Linux Analysis Report
JU8juw0kr0.elf

Overview

General Information

Sample name: JU8juw0kr0.elf
renamed because original name is a hash value
Original sample name: d64d515bcf2d91d1a7222e4a5a0ec940.elf
Analysis ID: 1430434
MD5: d64d515bcf2d91d1a7222e4a5a0ec940
SHA1: b3db534c6b86da47dfa9a7b55885474acf596a57
SHA256: a757c63a3b1fd90cd245c9590266906aac0d02712049cb6873f0e2c2adc3b4c9
Tags: 32armelfmirai
Infos:

Detection

Score: 64
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Queries the IP of a very long domain name
Sample deletes itself
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: JU8juw0kr0.elf Avira: detected
Source: JU8juw0kr0.elf ReversingLabs: Detection: 39%
Source: JU8juw0kr0.elf String: EOF/proc//proc/%s/cmdlinerwgetcurlftpechokillbashrebootshutdownhaltpoweroff[locker] killed process: %s ;; pid: %d

Networking

barindex
Source: unknown DNS traffic detected: query: cnc.voidnet.click.'f66a/PV!E(t:5r)I'fNNPV!a/E@
Source: unknown DNS traffic detected: query: cnc.voidnet.click.'f66a/PV!E(lj5)I'fNNPV!a/E@.@@y.5,a
Source: unknown DNS traffic detected: query: cnc.voidnet.click.'fx66a/PV!E(bBj>5)I'fNNPV!a/E@.@@y
Source: unknown DNS traffic detected: query: cnc.voidnet.click.'fNT66a/PV!E(&:?5)I'fTNNPV!a/E@.@@y5,br)I
Source: unknown DNS traffic detected: query: cnc.voidnet.click.'fJJPV!a/E<V@@+Y5p('f66
Source: global traffic TCP traffic: 192.168.2.13:44752 -> 89.190.156.145:7733
Source: global traffic TCP traffic: 192.168.2.13:51574 -> 94.156.79.77:33966
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown TCP traffic detected without corresponding DNS query: 89.190.156.145
Source: unknown DNS traffic detected: queries for: cnc.voidnet.click
Source: ELF static info symbol of initial sample .symtab present: no
Source: /tmp/JU8juw0kr0.elf (PID: 5552) SIGKILL sent: pid: 1884, result: successful Jump to behavior
Source: classification engine Classification label: mal64.troj.evad.linELF@0/1@6/0
Source: /usr/libexec/gsd-rfkill (PID: 5556) Directory: <invalid fd (9)>/.. Jump to behavior
Source: /usr/libexec/gsd-rfkill (PID: 5556) Directory: <invalid fd (8)>/.. Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5561) Directory: <invalid fd (10)>/.. Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/230/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/110/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/231/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/111/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/232/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/112/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/233/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/113/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/234/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/114/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/235/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/115/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/236/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/116/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/237/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/117/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/238/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/118/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/239/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/119/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/914/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/10/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/917/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/11/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/12/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/13/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/14/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/15/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/16/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/17/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/18/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/19/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/240/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/120/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/241/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/121/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/242/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/122/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/243/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/2/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/123/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/244/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/3/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/124/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/245/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/1588/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/125/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/4/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/246/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/126/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/5/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/247/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/127/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/6/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/248/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/128/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/7/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/249/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/129/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/8/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/800/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/9/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/802/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/803/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/20/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/21/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/22/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/23/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/24/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/25/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/26/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/27/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/28/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/29/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/1482/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/490/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/1480/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/250/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/371/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/130/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/251/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/131/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/252/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/132/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/253/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/254/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/1238/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/134/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/255/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/256/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/257/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/378/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/258/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/259/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/1475/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/936/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/30/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/816/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/35/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/260/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/261/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/262/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/142/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/263/cmdline Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5552) File opened: /proc/264/cmdline Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/JU8juw0kr0.elf (PID: 5550) File: /tmp/JU8juw0kr0.elf Jump to behavior
Source: /tmp/JU8juw0kr0.elf (PID: 5548) Queries kernel information via 'uname': Jump to behavior
Source: /lib/systemd/systemd-hostnamed (PID: 5561) Queries kernel information via 'uname': Jump to behavior
Source: JU8juw0kr0.elf, 5548.1.0000556169f1b000.000055616a049000.rw-.sdmp Binary or memory string: iaU!/etc/qemu-binfmt/arm
Source: JU8juw0kr0.elf, 5548.1.00007ffdcd3cb000.00007ffdcd3ec000.rw-.sdmp Binary or memory string: /tmp/qemu-open.TsJKJG
Source: JU8juw0kr0.elf, 5548.1.00007ffdcd3cb000.00007ffdcd3ec000.rw-.sdmp Binary or memory string: xfaU/tmp/qemu-open.TsJKJG:
Source: JU8juw0kr0.elf, 5548.1.00007ffdcd3cb000.00007ffdcd3ec000.rw-.sdmp Binary or memory string: qx86_64/usr/bin/qemu-arm/tmp/JU8juw0kr0.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/JU8juw0kr0.elf
Source: JU8juw0kr0.elf, 5548.1.0000556169f1b000.000055616a049000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: JU8juw0kr0.elf, 5548.1.00007ffdcd3cb000.00007ffdcd3ec000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs