Linux Analysis Report UnHAnaAW.arm5

Overview

General Information

Sample Name: UnHAnaAW.arm5
Analysis ID: 553497
MD5: 1ab9ba9183a1cfc793e53d95c053a94f
SHA1: 0f89abb2535540236747f7509c00e7730805132b
SHA256: 0e96c432e77949a73df5b0b52a741ce1d10e74aa5b2e70f7345dfd577d07a96c
Infos:

Detection

Score: 48
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Sample has stripped symbol table

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: UnHAnaAW.arm5 ReversingLabs: Detection: 48%

Networking:

barindex
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 207.188.71.177
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 41.180.144.215
Source: unknown TCP traffic detected without corresponding DNS query: 121.131.157.253
Source: unknown TCP traffic detected without corresponding DNS query: 207.134.109.11
Source: unknown TCP traffic detected without corresponding DNS query: 197.234.233.181

System Summary:

barindex
Sample has stripped symbol table
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal48.linARM5@0/0@0/0

Malware Analysis System Evasion:

barindex
Uses the "uname" system call to query kernel version information (possible evasion)
Source: /tmp/UnHAnaAW.arm5 (PID: 5200) Queries kernel information via 'uname': Jump to behavior
Source: UnHAnaAW.arm5, 5200.1.00000000f4b54758.00000000cb93636f.rw-.sdmp Binary or memory string: qemu: %s: %s
Source: UnHAnaAW.arm5, 5200.1.00000000f4b54758.00000000cb93636f.rw-.sdmp Binary or memory string: leqemu: %s: %s
Source: UnHAnaAW.arm5, 5200.1.0000000091dc3d8c.0000000048b8234f.rw-.sdmp Binary or memory string: 4Vrg.qemu.gdb.arm.sys.regs">
Source: UnHAnaAW.arm5, 5200.1.00000000f4b54758.00000000cb93636f.rw-.sdmp Binary or memory string: 9E{x86_64/usr/bin/qemu-arm/tmp/UnHAnaAW.arm5SUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/UnHAnaAW.arm5
Source: UnHAnaAW.arm5, 5200.1.0000000091dc3d8c.0000000048b8234f.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: UnHAnaAW.arm5, 5200.1.00000000f4b54758.00000000cb93636f.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
Source: UnHAnaAW.arm5, 5200.1.0000000091dc3d8c.0000000048b8234f.rw-.sdmp Binary or memory string: rg.qemu.gdb.arm.sys.regs">
Source: UnHAnaAW.arm5, 5200.1.0000000091dc3d8c.0000000048b8234f.rw-.sdmp Binary or memory string: 4V!/etc/qemu-binfmt/arm
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs