Loading ...

Play interactive tourEdit tour

Linux Analysis Report syst3md

Overview

General Information

Sample Name:syst3md
Analysis ID:438274
MD5:5d33f7f4af840c8ee5a8fde96ef07495
SHA1:732186c30bcc72f0a295284fc4593b200aa84779
SHA256:efa9cf5ad8eb73556e34f2cbf4fb71df19e9956a4f0332a714bb6307395f3dcc
Infos:

Detection

Xmrig
Score:72
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
Found strings related to Crypto-Mining
Stdout / stderr contain strings indicative of a mining client
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Analysis Advice

Non-zero exit code suggests an error during the execution. Lookup the error code for hints.

General Information

Joe Sandbox Version:32.0.0 Black Diamond
Analysis ID:438274
Start date:22.06.2021
Start time:11:16:55
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 21s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:syst3md
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 16.04 x64 (Kernel 4.4.0-116, Firefox 59.0, Document Viewer 3.18.2, LibreOffice 5.1.6.2, OpenJDK 1.8.0_171)
Analysis Mode:default
Detection:MAL
Classification:mal72.mine.lin@0/0@0/0

Process Tree

  • system is lnxubuntu1
  • syst3md (PID: 4553, Parent: 4484, MD5: 5d33f7f4af840c8ee5a8fde96ef07495) Arguments: /tmp/syst3md
  • cleanup

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
syst3mdJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    4553.1.0000000000400000.0000000000a62000.r-x.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      Process Memory Space: syst3md PID: 4553JoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Antivirus / Scanner detection for submitted sampleShow sources
        Source: syst3mdAvira: detected
        Multi AV Scanner detection for submitted fileShow sources
        Source: syst3mdVirustotal: Detection: 37%Perma Link
        Source: syst3mdMetadefender: Detection: 28%Perma Link
        Source: syst3mdReversingLabs: Detection: 51%

        Bitcoin Miner:

        barindex
        Yara detected Xmrig cryptocurrency minerShow sources
        Source: Yara matchFile source: syst3md, type: SAMPLE
        Source: Yara matchFile source: 4553.1.0000000000400000.0000000000a62000.r-x.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: syst3md PID: 4553, type: MEMORY
        Found strings related to Crypto-MiningShow sources
        Source: syst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpString found in binary or memory: stratum+ssl://
        Source: syst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpString found in binary or memory: cryptonight/0
        Source: syst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpString found in binary or memory: -o, --url=URL URL of mining server
        Source: syst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpString found in binary or memory: stratum+tcp://
        Source: syst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
        Source: syst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpString found in binary or memory: XMRig 6.3.2
        Stdout / stderr contain strings indicative of a mining clientShow sources
        Source: /tmp/syst3mdStdout: xmrig
        Source: syst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpString found in binary or memory: http://www.gnu.org/software/libc/bugs.html
        Source: syst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpString found in binary or memory: https://gcc.gnu.org/bugsterminate
        Source: syst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpString found in binary or memory: https://xmrig.com/docs/algorithms
        Source: syst3md, 4553.1.00007f0d5f706000.00007f0d5f707000.rw-.sdmp, syst3md, 4553.1.0000000000f0c000.0000000000f2f000.rw-.sdmp, syst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpString found in binary or memory: https://xmrig.com/wizard
        Source: syst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpString found in binary or memory: https://xmrig.com/wizard%s
        Source: ELF static info symbol of initial sample.symtab present: no
        Source: classification engineClassification label: mal72.mine.lin@0/0@0/0
        Source: /tmp/syst3md (PID: 4553)Queries kernel information via 'uname': Jump to behavior

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Number of created Files
        • Is malicious
        • Internet

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        syst3md38%VirustotalBrowse
        syst3md31%MetadefenderBrowse
        syst3md52%ReversingLabsLinux.Coinminer.BitCoinMiner
        syst3md100%AviraLINUX/BitCoinMiner.ivhwt

        Dropped Files

        No Antivirus matches

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        https://xmrig.com/wizard0%URL Reputationsafe
        https://xmrig.com/wizard0%URL Reputationsafe
        https://xmrig.com/wizard0%URL Reputationsafe
        https://xmrig.com/wizard0%URL Reputationsafe
        https://xmrig.com/wizard%s0%URL Reputationsafe
        https://xmrig.com/wizard%s0%URL Reputationsafe
        https://xmrig.com/wizard%s0%URL Reputationsafe
        https://xmrig.com/wizard%s0%URL Reputationsafe
        https://xmrig.com/docs/algorithms0%URL Reputationsafe
        https://xmrig.com/docs/algorithms0%URL Reputationsafe
        https://xmrig.com/docs/algorithms0%URL Reputationsafe
        https://xmrig.com/docs/algorithms0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        No contacted domains info

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.gnu.org/software/libc/bugs.htmlsyst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpfalse
          high
          https://xmrig.com/wizardsyst3md, 4553.1.00007f0d5f706000.00007f0d5f707000.rw-.sdmp, syst3md, 4553.1.0000000000f0c000.0000000000f2f000.rw-.sdmp, syst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          https://gcc.gnu.org/bugsterminatesyst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpfalse
            high
            https://xmrig.com/wizard%ssyst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            https://xmrig.com/docs/algorithmssyst3md, 4553.1.0000000000400000.0000000000a62000.r-x.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown

            Contacted IPs

            No contacted IP infos


            Runtime Messages

            Command:/tmp/syst3md
            Exit Code:2
            Exit Code Info:
            Killed:False
            Standard Output:
            [2021-06-22 13:17:29.284] unable to open '/tmp/config.json'.
            [2021-06-22 13:17:29.285] no valid configuration found; try https://xmrig.com/wizard
            Standard Error:

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            No created / dropped files found

            Static File Info

            General

            File type:ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), statically linked, for GNU/Linux 2.6.18, BuildID[sha1]=abbd7cc45284dffd19b3e61e1f31b03e44addc00, stripped
            Entropy (8bit):6.400341977070569
            TrID:
            • ELF Executable and Linkable format (generic) (4004/1) 100.00%
            File name:syst3md
            File size:6960840
            MD5:5d33f7f4af840c8ee5a8fde96ef07495
            SHA1:732186c30bcc72f0a295284fc4593b200aa84779
            SHA256:efa9cf5ad8eb73556e34f2cbf4fb71df19e9956a4f0332a714bb6307395f3dcc
            SHA512:ce41cc41a16d3c687d7ad100d87144bf622e2071e528bd514bfefb38a95370770b05197dffc415351cea269902d07e2161cc9156570556c468a7cff7f95c7b12
            SSDEEP:98304:Yk/JyyJ/B+ga0px70IlOOiiOOO+OOO+OOOTxkxkxPpxNpxfGQvvANnUr+sdcJZ7V:Yk/syJZba5unAtLEyB6tpN/jO/N1s
            File Content Preview:.ELF..............>...... @.....@.......H/j.........@.8...@.......................@.......@.......f.......f....... .............`$f.....`$......`$..............xo........ .......................@.......@.....D.......D.......................`$f.....`$.....

            Static ELF Info

            ELF header

            Class:ELF64
            Data:2's complement, little endian
            Version:1 (current)
            Machine:Advanced Micro Devices X86-64
            Version Number:0x1
            Type:EXEC (Executable file)
            OS/ABI:UNIX - Linux
            ABI Version:0
            Entry Point Address:0x4020a4
            Flags:0x0
            ELF Header Size:64
            Program Header Offset:64
            Program Header Size:56
            Number of Program Headers:6
            Section Header Offset:6958920
            Section Header Size:64
            Number of Section Headers:30
            Header String Table Index:29

            Sections

            NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
            NULL0x00x00x00x00x0000
            .note.ABI-tagNOTE0x4001900x1900x200x00x2A004
            .note.gnu.build-idNOTE0x4001b00x1b00x240x00x2A004
            .rela.pltRELA0x4001d80x1d80x1b00x180x42AI0238
            .initPROGBITS0x4003880x3880xe0x00x6AX004
            .pltPROGBITS0x4003a00x3a00x1200x00x6AX0016
            .textPROGBITS0x4004c00x4c00x4d6cd40x00x6AX0064
            __libc_freeres_fnPROGBITS0x8d71a00x4d71a00x1c810x00x6AX0016
            __libc_thread_freeres_fnPROGBITS0x8d8e300x4d8e300x2180x00x6AX0016
            .finiPROGBITS0x8d90480x4d90480x90x00x6AX004
            .rodataPROGBITS0x8d90800x4d90800xde0280x00x2A0064
            __libc_subfreeresPROGBITS0x9b70a80x5b70a80xa80x00x2A008
            __libc_atexitPROGBITS0x9b71500x5b71500x80x00x2A008
            __libc_thread_subfreeresPROGBITS0x9b71580x5b71580x100x00x2A008
            .stapsdt.basePROGBITS0x9b71680x5b71680x10x00x2A001
            .eh_framePROGBITS0x9b71700x5b71700x9f4640x00x2A008
            .gcc_except_tablePROGBITS0xa565d40x6565d40xb8040x00x2A004
            .tdataPROGBITS0xc624600x6624600x280x00x403WAT0016
            .tbssNOBITS0xc624900x6624880x580x00x403WAT0016
            .init_arrayINIT_ARRAY0xc624900x6624900x1b00x80x3WA008
            .fini_arrayFINI_ARRAY0xc626400x6626400x180x80x3WA008
            .data.rel.roPROGBITS0xc626600x6626600x338fc0x00x3WA0032
            .gotPROGBITS0xc95f600x695f600x880x80x3WA008
            .got.pltPROGBITS0xc960000x6960000xa80x80x3WA008
            .dataPROGBITS0xc960c00x6960c00xca480x00x3WA0032
            .bssNOBITS0xca2b400x6a2b080xa68500x00x3WA0064
            __libc_freeres_ptrsNOBITS0xd493900x6a2b080x480x00x3WA008
            .commentPROGBITS0x00x6a2b080x590x10x30MS001
            .note.stapsdtNOTE0x00x6a2b640x28c0x00x0004
            .shstrtabSTRTAB0x00x6a2df00x1540x00x0001

            Program Segments

            TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
            LOAD0x00x4000000x4000000x661dd80x661dd83.98850x5R E0x200000.note.ABI-tag .note.gnu.build-id .rela.plt .init .plt .text __libc_freeres_fn __libc_thread_freeres_fn .fini .rodata __libc_subfreeres __libc_atexit __libc_thread_subfreeres .stapsdt.base .eh_frame .gcc_except_table
            LOAD0x6624600xc624600xc624600x406a80xe6f781.72580x6RW 0x200000.init_array .fini_array .data.rel.ro .got .got.plt .data .bss __libc_freeres_ptrs
            NOTE0x1900x4001900x4001900x440x442.44130x4R 0x4.note.ABI-tag .note.gnu.build-id
            TLS0x6624600xc624600xc624600x280x880.81730x4R 0x10
            GNU_STACK0x00x00x00x00x00.00000x6RW 0x10
            GNU_RELRO0x6624600xc624600xc624600x33ba00x33ba01.56670x4R 0x1.init_array .fini_array .data.rel.ro .got

            Network Behavior

            No network behavior found

            System Behavior

            General

            Start time:11:17:29
            Start date:22/06/2021
            Path:/tmp/syst3md
            Arguments:/tmp/syst3md
            File size:6960840 bytes
            MD5 hash:5d33f7f4af840c8ee5a8fde96ef07495