Linux Analysis Report
t6t7sqwfzY.elf

Overview

General Information

Sample name: t6t7sqwfzY.elf
renamed because original name is a hash value
Original sample name: 4a7ca8c328cb568cef9f3e2ab48d30b1.elf
Analysis ID: 1427806
MD5: 4a7ca8c328cb568cef9f3e2ab48d30b1
SHA1: 39c215d038997c8cc7f0f1cf8eef1cea30beee9c
SHA256: 4164c7efaf18295255b8953b67a0cdb82a5add0134d1fc42e2fe3ebe14e16cf6
Tags: 32elfmiraipowerpc
Infos:

Detection

Score: 56
Range: 0 - 100
Whitelisted: false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

AV Detection

barindex
Source: t6t7sqwfzY.elf ReversingLabs: Detection: 42%
Source: t6t7sqwfzY.elf Virustotal: Detection: 48% Perma Link
Source: t6t7sqwfzY.elf String: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinernetstatwgetcurlbusybox/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemd/usr/libexec/openssh/sftp-serverusr/shellmnt/sys/bin/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt//var/Condi
Source: unknown DNS traffic detected: query: cnc.condi.cloud replaycode: Server failure (2)
Source: unknown DNS traffic detected: queries for: cnc.condi.cloud

System Summary

barindex
Source: t6t7sqwfzY.elf, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5433.1.00007f6458001000.00007f6458013000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: t6t7sqwfzY.elf PID: 5433, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Initial sample String containing 'busybox' found: busybox
Source: Initial sample String containing 'busybox' found: /bin/busybox
Source: Initial sample String containing 'busybox' found: HTTP/1.1 200 OKtop1hbt.armtop1hbt.arm5top1hbt.arm6top1hbt.arm7top1hbt.mipstop1hbt.mpsltop1hbt.x86_64top1hbt.sh4/proc/proc/%d/cmdlinernetstatwgetcurlbusybox/bin/busybox/proc//proc/%s/exe/proc/self/exevar/Challengeapp/hi3511gmDVRiboxusr/dvr_main _8182T_1108mnt/mtd/app/guivar/Kylinl0 c/udevdanko-app/ankosample _8182T_1104var/tmp/soniahicorestm_hi3511_dvr/usr/lib/systemd/systemd/usr/libexec/openssh/sftp-serverusr/shellmnt/sys/bin/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davincitelnetsshwatchdog/var/spool/var/Sofiasshd/usr/compress/bin//compress/bin/compress/usr/bashhttpdtelnetddropbearropbearencodersystem/root/dvr_gui//root/dvr_app//anko-app//opt//var/Condi
Source: ELF static info symbol of initial sample .symtab present: no
Source: t6t7sqwfzY.elf, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5433.1.00007f6458001000.00007f6458013000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: t6t7sqwfzY.elf PID: 5433, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: classification engine Classification label: mal56.linELF@0/1025@105/0
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/4055/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/230/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/110/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/231/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/111/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/232/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/112/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/233/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/113/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/234/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/114/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/235/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/115/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/236/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/116/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/237/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/117/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/238/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/118/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/239/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/5379/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/119/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/914/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/10/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/917/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/11/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/5272/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/12/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/13/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/14/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/15/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/16/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/17/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/18/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/19/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/240/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/3095/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/120/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/241/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/121/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/242/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/1/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/122/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/243/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/2/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/123/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/244/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/3/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/124/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/245/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/1588/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/125/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/4/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/246/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/126/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/5/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/247/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/127/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/6/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/248/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/128/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/7/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/249/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/129/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/8/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/800/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/9/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/1906/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/802/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/803/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/3646/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/20/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/21/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/22/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/23/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/24/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/25/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/26/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/27/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/28/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/29/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/3420/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/1482/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/490/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/1480/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/250/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/371/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/130/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/251/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/131/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/252/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/132/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/253/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/254/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/1238/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/134/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/255/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/256/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/257/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/378/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/3413/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/258/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/259/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/1475/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5437) File opened: /proc/936/cmdline Jump to behavior
Source: /tmp/t6t7sqwfzY.elf (PID: 5433) Queries kernel information via 'uname': Jump to behavior
Source: t6t7sqwfzY.elf, 5433.1.00007ffe5b917000.00007ffe5b938000.rw-.sdmp Binary or memory string: zx86_64/usr/bin/qemu-ppc/tmp/t6t7sqwfzY.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/t6t7sqwfzY.elf
Source: t6t7sqwfzY.elf, 5433.1.0000562293cdc000.0000562293d8c000.rw-.sdmp Binary or memory string: !/etc/qemu-binfmt/ppc11!hotpluggableq
Source: t6t7sqwfzY.elf, 5433.1.0000562293cdc000.0000562293d8c000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/ppc
Source: t6t7sqwfzY.elf, 5433.1.00007ffe5b917000.00007ffe5b938000.rw-.sdmp Binary or memory string: /usr/bin/qemu-ppc
No contacted IP infos