Linux Analysis Report
if7G7W6gWn.elf

Overview

General Information

Sample name: if7G7W6gWn.elf
renamed because original name is a hash value
Original sample name: 25916ce134da7ae0ba1be9c9787298f9.elf
Analysis ID: 1432070
MD5: 25916ce134da7ae0ba1be9c9787298f9
SHA1: 288f48353bc9357508cbe994786664a5ab5ad233
SHA256: 39772de123a121e00ea070169dbcf06ed40ad267eff0d7385005dc26746a774a
Tags: 32elfmirairenesas
Infos:

Detection

Okiru
Score: 56
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Okiru
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Reads CPU information from /proc indicative of miner or evasive malware
Reads system information from the proc file system
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample contains strings that are user agent strings indicative of HTTP manipulation
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: if7G7W6gWn.elf Virustotal: Detection: 18% Perma Link
Source: /tmp/if7G7W6gWn.elf (PID: 6205) Reads CPU info from proc file: /proc/cpuinfo Jump to behavior
Source: global traffic TCP traffic: 192.168.2.23:48668 -> 45.142.182.80:5900
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.80
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 33606
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 33606 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: Initial sample String containing 'busybox' found: /bin/busybox
Source: Initial sample String containing 'busybox' found: /proc/proc/%s/exe/var/Challenge/app/hi3511/gmDVR/ibox/usr/dvr_main _8182T_1108/mnt/mtd/app/gui/var/Kylin/l0 c/udevd/anko-app/ankosample _8182T_1104/var/tmp/sonia/hicore/stm_hi3511_dvr/bin/busybox/usr/lib/systemd/systemd/usr/libexec/openssh/sftp-server/usr//shell/mnt//sys//bin//boot//media//srv//var/run//sbin//lib//etc//dev//home/Davinci/telnet/ssh/var/spool/var/Sofia/sshd/usr/compress/bin//compress/bin/compress/usr//bash/httpd/telnetd/dropbear/ropbear/encoder/system/root/dvr_gui//root/dvr_app//anko-app//opt//softbot.arm/softbot.arm6/softbot.dbg/softbot.mpsl/softbot.x86/softbot.arm5/softbot.arm7/softbot.mips/softbot.sh4softbot.armsoftbot.arm6softbot.dbgsoftbot.mpslsoftbot.x86softbot.arm5softbot.arm7softbot.mipssoftbot.sh4/bin/shD
Source: ELF static info symbol of initial sample .symtab present: no
Source: /tmp/if7G7W6gWn.elf (PID: 6205) SIGKILL sent: pid: -6203, result: unknown Jump to behavior
Source: classification engine Classification label: mal56.troj.linELF@0/0@0/0
Source: /usr/bin/dash (PID: 6247) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.QFi1oBeZ2Z /tmp/tmp.wQRko5GF2s /tmp/tmp.5w8KPCe39U Jump to behavior
Source: /usr/bin/dash (PID: 6248) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.QFi1oBeZ2Z /tmp/tmp.wQRko5GF2s /tmp/tmp.5w8KPCe39U Jump to behavior
Source: /tmp/if7G7W6gWn.elf (PID: 6205) Reads from proc file: /proc/cpuinfo Jump to behavior
Source: /tmp/if7G7W6gWn.elf (PID: 6205) Reads from proc file: /proc/meminfo Jump to behavior
Source: /tmp/if7G7W6gWn.elf (PID: 6205) Reads CPU info from proc file: /proc/cpuinfo Jump to behavior
Source: /tmp/if7G7W6gWn.elf (PID: 6199) Queries kernel information via 'uname': Jump to behavior
Source: if7G7W6gWn.elf, 6199.1.00007ffe32d36000.00007ffe32d57000.rw-.sdmp, if7G7W6gWn.elf, 6203.1.00007ffe32d36000.00007ffe32d57000.rw-.sdmp, if7G7W6gWn.elf, 6205.1.00007ffe32d36000.00007ffe32d57000.rw-.sdmp Binary or memory string: /usr/bin/qemu-sh4
Source: if7G7W6gWn.elf, 6199.1.00005650db438000.00005650db49b000.rw-.sdmp, if7G7W6gWn.elf, 6203.1.00005650db438000.00005650db49b000.rw-.sdmp, if7G7W6gWn.elf, 6205.1.00005650db438000.00005650db49b000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/sh4
Source: if7G7W6gWn.elf, 6199.1.00005650db438000.00005650db49b000.rw-.sdmp, if7G7W6gWn.elf, 6203.1.00005650db438000.00005650db49b000.rw-.sdmp, if7G7W6gWn.elf, 6205.1.00005650db438000.00005650db49b000.rw-.sdmp Binary or memory string: PV5!/etc/qemu-binfmt/sh4
Source: if7G7W6gWn.elf, 6199.1.00007ffe32d36000.00007ffe32d57000.rw-.sdmp, if7G7W6gWn.elf, 6203.1.00007ffe32d36000.00007ffe32d57000.rw-.sdmp, if7G7W6gWn.elf, 6205.1.00007ffe32d36000.00007ffe32d57000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-sh4/tmp/if7G7W6gWn.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/if7G7W6gWn.elf

Stealing of Sensitive Information

barindex
Source: Yara match File source: if7G7W6gWn.elf, type: SAMPLE
Source: Yara match File source: 6199.1.00007fc9b8400000.00007fc9b8412000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6205.1.00007fc9b8400000.00007fc9b8412000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6203.1.00007fc9b8400000.00007fc9b8412000.r-x.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: if7G7W6gWn.elf PID: 6199, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: if7G7W6gWn.elf PID: 6203, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: if7G7W6gWn.elf PID: 6205, type: MEMORYSTR
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.67 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:100.0) Gecko/20100101 Firefox/100.0
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.64 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (X11; Linux x86_64; rv:100.0) Gecko/20100101 Firefox/100.0
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.63 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36
Source: Initial sample User agent string found: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0

Remote Access Functionality

barindex
Source: Yara match File source: if7G7W6gWn.elf, type: SAMPLE
Source: Yara match File source: 6199.1.00007fc9b8400000.00007fc9b8412000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6205.1.00007fc9b8400000.00007fc9b8412000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6203.1.00007fc9b8400000.00007fc9b8412000.r-x.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: if7G7W6gWn.elf PID: 6199, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: if7G7W6gWn.elf PID: 6203, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: if7G7W6gWn.elf PID: 6205, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs