Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
.i.elf

Overview

General Information

Sample name:.i.elf
Analysis ID:1665301
MD5:fd44d98863099d89a0582ddf193ddb37
SHA1:b552d4c2d061c9f95005c620ba3e9ad702c2b2bc
SHA256:37861894a10154d35b3631b83e0427e05e837f52017d9a59b1cc5fae354383c6
Tags:elfuser-abuse_ch
Infos:

Detection

Score:48
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
ELF contains segments with high entropy indicating compressed/encrypted content
Executes the "rm" command used to delete files or directories
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1665301
Start date and time:2025-04-15 13:13:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 27s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:.i.elf
Detection:MAL
Classification:mal48.linELF@0/0@2/0
Command:/tmp/.i.elf
PID:5426
Exit Code:139
Exit Code Info:SIGSEGV (11) Segmentation fault invalid memory reference
Killed:False
Standard Output:

Standard Error:qemu: uncaught target signal 11 (Segmentation fault) - core dumped
  • system is lnxubuntu20
  • .i.elf (PID: 5426, Parent: 5349, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/.i.elf
  • dash New Fork (PID: 5521, Parent: 3580)
  • rm (PID: 5521, Parent: 3580, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.Uq55c4fVfp /tmp/tmp.Zb47z9JcwA /tmp/tmp.d1JBubbCY3
  • dash New Fork (PID: 5522, Parent: 3580)
  • rm (PID: 5522, Parent: 3580, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.Uq55c4fVfp /tmp/tmp.Zb47z9JcwA /tmp/tmp.d1JBubbCY3
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: .i.elfVirustotal: Detection: 21%Perma Link
Source: .i.elfReversingLabs: Detection: 50%
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownTCP traffic detected without corresponding DNS query: 54.171.230.55
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: daisy.ubuntu.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58876
Source: unknownNetwork traffic detected: HTTP traffic on port 58876 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 37676 -> 443
Source: LOAD without section mappingsProgram segment: 0x10000
Source: classification engineClassification label: mal48.linELF@0/0@2/0
Source: /usr/bin/dash (PID: 5521)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Uq55c4fVfp /tmp/tmp.Zb47z9JcwA /tmp/tmp.d1JBubbCY3Jump to behavior
Source: /usr/bin/dash (PID: 5522)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Uq55c4fVfp /tmp/tmp.Zb47z9JcwA /tmp/tmp.d1JBubbCY3Jump to behavior
Source: .i.elfSubmission file: segment LOAD with 7.9969 entropy (max. 8.0)
Source: /tmp/.i.elf (PID: 5426)Queries kernel information via 'uname': Jump to behavior
Source: .i.elf, 5426.1.000055d18e467000.000055d18e595000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/arm
Source: .i.elf, 5426.1.000055d18e467000.000055d18e595000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: .i.elf, 5426.1.00007ffe3b25d000.00007ffe3b27e000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: .i.elf, 5426.1.00007ffe3b25d000.00007ffe3b27e000.rw-.sdmpBinary or memory string: k{9x86_64/usr/bin/qemu-arm/tmp/.i.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/.i.elf
Source: .i.elf, 5426.1.00007ffe3b25d000.00007ffe3b27e000.rw-.sdmpBinary or memory string: qemu: uncaught target signal 11 (Segmentation fault) - core dumped
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Obfuscated Files or Information
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
File Deletion
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1665301 Sample: .i.elf Startdate: 15/04/2025 Architecture: LINUX Score: 48 12 54.171.230.55, 443, 58876 AMAZON-02US United States 2->12 14 54.217.10.153, 443 AMAZON-02US United States 2->14 16 daisy.ubuntu.com 2->16 18 Multi AV Scanner detection for submitted file 2->18 6 dash rm 2->6         started        8 dash rm 2->8         started        10 .i.elf 2->10         started        signatures3 process4
SourceDetectionScannerLabelLink
.i.elf22%VirustotalBrowse
.i.elf50%ReversingLabsLinux.Backdoor.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
daisy.ubuntu.com
162.213.35.24
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    54.171.230.55
    unknownUnited States
    16509AMAZON-02USfalse
    54.217.10.153
    unknownUnited States
    16509AMAZON-02USfalse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    54.171.230.55na.elfGet hashmaliciousPrometeiBrowse
      na.elfGet hashmaliciousPrometeiBrowse
        na.elfGet hashmaliciousPrometeiBrowse
          na.elfGet hashmaliciousPrometeiBrowse
            na.elfGet hashmaliciousPrometeiBrowse
              na.elfGet hashmaliciousPrometeiBrowse
                boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                  boatnet.m68k.elfGet hashmaliciousMiraiBrowse
                    edit.menu.elfGet hashmaliciousUnknownBrowse
                      na.elfGet hashmaliciousPrometeiBrowse
                        54.217.10.153boatnet.mips.elfGet hashmaliciousMiraiBrowse
                          hidakibest.sparc.elfGet hashmaliciousGafgyt, MiraiBrowse
                            hidakibest.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                              hidakibest.arm7.elfGet hashmaliciousGafgyt, MiraiBrowse
                                arm.elfGet hashmaliciousMiraiBrowse
                                  2xvhK6n0L5YrHJ4.x86_64.elfGet hashmaliciousMiraiBrowse
                                    Pitbull.arm.elfGet hashmaliciousMiraiBrowse
                                      t7h65hoHB2.elfGet hashmaliciousUnknownBrowse
                                        splarm6.elfGet hashmaliciousUnknownBrowse
                                          zerx86.elfGet hashmaliciousUnknownBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            daisy.ubuntu.comzerarm6.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            nklarm6.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.25
                                            boatnet.arm6.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.25
                                            boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.25
                                            pspc.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.25
                                            parm6.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.24
                                            parm7.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.25
                                            pmpsl.elfGet hashmaliciousMiraiBrowse
                                            • 162.213.35.24
                                            edit.menu.elfGet hashmaliciousUnknownBrowse
                                            • 162.213.35.24
                                            x86_64.elfGet hashmaliciousAquabotBrowse
                                            • 162.213.35.24
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                                            • 34.249.145.219
                                            https://sgoutreach.com/mt/lte?tid=10575540077886&lid=1&targetURL=https://gamma.app/docs/Camozzi-Automation-Ltd-3uaq1u1p10l4wlv?mode=present#card-fwba4n8sto7tjssGet hashmaliciousHTMLPhisherBrowse
                                            • 76.223.31.44
                                            MicrosoftInvoiceEnterprise.pdf.lnkGet hashmaliciousUnknownBrowse
                                            • 3.163.80.85
                                            https://sgoutreach.com/mt/lte?tid=10575540077886&lid=1&targetURL=https://gamma.app/docs/Camozzi-Automation-Ltd-3uaq1u1p10l4wlv?mode=present#card-fwba4n8sto7tjssGet hashmaliciousHTMLPhisherBrowse
                                            • 3.165.181.8
                                            DHL_AWB#6078538091.exeGet hashmaliciousFormBookBrowse
                                            • 13.248.169.48
                                            sh4.elfGet hashmaliciousMiraiBrowse
                                            • 34.249.145.219
                                            IMG77202400210014.vbeGet hashmaliciousFormBookBrowse
                                            • 13.248.169.48
                                            IMG77202400210015.vbeGet hashmaliciousFormBookBrowse
                                            • 13.248.169.48
                                            Q3M4ZKzjxb.exeGet hashmaliciousCredential FlusherBrowse
                                            • 52.37.232.247
                                            Order List481204832140425.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 52.216.10.3
                                            AMAZON-02USna.elfGet hashmaliciousPrometeiBrowse
                                            • 34.249.145.219
                                            https://sgoutreach.com/mt/lte?tid=10575540077886&lid=1&targetURL=https://gamma.app/docs/Camozzi-Automation-Ltd-3uaq1u1p10l4wlv?mode=present#card-fwba4n8sto7tjssGet hashmaliciousHTMLPhisherBrowse
                                            • 76.223.31.44
                                            MicrosoftInvoiceEnterprise.pdf.lnkGet hashmaliciousUnknownBrowse
                                            • 3.163.80.85
                                            https://sgoutreach.com/mt/lte?tid=10575540077886&lid=1&targetURL=https://gamma.app/docs/Camozzi-Automation-Ltd-3uaq1u1p10l4wlv?mode=present#card-fwba4n8sto7tjssGet hashmaliciousHTMLPhisherBrowse
                                            • 3.165.181.8
                                            DHL_AWB#6078538091.exeGet hashmaliciousFormBookBrowse
                                            • 13.248.169.48
                                            sh4.elfGet hashmaliciousMiraiBrowse
                                            • 34.249.145.219
                                            IMG77202400210014.vbeGet hashmaliciousFormBookBrowse
                                            • 13.248.169.48
                                            IMG77202400210015.vbeGet hashmaliciousFormBookBrowse
                                            • 13.248.169.48
                                            Q3M4ZKzjxb.exeGet hashmaliciousCredential FlusherBrowse
                                            • 52.37.232.247
                                            Order List481204832140425.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 52.216.10.3
                                            No context
                                            No context
                                            No created / dropped files found
                                            File type:ELF 32-bit LSB executable, ARM, EABI5 version 1 (GNU/Linux), statically linked, no section header
                                            Entropy (8bit):7.996862329585939
                                            TrID:
                                            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                            File name:.i.elf
                                            File size:64'960 bytes
                                            MD5:fd44d98863099d89a0582ddf193ddb37
                                            SHA1:b552d4c2d061c9f95005c620ba3e9ad702c2b2bc
                                            SHA256:37861894a10154d35b3631b83e0427e05e837f52017d9a59b1cc5fae354383c6
                                            SHA512:74f2f578d204b6776c35cafdeb19a4630481edf9873263dad313d64f1cb1e0a7e0fe399fec19124426457e25c321820b5282489c4bb95ed164d5570a88aa89f0
                                            SSDEEP:1536:87vbq1lGAXSEYQjbChaAU2yU23M51DjZgSQAvcYkFU:8D+CAXFYQChaAUk5ljnQs1
                                            TLSH:915302D02B75178C5671E87539EE306F8124562F329A2A101DA781CEFC1B213A9B7EFD
                                            File Content Preview:.ELF..............(......'..4...........4. ...(......................7...7.............................................c........................i..........?.E.h;....#..$..O.%.......y.A.U"......-R..e....<l>=).!...O........u.....`o..*ziy"......R..~@....x2'_

                                            ELF header

                                            Class:ELF32
                                            Data:2's complement, little endian
                                            Version:1 (current)
                                            Machine:ARM
                                            Version Number:0x1
                                            Type:EXEC (Executable file)
                                            OS/ABI:UNIX - Linux
                                            ABI Version:0
                                            Entry Point Address:0x22718
                                            Flags:0x5000202
                                            ELF Header Size:52
                                            Program Header Offset:52
                                            Program Header Size:32
                                            Number of Program Headers:2
                                            Section Header Offset:0
                                            Section Header Size:40
                                            Number of Section Headers:0
                                            Header String Table Index:0
                                            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                            LOAD0x00x100000x100000x137e90x137e97.99690x5R E0x10000
                                            LOAD0x6fc0x506fc0x506fc0x00x00.00000x6RW 0x10000
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 15, 2025 13:13:49.473964930 CEST37676443192.168.2.1354.217.10.153
                                            Apr 15, 2025 13:14:18.096930981 CEST58876443192.168.2.1354.171.230.55
                                            Apr 15, 2025 13:14:18.097002983 CEST4435887654.171.230.55192.168.2.13
                                            Apr 15, 2025 13:14:18.097073078 CEST58876443192.168.2.1354.171.230.55
                                            Apr 15, 2025 13:14:18.098954916 CEST58876443192.168.2.1354.171.230.55
                                            Apr 15, 2025 13:14:18.098968983 CEST4435887654.171.230.55192.168.2.13
                                            Apr 15, 2025 13:15:18.099172115 CEST58876443192.168.2.1354.171.230.55
                                            Apr 15, 2025 13:15:18.140276909 CEST4435887654.171.230.55192.168.2.13
                                            Apr 15, 2025 13:15:55.056065083 CEST4435887654.171.230.55192.168.2.13
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 15, 2025 13:13:51.664274931 CEST5336553192.168.2.131.1.1.1
                                            Apr 15, 2025 13:13:51.664352894 CEST4777953192.168.2.131.1.1.1
                                            Apr 15, 2025 13:13:51.772083998 CEST53477791.1.1.1192.168.2.13
                                            Apr 15, 2025 13:13:51.772119045 CEST53533651.1.1.1192.168.2.13
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Apr 15, 2025 13:13:51.664274931 CEST192.168.2.131.1.1.10xaa9Standard query (0)daisy.ubuntu.comA (IP address)IN (0x0001)false
                                            Apr 15, 2025 13:13:51.664352894 CEST192.168.2.131.1.1.10x93bbStandard query (0)daisy.ubuntu.com28IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Apr 15, 2025 13:13:51.772119045 CEST1.1.1.1192.168.2.130xaa9No error (0)daisy.ubuntu.com162.213.35.24A (IP address)IN (0x0001)false
                                            Apr 15, 2025 13:13:51.772119045 CEST1.1.1.1192.168.2.130xaa9No error (0)daisy.ubuntu.com162.213.35.25A (IP address)IN (0x0001)false

                                            System Behavior

                                            Start time (UTC):11:13:49
                                            Start date (UTC):15/04/2025
                                            Path:/tmp/.i.elf
                                            Arguments:/tmp/.i.elf
                                            File size:4956856 bytes
                                            MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                            Start time (UTC):11:15:17
                                            Start date (UTC):15/04/2025
                                            Path:/usr/bin/dash
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):11:15:17
                                            Start date (UTC):15/04/2025
                                            Path:/usr/bin/rm
                                            Arguments:rm -f /tmp/tmp.Uq55c4fVfp /tmp/tmp.Zb47z9JcwA /tmp/tmp.d1JBubbCY3
                                            File size:72056 bytes
                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                                            Start time (UTC):11:15:17
                                            Start date (UTC):15/04/2025
                                            Path:/usr/bin/dash
                                            Arguments:-
                                            File size:129816 bytes
                                            MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                            Start time (UTC):11:15:17
                                            Start date (UTC):15/04/2025
                                            Path:/usr/bin/rm
                                            Arguments:rm -f /tmp/tmp.Uq55c4fVfp /tmp/tmp.Zb47z9JcwA /tmp/tmp.d1JBubbCY3
                                            File size:72056 bytes
                                            MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b