Linux Analysis Report
dPOYR1HYAD.elf

Overview

General Information

Sample name: dPOYR1HYAD.elf
renamed because original name is a hash value
Original sample name: 41d3ee7390ce39e60f95c0144128fc45.elf
Analysis ID: 1432064
MD5: 41d3ee7390ce39e60f95c0144128fc45
SHA1: 3c5e22a7c783a22f3de39b448911ab294847532b
SHA256: 2fa1aa901170e3b67af6006da325523b38bd610ac387cfeeac3dc55ea9e9aa55
Tags: 32elfmipsmirai
Infos:

Detection

Okiru
Score: 60
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Okiru
Sample is packed with UPX
ELF contains segments with high entropy indicating compressed/encrypted content
Executes the "rm" command used to delete files or directories
Reads CPU information from /proc indicative of miner or evasive malware
Reads system information from the proc file system
Sample contains only a LOAD segment without any section mappings
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: dPOYR1HYAD.elf ReversingLabs: Detection: 15%
Source: dPOYR1HYAD.elf Virustotal: Detection: 13% Perma Link
Source: /tmp/dPOYR1HYAD.elf (PID: 6211) Reads CPU info from proc file: /proc/cpuinfo Jump to behavior
Source: dPOYR1HYAD.elf String found in binary or memory: http://upx.sf.net
Source: LOAD without section mappings Program segment: 0x400000
Source: /tmp/dPOYR1HYAD.elf (PID: 6211) SIGKILL sent: pid: -6209, result: unknown Jump to behavior
Source: /tmp/dPOYR1HYAD.elf (PID: 6294) SIGKILL sent: pid: 6294, result: unknown Jump to behavior
Source: classification engine Classification label: mal60.troj.evad.linELF@0/0@0/0

Data Obfuscation

barindex
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Id: UPX 4.30 Copyright (C) 1996-2024 the UPX Team. All Rights Reserved. $
Source: /usr/bin/dash (PID: 6247) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.RsMkx57hJx /tmp/tmp.br4Wgx1gNE /tmp/tmp.pUQWfyOGYi Jump to behavior
Source: /usr/bin/dash (PID: 6256) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.RsMkx57hJx /tmp/tmp.br4Wgx1gNE /tmp/tmp.pUQWfyOGYi Jump to behavior
Source: /tmp/dPOYR1HYAD.elf (PID: 6211) Reads from proc file: /proc/cpuinfo Jump to behavior
Source: /tmp/dPOYR1HYAD.elf (PID: 6211) Reads from proc file: /proc/meminfo Jump to behavior
Source: dPOYR1HYAD.elf Submission file: segment LOAD with 7.5156 entropy (max. 8.0)
Source: dPOYR1HYAD.elf Submission file: segment LOAD with 7.6806 entropy (max. 8.0)
Source: /tmp/dPOYR1HYAD.elf (PID: 6211) Reads CPU info from proc file: /proc/cpuinfo Jump to behavior
Source: /tmp/dPOYR1HYAD.elf (PID: 6205) Queries kernel information via 'uname': Jump to behavior
Source: dPOYR1HYAD.elf, 6205.1.000055f11acfa000.000055f11ad81000.rw-.sdmp, dPOYR1HYAD.elf, 6209.1.000055f11acfa000.000055f11ad81000.rw-.sdmp, dPOYR1HYAD.elf, 6211.1.000055f11acfa000.000055f11ad81000.rw-.sdmp, dPOYR1HYAD.elf, 6294.1.000055f11acfa000.000055f11ad81000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/mipsel
Source: dPOYR1HYAD.elf, 6205.1.000055f11acfa000.000055f11ad81000.rw-.sdmp, dPOYR1HYAD.elf, 6209.1.000055f11acfa000.000055f11ad81000.rw-.sdmp, dPOYR1HYAD.elf, 6211.1.000055f11acfa000.000055f11ad81000.rw-.sdmp, dPOYR1HYAD.elf, 6294.1.000055f11acfa000.000055f11ad81000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/mipsel
Source: dPOYR1HYAD.elf, 6205.1.00007ffc8cd5a000.00007ffc8cd7b000.rw-.sdmp, dPOYR1HYAD.elf, 6209.1.00007ffc8cd5a000.00007ffc8cd7b000.rw-.sdmp, dPOYR1HYAD.elf, 6211.1.00007ffc8cd5a000.00007ffc8cd7b000.rw-.sdmp, dPOYR1HYAD.elf, 6294.1.00007ffc8cd5a000.00007ffc8cd7b000.rw-.sdmp Binary or memory string: /usr/bin/qemu-mipsel
Source: dPOYR1HYAD.elf, 6205.1.00007ffc8cd5a000.00007ffc8cd7b000.rw-.sdmp, dPOYR1HYAD.elf, 6209.1.00007ffc8cd5a000.00007ffc8cd7b000.rw-.sdmp, dPOYR1HYAD.elf, 6211.1.00007ffc8cd5a000.00007ffc8cd7b000.rw-.sdmp, dPOYR1HYAD.elf, 6294.1.00007ffc8cd5a000.00007ffc8cd7b000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/dPOYR1HYAD.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/dPOYR1HYAD.elf

Stealing of Sensitive Information

barindex
Source: Yara match File source: 6205.1.00007f25c4400000.00007f25c4426000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6209.1.00007f25c4400000.00007f25c4426000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6211.1.00007f25c4400000.00007f25c4426000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6294.1.00007f25c4400000.00007f25c4426000.r-x.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: dPOYR1HYAD.elf PID: 6205, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: dPOYR1HYAD.elf PID: 6209, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: dPOYR1HYAD.elf PID: 6211, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: dPOYR1HYAD.elf PID: 6294, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 6205.1.00007f25c4400000.00007f25c4426000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6209.1.00007f25c4400000.00007f25c4426000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6211.1.00007f25c4400000.00007f25c4426000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6294.1.00007f25c4400000.00007f25c4426000.r-x.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: dPOYR1HYAD.elf PID: 6205, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: dPOYR1HYAD.elf PID: 6209, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: dPOYR1HYAD.elf PID: 6211, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: dPOYR1HYAD.elf PID: 6294, type: MEMORYSTR
No contacted IP infos