Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
dYAd42NlXg.elf

Overview

General Information

Sample name:dYAd42NlXg.elf
renamed because original name is a hash value
Original sample name:c24b11f45ca54f695664065ae09fdadb.elf
Analysis ID:1417439
MD5:c24b11f45ca54f695664065ae09fdadb
SHA1:e1845930b9052bb0b28058d38481449a61b88bf8
SHA256:e2b956e886fec121af094023145bfd5de995a2ba676a4542b48c492c2ed164b7
Tags:32elfmiraipowerpc
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Reads CPU information from /proc indicative of miner or evasive malware
Reads system information from the proc file system
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1417439
Start date and time:2024-03-29 09:53:00 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 36s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:dYAd42NlXg.elf
renamed because original name is a hash value
Original Sample Name:c24b11f45ca54f695664065ae09fdadb.elf
Detection:MAL
Classification:mal52.troj.linELF@0/0@1/0
Command:/tmp/dYAd42NlXg.elf
PID:5542
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
carico_di_insetti.
Standard Error:
  • system is lnxubuntu20
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: dYAd42NlXg.elfReversingLabs: Detection: 39%
Source: dYAd42NlXg.elfVirustotal: Detection: 41%Perma Link
Source: /tmp/dYAd42NlXg.elf (PID: 5544)Reads CPU info from proc file: /proc/cpuinfoJump to behavior

Networking

barindex
Source: global trafficTCP traffic: 185.196.8.213 ports 59432,6,7,8,9,6789
Source: global trafficTCP traffic: 192.168.2.14:43276 -> 185.196.8.213:6789
Source: /tmp/dYAd42NlXg.elf (PID: 5542)Socket: 127.0.0.1::46157Jump to behavior
Source: unknownDNS traffic detected: queries for: jhbaghjbasdg.shop
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.troj.linELF@0/0@1/0
Source: /tmp/dYAd42NlXg.elf (PID: 5544)Reads from proc file: /proc/cpuinfoJump to behavior
Source: /tmp/dYAd42NlXg.elf (PID: 5544)Reads CPU info from proc file: /proc/cpuinfoJump to behavior
Source: /tmp/dYAd42NlXg.elf (PID: 5542)Queries kernel information via 'uname': Jump to behavior
Source: dYAd42NlXg.elf, 5542.1.000055d6d656c000.000055d6d661c000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc11!hotpluggableq
Source: dYAd42NlXg.elf, 5546.1.000055d6d656c000.000055d6d661c000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc1
Source: dYAd42NlXg.elf, 5542.1.00007fff3f04c000.00007fff3f06d000.rw-.sdmp, dYAd42NlXg.elf, 5546.1.00007fff3f04c000.00007fff3f06d000.rw-.sdmpBinary or memory string: +x86_64/usr/bin/qemu-ppc/tmp/dYAd42NlXg.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/dYAd42NlXg.elf
Source: dYAd42NlXg.elf, 5542.1.000055d6d656c000.000055d6d661c000.rw-.sdmp, dYAd42NlXg.elf, 5546.1.000055d6d656c000.000055d6d661c000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
Source: dYAd42NlXg.elf, 5542.1.00007fff3f04c000.00007fff3f06d000.rw-.sdmp, dYAd42NlXg.elf, 5546.1.00007fff3f04c000.00007fff3f06d000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1417439 Sample: dYAd42NlXg.elf Startdate: 29/03/2024 Architecture: LINUX Score: 52 16 jhbaghjbasdg.shop 185.196.8.213, 43276, 56090, 59432 SIMPLECARRER2IT Switzerland 2->16 18 Multi AV Scanner detection for submitted file 2->18 20 Connects to many ports of the same IP (likely port scanning) 2->20 8 dYAd42NlXg.elf 2->8         started        signatures3 process4 process5 10 dYAd42NlXg.elf 8->10         started        process6 12 dYAd42NlXg.elf 10->12         started        14 dYAd42NlXg.elf 10->14         started       
SourceDetectionScannerLabelLink
dYAd42NlXg.elf39%ReversingLabsLinux.Trojan.Mirai
dYAd42NlXg.elf41%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
jhbaghjbasdg.shop
185.196.8.213
truetrue
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    185.196.8.213
    jhbaghjbasdg.shopSwitzerland
    34888SIMPLECARRER2ITtrue
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    185.196.8.21363PPG1bWEo.elfGet hashmaliciousUnknownBrowse
      mZFiaBnsij.elfGet hashmaliciousUnknownBrowse
        JWfFVrymKr.elfGet hashmaliciousMiraiBrowse
          CgJxT081Ih.elfGet hashmaliciousUnknownBrowse
            shuJBFmlV9.elfGet hashmaliciousUnknownBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              jhbaghjbasdg.shop63PPG1bWEo.elfGet hashmaliciousUnknownBrowse
              • 185.196.8.213
              mZFiaBnsij.elfGet hashmaliciousUnknownBrowse
              • 185.196.8.213
              CgJxT081Ih.elfGet hashmaliciousUnknownBrowse
              • 185.196.8.213
              shuJBFmlV9.elfGet hashmaliciousUnknownBrowse
              • 185.196.8.213
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              SIMPLECARRER2IT63PPG1bWEo.elfGet hashmaliciousUnknownBrowse
              • 185.196.8.213
              mZFiaBnsij.elfGet hashmaliciousUnknownBrowse
              • 185.196.8.213
              Rechnung.pdf.lnkGet hashmaliciousVidarBrowse
              • 185.196.8.158
              JWfFVrymKr.elfGet hashmaliciousMiraiBrowse
              • 185.196.8.213
              CgJxT081Ih.elfGet hashmaliciousUnknownBrowse
              • 185.196.8.213
              shuJBFmlV9.elfGet hashmaliciousUnknownBrowse
              • 185.196.8.213
              nR4nUPI5Eo.exeGet hashmaliciousSocks5SystemzBrowse
              • 185.196.8.22
              file.exeGet hashmaliciousSocks5SystemzBrowse
              • 185.196.8.22
              07ckZTU13U.exeGet hashmaliciousSocks5SystemzBrowse
              • 185.196.8.22
              LUFkhhOJGJ.exeGet hashmaliciousPhonk Miner, XmrigBrowse
              • 185.196.8.200
              No context
              No context
              No created / dropped files found
              File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
              Entropy (8bit):6.226422169759049
              TrID:
              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
              File name:dYAd42NlXg.elf
              File size:68'212 bytes
              MD5:c24b11f45ca54f695664065ae09fdadb
              SHA1:e1845930b9052bb0b28058d38481449a61b88bf8
              SHA256:e2b956e886fec121af094023145bfd5de995a2ba676a4542b48c492c2ed164b7
              SHA512:4ba5cc2863b68ada42121f1594d7450511d42fb1fdeb2ecf0e8cb73b3b66d8d6cc0b1a0c0518bcb7495f63c3d751b46494f44fa49e6df41c62660b620da48967
              SSDEEP:1536:LZ7p7mt16/ixcYjxYI/s5HvFmuvSZI378MwiJy:bo1VrqyZIL8eJy
              TLSH:A9634A02731C0A47C1736EB42A3F53E183FFAA9121F4BA84651E9B469275E371686FCD
              File Content Preview:.ELF...........................4.........4. ...(.......................0...0...............4...4...4......&.........dt.Q.............................!..|......$H...H......$8!. |...N.. .!..|.......?.............../...@..\?......L.+../...A..$8...}).....LN..

              ELF header

              Class:ELF32
              Data:2's complement, big endian
              Version:1 (current)
              Machine:PowerPC
              Version Number:0x1
              Type:EXEC (Executable file)
              OS/ABI:UNIX - System V
              ABI Version:0
              Entry Point Address:0x100001f0
              Flags:0x0
              ELF Header Size:52
              Program Header Offset:52
              Program Header Size:32
              Number of Program Headers:3
              Section Header Offset:67732
              Section Header Size:40
              Number of Section Headers:12
              Header String Table Index:11
              NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
              NULL0x00x00x00x00x0000
              .initPROGBITS0x100000940x940x240x00x6AX004
              .textPROGBITS0x100000b80xb80xeb580x00x6AX004
              .finiPROGBITS0x1000ec100xec100x200x00x6AX004
              .rodataPROGBITS0x1000ec300xec300x18000x00x2A008
              .ctorsPROGBITS0x100204340x104340x80x00x3WA004
              .dtorsPROGBITS0x1002043c0x1043c0x80x00x3WA004
              .dataPROGBITS0x100204480x104480x3bc0x00x3WA008
              .sdataPROGBITS0x100208040x108040x440x00x3WA004
              .sbssNOBITS0x100208480x108480x540x00x3WA004
              .bssNOBITS0x1002089c0x108480x219c0x00x3WA004
              .shstrtabSTRTAB0x00x108480x4b0x00x0001
              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
              LOAD0x00x100000000x100000000x104300x104306.27070x5R E0x10000.init .text .fini .rodata
              LOAD0x104340x100204340x100204340x4140x26043.21520x6RW 0x10000.ctors .dtors .data .sdata .sbss .bss
              GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
              TimestampSource PortDest PortSource IPDest IP
              Mar 29, 2024 09:53:55.191400051 CET432766789192.168.2.14185.196.8.213
              Mar 29, 2024 09:53:55.378983021 CET678943276185.196.8.213192.168.2.14
              Mar 29, 2024 09:53:55.379153013 CET432766789192.168.2.14185.196.8.213
              Mar 29, 2024 09:53:55.380774975 CET432766789192.168.2.14185.196.8.213
              Mar 29, 2024 09:53:55.381396055 CET432766789192.168.2.14185.196.8.213
              Mar 29, 2024 09:53:55.567370892 CET678943276185.196.8.213192.168.2.14
              Mar 29, 2024 09:53:55.567615986 CET678943276185.196.8.213192.168.2.14
              Mar 29, 2024 09:53:55.567806005 CET432766789192.168.2.14185.196.8.213
              Mar 29, 2024 09:53:55.579718113 CET5609059432192.168.2.14185.196.8.213
              Mar 29, 2024 09:53:55.766472101 CET5943256090185.196.8.213192.168.2.14
              Mar 29, 2024 09:53:55.766561985 CET5609059432192.168.2.14185.196.8.213
              Mar 29, 2024 09:53:55.766855001 CET5609059432192.168.2.14185.196.8.213
              Mar 29, 2024 09:53:55.957187891 CET5943256090185.196.8.213192.168.2.14
              Mar 29, 2024 09:53:55.957479954 CET5609059432192.168.2.14185.196.8.213
              Mar 29, 2024 09:53:56.144928932 CET5943256090185.196.8.213192.168.2.14
              Mar 29, 2024 09:54:05.776499987 CET5609059432192.168.2.14185.196.8.213
              Mar 29, 2024 09:54:05.962948084 CET5943256090185.196.8.213192.168.2.14
              Mar 29, 2024 09:54:05.963052988 CET5943256090185.196.8.213192.168.2.14
              Mar 29, 2024 09:54:05.963128090 CET5609059432192.168.2.14185.196.8.213
              Mar 29, 2024 09:54:21.224596024 CET5943256090185.196.8.213192.168.2.14
              Mar 29, 2024 09:54:21.224772930 CET5609059432192.168.2.14185.196.8.213
              Mar 29, 2024 09:54:36.412643909 CET5943256090185.196.8.213192.168.2.14
              Mar 29, 2024 09:54:36.412734985 CET5609059432192.168.2.14185.196.8.213
              Mar 29, 2024 09:54:51.600531101 CET5943256090185.196.8.213192.168.2.14
              Mar 29, 2024 09:54:51.600702047 CET5609059432192.168.2.14185.196.8.213
              Mar 29, 2024 09:55:06.002403021 CET5609059432192.168.2.14185.196.8.213
              Mar 29, 2024 09:55:06.189368963 CET5943256090185.196.8.213192.168.2.14
              Mar 29, 2024 09:55:06.189604998 CET5609059432192.168.2.14185.196.8.213
              Mar 29, 2024 09:55:21.384618998 CET5943256090185.196.8.213192.168.2.14
              Mar 29, 2024 09:55:21.384740114 CET5609059432192.168.2.14185.196.8.213
              Mar 29, 2024 09:55:36.572407007 CET5943256090185.196.8.213192.168.2.14
              Mar 29, 2024 09:55:36.572550058 CET5609059432192.168.2.14185.196.8.213
              Mar 29, 2024 09:55:51.760409117 CET5943256090185.196.8.213192.168.2.14
              Mar 29, 2024 09:55:51.760602951 CET5609059432192.168.2.14185.196.8.213
              TimestampSource PortDest PortSource IPDest IP
              Mar 29, 2024 09:53:55.383449078 CET4111053192.168.2.148.8.8.8
              Mar 29, 2024 09:53:55.579133034 CET53411108.8.8.8192.168.2.14
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Mar 29, 2024 09:53:55.383449078 CET192.168.2.148.8.8.80x3829Standard query (0)jhbaghjbasdg.shopA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Mar 29, 2024 09:53:55.579133034 CET8.8.8.8192.168.2.140x3829No error (0)jhbaghjbasdg.shop185.196.8.213A (IP address)IN (0x0001)false

              System Behavior

              Start time (UTC):08:53:54
              Start date (UTC):29/03/2024
              Path:/tmp/dYAd42NlXg.elf
              Arguments:/tmp/dYAd42NlXg.elf
              File size:5388968 bytes
              MD5 hash:ae65271c943d3451b7f026d1fadccea6

              Start time (UTC):08:53:54
              Start date (UTC):29/03/2024
              Path:/tmp/dYAd42NlXg.elf
              Arguments:-
              File size:5388968 bytes
              MD5 hash:ae65271c943d3451b7f026d1fadccea6

              Start time (UTC):08:53:54
              Start date (UTC):29/03/2024
              Path:/tmp/dYAd42NlXg.elf
              Arguments:-
              File size:5388968 bytes
              MD5 hash:ae65271c943d3451b7f026d1fadccea6

              Start time (UTC):08:53:54
              Start date (UTC):29/03/2024
              Path:/tmp/dYAd42NlXg.elf
              Arguments:-
              File size:5388968 bytes
              MD5 hash:ae65271c943d3451b7f026d1fadccea6