Analysis Report nsu

Overview

General Information

Sample Name: nsu
Analysis ID: 324350
MD5: 856d3c4cd13172355643638458e72f39
SHA1: 8f8a112aecddc2fbef07f989dca48862b70b0628
SHA256: b1047a2a9faf9e080c8cc8422fdb2ec4fd087963b597378903d2ebb8f24372dd

Detection

Score: 4
Range: 0 - 100
Whitelisted: false

Signatures

Creates hidden files and/or directories
Executes the "grep" command used to find patterns in files or piped streams
Executes the "mkdir" command used to create folders
Executes the "mktemp" command used to create a temporary unique file name
Executes the "rm" command used to delete files or directories
Executes the "sleep" command used to delay execution and potentially evade sandboxes
Sample contains strings that are potentially command strings
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

System Summary:

barindex
Sample contains strings that are potentially command strings
Source: Initial sample Potential command found: status == __codecvt_partial
Source: Initial sample Potential command found: status == __codecvt_partial_IO_wfile_underflowwfileops.c,ccs=fcts.tomb_nsteps == 1_IO_new_file_fopenfcts.towc_nsteps == 1TRIM_THRESHOLD_MMAP_THRESHOLD_MMAP_MAX_TOP_PAD_malloc: top chunk is corrupt
Source: Initial sample Potential command found: status == __GCONV_OK || status == __GCONV_EMPTY_INPUT || status == __GCONV_ILLEGAL_INPUT || status == __GCONV_INCOMPLETE_INPUT || status == __GCONV_FULL_OUTPUT
Source: Initial sample Potential command found: file too short
Source: Initial sample Potential command found: find library=%s; searching
Sample has stripped symbol table
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: clean4.lin@0/9@0/0

Persistence and Installation Behavior:

barindex
Creates hidden files and/or directories
Source: /bin/mkdir (PID: 3652) Directory: .cache
Source: /bin/mkdir (PID: 3653) Directory: .cache
Executes the "grep" command used to find patterns in files or piped streams
Source: /bin/egrep (PID: 3654) Grep executable: /bin/grep -> grep -E [^[:print:]] /home/user/.cache/logrotate/status
Executes the "mkdir" command used to create folders
Source: /sbin/resolvconf (PID: 3613) Mkdir executable: /bin/mkdir -> mkdir -p /run/resolvconf/interface
Source: /bin/dash (PID: 3652) Mkdir executable: /bin/mkdir -> mkdir -p /home/user/.cache/logrotate
Source: /bin/dash (PID: 3653) Mkdir executable: /bin/mkdir -> mkdir -p /home/user/.cache/upstart
Executes the "mktemp" command used to create a temporary unique file name
Source: /bin/dash (PID: 3689) Mktemp executable: /bin/mktemp -> mktemp
Executes the "rm" command used to delete files or directories
Source: /bin/dash (PID: 3787) Rm executable: /bin/rm -> rm -f /tmp/tmp.zmF3WJPRCX

Malware Analysis System Evasion:

barindex
Executes the "sleep" command used to delay execution and potentially evade sandboxes
Source: /bin/dash (PID: 3198) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3221) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3258) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3277) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3306) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3338) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3370) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3403) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3427) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3454) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3492) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3535) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3558) Sleep executable: /bin/sleep -> sleep 1
Source: /bin/dash (PID: 3576) Sleep executable: /bin/sleep -> sleep 1
Uses the "uname" system call to query kernel version information (possible evasion)
Source: /tmp/nsu (PID: 3479) Queries kernel information via 'uname':

No Screenshots

No contacted IP infos