-genericlocale:en-usos:ubuntu-22.04-amd64system -
submitted
23-08-2024 06:31
Behavioral task
behavioral1
Sample
bab61d0cbd2305656550c3a70330cb35_JaffaCakes118
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
bab61d0cbd2305656550c3a70330cb35_JaffaCakes118
-
Size
1.2MB
-
MD5
bab61d0cbd2305656550c3a70330cb35
-
SHA1
b4336029e368ecd4f881b499037fd5e0a5c59b69
-
SHA256
d0cd564544266533d95bcda3fe25b09546719dd3a312e2c3383ccfae8e2b35c6
-
SHA512
d5bc415ce576a508442e0756930520d3c36f3e7e1893cec26c56b771cb735ad4bb8afbabf9bf7f36153e861bd1c685b8a4f23ce34edfee97f6a57aa12aa01252
-
SSDEEP
24576:e845rGHu6gVJKG75oFpA0VWeX4X2y1q2rJp0:745vRVJKGtSA0VWeoGu9p0
Malware Config
Signatures
-
MrBlack trojan 1 IoCs
Processes:
resource yara_rule behavioral1/files/fstream-4.dat family_mrblack -
Executes dropped EXE 2 IoCs
Processes:
getty.sshdioc pid Process /usr/bin/bsd-port/getty 1598 getty /usr/bin/.sshd 1620 .sshd -
Processes:
bab61d0cbd2305656550c3a70330cb35_JaffaCakes118gettydescription ioc Process File opened for modification /etc/init.d/DbSecuritySpt bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 File opened for modification /etc/init.d/selinux getty -
Reads system routing table 1 TTPs 1 IoCs
Gets active network interfaces from /proc virtual filesystem.
Processes:
bab61d0cbd2305656550c3a70330cb35_JaffaCakes118description ioc Process File opened for reading /proc/net/route bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 -
Write file to user bin folder 1 TTPs 11 IoCs
Processes:
bab61d0cbd2305656550c3a70330cb35_JaffaCakes118cpcpcpgettycpcpcpcpcpdescription ioc Process File opened for modification /usr/bin/bsd-port/getty.lock bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 File opened for modification /usr/bin/bsd-port/udevd.lock bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 File opened for modification /usr/bin/bsd-port/getty cp File opened for modification /usr/bin/dpkgd/lsof cp File opened for modification /usr/bin/ps cp File opened for modification /usr/bin/bsd-port/getty.lock getty File opened for modification /usr/bin/.sshd cp File opened for modification /usr/bin/dpkgd/ps cp File opened for modification /usr/bin/dpkgd/ss cp File opened for modification /usr/bin/lsof cp File opened for modification /usr/bin/ss cp -
Writes file to system bin folder 1 TTPs 3 IoCs
Processes:
cpcpcpdescription ioc Process File opened for modification /bin/lsof cp File opened for modification /bin/ps cp File opened for modification /bin/ss cp -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
Processes:
gettybab61d0cbd2305656550c3a70330cb35_JaffaCakes118description ioc Process File opened for reading /proc/cpuinfo getty File opened for reading /proc/cpuinfo bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 -
Reads system network configuration 1 TTPs 4 IoCs
Uses contents of /proc filesystem to enumerate network settings.
Processes:
gettybab61d0cbd2305656550c3a70330cb35_JaffaCakes118description ioc Process File opened for reading /proc/net/dev getty File opened for reading /proc/net/dev bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 File opened for reading /proc/net/route bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 File opened for reading /proc/net/arp bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 -
Reads runtime system information 37 IoCs
Reads data from /proc virtual filesystem.
Processes:
cpbab61d0cbd2305656550c3a70330cb35_JaffaCakes118mkdircpcpmkdirinsmodgettymkdirmkdircpmkdirmkdircpcpinsmodcpmkdirmkdircpmkdirmkdircp.sshdmkdircpmkdirmkdirmkdirmkdirmkdirmkdircpdescription ioc Process File opened for reading /proc/filesystems cp File opened for reading /proc/stat bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/cmdline insmod File opened for reading /proc/sys/kernel/version getty File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems cp File opened for reading /proc/meminfo getty File opened for reading /proc/meminfo bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 File opened for reading /proc/cmdline insmod File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/stat getty File opened for reading /proc/sys/kernel/version .sshd File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/sys/kernel/version bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems mkdir File opened for reading /proc/filesystems cp -
Writes file to tmp directory 8 IoCs
Malware often drops required files in the /tmp directory.
Processes:
.sshdbab61d0cbd2305656550c3a70330cb35_JaffaCakes118description ioc Process File opened for modification /tmp/notify.file .sshd File opened for modification /tmp/conf.n bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 File opened for modification /tmp/gates.lod .sshd File opened for modification /tmp/moni.lod bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 File opened for modification /tmp/bill.lock bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 File opened for modification /tmp/gates.lod bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 File opened for modification /tmp/notify.file bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 File opened for modification /tmp/moni.lod .sshd
Processes
-
/tmp/bab61d0cbd2305656550c3a70330cb35_JaffaCakes118/tmp/bab61d0cbd2305656550c3a70330cb35_JaffaCakes1181⤵
- Modifies init.d
- Reads system routing table
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
- Writes file to tmp directory
PID:1568 -
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt"2⤵PID:1580
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc1.d/S97DbSecuritySpt3⤵PID:1581
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt"2⤵PID:1582
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc2.d/S97DbSecuritySpt3⤵PID:1583
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt"2⤵PID:1584
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc3.d/S97DbSecuritySpt3⤵PID:1585
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt"2⤵PID:1586
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc4.d/S97DbSecuritySpt3⤵PID:1587
-
-
-
/bin/shsh -c "ln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt"2⤵PID:1588
-
/usr/bin/lnln -s /etc/init.d/DbSecuritySpt /etc/rc5.d/S97DbSecuritySpt3⤵PID:1589
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1590
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1591
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/bsd-port"2⤵PID:1592
-
/usr/bin/mkdirmkdir -p /usr/bin/bsd-port3⤵
- Reads runtime system information
PID:1593
-
-
-
/bin/shsh -c "cp -f /tmp/bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 /usr/bin/bsd-port/getty"2⤵PID:1594
-
/usr/bin/cpcp -f /tmp/bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 /usr/bin/bsd-port/getty3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1595
-
-
-
/bin/shsh -c /usr/bin/bsd-port/getty2⤵PID:1597
-
/usr/bin/bsd-port/getty/usr/bin/bsd-port/getty3⤵
- Executes dropped EXE
- Modifies init.d
- Write file to user bin folder
- Checks CPU configuration
- Reads system network configuration
- Reads runtime system information
PID:1598 -
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc1.d/S99selinux"4⤵PID:1606
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc1.d/S99selinux5⤵PID:1607
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc2.d/S99selinux"4⤵PID:1608
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc2.d/S99selinux5⤵PID:1609
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc3.d/S99selinux"4⤵PID:1610
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc3.d/S99selinux5⤵PID:1611
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc4.d/S99selinux"4⤵PID:1612
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc4.d/S99selinux5⤵PID:1613
-
-
-
/bin/shsh -c "ln -s /etc/init.d/selinux /etc/rc5.d/S99selinux"4⤵PID:1614
-
/usr/bin/lnln -s /etc/init.d/selinux /etc/rc5.d/S99selinux5⤵PID:1615
-
-
-
/bin/shsh -c "mkdir -p /usr/bin/dpkgd"4⤵PID:1616
-
/usr/bin/mkdirmkdir -p /usr/bin/dpkgd5⤵
- Reads runtime system information
PID:1617
-
-
-
/bin/shsh -c "cp -f /bin/lsof /usr/bin/dpkgd/lsof"4⤵PID:1621
-
/usr/bin/cpcp -f /bin/lsof /usr/bin/dpkgd/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1622
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1623
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1624
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1625
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1626
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/lsof"4⤵PID:1627
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/lsof5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1628
-
-
-
/bin/shsh -c "chmod 0755 /bin/lsof"4⤵PID:1629
-
/usr/bin/chmodchmod 0755 /bin/lsof5⤵PID:1630
-
-
-
/bin/shsh -c "cp -f /bin/ps /usr/bin/dpkgd/ps"4⤵PID:1631
-
/usr/bin/cpcp -f /bin/ps /usr/bin/dpkgd/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1632
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1633
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1634
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1635
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1636
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ps"4⤵PID:1637
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ps5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1638
-
-
-
/bin/shsh -c "chmod 0755 /bin/ps"4⤵PID:1639
-
/usr/bin/chmodchmod 0755 /bin/ps5⤵PID:1640
-
-
-
/bin/shsh -c "cp -f /bin/ss /usr/bin/dpkgd/ss"4⤵PID:1641
-
/usr/bin/cpcp -f /bin/ss /usr/bin/dpkgd/ss5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1642
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1643
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1644
-
-
-
/bin/shsh -c "mkdir -p /bin"4⤵PID:1645
-
/usr/bin/mkdirmkdir -p /bin5⤵
- Reads runtime system information
PID:1646
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /bin/ss"4⤵PID:1647
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /bin/ss5⤵
- Writes file to system bin folder
- Reads runtime system information
PID:1648
-
-
-
/bin/shsh -c "chmod 0755 /bin/ss"4⤵PID:1649
-
/usr/bin/chmodchmod 0755 /bin/ss5⤵PID:1650
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1651
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1652
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1653
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1654
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/lsof"4⤵PID:1655
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/lsof5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1656
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/lsof"4⤵PID:1657
-
/usr/bin/chmodchmod 0755 /usr/bin/lsof5⤵PID:1658
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1659
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1660
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1661
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1662
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ps"4⤵PID:1663
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ps5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1664
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ps"4⤵PID:1665
-
/usr/bin/chmodchmod 0755 /usr/bin/ps5⤵PID:1666
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1667
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1668
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"4⤵PID:1669
-
/usr/bin/mkdirmkdir -p /usr/bin5⤵
- Reads runtime system information
PID:1670
-
-
-
/bin/shsh -c "cp -f /usr/bin/bsd-port/getty /usr/bin/ss"4⤵PID:1671
-
/usr/bin/cpcp -f /usr/bin/bsd-port/getty /usr/bin/ss5⤵
- Write file to user bin folder
- Reads runtime system information
PID:1672
-
-
-
/bin/shsh -c "chmod 0755 /usr/bin/ss"4⤵PID:1673
-
/usr/bin/chmodchmod 0755 /usr/bin/ss5⤵PID:1674
-
-
-
/bin/shsh -c "insmod /usr/bin/bsd-port/xpacket.ko"4⤵PID:1677
-
/usr/sbin/insmodinsmod /usr/bin/bsd-port/xpacket.ko5⤵
- Reads runtime system information
PID:1678
-
-
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1600
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1601
-
-
-
/bin/shsh -c "mkdir -p /usr/bin"2⤵PID:1602
-
/usr/bin/mkdirmkdir -p /usr/bin3⤵
- Reads runtime system information
PID:1603
-
-
-
/bin/shsh -c "cp -f /tmp/bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 /usr/bin/.sshd"2⤵PID:1604
-
/usr/bin/cpcp -f /tmp/bab61d0cbd2305656550c3a70330cb35_JaffaCakes118 /usr/bin/.sshd3⤵
- Write file to user bin folder
- Reads runtime system information
PID:1605
-
-
-
/bin/shsh -c /usr/bin/.sshd2⤵PID:1619
-
/usr/bin/.sshd/usr/bin/.sshd3⤵
- Executes dropped EXE
- Reads runtime system information
- Writes file to tmp directory
PID:1620
-
-
-
/bin/shsh -c "insmod /tmp/xpacket.ko"2⤵PID:1679
-
/usr/sbin/insmodinsmod /tmp/xpacket.ko3⤵
- Reads runtime system information
PID:1680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD5aaba406f0d022c08213b09da45314ea4
SHA15966c2d23463b12d9730469a47ed3285711dfd96
SHA2560b5a71b5422eebd279f07b5376fdd6e6e0240bd4fe1cdf449225004421ead1ee
SHA51208ce4bc9f32993a9ea296fc0c7ab292628a094f310babb853dffd1e020075ed6dab91601a2bf672817774a778eceb59f42cbcf84bc71189ac769098ebe56a659
-
Filesize
36B
MD5993cc15058142d96c3daf7852c3d5ee8
SHA10950b8b391b04dd3895ea33cd3141543ebd2525d
SHA2568171d077918611803d93088409f220c66fae1c670b297e1aa5d8cbd548ce9208
SHA5120c4256c00a3710f97e92581b552682b36b62afc35fe72622c491323c618c19ea62611ac04ccafc3dfcde2254a2ebbd93b69b66795b16e36332293bed83adb928
-
Filesize
73B
MD5a14cf3fc2481168aefc6f65da37cc4ca
SHA1eb51eba05300c92f52fed7fbcadf771d32fc84e1
SHA256c2a71ef12a45929f4bd6e8a349945b9762f95d55c53ac3939f145ba9106a69f4
SHA5124f96cac782b2aa8608f4f00006f5778d0161db09640e1e4e0925218e97756071de427e6a685486f5faeae2df34cff789d8bde0cdac88f8d7d7520d8a6ade1d42
-
Filesize
4B
MD570efba66d3d8d53194fb1a8446ae07fa
SHA18639c2e8c44d79a5afaf095aa46f9c9231829b72
SHA256679b0ecadd205e5143506d637aaec6849987ae11c8c8280fb79f4d1080326eec
SHA512a3da83439d2d568e7b2f953f17c00bf8003e8a52a0d0cbd43eb69dff4641698c3c98ea76e1a8ec0001c2cb0394030fd686c41834fb50e78e7e66bc28218c01a9
-
Filesize
4B
MD564f1f27bf1b4ec22924fd0acb550c235
SHA1e900ef91797870a3dc9213feb860f307c729e341
SHA25638f13ba4550b60ae975cb2a6efd68b795f4c026ea25b162d316a9d00182cd92d
SHA5123f5ea73f685a4a0d302dbcafdd85e13a4a0eb811f245c58f232f78f501eff69a7f03cf69a7ae05fe40ec870da7d58f4bdae564ea109dc0ccafe83389e559f5e8
-
Filesize
51B
MD5e173fe0ede36f280db9654a87dbc176b
SHA178cedb140a36b5c340e63dda1452057bdbd7eb00
SHA256ae3353de8e2347bfccff31a19b203169d2a0c16ca9ebd5079c0aadcceed45fdf
SHA5129b35652411f5e1bca1ba0c91ba3743deded47c42dc712726e996d7a5da446dddbabc1f168d5071e28c628d6f01f8fc361b80c9869c8788547fd5dc54839b77fa
-
Filesize
1.2MB
MD5bab61d0cbd2305656550c3a70330cb35
SHA1b4336029e368ecd4f881b499037fd5e0a5c59b69
SHA256d0cd564544266533d95bcda3fe25b09546719dd3a312e2c3383ccfae8e2b35c6
SHA512d5bc415ce576a508442e0756930520d3c36f3e7e1893cec26c56b771cb735ad4bb8afbabf9bf7f36153e861bd1c685b8a4f23ce34edfee97f6a57aa12aa01252
-
Filesize
163KB
MD5ab57b66cc531ae0f996963223e632b60
SHA1bf7e5becd33f21c2539f5a75ffa0ab61c49c8795
SHA2562484863a7bfda7f97b90bfd5dfceed4ec9f27dd51f9c5158c8daabbf4309b1df
SHA512908acef13f3c1d80b7169ec3b16bb67006013453348fff75550bc3c6c2137e798b21d7990edbd5be63d756d9c41b06160aebf38aa80547e4bafa3a62596057f6
-
Filesize
138KB
MD58146139c2ad7e550b1d1f49480997446
SHA1074db8890c3227bd8a588417f5b9bde637bcf3af
SHA256207df9d438f75185ab3af2ab1173d104831a6631c28ef40d38b2ab43de27b40f
SHA512b6d71d537f593b9af833e6f798e412e95fc486a313414ed8cca9639f61be7ac9dca700e9f861c0d07c7f65b3783127a67f829f422472cad8938ba01d397ab9de
-
Filesize
125KB
MD51b25ac945efae8520ba112b500e2d561
SHA18324c4d1d1427829266e82f203386232ff82af15
SHA2565eb16d9a8bc81fe767725874e3f67623b8e86b46ec93546be49c5b09d3ab4636
SHA512e191f967170ea4844f736c5ab75b7bf45fef3af34f0a4bef0d36475d646b0b089449fe39806664b9f6ce1984037687930cc368892230662c8c30f67fa3ac216e