Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
XJ1HBOKHgY.elf

Overview

General Information

Sample name:XJ1HBOKHgY.elf
renamed because original name is a hash value
Original sample name:227e75766787753269252db66bd3a646.elf
Analysis ID:1427874
MD5:227e75766787753269252db66bd3a646
SHA1:b2394cf87c2911cfeb2c352e2cb24bca527fc9f0
SHA256:2337525595c88a1d3fdcd43a7349f86258d40cafe45beaf02b8f449e7514b867
Tags:32elfmiraisparc
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1427874
Start date and time:2024-04-18 09:57:41 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 47s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:XJ1HBOKHgY.elf
renamed because original name is a hash value
Original Sample Name:227e75766787753269252db66bd3a646.elf
Detection:MAL
Classification:mal56.linELF@0/0@0/0
Command:/tmp/XJ1HBOKHgY.elf
PID:6258
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
DaddyL33T Infected Your Shit
Standard Error:
  • system is lnxubuntu20
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: XJ1HBOKHgY.elfAvira: detected
Source: XJ1HBOKHgY.elfReversingLabs: Detection: 60%
Source: XJ1HBOKHgY.elfVirustotal: Detection: 56%Perma Link
Source: global trafficTCP traffic: 192.168.2.23:43610 -> 92.249.48.17:666
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownTCP traffic detected without corresponding DNS query: 92.249.48.17
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal56.linELF@0/0@0/0
Source: /tmp/XJ1HBOKHgY.elf (PID: 6258)Queries kernel information via 'uname': Jump to behavior
Source: XJ1HBOKHgY.elf, 6258.1.000055ed73611000.000055ed73696000.rw-.sdmp, XJ1HBOKHgY.elf, 6260.1.000055ed73611000.000055ed73696000.rw-.sdmp, XJ1HBOKHgY.elf, 6264.1.000055ed73611000.000055ed73696000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sparc
Source: XJ1HBOKHgY.elf, 6258.1.000055ed73611000.000055ed73696000.rw-.sdmp, XJ1HBOKHgY.elf, 6260.1.000055ed73611000.000055ed73696000.rw-.sdmp, XJ1HBOKHgY.elf, 6264.1.000055ed73611000.000055ed73696000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/sparc
Source: XJ1HBOKHgY.elf, 6258.1.00007ffe2adc0000.00007ffe2ade1000.rw-.sdmp, XJ1HBOKHgY.elf, 6260.1.00007ffe2adc0000.00007ffe2ade1000.rw-.sdmp, XJ1HBOKHgY.elf, 6264.1.00007ffe2adc0000.00007ffe2ade1000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sparc/tmp/XJ1HBOKHgY.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/XJ1HBOKHgY.elf
Source: XJ1HBOKHgY.elf, 6258.1.00007ffe2adc0000.00007ffe2ade1000.rw-.sdmp, XJ1HBOKHgY.elf, 6260.1.00007ffe2adc0000.00007ffe2ade1000.rw-.sdmp, XJ1HBOKHgY.elf, 6264.1.00007ffe2adc0000.00007ffe2ade1000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1427874 Sample: XJ1HBOKHgY.elf Startdate: 18/04/2024 Architecture: LINUX Score: 56 16 92.249.48.17, 43610, 666 M247GB Germany 2->16 18 109.202.202.202, 80 INIT7CH Switzerland 2->18 20 2 other IPs or domains 2->20 22 Antivirus / Scanner detection for submitted sample 2->22 24 Multi AV Scanner detection for submitted file 2->24 8 XJ1HBOKHgY.elf 2->8         started        signatures3 process4 process5 10 XJ1HBOKHgY.elf 8->10         started        12 XJ1HBOKHgY.elf 8->12         started        process6 14 XJ1HBOKHgY.elf 10->14         started       
SourceDetectionScannerLabelLink
XJ1HBOKHgY.elf61%ReversingLabsLinux.Trojan.Mirai
XJ1HBOKHgY.elf56%VirustotalBrowse
XJ1HBOKHgY.elf100%AviraEXP/ELF.Mirai.T
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
92.249.48.17
unknownGermany
9009M247GBfalse
109.202.202.202
unknownSwitzerland
13030INIT7CHfalse
91.189.91.43
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
91.189.91.42
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
No context
No context
No context
No context
No context
No created / dropped files found
File type:ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, stripped
Entropy (8bit):5.969663034509413
TrID:
  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
File name:XJ1HBOKHgY.elf
File size:58'408 bytes
MD5:227e75766787753269252db66bd3a646
SHA1:b2394cf87c2911cfeb2c352e2cb24bca527fc9f0
SHA256:2337525595c88a1d3fdcd43a7349f86258d40cafe45beaf02b8f449e7514b867
SHA512:6369d07c1429fada582fa5d4fba63371fa1a1bc661e8b0c4506e89f3ed5178edfcbbdb2b5fac5fddddc1c92f62b5cc7160d337d155fd4e1aa4c5af855069bfc9
SSDEEP:768:7boeqn8PLtADbbi1x0q9+8A/026N+urOjfEU4WHO+t99lt:7bfqn0ZADbbi1x0S+8A/026N+R4U4G9
TLSH:99434C2166393F1AC4E0E8BE21B70325B1F52A5E65A4C94EBD730E4FFF11A54A6036F4
File Content Preview:.ELF...........................4.........4. ...(.......................(...(...............,...,...,...,...\........dt.Q................................@..(....@.2a................#.....bX..`.....!..... D..@.....".........`......$ D.. D..@...........`....

ELF header

Class:ELF32
Data:2's complement, big endian
Version:1 (current)
Machine:Sparc
Version Number:0x1
Type:EXEC (Executable file)
OS/ABI:UNIX - System V
ABI Version:0
Entry Point Address:0x101a4
Flags:0x0
ELF Header Size:52
Program Header Offset:52
Program Header Size:32
Number of Program Headers:3
Section Header Offset:58008
Section Header Size:40
Number of Section Headers:10
Header String Table Index:9
NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
NULL0x00x00x00x00x0000
.initPROGBITS0x100940x940x1c0x00x6AX004
.textPROGBITS0x100b00xb00xc9bc0x00x6AX004
.finiPROGBITS0x1ca6c0xca6c0x140x00x6AX004
.rodataPROGBITS0x1ca800xca800x15a80x00x2A008
.ctorsPROGBITS0x2e02c0xe02c0x80x00x3WA004
.dtorsPROGBITS0x2e0340xe0340x80x00x3WA004
.dataPROGBITS0x2e0400xe0400x2180x00x3WA008
.bssNOBITS0x2e2580xe2580x2300x00x3WA004
.shstrtabSTRTAB0x00xe2580x3e0x00x0001
TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
LOAD0x00x100000x100000xe0280xe0285.99540x5R E0x10000.init .text .fini .rodata
LOAD0xe02c0x2e02c0x2e02c0x22c0x45c2.95850x6RW 0x10000.ctors .dtors .data .bss
GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
TimestampSource PortDest PortSource IPDest IP
Apr 18, 2024 09:58:44.025221109 CEST4251680192.168.2.23109.202.202.202
Apr 18, 2024 09:58:45.626696110 CEST43610666192.168.2.2392.249.48.17
Apr 18, 2024 09:58:45.816931963 CEST43928443192.168.2.2391.189.91.42
Apr 18, 2024 09:58:45.834837914 CEST6664361092.249.48.17192.168.2.23
Apr 18, 2024 09:58:45.834908962 CEST43610666192.168.2.2392.249.48.17
Apr 18, 2024 09:58:45.835241079 CEST43610666192.168.2.2392.249.48.17
Apr 18, 2024 09:58:46.043248892 CEST6664361092.249.48.17192.168.2.23
Apr 18, 2024 09:58:46.043482065 CEST43610666192.168.2.2392.249.48.17
Apr 18, 2024 09:58:46.251616001 CEST6664361092.249.48.17192.168.2.23
Apr 18, 2024 09:58:51.192306995 CEST42836443192.168.2.2391.189.91.43
Apr 18, 2024 09:58:55.844336987 CEST43610666192.168.2.2392.249.48.17
Apr 18, 2024 09:58:56.052463055 CEST6664361092.249.48.17192.168.2.23
Apr 18, 2024 09:58:56.052499056 CEST6664361092.249.48.17192.168.2.23
Apr 18, 2024 09:58:56.052676916 CEST43610666192.168.2.2392.249.48.17
Apr 18, 2024 09:59:05.782296896 CEST43928443192.168.2.2391.189.91.42
Apr 18, 2024 09:59:11.289503098 CEST6664361092.249.48.17192.168.2.23
Apr 18, 2024 09:59:11.289608955 CEST43610666192.168.2.2392.249.48.17
Apr 18, 2024 09:59:13.973001003 CEST4251680192.168.2.23109.202.202.202
Apr 18, 2024 09:59:18.068455935 CEST42836443192.168.2.2391.189.91.43
Apr 18, 2024 09:59:26.497637033 CEST6664361092.249.48.17192.168.2.23
Apr 18, 2024 09:59:26.497785091 CEST43610666192.168.2.2392.249.48.17
Apr 18, 2024 09:59:41.705564022 CEST6664361092.249.48.17192.168.2.23
Apr 18, 2024 09:59:41.705686092 CEST43610666192.168.2.2392.249.48.17
Apr 18, 2024 09:59:46.736514091 CEST43928443192.168.2.2391.189.91.42
Apr 18, 2024 09:59:56.101545095 CEST43610666192.168.2.2392.249.48.17
Apr 18, 2024 09:59:56.310231924 CEST6664361092.249.48.17192.168.2.23
Apr 18, 2024 09:59:56.310410023 CEST43610666192.168.2.2392.249.48.17
Apr 18, 2024 10:00:11.545653105 CEST6664361092.249.48.17192.168.2.23
Apr 18, 2024 10:00:11.545806885 CEST43610666192.168.2.2392.249.48.17
Apr 18, 2024 10:00:26.753735065 CEST6664361092.249.48.17192.168.2.23
Apr 18, 2024 10:00:26.754002094 CEST43610666192.168.2.2392.249.48.17
Apr 18, 2024 10:00:41.961489916 CEST6664361092.249.48.17192.168.2.23
Apr 18, 2024 10:00:41.961762905 CEST43610666192.168.2.2392.249.48.17

System Behavior

Start time (UTC):07:58:45
Start date (UTC):18/04/2024
Path:/tmp/XJ1HBOKHgY.elf
Arguments:/tmp/XJ1HBOKHgY.elf
File size:4379400 bytes
MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

Start time (UTC):07:58:45
Start date (UTC):18/04/2024
Path:/tmp/XJ1HBOKHgY.elf
Arguments:-
File size:4379400 bytes
MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

Start time (UTC):07:58:45
Start date (UTC):18/04/2024
Path:/tmp/XJ1HBOKHgY.elf
Arguments:-
File size:4379400 bytes
MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

Start time (UTC):07:58:45
Start date (UTC):18/04/2024
Path:/tmp/XJ1HBOKHgY.elf
Arguments:-
File size:4379400 bytes
MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e