Linux Analysis Report
GFzGVKywzJ.elf

Overview

General Information

Sample name: GFzGVKywzJ.elf
renamed because original name is a hash value
Original sample name: 83971b3f27779e1d0d0f579572deaa50.elf
Analysis ID: 1432503
MD5: 83971b3f27779e1d0d0f579572deaa50
SHA1: 3f2f3fa0e9e5b0158bb7d6f73a9290df6aa081e5
SHA256: d8dc8b9639baed13bff88f63065d58d98addc5b3d9f1ee7ab6cc6f8c1776ef75
Tags: 32elfmiraisparc
Infos:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Sample listens on a socket
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: GFzGVKywzJ.elf ReversingLabs: Detection: 50%
Source: GFzGVKywzJ.elf Virustotal: Detection: 31% Perma Link

Networking

barindex
Source: global traffic TCP traffic: 86.104.194.171 ports 38241,1,2,3,4,8
Source: global traffic TCP traffic: 192.168.2.23:51030 -> 86.104.194.171:38241
Source: /tmp/GFzGVKywzJ.elf (PID: 6288) Socket: 127.0.0.1::39148 Jump to behavior
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown UDP traffic detected without corresponding DNS query: 139.84.165.176
Source: global traffic DNS traffic detected: DNS query: yellowchink.pirate
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal52.troj.linELF@0/0@1/0
Source: /tmp/GFzGVKywzJ.elf (PID: 6288) Queries kernel information via 'uname': Jump to behavior
Source: GFzGVKywzJ.elf, 6288.1.0000557ef20f0000.0000557ef2175000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/sparc
Source: GFzGVKywzJ.elf, 6288.1.00007ffe99366000.00007ffe99387000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-sparc/tmp/GFzGVKywzJ.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/GFzGVKywzJ.elf
Source: GFzGVKywzJ.elf, 6288.1.00007ffe99366000.00007ffe99387000.rw-.sdmp Binary or memory string: /usr/bin/qemu-sparc
Source: GFzGVKywzJ.elf, 6288.1.0000557ef20f0000.0000557ef2175000.rw-.sdmp Binary or memory string: ~U!/etc/qemu-binfmt/sparc
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs