Analysis
-
max time kernel
148s -
max time network
151s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
05-11-2024 02:40
Behavioral task
behavioral1
Sample
3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf
Resource
debian9-armhf-20240611-en
General
-
Target
3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf
-
Size
5.1MB
-
MD5
8bd999abd9893c4be18600f481b04ad3
-
SHA1
10080f79cd6bed96cb3c35e896443c37460b10bf
-
SHA256
3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0
-
SHA512
81601a5cfa807f87628bc75aa16c7d9a4d052961e33e0423bffd520063fcb399f79ba6594715704e2dc8926989fd1293a5842c8cd08a60f4fed55fb88e519c09
-
SSDEEP
98304:8cSBHdgN2a7JP97kJru8cYWPAXqDu+60:8cS03Lu+6
Malware Config
Extracted
kaiji
78789.dns.army:7850
Signatures
-
Kaiji 1 IoCs
Kaiji payload
Processes:
resource yara_rule /etc/id.services.conf Kaiji -
Kaiji family
-
kaiji_chaosbot 1 IoCs
Chaos-variant payload
Processes:
resource yara_rule /etc/id.services.conf kaiji_chaosbot -
Executes dropped EXE 7 IoCs
Processes:
32678id.services.confid.services.conf32678id.services.confid.services.conf32678ioc pid process /etc/32678 675 32678 /etc/id.services.conf 814 id.services.conf /etc/id.services.conf 821 id.services.conf /etc/32678 822 32678 /etc/id.services.conf 853 id.services.conf /etc/id.services.conf 860 id.services.conf /etc/32678 861 32678 -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
Processes:
3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elfdescription ioc process File opened for modification /dev/watchdog 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for modification /dev/misc/watchdog 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Creates/modifies environment variables 1 TTPs 3 IoCs
Creating/modifying environment variables is a common persistence mechanism.
Processes:
3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elfdescription ioc process File opened for modification /etc/profile.d/bash_config.sh 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for modification /etc/profile.d/bash_config 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for modification /etc/profile.d/linux.sh 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf -
Enumerates running processes
Discovers information about currently running processes on the system
-
Processes:
3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elfdescription ioc process File opened for modification /etc/init.d/linux_kill 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for modification /etc/init.d/ssh 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf -
Write file to user bin folder 1 IoCs
Processes:
3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elfdescription ioc process File opened for modification /usr/bin/find 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf -
Modifies Bash startup script 2 TTPs 3 IoCs
Processes:
3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elfdescription ioc process File opened for modification /etc/profile.d/bash_config.sh 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for modification /etc/profile.d/bash_config 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for modification /etc/profile.d/linux.sh 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf -
Changes its process name 1 IoCs
Processes:
3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elfdescription ioc pid process Changes the process name, possibly in an attempt to hide itself ksoftirqd/0 682 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf -
Reads CPU attributes 1 TTPs 2 IoCs
Processes:
pkillpkilldescription ioc process File opened for reading /sys/devices/system/cpu/online pkill File opened for reading /sys/devices/system/cpu/online pkill -
Enumerates kernel/hardware configuration 1 TTPs 20 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
Processes:
3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elfsystemctlsystemctlsystemctlid.services.confid.services.confsystemctlsystemctlsystemctlsystemctlsystemctlsystemctlsystemctl3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elfsystemctlid.services.confsystemctlsystemctlid.services.confsystemctldescription ioc process File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size id.services.conf File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size id.services.conf File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size id.services.conf File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/kernel/mm/transparent_hugepage/hpage_pmd_size id.services.conf File opened for reading /sys/fs/kdbus/0-system/bus systemctl -
Processes:
pkillsystemctlpkill3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elfsystemctlsystemctlsystemctlsystemctldescription ioc process File opened for reading /proc/29/status pkill File opened for reading /proc/652/cmdline pkill File opened for reading /proc/1/environ systemctl File opened for reading /proc/154/status pkill File opened for reading /proc/161/status pkill File opened for reading /proc/651/stat 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /proc/660/stat 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /proc/26/status pkill File opened for reading /proc/325/cmdline pkill File opened for reading /proc/25/cmdline pkill File opened for reading /proc/120/status pkill File opened for reading /proc/607/stat 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /proc/self/stat systemctl File opened for reading /proc/758/stat 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /proc/21/status pkill File opened for reading /proc/29/cmdline pkill File opened for reading /proc/154/cmdline pkill File opened for reading /proc/659/status pkill File opened for reading /proc/603/status pkill File opened for reading /proc/self/stat systemctl File opened for reading /proc/self/stat systemctl File opened for reading /proc/675/stat 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /proc/279/status pkill File opened for reading /proc/293/status pkill File opened for reading /proc/7/status pkill File opened for reading /proc/22/status pkill File opened for reading /proc/27/cmdline pkill File opened for reading /proc/293/stat 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /proc/cmdline systemctl File opened for reading /proc/792/stat 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /proc/12/status pkill File opened for reading /proc/17/cmdline pkill File opened for reading /proc/853/cmdline pkill File opened for reading /proc/665/stat 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /proc/1/environ systemctl File opened for reading /proc/5/status pkill File opened for reading /proc/8/status pkill File opened for reading /proc/12/cmdline pkill File opened for reading /proc/27/status pkill File opened for reading /proc/876/stat 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /proc/10/status pkill File opened for reading /proc/587/cmdline pkill File opened for reading /proc/834/stat 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /proc/818/cmdline pkill File opened for reading /proc/18/status pkill File opened for reading /proc/filesystems systemctl File opened for reading /proc/325/cmdline pkill File opened for reading /proc/608/cmdline pkill File opened for reading /proc/346/status pkill File opened for reading /proc/41/cmdline pkill File opened for reading /proc/607/cmdline pkill File opened for reading /proc/837/status pkill File opened for reading /proc/857/cmdline pkill File opened for reading /proc/603/stat 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /proc/3/status pkill File opened for reading /proc/11/cmdline pkill File opened for reading /proc/873/stat 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /proc/651/status pkill File opened for reading /proc/819/stat 3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf File opened for reading /proc/652/cmdline pkill File opened for reading /proc/3/cmdline pkill File opened for reading /proc/112/status pkill File opened for reading /proc/161/status pkill File opened for reading /proc/607/status pkill -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 6 Go-http-client/1.1
Processes
-
/tmp/3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf/tmp/3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf1⤵
- Enumerates kernel/hardware configuration
PID:653 -
/bin/shsh -c "/etc/32678&"2⤵PID:670
-
/etc/32678/etc/326783⤵
- Executes dropped EXE
PID:675 -
/bin/sleepsleep 604⤵PID:678
-
-
/etc/id.services.conf/etc/id.services.conf4⤵
- Executes dropped EXE
- Enumerates kernel/hardware configuration
PID:814 -
/usr/bin/pkillpkill -9 326785⤵
- Reads CPU attributes
- Reads runtime system information
PID:818
-
-
/bin/shsh -c "/etc/32678&"5⤵PID:819
-
-
/usr/sbin/serviceservice crond start5⤵PID:820
-
/usr/bin/basenamebasename /usr/sbin/service6⤵PID:823
-
-
/usr/bin/basenamebasename /usr/sbin/service6⤵PID:825
-
-
/bin/systemctlsystemctl --quiet is-active multi-user.target6⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:829
-
-
/bin/systemctlsystemctl list-unit-files --full "--type=socket"6⤵
- Enumerates kernel/hardware configuration
PID:831
-
-
/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"6⤵PID:832
-
-
-
/etc/id.services.conf/etc/id.services.conf " "5⤵
- Executes dropped EXE
- Enumerates kernel/hardware configuration
PID:821
-
-
-
-
-
/usr/sbin/serviceservice crond start2⤵PID:671
-
/usr/bin/basenamebasename /usr/sbin/service3⤵PID:677
-
-
/usr/bin/basenamebasename /usr/sbin/service3⤵PID:684
-
-
/bin/systemctlsystemctl --quiet is-active multi-user.target3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:689
-
-
/bin/systemctlsystemctl list-unit-files --full "--type=socket"3⤵
- Enumerates kernel/hardware configuration
PID:695
-
-
/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"3⤵PID:696
-
-
-
/tmp/3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf/tmp/3bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0.elf " "2⤵
- Modifies Watchdog functionality
- Creates/modifies environment variables
- Modifies init.d
- Write file to user bin folder
- Modifies Bash startup script
- Changes its process name
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:672 -
/usr/sbin/update-rc.dupdate-rc.d linux_kill defaults3⤵PID:691
-
/usr/local/sbin/systemctlsystemctl daemon-reload4⤵PID:699
-
-
/usr/local/bin/systemctlsystemctl daemon-reload4⤵PID:699
-
-
/usr/sbin/systemctlsystemctl daemon-reload4⤵PID:699
-
-
/usr/bin/systemctlsystemctl daemon-reload4⤵PID:699
-
-
/sbin/systemctlsystemctl daemon-reload4⤵PID:699
-
-
/bin/systemctlsystemctl daemon-reload4⤵
- Enumerates kernel/hardware configuration
PID:699
-
-
-
/bin/bashbash -c "echo \"*/1 * * * * root /.img \" >> /etc/crontab"3⤵
- Creates/modifies Cron job
PID:705
-
-
/usr/bin/renicerenice -20 6723⤵PID:706
-
-
/bin/mountmount -o bind /tmp/ /proc/6723⤵PID:707
-
-
/usr/sbin/serviceservice cron start3⤵PID:708
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:709
-
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:710
-
-
/bin/systemctlsystemctl --quiet is-active multi-user.target4⤵
- Enumerates kernel/hardware configuration
PID:711
-
-
/bin/systemctlsystemctl list-unit-files --full "--type=socket"4⤵
- Enumerates kernel/hardware configuration
PID:713
-
-
/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"4⤵PID:714
-
-
-
/usr/local/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:708
-
-
/usr/local/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:708
-
-
/usr/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:708
-
-
/usr/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:708
-
-
/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵PID:708
-
-
/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start cron.service3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:708
-
-
/bin/systemctlsystemctl start crond.service3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:715
-
-
-
/usr/local/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:671
-
/usr/local/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:671
-
/usr/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:671
-
/usr/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:671
-
/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:671
-
/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵
- Enumerates kernel/hardware configuration
PID:671
-
/etc/32678/etc/326781⤵
- Executes dropped EXE
PID:822 -
/bin/sleepsleep 602⤵PID:824
-
-
/etc/id.services.conf/etc/id.services.conf2⤵
- Executes dropped EXE
- Enumerates kernel/hardware configuration
PID:853 -
/usr/bin/pkillpkill -9 326783⤵
- Reads CPU attributes
- Reads runtime system information
PID:857
-
-
/bin/shsh -c "/etc/32678&"3⤵PID:858
-
-
/usr/sbin/serviceservice crond start3⤵PID:859
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:862
-
-
/usr/bin/basenamebasename /usr/sbin/service4⤵PID:864
-
-
/bin/systemctlsystemctl --quiet is-active multi-user.target4⤵
- Enumerates kernel/hardware configuration
PID:868
-
-
/bin/systemctlsystemctl list-unit-files --full "--type=socket"4⤵
- Enumerates kernel/hardware configuration
PID:870
-
-
/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"4⤵PID:871
-
-
-
/etc/id.services.conf/etc/id.services.conf " "3⤵
- Executes dropped EXE
- Enumerates kernel/hardware configuration
PID:860
-
-
-
/usr/local/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:820
-
/usr/local/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:820
-
/usr/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:820
-
/usr/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:820
-
/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:820
-
/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:820
-
/etc/32678/etc/326781⤵
- Executes dropped EXE
PID:861 -
/bin/sleepsleep 602⤵PID:863
-
-
/usr/local/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:859
-
/usr/local/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:859
-
/usr/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:859
-
/usr/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:859
-
/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵PID:859
-
/bin/systemctlsystemctl "--job-mode=ignore-dependencies" start crond.service1⤵
- Enumerates kernel/hardware configuration
PID:859
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
1RC Scripts
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
2Boot or Logon Initialization Scripts
1RC Scripts
1Event Triggered Execution
1Unix Shell Configuration Modification
1Hijack Execution Flow
1Path Interception by PATH Environment Variable
1Scheduled Task/Job
1Cron
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5d73d3376908ea075a939e3871ad0fabe
SHA1320ff65831247ba199515f1b94df26cc8a3e5f76
SHA256edbdabe30d8236a2c0a4eb89dfd597552130e4c1a4e93f8fe1568920442ad73a
SHA51257b83fef88620598beb5d65626bf757d0abef242d2d6a01796a61474dedc5095a4a9d0f292b6abb450cad3d4410ab8456253600f58ddb66cfe6d79e1c8415536
-
Filesize
61B
MD5768eaf287796da19e1cf5e0b2fb1b161
SHA16a1ce2ee5ccc86d1f33806feb14547b35290df2a
SHA2561d22620dfb2a6715e5d745aed5cf841ede0e75e1747f12b9b925a2d346bc7ecb
SHA512e6af30c9df4f7f47696069511e64ecbc8e841629d692ee4056503df3533fb7a7a74960698826260355e1dba7b6c562482a27a39bb51a4237473ce4b68472d620
-
Filesize
5.1MB
MD58bd999abd9893c4be18600f481b04ad3
SHA110080f79cd6bed96cb3c35e896443c37460b10bf
SHA2563bd7660e77cbac4a9c8e0d85c03fe144ff34177087dc739e2b66a1293653aeb0
SHA51281601a5cfa807f87628bc75aa16c7d9a4d052961e33e0423bffd520063fcb399f79ba6594715704e2dc8926989fd1293a5842c8cd08a60f4fed55fb88e519c09
-
Filesize
189B
MD53909975f7cc0d1121c1819b800069f31
SHA13e68de708c2e6c40fab6794afdee3104e5590189
SHA2566876dac71f13a068afb863d257134275f2edba43b2acaf4924fabf97c079070b
SHA51250600cceeb03b05f45ae61d890caee9f51ff390b6776930866e527e071d65d08241fc66673fd9b99d62fbc77d3c00fc3de4d7378cbc42f5daba5d83072b0906e
-
Filesize
37B
MD5cfb4e51061485fe91169381fbdc1538e
SHA19a85b9b766a15b01737a41d680e4593b7a9bde87
SHA256897f37267d0ceaa2fbdaa09847f5d08e6f8b01a0348a0d666264b0f10acd0c90
SHA512fb154ec711d2090a7461da4db8ddad2b522649a27e74162ecb203f539b1729430288bc02d78d2071bde9c4bbc005693403a57612ef50277d52f816cb94524216