Linux Analysis Report jC0B6sMh1d

Overview

General Information

Sample Name: jC0B6sMh1d
Analysis ID: 510737
MD5: b1feb3a904e964c32206daa7bdfe32c1
SHA1: 560cd5a67dba861edbe52c7b22b8d4e5894cd599
SHA256: 87a8709a03cdf2cbe97b4e11e6ad89fc49067747b022fdc44d62ba2ace63fb0a
Tags: 32elfgafgytpowerpc
Infos:

Detection

Score: 48
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: jC0B6sMh1d Virustotal: Detection: 55% Perma Link

Networking:

barindex
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.23:52604 -> 45.148.120.226:666
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 45.148.120.226
Source: unknown TCP traffic detected without corresponding DNS query: 45.148.120.226
Source: unknown TCP traffic detected without corresponding DNS query: 45.148.120.226
Source: unknown TCP traffic detected without corresponding DNS query: 45.148.120.226
Source: unknown TCP traffic detected without corresponding DNS query: 45.148.120.226
Source: unknown TCP traffic detected without corresponding DNS query: 45.148.120.226
Source: unknown TCP traffic detected without corresponding DNS query: 45.148.120.226
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 45.148.120.226
Source: unknown TCP traffic detected without corresponding DNS query: 45.148.120.226
Source: unknown TCP traffic detected without corresponding DNS query: 45.148.120.226
Source: unknown TCP traffic detected without corresponding DNS query: 45.148.120.226
Source: unknown TCP traffic detected without corresponding DNS query: 45.148.120.226
Source: unknown TCP traffic detected without corresponding DNS query: 45.148.120.226
Source: ELF static info symbol of initial sample FILE: libc/sysdeps/linux/powerpc/brk.S
Source: ELF static info symbol of initial sample FILE: libc/sysdeps/linux/powerpc/crt1.S
Source: ELF static info symbol of initial sample FILE: libc/sysdeps/linux/powerpc/crti.S
Source: ELF static info symbol of initial sample FILE: libc/sysdeps/linux/powerpc/crtn.S
Source: ELF static info symbol of initial sample FILE: libc/sysdeps/linux/powerpc/vfork.S
Source: classification engine Classification label: mal48.lin@0/0@0/0
Source: jC0B6sMh1d Joe Sandbox Cloud Basic: Detection: clean Score: 0 Perma Link

Malware Analysis System Evasion:

barindex
Uses the "uname" system call to query kernel version information (possible evasion)
Source: /tmp/jC0B6sMh1d (PID: 5241) Queries kernel information via 'uname': Jump to behavior
Source: jC0B6sMh1d, 5241.1.0000000047821213.00000000e04a999f.rw-.sdmp Binary or memory string: !/etc/qemu-binfmt/ppc11!hotpluggableq
Source: jC0B6sMh1d, 5249.1.0000000047821213.00000000e04a999f.rw-.sdmp Binary or memory string: !/etc/qemu-binfmt/ppc1
Source: jC0B6sMh1d, 5241.1.0000000047821213.00000000e04a999f.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/ppc
Source: jC0B6sMh1d, 5241.1.00000000f8a2bfd4.00000000c155a1d0.rw-.sdmp Binary or memory string: /usr/bin/qemu-ppc
Source: jC0B6sMh1d, 5241.1.00000000f8a2bfd4.00000000c155a1d0.rw-.sdmp Binary or memory string: 3~Nox86_64/usr/bin/qemu-ppc/tmp/jC0B6sMh1dSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/jC0B6sMh1d
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs