Play interactive tourEdit tour
Analysis Report Mozi.m
Overview
General Information
Sample Name: | Mozi.m |
Analysis ID: | 376062 |
MD5: | fbe51695e97a45dc61967dc3241a37dc |
SHA1: | 1ed14334b5b71783cd6ec14b8a704fe48e600cf0 |
SHA256: | 2e4506802aedea2e6d53910dfb296323be6620ac08c4b799a879eace5923a7b6 |
Infos: |
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Sample contains only a LOAD segment without any section mappings
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match
Classification
Startup |
---|
|
Yara Overview |
---|
Initial Sample |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_ELF_LNX_UPX_Compressed_File | Detects a suspicious ELF binary with UPX compression | Florian Roth |
|
Signature Overview |
---|
Click to jump to signature section
Show All Signature Results
AV Detection: |
---|
Antivirus / Scanner detection for submitted sample | Show sources |
Source: | Avira: |
Multi AV Scanner detection for submitted file | Show sources |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | String found in binary or memory: |
Source: | Program segment: |
Source: | Matched rule: |
Source: | Classification label: |
Data Obfuscation: |
---|
Sample is packed with UPX | Show sources |
Source: | String containing UPX found: | ||
Source: | String containing UPX found: | ||
Source: | String containing UPX found: |
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior | ||
Source: | Queries kernel information via 'uname': | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | Obfuscated Files or Information1 | OS Credential Dumping | Security Software Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Behavior Graph |
---|
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
58% | Virustotal | Browse | ||
42% | Metadefender | Browse | ||
67% | ReversingLabs | Linux.Trojan.Mirai | ||
100% | Avira | LINUX/Mirai.souoo |
Dropped Files |
---|
No Antivirus matches |
---|
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
No Antivirus matches |
---|
Domains and IPs |
---|
Contacted Domains |
---|
No contacted domains info |
---|
URLs from Memory and Binaries |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
Contacted IPs |
---|
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 376062 |
Start date: | 25.03.2021 |
Start time: | 17:29:11 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 34s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | Mozi.m |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 16.04 x64 (Kernel 4.4.0-116, Firefox 59.0, Document Viewer 3.18.2, LibreOffice 5.1.6.2, OpenJDK 1.8.0_171) |
Analysis Mode: | default |
Detection: | MAL |
Classification: | mal60.evad.linM@0/2@0/0 |
Runtime Messages |
---|
Command: | /tmp/Mozi.m |
Exit Code: | 133 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: | qemu: uncaught target signal 5 (Trace/breakpoint trap) - core dumped |
Joe Sandbox View / Context |
---|
Created / dropped Files |
---|
Process: | /usr/share/apport/apport-checkreports |
File Type: | |
Category: | dropped |
Size (bytes): | 14915 |
Entropy (8bit): | 4.642724747915074 |
Encrypted: | false |
SSDEEP: | 96:7T3c8MJs/6lfjG68SSH1erbDb7GDvusd+ujtEJvXnnEIoJPI3d4YXrM:7T34cnH120Xd+HnnEIoPIthbM |
MD5: | C1F2F4B13925C2B4A6564597C90C0413 |
SHA1: | AFF846787F203772B1404A7462762952438354CE |
SHA-256: | 4FEBEABAB41B149A6050D43CCB14BBCC5484E802E3AD642566EC0A339431B1A4 |
SHA-512: | 022DA45937311A8749780F1CC22F4EDDCDC1FF7B9755BDEDD6F087F8049DE388648C423099DCDC3987098D1BB98171E3679B5E7ACAF948A20D2C7BFD41F5985C |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | /usr/share/apport/apport-gtk |
File Type: | |
Category: | dropped |
Size (bytes): | 47094 |
Entropy (8bit): | 4.480160527917045 |
Encrypted: | false |
SSDEEP: | 768:6p5g2n/D/1/x/rNsaKWVsIwNZKE0an65kueKf:T2n/D/1/x//NVsIwN70an65kueKf |
MD5: | 4102F0DC2B1268F109DEE23CBFB4CD30 |
SHA1: | 59060DE11AD450747C9AB6D54C55529742531790 |
SHA-256: | 1EA55C5AD2F2994C64A033FB8E36AF244BAE309E04C0FDE56300A9A73840C408 |
SHA-512: | F021A6355463C490A66CED871CC06F8C6E22B832FA6027096DDC692B10724E1F7BF7ACDB062AB76F0B208EDF89BF0B2714A52AC926C2FC352252CA5FC51DF6D9 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.813753507680382 |
TrID: |
|
File name: | Mozi.m |
File size: | 132876 |
MD5: | fbe51695e97a45dc61967dc3241a37dc |
SHA1: | 1ed14334b5b71783cd6ec14b8a704fe48e600cf0 |
SHA256: | 2e4506802aedea2e6d53910dfb296323be6620ac08c4b799a879eace5923a7b6 |
SHA512: | c35eab56ba59beb2ec2b362e4d1aae734fadc2d9db1d720439337dcade13ec9c7b68da9d03821efc7277abaf9bace342ff35593373e04c67327d5f7db460ad8a |
SSDEEP: | 3072:/TNVO/QJHZcfFj4rwLQGTNO5VZLwHm7vuQTpZUyY6cot:7O/QJHZweEL/NOjCHm7FZZncI |
File Content Preview: | .ELF.....................A.h...4.........4. ...(.............@...@...........................C...C...................*.*UPX!.X.....................\....|.$..ELF..........@.`....4..^h... ...(......<...@......ll.....H.W.`.t.d....dt.Q.....].M............6... |
Static ELF Info |
---|
ELF header | |
---|---|
Class: | |
Data: | |
Version: | |
Machine: | |
Version Number: | |
Type: | |
OS/ABI: | |
ABI Version: | |
Entry Point Address: | |
Flags: | |
ELF Header Size: | |
Program Header Offset: | |
Program Header Size: | |
Number of Program Headers: | |
Section Header Offset: | |
Section Header Size: | |
Number of Section Headers: | |
Header String Table Index: |
Program Segments |
---|
Type | Offset | Virtual Address | Physical Address | File Size | Memory Size | Flags | Flags Description | Align | Prog Interpreter | Section Mappings |
---|---|---|---|---|---|---|---|---|---|---|
LOAD | 0x0 | 0x400000 | 0x400000 | 0x205b2 | 0x205b2 | 0x5 | R E | 0x10000 | ||
LOAD | 0x0 | 0x430000 | 0x430000 | 0x0 | 0x8ac18 | 0x6 | RW | 0x10000 |
Network Behavior |
---|
No network behavior found |
---|
System Behavior |
---|
General |
---|
Start time: | 17:29:42 |
Start date: | 25/03/2021 |
Path: | /tmp/Mozi.m |
Arguments: | /usr/bin/qemu-mips /tmp/Mozi.m |
File size: | 132876 bytes |
MD5 hash: | fbe51695e97a45dc61967dc3241a37dc |
General |
---|
Start time: | 17:29:42 |
Start date: | 25/03/2021 |
Path: | /sbin/upstart |
Arguments: | n/a |
File size: | 0 bytes |
MD5 hash: | 00000000000000000000000000000000 |
General |
---|
Start time: | 17:29:42 |
Start date: | 25/03/2021 |
Path: | /bin/sh |
Arguments: | /bin/sh -e /proc/self/fd/9 |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
General |
---|
Start time: | 17:29:42 |
Start date: | 25/03/2021 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
General |
---|
Start time: | 17:29:42 |
Start date: | 25/03/2021 |
Path: | /bin/date |
Arguments: | date |
File size: | 68464 bytes |
MD5 hash: | 54903b613f9019bfca9f5d28a4fff34e |
General |
---|
Start time: | 17:29:42 |
Start date: | 25/03/2021 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
General |
---|
Start time: | 17:29:42 |
Start date: | 25/03/2021 |
Path: | /usr/share/apport/apport-checkreports |
Arguments: | /usr/bin/python3 /usr/share/apport/apport-checkreports --system |
File size: | 1269 bytes |
MD5 hash: | 1a7d84ebc34df04e55ca3723541f48c9 |
General |
---|
Start time: | 17:29:42 |
Start date: | 25/03/2021 |
Path: | /sbin/upstart |
Arguments: | n/a |
File size: | 0 bytes |
MD5 hash: | 00000000000000000000000000000000 |
General |
---|
Start time: | 17:29:42 |
Start date: | 25/03/2021 |
Path: | /bin/sh |
Arguments: | /bin/sh -e /proc/self/fd/9 |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
General |
---|
Start time: | 17:29:42 |
Start date: | 25/03/2021 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
General |
---|
Start time: | 17:29:42 |
Start date: | 25/03/2021 |
Path: | /bin/date |
Arguments: | date |
File size: | 68464 bytes |
MD5 hash: | 54903b613f9019bfca9f5d28a4fff34e |
General |
---|
Start time: | 17:29:42 |
Start date: | 25/03/2021 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
General |
---|
Start time: | 17:29:42 |
Start date: | 25/03/2021 |
Path: | /usr/share/apport/apport-gtk |
Arguments: | /usr/bin/python3 /usr/share/apport/apport-gtk |
File size: | 23806 bytes |
MD5 hash: | ec58a49a30ef6a29406a204f28cc7d87 |
General |
---|
Start time: | 17:29:43 |
Start date: | 25/03/2021 |
Path: | /sbin/upstart |
Arguments: | n/a |
File size: | 0 bytes |
MD5 hash: | 00000000000000000000000000000000 |
General |
---|
Start time: | 17:29:43 |
Start date: | 25/03/2021 |
Path: | /bin/sh |
Arguments: | /bin/sh -e /proc/self/fd/9 |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
General |
---|
Start time: | 17:29:43 |
Start date: | 25/03/2021 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
General |
---|
Start time: | 17:29:43 |
Start date: | 25/03/2021 |
Path: | /bin/date |
Arguments: | date |
File size: | 68464 bytes |
MD5 hash: | 54903b613f9019bfca9f5d28a4fff34e |
General |
---|
Start time: | 17:29:43 |
Start date: | 25/03/2021 |
Path: | /bin/sh |
Arguments: | n/a |
File size: | 4 bytes |
MD5 hash: | e02ea3c3450d44126c46d658fa9e654c |
General |
---|
Start time: | 17:29:43 |
Start date: | 25/03/2021 |
Path: | /usr/share/apport/apport-gtk |
Arguments: | /usr/bin/python3 /usr/share/apport/apport-gtk |
File size: | 23806 bytes |
MD5 hash: | ec58a49a30ef6a29406a204f28cc7d87 |