Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
z3u7dnBStL.elf

Overview

General Information

Sample name:z3u7dnBStL.elf
renamed because original name is a hash value
Original sample name:bf1200bf14f6b52ed1ef8b75568b7753.elf
Analysis ID:1426699
MD5:bf1200bf14f6b52ed1ef8b75568b7753
SHA1:6e26847636874e541cfb48c8adde88b8cff17e1c
SHA256:4ea6db5fae8679b110af1cca107bcf470b60c1066881bcd25aadfe70332b73a6
Tags:32armelfmirai
Infos:

Detection

Mirai
Score:72
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Mirai
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Exit code information suggests that the sample terminated abnormally, try to lookup the sample's target architecture.
Non-zero exit code suggests an error during the execution. Lookup the error code for hints.
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1426699
Start date and time:2024-04-16 14:02:21 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:z3u7dnBStL.elf
renamed because original name is a hash value
Original Sample Name:bf1200bf14f6b52ed1ef8b75568b7753.elf
Detection:MAL
Classification:mal72.troj.linELF@0/0@2/0
Command:/tmp/z3u7dnBStL.elf
PID:5517
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • z3u7dnBStL.elf (PID: 5517, Parent: 5441, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/z3u7dnBStL.elf
  • dash New Fork (PID: 5606, Parent: 3670)
  • rm (PID: 5606, Parent: 3670, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.quJnwvWnw9 /tmp/tmp.0asyiAsN19 /tmp/tmp.sNxz6L6XVy
  • dash New Fork (PID: 5608, Parent: 3670)
  • rm (PID: 5608, Parent: 3670, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.quJnwvWnw9 /tmp/tmp.0asyiAsN19 /tmp/tmp.sNxz6L6XVy
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
z3u7dnBStL.elfJoeSecurity_Mirai_5Yara detected MiraiJoe Security
    z3u7dnBStL.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
    • 0x15984:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15998:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x159ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x159c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x159d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x159e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x159fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15a10:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15a24:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15a38:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15a4c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15a60:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15a74:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15a88:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15a9c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15ab0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15ac4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15ad8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15aec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15b00:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    • 0x15b14:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
    z3u7dnBStL.elfMAL_ELF_LNX_Mirai_Oct10_2Detects ELF malware Mirai relatedFlorian Roth
    • 0x15904:$c01: 50 4F 53 54 20 2F 63 64 6E 2D 63 67 69 2F 00 00 20 48 54 54 50 2F 31 2E 31 0D 0A 55 73 65 72 2D 41 67 65 6E 74 3A 20 00 0D 0A 48 6F 73 74 3A
    SourceRuleDescriptionAuthorStrings
    5517.1.00007f07f4017000.00007f07f402f000.r-x.sdmpJoeSecurity_Mirai_5Yara detected MiraiJoe Security
      5517.1.00007f07f4017000.00007f07f402f000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x15984:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15998:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x159ac:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x159c0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x159d4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x159e8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x159fc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15a10:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15a24:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15a38:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15a4c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15a60:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15a74:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15a88:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15a9c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15ab0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15ac4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15ad8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15aec:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15b00:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x15b14:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      5517.1.00007f07f4017000.00007f07f402f000.r-x.sdmpMAL_ELF_LNX_Mirai_Oct10_2Detects ELF malware Mirai relatedFlorian Roth
      • 0x15904:$c01: 50 4F 53 54 20 2F 63 64 6E 2D 63 67 69 2F 00 00 20 48 54 54 50 2F 31 2E 31 0D 0A 55 73 65 72 2D 41 67 65 6E 74 3A 20 00 0D 0A 48 6F 73 74 3A
      Process Memory Space: z3u7dnBStL.elf PID: 5517Linux_Trojan_Gafgyt_28a2fe0cunknownunknown
      • 0x103:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x117:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x12b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x13f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x153:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x167:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x17b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x18f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1a3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1b7:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1cb:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1df:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x1f3:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x207:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x21b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x22f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x243:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x257:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x26b:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x27f:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      • 0x293:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: z3u7dnBStL.elfAvira: detected
      Source: z3u7dnBStL.elfVirustotal: Detection: 67%Perma Link
      Source: z3u7dnBStL.elfReversingLabs: Detection: 68%
      Source: unknownTCP traffic detected without corresponding DNS query: 54.247.62.1
      Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
      Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
      Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
      Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
      Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
      Source: unknownTCP traffic detected without corresponding DNS query: 34.254.182.186
      Source: unknownDNS traffic detected: queries for: daisy.ubuntu.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 44530
      Source: unknownNetwork traffic detected: HTTP traffic on port 44530 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 52466 -> 443

      System Summary

      barindex
      Source: z3u7dnBStL.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: z3u7dnBStL.elf, type: SAMPLEMatched rule: Detects ELF malware Mirai related Author: Florian Roth
      Source: 5517.1.00007f07f4017000.00007f07f402f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: 5517.1.00007f07f4017000.00007f07f402f000.r-x.sdmp, type: MEMORYMatched rule: Detects ELF malware Mirai related Author: Florian Roth
      Source: Process Memory Space: z3u7dnBStL.elf PID: 5517, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
      Source: ELF static info symbol of initial sample.symtab present: no
      Source: z3u7dnBStL.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: z3u7dnBStL.elf, type: SAMPLEMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
      Source: 5517.1.00007f07f4017000.00007f07f402f000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: 5517.1.00007f07f4017000.00007f07f402f000.r-x.sdmp, type: MEMORYMatched rule: MAL_ELF_LNX_Mirai_Oct10_2 date = 2018-10-27, hash1 = fa0018e75f503f9748a5de0d14d4358db234f65e28c31c8d5878cc58807081c9, author = Florian Roth, description = Detects ELF malware Mirai related, reference = Internal Research
      Source: Process Memory Space: z3u7dnBStL.elf PID: 5517, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
      Source: classification engineClassification label: mal72.troj.linELF@0/0@2/0
      Source: /usr/bin/dash (PID: 5606)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.quJnwvWnw9 /tmp/tmp.0asyiAsN19 /tmp/tmp.sNxz6L6XVyJump to behavior
      Source: /usr/bin/dash (PID: 5608)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.quJnwvWnw9 /tmp/tmp.0asyiAsN19 /tmp/tmp.sNxz6L6XVyJump to behavior
      Source: /tmp/z3u7dnBStL.elf (PID: 5517)Queries kernel information via 'uname': Jump to behavior
      Source: z3u7dnBStL.elf, 5517.1.000055d7d85c7000.000055d7d86f5000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
      Source: z3u7dnBStL.elf, 5517.1.00007ffca98a9000.00007ffca98ca000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-arm/tmp/z3u7dnBStL.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/z3u7dnBStL.elf
      Source: z3u7dnBStL.elf, 5517.1.000055d7d85c7000.000055d7d86f5000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
      Source: z3u7dnBStL.elf, 5517.1.00007ffca98a9000.00007ffca98ca000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
      Source: z3u7dnBStL.elf, 5517.1.00007ffca98a9000.00007ffca98ca000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: z3u7dnBStL.elf, type: SAMPLE
      Source: Yara matchFile source: 5517.1.00007f07f4017000.00007f07f402f000.r-x.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: z3u7dnBStL.elf, type: SAMPLE
      Source: Yara matchFile source: 5517.1.00007f07f4017000.00007f07f402f000.r-x.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
      File Deletion
      OS Credential Dumping11
      Security Software Discovery
      Remote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      No configs have been found
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Number of created Files
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      z3u7dnBStL.elf68%VirustotalBrowse
      z3u7dnBStL.elf68%ReversingLabsLinux.Trojan.Mirai
      z3u7dnBStL.elf100%AviraEXP/ELF.Mirai.Z.A
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      daisy.ubuntu.com
      162.213.35.25
      truefalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        34.254.182.186
        unknownUnited States
        16509AMAZON-02USfalse
        54.247.62.1
        unknownUnited States
        16509AMAZON-02USfalse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        34.254.182.186YE6HFLEfb4.elfGet hashmaliciousUnknownBrowse
          00kDn01FGP.elfGet hashmaliciousMiraiBrowse
            F5owD542qK.elfGet hashmaliciousMiraiBrowse
              6nuXoz7rzo.elfGet hashmaliciousGafgyt, MiraiBrowse
                CT9oaKX3q3.elfGet hashmaliciousUnknownBrowse
                  xulknaY6vd.elfGet hashmaliciousMirai, MoobotBrowse
                    gEqPcxJPs4.elfGet hashmaliciousGafgyt, MiraiBrowse
                      vlxx.x86_64-20240413-0016.elfGet hashmaliciousMiraiBrowse
                        Lu3hmMeb1i.elfGet hashmaliciousGafgytBrowse
                          tGUvOmucT1.elfGet hashmaliciousMiraiBrowse
                            54.247.62.1YE6HFLEfb4.elfGet hashmaliciousUnknownBrowse
                              0nfIIyGr0B.elfGet hashmaliciousMiraiBrowse
                                OurfOY2sbZ.elfGet hashmaliciousMiraiBrowse
                                  xulknaY6vd.elfGet hashmaliciousMirai, MoobotBrowse
                                    SecuriteInfo.com.Linux.Siggen.9999.13380.14766.elfGet hashmaliciousUnknownBrowse
                                      mJDl3m5Wmt.elfGet hashmaliciousMiraiBrowse
                                        DkVBuCb3gf.elfGet hashmaliciousMiraiBrowse
                                          HuQOCdLGIt.elfGet hashmaliciousMiraiBrowse
                                            ZOOFmp9o18.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              b5PyI4OVjJ.elfGet hashmaliciousMirai, GafgytBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                daisy.ubuntu.comB7cl2k3l7y.elfGet hashmaliciousUnknownBrowse
                                                • 162.213.35.25
                                                YE6HFLEfb4.elfGet hashmaliciousUnknownBrowse
                                                • 162.213.35.25
                                                l93FFq2FQj.elfGet hashmaliciousUnknownBrowse
                                                • 162.213.35.25
                                                Cm7GbQyTGv.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.24
                                                VxMFqinCKK.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.25
                                                00kDn01FGP.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.24
                                                oSPPLmZbTe.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.25
                                                gK2yAWsLiL.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.25
                                                qkxofQCmKL.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.25
                                                CIzahLJ1XG.elfGet hashmaliciousMiraiBrowse
                                                • 162.213.35.24
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                AMAZON-02USUTiFqtxJ1o.elfGet hashmaliciousMiraiBrowse
                                                • 35.76.151.145
                                                bnNLsZqj8B.elfGet hashmaliciousMiraiBrowse
                                                • 13.232.173.28
                                                IBpwSQBj5F.elfGet hashmaliciousUnknownBrowse
                                                • 34.249.145.219
                                                GFw6joeIJl.elfGet hashmaliciousMiraiBrowse
                                                • 54.151.38.228
                                                zLH4Gkr36e.elfGet hashmaliciousMiraiBrowse
                                                • 13.50.244.10
                                                YE6HFLEfb4.elfGet hashmaliciousUnknownBrowse
                                                • 54.247.62.1
                                                00kDn01FGP.elfGet hashmaliciousMiraiBrowse
                                                • 34.254.182.186
                                                F5owD542qK.elfGet hashmaliciousMiraiBrowse
                                                • 34.254.182.186
                                                IRtucjku4f.elfGet hashmaliciousMiraiBrowse
                                                • 54.171.230.55
                                                0nfIIyGr0B.elfGet hashmaliciousMiraiBrowse
                                                • 54.247.62.1
                                                AMAZON-02USUTiFqtxJ1o.elfGet hashmaliciousMiraiBrowse
                                                • 35.76.151.145
                                                bnNLsZqj8B.elfGet hashmaliciousMiraiBrowse
                                                • 13.232.173.28
                                                IBpwSQBj5F.elfGet hashmaliciousUnknownBrowse
                                                • 34.249.145.219
                                                GFw6joeIJl.elfGet hashmaliciousMiraiBrowse
                                                • 54.151.38.228
                                                zLH4Gkr36e.elfGet hashmaliciousMiraiBrowse
                                                • 13.50.244.10
                                                YE6HFLEfb4.elfGet hashmaliciousUnknownBrowse
                                                • 54.247.62.1
                                                00kDn01FGP.elfGet hashmaliciousMiraiBrowse
                                                • 34.254.182.186
                                                F5owD542qK.elfGet hashmaliciousMiraiBrowse
                                                • 34.254.182.186
                                                IRtucjku4f.elfGet hashmaliciousMiraiBrowse
                                                • 54.171.230.55
                                                0nfIIyGr0B.elfGet hashmaliciousMiraiBrowse
                                                • 54.247.62.1
                                                No context
                                                No context
                                                No created / dropped files found
                                                File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                                                Entropy (8bit):6.100127475582964
                                                TrID:
                                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                                File name:z3u7dnBStL.elf
                                                File size:99'468 bytes
                                                MD5:bf1200bf14f6b52ed1ef8b75568b7753
                                                SHA1:6e26847636874e541cfb48c8adde88b8cff17e1c
                                                SHA256:4ea6db5fae8679b110af1cca107bcf470b60c1066881bcd25aadfe70332b73a6
                                                SHA512:db40206ff6b0e2c56e934622d486537efe690c0831f964825d300298bca34f74a0d4ca46554c97561c30ec0f0c398e963a3353bd6c64beff62b1000723097b1b
                                                SSDEEP:1536:uxnkY3RS4sAjoGiIANTThKcNe5zVMN6WCPJadO5b8MVicvwR8KRz/5bYi:83c4MGET1AhMEfRaGvwR8KRz/xF
                                                TLSH:3CA32A86BC419A11C6C10677FE2F118E331257ECE2DE73139D245B607BCB81B0E6BA5A
                                                File Content Preview:.ELF..............(.....T...4...........4. ...(.....................Pw..Pw..........................8...............Q.td..................................-...L..................@-.,@...0....S..... 0....S.........../..0...0...@..../.8.............-.@0....S

                                                ELF header

                                                Class:ELF32
                                                Data:2's complement, little endian
                                                Version:1 (current)
                                                Machine:ARM
                                                Version Number:0x1
                                                Type:EXEC (Executable file)
                                                OS/ABI:UNIX - System V
                                                ABI Version:0
                                                Entry Point Address:0x8154
                                                Flags:0x4000002
                                                ELF Header Size:52
                                                Program Header Offset:52
                                                Program Header Size:32
                                                Number of Program Headers:3
                                                Section Header Offset:98988
                                                Section Header Size:40
                                                Number of Section Headers:12
                                                Header String Table Index:11
                                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                                NULL0x00x00x00x00x0000
                                                .initPROGBITS0x80940x940x100x00x6AX004
                                                .textPROGBITS0x80b00xb00x1583c0x00x6AX0016
                                                .finiPROGBITS0x1d8ec0x158ec0x100x00x6AX004
                                                .rodataPROGBITS0x1d9000x159000x1e500x00x2A008
                                                .init_arrayINIT_ARRAY0x200040x180080x40x00x3WA004
                                                .fini_arrayFINI_ARRAY0x200080x1800c0x40x00x3WA004
                                                .gotPROGBITS0x200100x180140x780x40x3WA004
                                                .dataPROGBITS0x200880x1808c0x1b00x00x3WA004
                                                .bssNOBITS0x202380x1823c0x27580x00x3WA004
                                                .ARM.attributesARM_ATTRIBUTES0x00x1823c0x100x00x0001
                                                .shstrtabSTRTAB0x00x1824c0x5d0x00x0001
                                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                                LOAD0x00x80000x80000x177500x177506.20230x5R E0x8000.init .text .fini .rodata
                                                LOAD0x180040x200040x200000x2380xa98c2.23870x6RW 0x8000.init_array .fini_array .got .data .bss
                                                GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 16, 2024 14:03:04.832495928 CEST52466443192.168.2.1554.247.62.1
                                                Apr 16, 2024 14:03:33.435468912 CEST44530443192.168.2.1534.254.182.186
                                                Apr 16, 2024 14:03:33.435529947 CEST4434453034.254.182.186192.168.2.15
                                                Apr 16, 2024 14:03:33.435655117 CEST44530443192.168.2.1534.254.182.186
                                                Apr 16, 2024 14:03:33.440809965 CEST44530443192.168.2.1534.254.182.186
                                                Apr 16, 2024 14:03:33.440835953 CEST4434453034.254.182.186192.168.2.15
                                                Apr 16, 2024 14:04:33.434444904 CEST44530443192.168.2.1534.254.182.186
                                                Apr 16, 2024 14:04:33.480124950 CEST4434453034.254.182.186192.168.2.15
                                                Apr 16, 2024 14:04:43.259639025 CEST4434453034.254.182.186192.168.2.15
                                                Apr 16, 2024 14:04:43.259835005 CEST44530443192.168.2.1534.254.182.186
                                                Apr 16, 2024 14:04:43.259845972 CEST4434453034.254.182.186192.168.2.15
                                                Apr 16, 2024 14:04:43.259919882 CEST44530443192.168.2.1534.254.182.186
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 16, 2024 14:03:00.454782963 CEST5741653192.168.2.158.8.8.8
                                                Apr 16, 2024 14:03:00.454847097 CEST3824753192.168.2.158.8.8.8
                                                Apr 16, 2024 14:03:00.559700012 CEST53382478.8.8.8192.168.2.15
                                                Apr 16, 2024 14:03:00.559762955 CEST53574168.8.8.8192.168.2.15
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Apr 16, 2024 14:03:00.454782963 CEST192.168.2.158.8.8.80x24d7Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                                Apr 16, 2024 14:03:00.454847097 CEST192.168.2.158.8.8.80xc7d2Standard query (0)daisy.ubuntu.com28IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Apr 16, 2024 14:03:00.559762955 CEST8.8.8.8192.168.2.150x24d7No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false
                                                Apr 16, 2024 14:03:00.559762955 CEST8.8.8.8192.168.2.150x24d7No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false

                                                System Behavior

                                                Start time (UTC):12:02:58
                                                Start date (UTC):16/04/2024
                                                Path:/tmp/z3u7dnBStL.elf
                                                Arguments:/tmp/z3u7dnBStL.elf
                                                File size:4956856 bytes
                                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                                Start time (UTC):12:04:32
                                                Start date (UTC):16/04/2024
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):12:04:32
                                                Start date (UTC):16/04/2024
                                                Path:/usr/bin/rm
                                                Arguments:rm -f /tmp/tmp.quJnwvWnw9 /tmp/tmp.0asyiAsN19 /tmp/tmp.sNxz6L6XVy
                                                File size:72056 bytes
                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                                Start time (UTC):12:04:32
                                                Start date (UTC):16/04/2024
                                                Path:/usr/bin/dash
                                                Arguments:-
                                                File size:129816 bytes
                                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                                Start time (UTC):12:04:32
                                                Start date (UTC):16/04/2024
                                                Path:/usr/bin/rm
                                                Arguments:rm -f /tmp/tmp.quJnwvWnw9 /tmp/tmp.0asyiAsN19 /tmp/tmp.sNxz6L6XVy
                                                File size:72056 bytes
                                                MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b