Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
ysUdGyAErx.elf

Overview

General Information

Sample name:ysUdGyAErx.elf
renamed because original name is a hash value
Original sample name:3308943170ffe154f77f48bb12c83b4e.elf
Analysis ID:1432513
MD5:3308943170ffe154f77f48bb12c83b4e
SHA1:e244764d1e016b8e0a6b2ade324858184fbdcbc0
SHA256:822a67dcf13910dcd0c71673efeb1e9d2e8c29f6887972abb41162f0ac3d7e20
Tags:32elfmiraipowerpc
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1432513
Start date and time:2024-04-27 11:35:37 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 25s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:ysUdGyAErx.elf
renamed because original name is a hash value
Original Sample Name:3308943170ffe154f77f48bb12c83b4e.elf
Detection:MAL
Classification:mal52.troj.linELF@0/0@1/0
Command:/tmp/ysUdGyAErx.elf
PID:5516
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
The Peoples Bank of China.
Standard Error:
  • system is lnxubuntu20
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ysUdGyAErx.elfVirustotal: Detection: 30%Perma Link
Source: ysUdGyAErx.elfReversingLabs: Detection: 47%

Networking

barindex
Source: global trafficTCP traffic: 204.76.203.101 ports 38241,1,2,3,4,8
Source: global trafficTCP traffic: 192.168.2.14:58732 -> 204.76.203.101:38241
Source: /tmp/ysUdGyAErx.elf (PID: 5516)Socket: 127.0.0.1::39148Jump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 64.176.6.48
Source: global trafficDNS traffic detected: DNS query: infectedchink.pirate
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal52.troj.linELF@0/0@1/0
Source: /tmp/ysUdGyAErx.elf (PID: 5516)Queries kernel information via 'uname': Jump to behavior
Source: ysUdGyAErx.elf, 5516.1.000055a1030ca000.000055a10317a000.rw-.sdmpBinary or memory string: !/etc/qemu-binfmt/ppc1
Source: ysUdGyAErx.elf, 5516.1.000055a1030ca000.000055a10317a000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/ppc
Source: ysUdGyAErx.elf, 5516.1.00007ffc5c003000.00007ffc5c024000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-ppc/tmp/ysUdGyAErx.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/ysUdGyAErx.elf
Source: ysUdGyAErx.elf, 5516.1.00007ffc5c003000.00007ffc5c024000.rw-.sdmpBinary or memory string: /usr/bin/qemu-ppc
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1432513 Sample: ysUdGyAErx.elf Startdate: 27/04/2024 Architecture: LINUX Score: 52 14 204.76.203.101, 38241, 58732 UNASSIGNED Reserved 2->14 16 infectedchink.pirate 2->16 18 Multi AV Scanner detection for submitted file 2->18 20 Connects to many ports of the same IP (likely port scanning) 2->20 8 ysUdGyAErx.elf 2->8         started        signatures3 process4 process5 10 ysUdGyAErx.elf 8->10         started        process6 12 ysUdGyAErx.elf 10->12         started       
SourceDetectionScannerLabelLink
ysUdGyAErx.elf31%VirustotalBrowse
ysUdGyAErx.elf47%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
infectedchink.pirate
5.181.80.61
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    204.76.203.101
    unknownReserved
    54041UNASSIGNEDtrue
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    infectedchink.piratespQm3NLQtH.elfGet hashmaliciousUnknownBrowse
    • 86.104.194.181
    x1b5bmJgLm.elfGet hashmaliciousUnknownBrowse
    • 5.181.80.61
    RpHVKGndFL.elfGet hashmaliciousUnknownBrowse
    • 5.181.80.130
    GcOeQTPzrh.elfGet hashmaliciousUnknownBrowse
    • 5.181.80.61
    EdO1baKdpe.elfGet hashmaliciousMiraiBrowse
    • 204.76.203.5
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    UNASSIGNED28aJXAjdQU.elfGet hashmaliciousUnknownBrowse
    • 204.76.203.63
    o7XNLGi3qx.elfGet hashmaliciousUnknownBrowse
    • 204.76.203.63
    GldvsHP0wD.elfGet hashmaliciousUnknownBrowse
    • 204.76.203.63
    G0DzFWJWTG.elfGet hashmaliciousMiraiBrowse
    • 204.76.203.5
    d1CFx1lzym.elfGet hashmaliciousMiraiBrowse
    • 163.202.111.211
    GcOeQTPzrh.elfGet hashmaliciousUnknownBrowse
    • 205.231.177.120
    8dToMPcvO1.elfGet hashmaliciousMiraiBrowse
    • 142.152.88.223
    bUuAPqXmkL.elfGet hashmaliciousMiraiBrowse
    • 205.231.152.94
    Request for Quotation.exeGet hashmaliciousAgentTeslaBrowse
    • 131.226.4.7
    Ship Docs_ CI_BL_HBL_.exeGet hashmaliciousAgentTeslaBrowse
    • 131.226.2.60
    No context
    No context
    No created / dropped files found
    File type:ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (SYSV), statically linked, stripped
    Entropy (8bit):6.232817451035358
    TrID:
    • ELF Executable and Linkable format (generic) (4004/1) 100.00%
    File name:ysUdGyAErx.elf
    File size:46'768 bytes
    MD5:3308943170ffe154f77f48bb12c83b4e
    SHA1:e244764d1e016b8e0a6b2ade324858184fbdcbc0
    SHA256:822a67dcf13910dcd0c71673efeb1e9d2e8c29f6887972abb41162f0ac3d7e20
    SHA512:cba9a9bfffb2e6735296abb5c15bd8487c10bf45eed1e0462d3c75293c94f05bb259cb7a7edd56d9c705fe13e8870b22d48ac81a6d61efa464616b3712c4af48
    SSDEEP:768:ATUoM6FcHjRaBqvENiQoWHk5xio3nrP5FpSYc87mtn9:yM6KDuAQom8xiKnD7pSYt7un9
    TLSH:E0235D43721C0A27C4A25774293F1BE093FBBEA025F4B684650F9B5A85B1F372446F9D
    File Content Preview:.ELF...........................4.........4. ...(....................................................................dt.Q.............................!..|......$H...H..a...$8!. |...N.. .!..|.......?.............../...@..\?........+../...A..$8...})......N..

    ELF header

    Class:ELF32
    Data:2's complement, big endian
    Version:1 (current)
    Machine:PowerPC
    Version Number:0x1
    Type:EXEC (Executable file)
    OS/ABI:UNIX - System V
    ABI Version:0
    Entry Point Address:0x100001f0
    Flags:0x0
    ELF Header Size:52
    Program Header Offset:52
    Program Header Size:32
    Number of Program Headers:3
    Section Header Offset:46248
    Section Header Size:40
    Number of Section Headers:13
    Header String Table Index:12
    NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
    NULL0x00x00x00x00x0000
    .initPROGBITS0x100000940x940x240x00x6AX004
    .textPROGBITS0x100000b80xb80xa7b80x00x6AX004
    .finiPROGBITS0x1000a8700xa8700x200x00x6AX004
    .rodataPROGBITS0x1000a8900xa8900xa400x00x2A004
    .ctorsPROGBITS0x1001b2d40xb2d40x80x00x3WA004
    .dtorsPROGBITS0x1001b2dc0xb2dc0x80x00x3WA004
    .jcrPROGBITS0x1001b2e40xb2e40x40x00x3WA004
    .dataPROGBITS0x1001b2e80xb2e80x1480x00x3WA008
    .sdataPROGBITS0x1001b4300xb4300x280x00x3WA004
    .sbssNOBITS0x1001b4580xb4580x5c0x00x3WA004
    .bssNOBITS0x1001b4b40xb4580x10c0x00x3WA004
    .shstrtabSTRTAB0x00xb4580x500x00x0001
    TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
    LOAD0x00x100000000x100000000xb2d00xb2d06.28910x5R E0x10000.init .text .fini .rodata
    LOAD0xb2d40x1001b2d40x1001b2d40x1840x2ec0.89880x6RW 0x10000.ctors .dtors .jcr .data .sdata .sbss .bss
    GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
    TimestampSource PortDest PortSource IPDest IP
    Apr 27, 2024 11:36:17.691389084 CEST5873238241192.168.2.14204.76.203.101
    Apr 27, 2024 11:36:18.125986099 CEST3824158732204.76.203.101192.168.2.14
    Apr 27, 2024 11:36:18.126147032 CEST5873238241192.168.2.14204.76.203.101
    Apr 27, 2024 11:36:18.126416922 CEST5873238241192.168.2.14204.76.203.101
    Apr 27, 2024 11:36:18.564229012 CEST3824158732204.76.203.101192.168.2.14
    Apr 27, 2024 11:36:18.564416885 CEST5873238241192.168.2.14204.76.203.101
    Apr 27, 2024 11:36:19.011605024 CEST3824158732204.76.203.101192.168.2.14
    Apr 27, 2024 11:36:28.136348963 CEST5873238241192.168.2.14204.76.203.101
    Apr 27, 2024 11:36:28.571126938 CEST3824158732204.76.203.101192.168.2.14
    Apr 27, 2024 11:36:28.571150064 CEST3824158732204.76.203.101192.168.2.14
    Apr 27, 2024 11:36:28.571271896 CEST5873238241192.168.2.14204.76.203.101
    Apr 27, 2024 11:36:44.031511068 CEST3824158732204.76.203.101192.168.2.14
    Apr 27, 2024 11:36:44.031757116 CEST5873238241192.168.2.14204.76.203.101
    Apr 27, 2024 11:36:59.466202021 CEST3824158732204.76.203.101192.168.2.14
    Apr 27, 2024 11:36:59.466360092 CEST5873238241192.168.2.14204.76.203.101
    Apr 27, 2024 11:37:14.896354914 CEST3824158732204.76.203.101192.168.2.14
    Apr 27, 2024 11:37:14.896492958 CEST5873238241192.168.2.14204.76.203.101
    Apr 27, 2024 11:37:28.623764992 CEST5873238241192.168.2.14204.76.203.101
    Apr 27, 2024 11:37:29.115236044 CEST3824158732204.76.203.101192.168.2.14
    Apr 27, 2024 11:37:29.115513086 CEST5873238241192.168.2.14204.76.203.101
    Apr 27, 2024 11:37:44.577610970 CEST3824158732204.76.203.101192.168.2.14
    Apr 27, 2024 11:37:44.577939034 CEST5873238241192.168.2.14204.76.203.101
    Apr 27, 2024 11:38:00.052124977 CEST3824158732204.76.203.101192.168.2.14
    Apr 27, 2024 11:38:00.052436113 CEST5873238241192.168.2.14204.76.203.101
    Apr 27, 2024 11:38:15.476397991 CEST3824158732204.76.203.101192.168.2.14
    Apr 27, 2024 11:38:15.476739883 CEST5873238241192.168.2.14204.76.203.101
    TimestampSource PortDest PortSource IPDest IP
    Apr 27, 2024 11:36:17.462574959 CEST5789253192.168.2.1464.176.6.48
    Apr 27, 2024 11:36:17.690887928 CEST535789264.176.6.48192.168.2.14
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Apr 27, 2024 11:36:17.462574959 CEST192.168.2.1464.176.6.480x732fStandard query (0)infectedchink.pirateA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate5.181.80.61A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate86.104.194.181A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate204.76.203.5A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate204.76.203.103A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate86.104.194.115A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate5.181.80.189A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate204.76.203.223A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate5.181.80.130A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate5.181.80.140A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate5.181.80.60A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate204.76.203.101A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate86.104.194.171A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate86.104.194.178A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate5.181.80.59A (IP address)IN (0x0001)false
    Apr 27, 2024 11:36:17.690887928 CEST64.176.6.48192.168.2.140x732fNo error (0)infectedchink.pirate204.76.203.63A (IP address)IN (0x0001)false

    System Behavior

    Start time (UTC):09:36:16
    Start date (UTC):27/04/2024
    Path:/tmp/ysUdGyAErx.elf
    Arguments:/tmp/ysUdGyAErx.elf
    File size:5388968 bytes
    MD5 hash:ae65271c943d3451b7f026d1fadccea6

    Start time (UTC):09:36:16
    Start date (UTC):27/04/2024
    Path:/tmp/ysUdGyAErx.elf
    Arguments:-
    File size:5388968 bytes
    MD5 hash:ae65271c943d3451b7f026d1fadccea6

    Start time (UTC):09:36:16
    Start date (UTC):27/04/2024
    Path:/tmp/ysUdGyAErx.elf
    Arguments:-
    File size:5388968 bytes
    MD5 hash:ae65271c943d3451b7f026d1fadccea6