Linux Analysis Report fVNp9NC9l9

Overview

General Information

Sample Name: fVNp9NC9l9
Analysis ID: 491760
MD5: 3ad11448f98fc08e6c1107c4327ab97f
SHA1: 9c0d1819f9b9292119560e21b8d2ff4c2f66316d
SHA256: 40b4a8e91427b81ee97fb43a56edce02dce93f88a6c55ad698c50693fb069f6b
Tags: 32elfintel
Infos:

Detection

Mirai
Score: 60
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Yara detected Mirai
Opens /proc/net/* files useful for finding connected devices and routers
Sample contains only a LOAD segment without any section mappings
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: fVNp9NC9l9 Virustotal: Detection: 28% Perma Link
Source: fVNp9NC9l9 ReversingLabs: Detection: 46%

Spreading:

barindex
Opens /proc/net/* files useful for finding connected devices and routers
Source: /tmp/fVNp9NC9l9 (PID: 5220) Opens: /proc/net/route Jump to behavior

Networking:

barindex
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.23:49078 -> 45.142.182.126:666
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.126
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.126
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.126
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.126
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.126
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.126
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.126
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.126
Source: unknown TCP traffic detected without corresponding DNS query: 45.142.182.126

System Summary:

barindex
Sample contains only a LOAD segment without any section mappings
Source: LOAD without section mappings Program segment: 0x8048000
Source: classification engine Classification label: mal60.spre.troj.lin@0/0@0/0

Stealing of Sensitive Information:

barindex
Yara detected Mirai
Source: Yara match File source: 5221.1.000000001a887bdc.00000000531557b5.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5220.1.000000001a887bdc.00000000531557b5.r-x.sdmp, type: MEMORY

Remote Access Functionality:

barindex
Yara detected Mirai
Source: Yara match File source: 5221.1.000000001a887bdc.00000000531557b5.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5220.1.000000001a887bdc.00000000531557b5.r-x.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs