Linux Analysis Report 78mne21kC0

Overview

General Information

Sample Name: 78mne21kC0
Analysis ID: 491790
MD5: 12cf087e49d1f9abc65f3b9f6d62470c
SHA1: 464abb479aa8d908d534ba39691b427e21b65566
SHA256: 9b4db7f46e24f6f9748d2b82a2497fe237fce6b1f4922c6a4eaffd286a2d3466
Tags: 32elfmiraimotorola
Infos:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Opens /proc/net/* files useful for finding connected devices and routers
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Sample has stripped symbol table

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: 78mne21kC0 Virustotal: Detection: 47% Perma Link
Source: 78mne21kC0 ReversingLabs: Detection: 46%

Spreading:

barindex
Opens /proc/net/* files useful for finding connected devices and routers
Source: /tmp/78mne21kC0 (PID: 5226) Opens: /proc/net/route Jump to behavior

Networking:

barindex
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.23:44652 -> 167.114.109.203:6525
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203
Source: unknown TCP traffic detected without corresponding DNS query: 167.114.109.203

System Summary:

barindex
Sample has stripped symbol table
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal52.spre.lin@0/1@0/0

Malware Analysis System Evasion:

barindex
Uses the "uname" system call to query kernel version information (possible evasion)
Source: /tmp/78mne21kC0 (PID: 5226) Queries kernel information via 'uname': Jump to behavior
Source: 78mne21kC0, 5226.1.000000001e77fee7.0000000066c953cb.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/m68k
Source: 78mne21kC0, 5226.1.000000002f8e5260.0000000019954b0f.rw-.sdmp Binary or memory string: U/tmp/qemu-open.cFPgFo\4
Source: 78mne21kC0, 5226.1.000000002f8e5260.0000000019954b0f.rw-.sdmp Binary or memory string: /tmp/qemu-open.cFPgFo
Source: 78mne21kC0, 5226.1.000000002f8e5260.0000000019954b0f.rw-.sdmp Binary or memory string: /usr/bin/qemu-m68k
Source: 78mne21kC0, 5226.1.000000001e77fee7.0000000066c953cb.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/m68k
Source: 78mne21kC0, 5226.1.000000002f8e5260.0000000019954b0f.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-m68k/tmp/78mne21kC0SUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/78mne21kC0
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs