Linux Analysis Report
wx6NGH4iz5.elf

Overview

General Information

Sample name: wx6NGH4iz5.elf
renamed because original name is a hash value
Original sample name: 8b4ac0094699b33dbf300cc5ff487856.elf
Analysis ID: 1432499
MD5: 8b4ac0094699b33dbf300cc5ff487856
SHA1: 95c8c0bdd74501247eae8191f217fdacbbb0d98a
SHA256: 4d34caa775e70fdf2969bab5ce40180a84a5bc10cbc7b9795570a92ce4dd8d32
Tags: 32armelfmirai
Infos:

Detection

Score: 48
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: wx6NGH4iz5.elf ReversingLabs: Detection: 57%
Source: wx6NGH4iz5.elf Virustotal: Detection: 31% Perma Link
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 34.249.145.219
Source: unknown TCP traffic detected without corresponding DNS query: 34.249.145.219
Source: unknown TCP traffic detected without corresponding DNS query: 34.249.145.219
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 34.249.145.219
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 39252
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 39252 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal48.linELF@0/0@0/0
Source: /usr/bin/dash (PID: 6331) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Jsum8kwrB4 /tmp/tmp.r9mNQhdtOY /tmp/tmp.eg73ircuuU Jump to behavior
Source: /usr/bin/dash (PID: 6332) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Jsum8kwrB4 /tmp/tmp.r9mNQhdtOY /tmp/tmp.eg73ircuuU Jump to behavior
Source: /tmp/wx6NGH4iz5.elf (PID: 6263) Queries kernel information via 'uname': Jump to behavior
Source: wx6NGH4iz5.elf, 6263.1.000055f161f1a000.000055f162048000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/arm
Source: wx6NGH4iz5.elf, 6263.1.00007ffdadebf000.00007ffdadee0000.rw-.sdmp Binary or memory string: 1x86_64/usr/bin/qemu-arm/tmp/wx6NGH4iz5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/wx6NGH4iz5.elf
Source: wx6NGH4iz5.elf, 6263.1.000055f161f1a000.000055f162048000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: wx6NGH4iz5.elf, 6263.1.00007ffdadebf000.00007ffdadee0000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
Source: wx6NGH4iz5.elf, 6263.1.00007ffdadebf000.00007ffdadee0000.rw-.sdmp Binary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs