Analysis Report bin.sh.2

Overview

General Information

Sample Name: bin.sh.2
Analysis ID: 321472
MD5: a73ddd6ec22462db955439f665cad4e6
SHA1: ac6962542a4b23ac13bddff22f8df9aeb702ef12
SHA256: b5cf68c7cb5bb2d21d60bf6654926f61566d95bfd7c9f9e182d032f1da5b4605

Detection

Score: 60
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Creates hidden files and/or directories
Executes the "grep" command used to find patterns in files or piped streams
Executes the "mkdir" command used to create folders
Executes the "mktemp" command used to create a temporary unique file name
Executes the "rm" command used to delete files or directories
Executes the "sleep" command used to delay execution and potentially evade sandboxes
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: bin.sh.2 Avira: detected
Multi AV Scanner detection for submitted file
Source: bin.sh.2 Virustotal: Detection: 61% Perma Link
Source: bin.sh.2 Metadefender: Detection: 15% Perma Link
Source: bin.sh.2 ReversingLabs: Detection: 58%
Source: bin.sh.2 String found in binary or memory: http://upx.sf.net

System Summary:

barindex
Sample contains only a LOAD segment without any section mappings
Source: LOAD without section mappings Program segment: 0x400000
Yara signature match
Source: bin.sh.2, type: SAMPLE Matched rule: SUSP_ELF_LNX_UPX_Compressed_File date = 2018-12-12, author = Florian Roth, description = Detects a suspicious ELF binary with UPX compression, reference = Internal Research, score = 038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4
Source: classification engine Classification label: mal60.evad.lin2@0/11@0/0

Data Obfuscation:

barindex
Sample is packed with UPX
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Id: UPX 3.95 Copyright (C) 1996-2018 the UPX Team. All Rights Reserved. $

Persistence and Installation Behavior:

barindex
Creates hidden files and/or directories
Source: /bin/mkdir (PID: 3734) Directory: .cache
Source: /bin/mkdir (PID: 3743) Directory: .cache
Executes the "grep" command used to find patterns in files or piped streams
Source: /bin/egrep (PID: 3744) Grep executable: /bin/grep -> grep -E [^[:print:]] /home/user/.cache/logrotate/status
Executes the "mkdir" command used to create folders
Source: /sbin/resolvconf (PID: 3695) Mkdir executable: /bin/mkdir -> mkdir -p /run/resolvconf/interface
Source: /bin/dash (PID: 3734) Mkdir executable: /bin/mkdir -> mkdir -p /home/user/.cache/logrotate
Source: /bin/dash (PID: 3743) Mkdir executable: /bin/mkdir -> mkdir -p /home/user/.cache/upstart
Executes the "mktemp" command used to create a temporary unique file name
Source: /bin/dash (PID: 3774) Mktemp executable: /bin/mktemp -> mktemp
Executes the "rm" command used to delete files or directories
Source: /bin/dash (PID: 3871) Rm executable: /bin/rm -> rm -f /tmp/tmp.Z3ICkFc8SF

Malware Analysis System Evasion:

barindex
Executes the "sleep" command used to delay execution and potentially evade sandboxes
Source: /bin/dash (PID: 3192) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3223) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3255) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3276) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3309) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3345) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3373) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3402) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3431) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3457) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3574) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3615) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3638) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3666) Sleep executable: /bin/sleep -> sleep 1
Uses the "uname" system call to query kernel version information (possible evasion)
Source: /tmp/bin.sh.2 (PID: 3475) Queries kernel information via 'uname':
Source: /usr/share/apport/apport-gtk (PID: 3519) Queries kernel information via 'uname':
Source: /usr/share/apport/apport-gtk (PID: 3546) Queries kernel information via 'uname':

No Screenshots

No contacted IP infos