Source: sUZF1NIN0R.elf |
ReversingLabs: Detection: 21% |
Source: sUZF1NIN0R.elf |
Virustotal: Detection: 23% |
Perma Link |
Source: /tmp/sUZF1NIN0R.elf (PID: 5498) |
Reads CPU info from proc file: /proc/cpuinfo |
Jump to behavior |
Source: Initial sample |
String containing 'busybox' found: /bin/busybox |
Source: Initial sample |
String containing 'busybox' found: /proc/proc/%s/exe/var/Challenge/app/hi3511/gmDVR/ibox/usr/dvr_main _8182T_1108/mnt/mtd/app/gui/var/Kylin/l0 c/udevd/anko-app/ankosample _8182T_1104/var/tmp/sonia/hicore/stm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemd/usr/libexec/openssh/sftp-server/usr//shell/mnt//sys//bin//boot//media//srv//var/run//sbin//lib//etc//dev//home/Davinci/telnet/ssh/var/spool/var/Sofia/sshd/usr/compress/bin//compress/bin/compress/usr//bash/httpd/telnetd/dropbear/ropbear/encoder/system/root/dvr_gui//root/dvr_app//anko-app//opt//softbot.arm/softbot.arm6/softbot.dbg/softbot.mpsl/softbot.x86/softbot.arm5/softbot.arm7/softbot.mips/softbot.sh4softbot.armsoftbot.arm6softbot.dbgsoftbot.mpslsoftbot.x86softbot.arm5softbot.arm7softbot.mipssoftbot.sh4/bin/sh |
Source: ELF static info symbol of initial sample |
.symtab present: no |
Source: /tmp/sUZF1NIN0R.elf (PID: 5550) |
SIGKILL sent: pid: 5550, result: unknown |
Jump to behavior |
Source: classification engine |
Classification label: mal64.troj.linELF@0/0@0/0 |
Source: /tmp/sUZF1NIN0R.elf (PID: 5498) |
Reads from proc file: /proc/cpuinfo |
Jump to behavior |
Source: /tmp/sUZF1NIN0R.elf (PID: 5498) |
Reads from proc file: /proc/meminfo |
Jump to behavior |
Source: /tmp/sUZF1NIN0R.elf (PID: 5498) |
Reads CPU info from proc file: /proc/cpuinfo |
Jump to behavior |
Source: /tmp/sUZF1NIN0R.elf (PID: 5492) |
Queries kernel information via 'uname': |
Jump to behavior |
Source: sUZF1NIN0R.elf, 5492.1.00007ffd27fd6000.00007ffd27ff7000.rw-.sdmp, sUZF1NIN0R.elf, 5496.1.00007ffd27fd6000.00007ffd27ff7000.rw-.sdmp, sUZF1NIN0R.elf, 5550.1.00007ffd27fd6000.00007ffd27ff7000.rw-.sdmp |
Binary or memory string: \e_ x86_64/usr/bin/qemu-arm/tmp/sUZF1NIN0R.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sUZF1NIN0R.elf |
Source: sUZF1NIN0R.elf, 5492.1.00005602ad899000.00005602ad9c7000.rw-.sdmp, sUZF1NIN0R.elf, 5496.1.00005602ad899000.00005602ad9c7000.rw-.sdmp, sUZF1NIN0R.elf, 5550.1.00005602ad899000.00005602ad9c7000.rw-.sdmp |
Binary or memory string: /etc/qemu-binfmt/arm |
Source: sUZF1NIN0R.elf, 5492.1.00005602ad899000.00005602ad9c7000.rw-.sdmp, sUZF1NIN0R.elf, 5496.1.00005602ad899000.00005602ad9c7000.rw-.sdmp, sUZF1NIN0R.elf, 5550.1.00005602ad899000.00005602ad9c7000.rw-.sdmp |
Binary or memory string: V!/etc/qemu-binfmt/arm |
Source: sUZF1NIN0R.elf, 5492.1.00007ffd27fd6000.00007ffd27ff7000.rw-.sdmp, sUZF1NIN0R.elf, 5496.1.00007ffd27fd6000.00007ffd27ff7000.rw-.sdmp, sUZF1NIN0R.elf, 5550.1.00007ffd27fd6000.00007ffd27ff7000.rw-.sdmp |
Binary or memory string: /usr/bin/qemu-arm |
Source: Yara match |
File source: sUZF1NIN0R.elf, type: SAMPLE |
Source: Yara match |
File source: 5550.1.00007f5550017000.00007f5550028000.r-x.sdmp, type: MEMORY |
Source: Yara match |
File source: 5496.1.00007f5550017000.00007f5550028000.r-x.sdmp, type: MEMORY |
Source: Yara match |
File source: 5492.1.00007f5550017000.00007f5550028000.r-x.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: sUZF1NIN0R.elf PID: 5492, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: sUZF1NIN0R.elf PID: 5496, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: sUZF1NIN0R.elf PID: 5550, type: MEMORYSTR |
Source: Initial sample |
User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36 |
Source: Initial sample |
User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.67 Safari/537.36 |
Source: Initial sample |
User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:100.0) Gecko/20100101 Firefox/100.0 |
Source: Initial sample |
User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36 |
Source: Initial sample |
User agent string found: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.64 Safari/537.36 |
Source: Initial sample |
User agent string found: Mozilla/5.0 (X11; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0 |
Source: Initial sample |
User agent string found: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0 |
Source: Initial sample |
User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.63 Safari/537.36 |
Source: Initial sample |
User agent string found: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36 |
Source: Initial sample |
User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0 |
Source: Yara match |
File source: sUZF1NIN0R.elf, type: SAMPLE |
Source: Yara match |
File source: 5550.1.00007f5550017000.00007f5550028000.r-x.sdmp, type: MEMORY |
Source: Yara match |
File source: 5496.1.00007f5550017000.00007f5550028000.r-x.sdmp, type: MEMORY |
Source: Yara match |
File source: 5492.1.00007f5550017000.00007f5550028000.r-x.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: sUZF1NIN0R.elf PID: 5492, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: sUZF1NIN0R.elf PID: 5496, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: sUZF1NIN0R.elf PID: 5550, type: MEMORYSTR |