Linux Analysis Report
sUZF1NIN0R.elf

Overview

General Information

Sample name: sUZF1NIN0R.elf
renamed because original name is a hash value
Original sample name: a4f3b2ca8260c47880acb195596f528f.elf
Analysis ID: 1432067
MD5: a4f3b2ca8260c47880acb195596f528f
SHA1: 2c4d45bcb3ffa9be12fd7ea16f66297d92a12ad8
SHA256: bcb07d02845fcabb0a3b8e3f5173d361f90267ffff00fff62647c182b13a1025
Tags: 32armelfmirai
Infos:

Detection

Okiru
Score: 64
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Okiru
Reads CPU information from /proc indicative of miner or evasive malware
Reads system information from the proc file system
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings that are user agent strings indicative of HTTP manipulation
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: sUZF1NIN0R.elf Avira: detected
Source: sUZF1NIN0R.elf ReversingLabs: Detection: 21%
Source: sUZF1NIN0R.elf Virustotal: Detection: 23% Perma Link
Source: /tmp/sUZF1NIN0R.elf (PID: 5498) Reads CPU info from proc file: /proc/cpuinfo Jump to behavior
Source: Initial sample String containing 'busybox' found: /bin/busybox
Source: Initial sample String containing 'busybox' found: /proc/proc/%s/exe/var/Challenge/app/hi3511/gmDVR/ibox/usr/dvr_main _8182T_1108/mnt/mtd/app/gui/var/Kylin/l0 c/udevd/anko-app/ankosample _8182T_1104/var/tmp/sonia/hicore/stm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemd/usr/libexec/openssh/sftp-server/usr//shell/mnt//sys//bin//boot//media//srv//var/run//sbin//lib//etc//dev//home/Davinci/telnet/ssh/var/spool/var/Sofia/sshd/usr/compress/bin//compress/bin/compress/usr//bash/httpd/telnetd/dropbear/ropbear/encoder/system/root/dvr_gui//root/dvr_app//anko-app//opt//softbot.arm/softbot.arm6/softbot.dbg/softbot.mpsl/softbot.x86/softbot.arm5/softbot.arm7/softbot.mips/softbot.sh4softbot.armsoftbot.arm6softbot.dbgsoftbot.mpslsoftbot.x86softbot.arm5softbot.arm7softbot.mipssoftbot.sh4/bin/sh
Source: ELF static info symbol of initial sample .symtab present: no
Source: /tmp/sUZF1NIN0R.elf (PID: 5550) SIGKILL sent: pid: 5550, result: unknown Jump to behavior
Source: classification engine Classification label: mal64.troj.linELF@0/0@0/0
Source: /tmp/sUZF1NIN0R.elf (PID: 5498) Reads from proc file: /proc/cpuinfo Jump to behavior
Source: /tmp/sUZF1NIN0R.elf (PID: 5498) Reads from proc file: /proc/meminfo Jump to behavior
Source: /tmp/sUZF1NIN0R.elf (PID: 5498) Reads CPU info from proc file: /proc/cpuinfo Jump to behavior
Source: /tmp/sUZF1NIN0R.elf (PID: 5492) Queries kernel information via 'uname': Jump to behavior
Source: sUZF1NIN0R.elf, 5492.1.00007ffd27fd6000.00007ffd27ff7000.rw-.sdmp, sUZF1NIN0R.elf, 5496.1.00007ffd27fd6000.00007ffd27ff7000.rw-.sdmp, sUZF1NIN0R.elf, 5550.1.00007ffd27fd6000.00007ffd27ff7000.rw-.sdmp Binary or memory string: \e_ x86_64/usr/bin/qemu-arm/tmp/sUZF1NIN0R.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sUZF1NIN0R.elf
Source: sUZF1NIN0R.elf, 5492.1.00005602ad899000.00005602ad9c7000.rw-.sdmp, sUZF1NIN0R.elf, 5496.1.00005602ad899000.00005602ad9c7000.rw-.sdmp, sUZF1NIN0R.elf, 5550.1.00005602ad899000.00005602ad9c7000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: sUZF1NIN0R.elf, 5492.1.00005602ad899000.00005602ad9c7000.rw-.sdmp, sUZF1NIN0R.elf, 5496.1.00005602ad899000.00005602ad9c7000.rw-.sdmp, sUZF1NIN0R.elf, 5550.1.00005602ad899000.00005602ad9c7000.rw-.sdmp Binary or memory string: V!/etc/qemu-binfmt/arm
Source: sUZF1NIN0R.elf, 5492.1.00007ffd27fd6000.00007ffd27ff7000.rw-.sdmp, sUZF1NIN0R.elf, 5496.1.00007ffd27fd6000.00007ffd27ff7000.rw-.sdmp, sUZF1NIN0R.elf, 5550.1.00007ffd27fd6000.00007ffd27ff7000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm

Stealing of Sensitive Information

barindex
Source: Yara match File source: sUZF1NIN0R.elf, type: SAMPLE
Source: Yara match File source: 5550.1.00007f5550017000.00007f5550028000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5496.1.00007f5550017000.00007f5550028000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5492.1.00007f5550017000.00007f5550028000.r-x.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: sUZF1NIN0R.elf PID: 5492, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: sUZF1NIN0R.elf PID: 5496, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: sUZF1NIN0R.elf PID: 5550, type: MEMORYSTR
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.67 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:100.0) Gecko/20100101 Firefox/100.0
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.64 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (X11; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.63 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0

Remote Access Functionality

barindex
Source: Yara match File source: sUZF1NIN0R.elf, type: SAMPLE
Source: Yara match File source: 5550.1.00007f5550017000.00007f5550028000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5496.1.00007f5550017000.00007f5550028000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5492.1.00007f5550017000.00007f5550028000.r-x.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: sUZF1NIN0R.elf PID: 5492, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: sUZF1NIN0R.elf PID: 5496, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: sUZF1NIN0R.elf PID: 5550, type: MEMORYSTR
No contacted IP infos