Linux Analysis Report
VQemUYjLmL

Overview

General Information

Sample Name: VQemUYjLmL
Analysis ID: 626465
MD5: 9bf5c9ac9cacd58b0d008938167c3d7d
SHA1: b57f925cbdad949ad41db5c57c0774a2cbf6d282
SHA256: 9cae0351a33e4b4c74263920dd8f1fee4e03d14022ff2caf631d367023b53fa8
Tags: 32elfintelmirai
Infos:

Detection

Mirai
Score: 60
Range: 0 - 100
Whitelisted: false

Signatures

Yara detected Mirai
Multi AV Scanner detection for submitted file
Sample is packed with UPX
Sample contains only a LOAD segment without any section mappings
Enumerates processes within the "proc" file system
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Sample tries to kill a process (SIGKILL)

Classification

AV Detection

barindex
Source: VQemUYjLmL Virustotal: Detection: 40% Perma Link
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:60988 -> 107.172.197.117:1312
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 107.172.197.117
Source: unknown TCP traffic detected without corresponding DNS query: 106.38.78.67
Source: unknown TCP traffic detected without corresponding DNS query: 211.29.213.67
Source: unknown TCP traffic detected without corresponding DNS query: 167.121.231.169
Source: unknown TCP traffic detected without corresponding DNS query: 164.59.8.64
Source: unknown TCP traffic detected without corresponding DNS query: 197.249.7.53
Source: unknown TCP traffic detected without corresponding DNS query: 208.238.100.146
Source: unknown TCP traffic detected without corresponding DNS query: 78.22.214.152
Source: unknown TCP traffic detected without corresponding DNS query: 43.104.156.175
Source: unknown TCP traffic detected without corresponding DNS query: 193.99.120.233
Source: unknown TCP traffic detected without corresponding DNS query: 146.252.206.10
Source: unknown TCP traffic detected without corresponding DNS query: 159.122.186.232
Source: unknown TCP traffic detected without corresponding DNS query: 68.245.215.101
Source: unknown TCP traffic detected without corresponding DNS query: 79.182.104.166
Source: unknown TCP traffic detected without corresponding DNS query: 164.13.129.250
Source: unknown TCP traffic detected without corresponding DNS query: 79.157.164.86
Source: unknown TCP traffic detected without corresponding DNS query: 154.187.41.100
Source: unknown TCP traffic detected without corresponding DNS query: 213.9.35.54
Source: unknown TCP traffic detected without corresponding DNS query: 204.140.249.124
Source: unknown TCP traffic detected without corresponding DNS query: 73.196.193.46
Source: unknown TCP traffic detected without corresponding DNS query: 104.45.93.135
Source: unknown TCP traffic detected without corresponding DNS query: 155.24.153.232
Source: unknown TCP traffic detected without corresponding DNS query: 37.133.254.246
Source: unknown TCP traffic detected without corresponding DNS query: 106.211.14.146
Source: unknown TCP traffic detected without corresponding DNS query: 187.115.98.97
Source: unknown TCP traffic detected without corresponding DNS query: 89.253.203.20
Source: unknown TCP traffic detected without corresponding DNS query: 70.111.42.24
Source: unknown TCP traffic detected without corresponding DNS query: 246.82.17.49
Source: unknown TCP traffic detected without corresponding DNS query: 19.55.53.44
Source: unknown TCP traffic detected without corresponding DNS query: 157.244.187.42
Source: unknown TCP traffic detected without corresponding DNS query: 20.217.196.70
Source: unknown TCP traffic detected without corresponding DNS query: 74.44.118.39
Source: unknown TCP traffic detected without corresponding DNS query: 217.233.198.119
Source: unknown TCP traffic detected without corresponding DNS query: 206.143.61.82
Source: unknown TCP traffic detected without corresponding DNS query: 255.130.166.23
Source: unknown TCP traffic detected without corresponding DNS query: 44.60.194.61
Source: unknown TCP traffic detected without corresponding DNS query: 98.11.9.51
Source: unknown TCP traffic detected without corresponding DNS query: 145.118.58.45
Source: unknown TCP traffic detected without corresponding DNS query: 4.120.246.167
Source: unknown TCP traffic detected without corresponding DNS query: 113.251.32.216
Source: unknown TCP traffic detected without corresponding DNS query: 48.187.197.152
Source: unknown TCP traffic detected without corresponding DNS query: 147.148.103.207
Source: unknown TCP traffic detected without corresponding DNS query: 98.33.188.200
Source: unknown TCP traffic detected without corresponding DNS query: 218.240.141.96
Source: unknown TCP traffic detected without corresponding DNS query: 79.72.104.51
Source: unknown TCP traffic detected without corresponding DNS query: 223.163.13.70
Source: unknown TCP traffic detected without corresponding DNS query: 111.53.251.142
Source: unknown TCP traffic detected without corresponding DNS query: 142.137.143.232
Source: unknown TCP traffic detected without corresponding DNS query: 84.7.45.117
Source: unknown TCP traffic detected without corresponding DNS query: 198.119.123.156
Source: VQemUYjLmL String found in binary or memory: http://upx.sf.net
Source: LOAD without section mappings Program segment: 0xc01000
Source: /tmp/VQemUYjLmL (PID: 6228) SIGKILL sent: pid: 936, result: successful Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) SIGKILL sent: pid: 936, result: successful Jump to behavior
Source: classification engine Classification label: mal60.troj.evad.lin@0/0@0/0

Data Obfuscation

barindex
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Info: This file is packed with the UPX executable packer http://upx.sf.net $
Source: initial sample String containing UPX found: $Id: UPX 3.94 Copyright (C) 1996-2017 the UPX Team. All Rights Reserved. $
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/6231/exe Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/491/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/793/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/772/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/796/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/774/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/797/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/777/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/799/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/658/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/912/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/759/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/936/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/918/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/1/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/761/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/785/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/884/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/720/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/721/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/788/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/789/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/800/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/801/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/847/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6231) File opened: /proc/904/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/491/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/793/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/772/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/796/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/774/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/797/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/777/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/799/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/658/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/912/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/759/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/6228/exe Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/936/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/918/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/1/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/761/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/785/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/884/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/720/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/721/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/788/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/789/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/800/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/801/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/847/fd Jump to behavior
Source: /tmp/VQemUYjLmL (PID: 6228) File opened: /proc/904/fd Jump to behavior
Source: VQemUYjLmL, 6227.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6228.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6320.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6329.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6324.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6229.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6319.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6232.1.00000000c7954095.00000000486baebe.rw-.sdmp Binary or memory string: ui686143okhp3gb4p2fdSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/VQemUYjLmL
Source: VQemUYjLmL, 6227.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6228.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6320.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6329.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6324.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6229.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6319.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6232.1.00000000c7954095.00000000486baebe.rw-.sdmp Binary or memory string: =/tmp/VQemUYjLmL
Source: VQemUYjLmL, 6227.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6228.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6228.1.000000006ff2a7f9.0000000067604773.rw-.sdmp, VQemUYjLmL, 6320.1.000000006ff2a7f9.0000000067604773.rw-.sdmp, VQemUYjLmL, 6320.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6329.1.000000006ff2a7f9.0000000067604773.rw-.sdmp, VQemUYjLmL, 6329.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6324.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6324.1.000000006ff2a7f9.0000000067604773.rw-.sdmp, VQemUYjLmL, 6229.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6319.1.00000000c7954095.00000000486baebe.rw-.sdmp, VQemUYjLmL, 6319.1.000000006ff2a7f9.0000000067604773.rw-.sdmp, VQemUYjLmL, 6232.1.00000000c7954095.00000000486baebe.rw-.sdmp Binary or memory string: /tmp/VQemUYjLmL

Stealing of Sensitive Information

barindex
Source: Yara match File source: dump.pcap, type: PCAP

Remote Access Functionality

barindex
Source: Yara match File source: dump.pcap, type: PCAP
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs