Linux Analysis Report CTKpl4EfIw

Overview

General Information

Sample Name: CTKpl4EfIw
Analysis ID: 491781
MD5: abee54d0880d98307d664c8a12d060d2
SHA1: b25744cdc5d79b96b601161da0a358c8325c381e
SHA256: a8e150eebb41bfbb84f75ba3c3bc0662219ca3271af960b9f37b5f532d601f71
Tags: 32armelfmirai
Infos:

Detection

Score: 60
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Opens /proc/net/* files useful for finding connected devices and routers
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports

Classification

AV Detection:

barindex
Antivirus / Scanner detection for submitted sample
Source: CTKpl4EfIw Avira: detected
Multi AV Scanner detection for submitted file
Source: CTKpl4EfIw Virustotal: Detection: 38% Perma Link
Source: CTKpl4EfIw ReversingLabs: Detection: 44%

Spreading:

barindex
Opens /proc/net/* files useful for finding connected devices and routers
Source: /tmp/CTKpl4EfIw (PID: 5226) Opens: /proc/net/route Jump to behavior

Networking:

barindex
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.23:44652 -> 167.114.109.203:6525
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203

System Summary:

barindex
Sample has stripped symbol table
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal60.spre.lin@0/0@0/0

Malware Analysis System Evasion:

barindex
Uses the "uname" system call to query kernel version information (possible evasion)
Source: /tmp/CTKpl4EfIw (PID: 5226) Queries kernel information via 'uname': Jump to behavior
Source: CTKpl4EfIw, 5226.1.0000000010752dbe.0000000046640ae6.rw-.sdmp Binary or memory string: Bx86_64/usr/bin/qemu-arm/tmp/CTKpl4EfIwSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/CTKpl4EfIw
Source: CTKpl4EfIw, 5226.1.0000000019f697fe.000000000893cb70.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/arm
Source: CTKpl4EfIw, 5226.1.0000000019f697fe.000000000893cb70.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: CTKpl4EfIw, 5226.1.0000000010752dbe.0000000046640ae6.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs