Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
hmDumpR4Ys.elf

Overview

General Information

Sample name:hmDumpR4Ys.elf
renamed because original name is a hash value
Original sample name:301cc407abd6736140ae0df3c53aec64.elf
Analysis ID:1427713
MD5:301cc407abd6736140ae0df3c53aec64
SHA1:e611be05f66ae77beb53328e98217f89af449096
SHA256:e3aab908800cb4601bc4a87ac9ac48d816ced57cdb409b6e2468956cc50bdf04
Tags:64elf
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Drops invisible ELF files
Performs DNS queries to domains with low reputation
Sample is packed with UPX
Creates hidden files and/or directories
ELF contains segments with high entropy indicating compressed/encrypted content
Reads the 'hosts' file potentially containing internal network hosts
Sample and/or dropped files contains symbols with suspicious names
Sample contains only a LOAD segment without any section mappings
Sample tries to set the executable flag
Uses the "uname" system call to query kernel version information (possible evasion)
Writes ELF files to disk

Classification

Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1427713
Start date and time:2024-04-18 01:32:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 20s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:hmDumpR4Ys.elf
renamed because original name is a hash value
Original Sample Name:301cc407abd6736140ae0df3c53aec64.elf
Detection:MAL
Classification:mal60.troj.evad.linELF@0/1@3/0
  • VT rate limit hit for: hmDumpR4Ys.elf
Command:/tmp/hmDumpR4Ys.elf
PID:5436
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • hmDumpR4Ys.elf (PID: 5436, Parent: 5360, MD5: 301cc407abd6736140ae0df3c53aec64) Arguments: /tmp/hmDumpR4Ys.elf
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: hmDumpR4Ys.elfReversingLabs: Detection: 21%

Networking

barindex
Source: DNS query: www.megtech.xyz
Source: /tmp/hmDumpR4Ys.elf (PID: 5436)Reads hosts file: /etc/hostsJump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: www.megtech.xyz
Source: hmDumpR4Ys.elfString found in binary or memory: http://upx.sf.net
Source: hmDumpR4Ys.elf, 5436.1.0000000000400000.000000000078d000.r-x.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
Source: hmDumpR4Ys.elf, 5436.1.0000000000400000.000000000078d000.r-x.sdmpString found in binary or memory: http://www.openssl.org/support/faq.htmlRAND
Source: .sys.rrcache.data.13.drString found in binary or memory: https://www.megtech.xyz/
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 42220
Source: unknownNetwork traffic detected: HTTP traffic on port 42218 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 42218
Source: unknownNetwork traffic detected: HTTP traffic on port 42220 -> 443
Source: .sys.rrcache.data.13.drELF static info symbol of dropped file: find_payload
Source: .sys.rrcache.data.13.drELF static info symbol of dropped file: find_payload
Source: LOAD without section mappingsProgram segment: 0x400000
Source: classification engineClassification label: mal60.troj.evad.linELF@0/1@3/0

Data Obfuscation

barindex
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sampleString containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
Source: /tmp/hmDumpR4Ys.elf (PID: 5437)File: /tmp/.sys.rrcache.dataJump to behavior
Source: /tmp/hmDumpR4Ys.elf (PID: 5437)Directory: /tmp/.sys.rrcache.dataJump to behavior
Source: /tmp/hmDumpR4Ys.elf (PID: 5437)File: /tmp/.sys.rrcache.data (bits: - usr: rwx grp: rwx all: rwx)Jump to behavior
Source: /tmp/hmDumpR4Ys.elf (PID: 5437)File written: /tmp/.sys.rrcache.dataJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/hmDumpR4Ys.elf (PID: 5437)ELF file: /tmp/.sys.rrcache.dataJump to dropped file
Source: hmDumpR4Ys.elfSubmission file: segment LOAD with 7.9135 entropy (max. 8.0)
Source: /tmp/hmDumpR4Ys.elf (PID: 5436)Queries kernel information via 'uname': Jump to behavior
Source: /tmp/hmDumpR4Ys.elf (PID: 5437)Queries kernel information via 'uname': Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File and Directory Permissions Modification
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Hidden Files and Directories
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
hmDumpR4Ys.elf21%ReversingLabsLinux.Trojan.CobaltStrike
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.megtech.xyz
15.197.130.221
truetrue
    unknown
    daisy.ubuntu.com
    162.213.35.24
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://upx.sf.nethmDumpR4Ys.elffalse
        high
        http://www.openssl.org/support/faq.htmlRANDhmDumpR4Ys.elf, 5436.1.0000000000400000.000000000078d000.r-x.sdmpfalse
          high
          http://www.openssl.org/support/faq.htmlhmDumpR4Ys.elf, 5436.1.0000000000400000.000000000078d000.r-x.sdmpfalse
            high
            https://www.megtech.xyz/.sys.rrcache.data.13.drfalse
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              15.197.130.221
              www.megtech.xyzUnited States
              7430TANDEMUStrue
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              15.197.130.221BL4567GH67_xls.exeGet hashmaliciousFormBookBrowse
              • www.drjoserizal.com/n8t5/
              Scan Document Copy_docx.exeGet hashmaliciousFormBookBrowse
              • www.drjoserizal.com/n8t5/
              ungziped_file.exeGet hashmaliciousFormBookBrowse
              • www.drjoserizal.com/n8t5/
              PO20024040422PACK.exeGet hashmaliciousFormBookBrowse
              • www.drjoserizal.com/bnz5/
              Solicitud de pedido Documento No 168646080.exeGet hashmaliciousFormBook, PureLog StealerBrowse
              • www.thewipglobal.com/pz08/?cx=j7VZTyaPLotDIgtvuFm1Wc2ZOg86ksyi3hYWattYqpUq5IzwEATKEtPTRIq3N3amsDpuvgSkbA==&CR=_DHhAtX
              file.exeGet hashmaliciousUnknownBrowse
              • vitalikcreatedethereumtobethenewworldorderscurrency.shop/get/65c3048a130dda59d2528286
              SecuriteInfo.com.Win32.PWSX-gen.8868.18243.exeGet hashmaliciousUnknownBrowse
              • vitalikcreatedethereumtobethenewworldorderscurrency.shop/get/65c2ee4a130dda59d2527f28
              Quotaton.pdf.exeGet hashmaliciousUnknownBrowse
              • vitalikcreatedethereumtobethenewworldorderscurrency.shop/get/65c29cdd130dda59d2527349
              chrome.apkGet hashmaliciousHydraBrowse
              • hjghgfgftdrdssst7654345.cfd/api/v1/device/check?screen=true
              file.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoaderBrowse
              • integrityhomemtg.com/pma/
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              daisy.ubuntu.comPwP4tXNi4a.elfGet hashmaliciousGafgyt, MiraiBrowse
              • 162.213.35.24
              0P0xPHw37E.elfGet hashmaliciousGafgyt, MiraiBrowse
              • 162.213.35.24
              8xnQBClhg7.elfGet hashmaliciousGafgyt, MiraiBrowse
              • 162.213.35.24
              ClPVG70TmC.elfGet hashmaliciousMiraiBrowse
              • 162.213.35.25
              5VaGSbWdTq.elfGet hashmaliciousMiraiBrowse
              • 162.213.35.24
              n3l6rOHrCy.elfGet hashmaliciousMiraiBrowse
              • 162.213.35.25
              Ag0lD8sQ2M.elfGet hashmaliciousMiraiBrowse
              • 162.213.35.24
              64ZOedXgZ1.elfGet hashmaliciousMiraiBrowse
              • 162.213.35.24
              ZNmO15OLbB.elfGet hashmaliciousMiraiBrowse
              • 162.213.35.25
              p83YQKCH5M.elfGet hashmaliciousMiraiBrowse
              • 162.213.35.24
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              TANDEMUShttps://17apmic5.z13.web.core.windows.net/Get hashmaliciousTechSupportScamBrowse
              • 15.197.193.217
              https://kristie-mancell-s-school.teachable.com/p/centerforfamilylifeGet hashmaliciousUnknownBrowse
              • 15.197.193.217
              R1iBOIfySQ.xlsxGet hashmaliciousHidden Macro 4.0Browse
              • 15.197.192.55
              https://cloudfiles.to/2cCuCHNsE6xGet hashmaliciousHTMLPhisherBrowse
              • 15.197.226.136
              http://www.ohp-puteaux.fr/Get hashmaliciousUnknownBrowse
              • 15.197.193.217
              http://www.creativeconcretend.com/Get hashmaliciousUnknownBrowse
              • 15.197.142.173
              https://learn.zix.com/Get hashmaliciousUnknownBrowse
              • 15.197.193.217
              http://FrontierDermatology.comGet hashmaliciousUnknownBrowse
              • 15.197.142.173
              http://h.top4top.ioGet hashmaliciousUnknownBrowse
              • 15.197.193.217
              BL4567GH67_xls.exeGet hashmaliciousFormBookBrowse
              • 15.197.130.221
              No context
              No context
              Process:/tmp/hmDumpR4Ys.elf
              File Type:ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=dab48a037fb31fef87b543e0e0d4527fb63b9b7e, not stripped
              Category:dropped
              Size (bytes):15840
              Entropy (8bit):2.4518598765872603
              Encrypted:false
              SSDEEP:96:RYEmvgNCBWBdby7q6oFo/dj3J/mq2EJvGJvxZjqdehuw7/3BQoBVW+iVxGxo:RIgNC8a7loFoFJ/VGVxXh3jvXFiD
              MD5:0CC7958B8D5C18E0FEE392EB9DBAA243
              SHA1:5D06277F77C87E9F3093D04D0824AB7183B96059
              SHA-256:1D1EAA462CE6BD8C7F0B7416D631349135AAD0CC76FA5F288F8BA3BD685221AB
              SHA-512:077FE6C88308F3C4DBF227B933B56156542B44E2AFD7C80B4CA935CA7C7C25D19F3C6FD14D9A80774B880FD6F3FFFC6EFCF361EFB569FEBD1FB5510C75557851
              Malicious:true
              Reputation:low
              Preview:.ELF..............>.............@........6..........@.8...@.............................................................................................................................. ....... ....... ......T.......T........................-.......=.......=......H.......P................................>.......>......................................8.......8.......8.......$.......$...............P.td.....#.......#.......#......D.......D...............Q.td....................................................R.td.....-.......=.......=..........................................GNU........C...R..;.~....................... ..$.............O}....A...B.\ &...%..................................................... ...................v.......................}........................... ...........................................n.......................,... ...................F..."...................................................%...............................j.......U.......i...............
              File type:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, no section header
              Entropy (8bit):7.908101450073808
              TrID:
              • ELF Executable and Linkable format (generic) (4004/1) 100.00%
              File name:hmDumpR4Ys.elf
              File size:1'441'224 bytes
              MD5:301cc407abd6736140ae0df3c53aec64
              SHA1:e611be05f66ae77beb53328e98217f89af449096
              SHA256:e3aab908800cb4601bc4a87ac9ac48d816ced57cdb409b6e2468956cc50bdf04
              SHA512:35f2b4eb255ab59c0e26625c78a1797610272027bb0440cefa4f8290f8254760eff2104c959731b3cbc68c92f2668080490c98dd943c067580a140496ac2e360
              SSDEEP:24576:nAHgTVEYTG8g9dnGU3XNqW+E8C73G+xY3/My4c763Gheij87uptkuLpIXEfsxp:n2E5g9hbXUjHQ3G33Uy4+zj87rcpIXEq
              TLSH:4D6523D6C05C1DF29135282BA46A7BA13E111D6B2B3E38982D9FEDC3CBB80E54D556CC
              File Content Preview:.ELF..............>.......U.....@...................@.8...@.......................@.......@....................... ......................7.......7..............................Q.td....................................................1..gUPX!8.......H.:.H.:

              ELF header

              Class:ELF64
              Data:2's complement, little endian
              Version:1 (current)
              Machine:Advanced Micro Devices X86-64
              Version Number:0x1
              Type:EXEC (Executable file)
              OS/ABI:UNIX - System V
              ABI Version:0
              Entry Point Address:0x55b3c8
              Flags:0x0
              ELF Header Size:64
              Program Header Offset:64
              Program Header Size:56
              Number of Program Headers:3
              Section Header Offset:0
              Section Header Size:64
              Number of Section Headers:0
              Header String Table Index:0
              TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
              LOAD0x00x4000000x4000000x15bbf30x15bbf37.91350x5R E0x200000
              LOAD0x7b00x9a37b00x9a37b00x00x00.00000x6RW 0x1000
              GNU_STACK0x00x00x00x00x00.00000x7RWE0x10
              TimestampSource PortDest PortSource IPDest IP
              Apr 18, 2024 01:32:58.095159054 CEST42218443192.168.2.1315.197.130.221
              Apr 18, 2024 01:32:58.095191956 CEST4434221815.197.130.221192.168.2.13
              Apr 18, 2024 01:32:58.095259905 CEST42218443192.168.2.1315.197.130.221
              Apr 18, 2024 01:32:58.095284939 CEST42218443192.168.2.1315.197.130.221
              Apr 18, 2024 01:32:58.095515966 CEST4434221815.197.130.221192.168.2.13
              Apr 18, 2024 01:32:58.095563889 CEST42218443192.168.2.1315.197.130.221
              Apr 18, 2024 01:32:58.096497059 CEST42220443192.168.2.1315.197.130.221
              Apr 18, 2024 01:32:58.096544981 CEST4434222015.197.130.221192.168.2.13
              Apr 18, 2024 01:32:58.096749067 CEST42220443192.168.2.1315.197.130.221
              Apr 18, 2024 01:32:58.097202063 CEST42220443192.168.2.1315.197.130.221
              Apr 18, 2024 01:32:58.097225904 CEST4434222015.197.130.221192.168.2.13
              Apr 18, 2024 01:35:07.688846111 CEST4434222015.197.130.221192.168.2.13
              TimestampSource PortDest PortSource IPDest IP
              Apr 18, 2024 01:32:56.620246887 CEST4448153192.168.2.131.1.1.1
              Apr 18, 2024 01:32:57.272366047 CEST53444811.1.1.1192.168.2.13
              Apr 18, 2024 01:35:39.056646109 CEST3992853192.168.2.131.1.1.1
              Apr 18, 2024 01:35:39.056646109 CEST4507953192.168.2.131.1.1.1
              Apr 18, 2024 01:35:39.161186934 CEST53450791.1.1.1192.168.2.13
              Apr 18, 2024 01:35:39.161848068 CEST53399281.1.1.1192.168.2.13
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Apr 18, 2024 01:32:56.620246887 CEST192.168.2.131.1.1.10xf790Standard query (0)www.megtech.xyzA (IP address)IN (0x0001)false
              Apr 18, 2024 01:35:39.056646109 CEST192.168.2.131.1.1.10xfc0Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
              Apr 18, 2024 01:35:39.056646109 CEST192.168.2.131.1.1.10x3d40Standard query (0)daisy.ubuntu.com28IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Apr 18, 2024 01:32:57.272366047 CEST1.1.1.1192.168.2.130xf790No error (0)www.megtech.xyz15.197.130.221A (IP address)IN (0x0001)false
              Apr 18, 2024 01:35:39.161848068 CEST1.1.1.1192.168.2.130xfc0No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
              Apr 18, 2024 01:35:39.161848068 CEST1.1.1.1192.168.2.130xfc0No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

              System Behavior

              Start time (UTC):23:32:55
              Start date (UTC):17/04/2024
              Path:/tmp/hmDumpR4Ys.elf
              Arguments:/tmp/hmDumpR4Ys.elf
              File size:1441224 bytes
              MD5 hash:301cc407abd6736140ae0df3c53aec64

              Start time (UTC):23:32:57
              Start date (UTC):17/04/2024
              Path:/tmp/hmDumpR4Ys.elf
              Arguments:-
              File size:1441224 bytes
              MD5 hash:301cc407abd6736140ae0df3c53aec64