Linux Analysis Report
BN34UR6QlT.elf

Overview

General Information

Sample name: BN34UR6QlT.elf
renamed because original name is a hash value
Original sample name: 66ef61ae742d72b4a385e16e95b078c5.elf
Analysis ID: 1430426
MD5: 66ef61ae742d72b4a385e16e95b078c5
SHA1: a0d83934a8cbf59724508aee78f9f380e8ea8118
SHA256: 75600ccfde87375df9385bfc70f8153b9926b702446e616076518a6a21037b8d
Tags: 32elfgafgytrenesas
Infos:

Detection

Score: 64
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Queries the IP of a very long domain name
Sample deletes itself
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: BN34UR6QlT.elf Avira: detected
Source: BN34UR6QlT.elf ReversingLabs: Detection: 31%
Source: BN34UR6QlT.elf String: lEOF/proc//proc/%s/cmdlinerwgetcurlftpechokillbashrebootshutdownhaltpoweroff[locker] killed process: %s ;; pid: %d

Networking

barindex
Source: unknown DNS traffic detected: query: cnc.voidnet.click.'f66a0PV!E(j5SSX'fNNPV!a0E@-
Source: unknown DNS traffic detected: query: cnc.voidnet.click.'f66a0PV!E(ju55_v'fNNPV!a0E@-
Source: unknown DNS traffic detected: query: cnc.voidnet.click.'f<566a0PV!E(:15<'f6NNPV!a0E@-
Source: unknown DNS traffic detected: query: cnc.voidnet.click.'f66a0PV!E(9;5^"'fNNPV!a0E@-
Source: unknown DNS traffic detected: query: cnc.voidnet.click.'fu66a0PV!E(:+5q'fvJJPV!a0E<
Source: global traffic TCP traffic: 192.168.2.14:38994 -> 94.156.79.77:33966
Source: global traffic TCP traffic: 192.168.2.14:57248 -> 89.190.156.145:7733
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown DNS traffic detected: queries for: cnc.voidnet.click
Source: ELF static info symbol of initial sample .symtab present: no
Source: /tmp/BN34UR6QlT.elf (PID: 5497) SIGKILL sent: pid: 1639, result: successful Jump to behavior
Source: classification engine Classification label: mal64.troj.evad.linELF@0/1@6/0
Source: /usr/libexec/gsd-rfkill (PID: 5499) Directory: <invalid fd (9)>/.. Jump to behavior
Source: /usr/libexec/gsd-rfkill (PID: 5499) Directory: <invalid fd (8)>/.. Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5504) Directory: <invalid fd (10)>/.. Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/1583/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/110/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/111/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/112/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/113/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/234/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/1577/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/114/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/235/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/115/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/116/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/117/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/118/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/119/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/10/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/917/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/11/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/12/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/13/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/14/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/15/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/16/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/17/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/18/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/19/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/1593/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/240/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/120/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/121/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/242/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/122/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/243/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/2/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/123/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/244/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/1589/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/3/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/124/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/245/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/1588/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/125/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/4/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/246/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/126/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/5/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/247/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/127/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/6/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/248/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/128/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/7/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/249/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/8/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/129/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/800/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/9/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/801/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/803/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/20/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/806/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/21/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/807/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/928/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/22/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/23/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/24/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/25/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/26/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/27/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/28/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/29/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/490/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/250/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/130/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/251/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/131/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/252/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/132/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/253/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/254/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/255/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/135/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/256/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/1599/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/257/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/378/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/258/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/259/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/30/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/35/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/1371/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/260/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/261/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/262/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/142/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/263/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/264/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/265/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/145/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/266/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/1369/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/267/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/268/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/269/cmdline Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5497) File opened: /proc/940/cmdline Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/BN34UR6QlT.elf (PID: 5495) File: /tmp/BN34UR6QlT.elf Jump to behavior
Source: /tmp/BN34UR6QlT.elf (PID: 5493) Queries kernel information via 'uname': Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5504) Queries kernel information via 'uname': Jump to behavior
Source: BN34UR6QlT.elf, 5493.1.00007fff9edb8000.00007fff9edd9000.rw-.sdmp Binary or memory string: /qemu-open.XXXXX
Source: BN34UR6QlT.elf, 5493.1.00007fff9edb8000.00007fff9edd9000.rw-.sdmp Binary or memory string: /usr/bin/qemu-sh4
Source: BN34UR6QlT.elf, 5493.1.00007fff9edb8000.00007fff9edd9000.rw-.sdmp Binary or memory string: /tmp/qemu-open.rpL8fx
Source: BN34UR6QlT.elf, 5493.1.00007fff9edb8000.00007fff9edd9000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-sh4/tmp/BN34UR6QlT.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/BN34UR6QlT.elf
Source: BN34UR6QlT.elf, 5493.1.000055bc2a125000.000055bc2a188000.rw-.sdmp Binary or memory string: U5!/etc/qemu-binfmt/sh4
Source: BN34UR6QlT.elf, 5493.1.000055bc2a125000.000055bc2a188000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/sh4
Source: BN34UR6QlT.elf, 5493.1.00007fff9edb8000.00007fff9edd9000.rw-.sdmp Binary or memory string: U/tmp/qemu-open.rpL8fx\
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs