Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
j0Ee2pkXcH

Overview

General Information

Sample Name:j0Ee2pkXcH
Analysis ID:626616
MD5:d4ef612e72f47f5fc33a7a567447ebe1
SHA1:4f526e7c9f7a9dc125d81c3e47743d8c539b0736
SHA256:9a875f1f3f80dede4a12c83cab4a01ed846e5abb8ea5ad2eae11d0da39339000
Tags:32elfmipsmirai
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures.
Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:626616
Start date and time: 14/05/202216:17:052022-05-14 16:17:05 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 49s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:j0Ee2pkXcH
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Detection:MAL
Classification:mal48.lin@0/0@0/0
Command:/tmp/j0Ee2pkXcH
PID:6227
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
KiraV2
Standard Error:
  • system is lnxubuntu20
  • j0Ee2pkXcH (PID: 6227, Parent: 6125, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/j0Ee2pkXcH
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: j0Ee2pkXcHVirustotal: Detection: 44%Perma Link
Source: j0Ee2pkXcHReversingLabs: Detection: 46%
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:44600 -> 103.136.40.176:8985
Source: /tmp/j0Ee2pkXcH (PID: 6227)Socket: 127.0.0.1::9473
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal48.lin@0/0@0/0
Source: /tmp/j0Ee2pkXcH (PID: 6227)Queries kernel information via 'uname':
Source: j0Ee2pkXcH, 6227.1.000000008e484c30.000000005efd5086.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
Source: j0Ee2pkXcH, 6227.1.000000008e484c30.000000005efd5086.rw-.sdmpBinary or memory string: V!/etc/qemu-binfmt/mipsel
Source: j0Ee2pkXcH, 6227.1.0000000086c72664.0000000028ee67e9.rw-.sdmpBinary or memory string: -ix86_64/usr/bin/qemu-mipsel/tmp/j0Ee2pkXcHSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/j0Ee2pkXcH
Source: j0Ee2pkXcH, 6227.1.0000000086c72664.0000000028ee67e9.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
j0Ee2pkXcH44%VirustotalBrowse
j0Ee2pkXcH46%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
103.136.40.176
unknownIndia
139884AGPL-AS-APApeironGlobalPvtLtdINfalse
109.202.202.202
unknownSwitzerland
13030INIT7CHfalse
91.189.91.43
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
91.189.91.42
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
No context
No context
No context
No context
No context
No created / dropped files found
File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
Entropy (8bit):5.444689626345033
TrID:
  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
File name:j0Ee2pkXcH
File size:52044
MD5:d4ef612e72f47f5fc33a7a567447ebe1
SHA1:4f526e7c9f7a9dc125d81c3e47743d8c539b0736
SHA256:9a875f1f3f80dede4a12c83cab4a01ed846e5abb8ea5ad2eae11d0da39339000
SHA512:44f988a34b3a5219e6e9d3fb690f17181ee0e6b00ad6d5997a803c912b52db601912a574bd99028f3cded83c841c42d9b0fb88bd60fe26b7db6a12afc6209869
SSDEEP:768:tTp45a3erDWjgeRegye9OevSZrdAZL9GpXi2hK8eRmw:tT25a3xXcwOxZhAZL9GpK8e
TLSH:D533C615FB514FB7CC9BCC7349A91B0128CC5A5B21F57B367A74D528B84B20B2AD3CA8
File Content Preview:.ELF....................`.@.4...D.......4. ...(...............@...@. ... ...............$...$.D.$.D......+..........Q.td...............................<<C.'!......'.......................<.C.'!... .........9'.. ........................<.B.'!.............9

ELF header

Class:ELF32
Data:2's complement, little endian
Version:1 (current)
Machine:MIPS R3000
Version Number:0x1
Type:EXEC (Executable file)
OS/ABI:UNIX - System V
ABI Version:0
Entry Point Address:0x400260
Flags:0x1007
ELF Header Size:52
Program Header Offset:52
Program Header Size:32
Number of Program Headers:3
Section Header Offset:51524
Section Header Size:40
Number of Section Headers:13
Header String Table Index:12
NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
NULL0x00x00x00x00x0000
.initPROGBITS0x4000940x940x8c0x00x6AX004
.textPROGBITS0x4001200x1200xb0100x00x6AX0016
.finiPROGBITS0x40b1300xb1300x5c0x00x6AX004
.rodataPROGBITS0x40b1900xb1900xe900x00x2A0016
.ctorsPROGBITS0x44c0240xc0240x80x00x3WA004
.dtorsPROGBITS0x44c02c0xc02c0x80x00x3WA004
.dataPROGBITS0x44c0400xc0400x3a00x00x3WA0016
.gotPROGBITS0x44c3e00xc3e00x50c0x40x10000003WA0016
.sbssNOBITS0x44c8ec0xc8ec0x3c0x00x10000003WA004
.bssNOBITS0x44c9300xc8ec0x22c00x00x3WA0016
.mdebug.abi32PROGBITS0x9a20xc8ec0x00x00x0001
.shstrtabSTRTAB0x00xc8ec0x570x00x0001
TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
LOAD0x00x4000000x4000000xc0200xc0203.45670x5R E0x10000.init .text .fini .rodata
LOAD0xc0240x44c0240x44c0240x8c80x2bcc1.72790x6RW 0x10000.ctors .dtors .data .got .sbss .bss
GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
TimestampSource PortDest PortSource IPDest IP
May 14, 2022 16:17:50.181714058 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:17:50.210563898 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:17:50.210750103 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:17:50.210979939 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:17:50.239624977 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:17:50.239701033 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:17:50.268538952 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:17:51.954677105 CEST42836443192.168.2.2391.189.91.43
May 14, 2022 16:17:52.722700119 CEST4251680192.168.2.23109.202.202.202
May 14, 2022 16:18:00.221422911 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:18:00.250243902 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:18:00.250289917 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:18:00.250452995 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:18:06.546565056 CEST43928443192.168.2.2391.189.91.42
May 14, 2022 16:18:15.318030119 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:18:15.318375111 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:18:18.834511995 CEST42836443192.168.2.2391.189.91.43
May 14, 2022 16:18:22.930469036 CEST4251680192.168.2.23109.202.202.202
May 14, 2022 16:18:30.354424953 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:18:30.354774952 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:18:45.394146919 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:18:45.394371033 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:18:47.506324053 CEST43928443192.168.2.2391.189.91.42
May 14, 2022 16:19:00.300514936 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:19:00.329612017 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:19:00.329873085 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:19:15.410670042 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:19:15.411205053 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:19:30.450625896 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:19:30.451155901 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:19:45.490283966 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:19:45.490478039 CEST446008985192.168.2.23103.136.40.176

System Behavior

Start time:16:17:48
Start date:14/05/2022
Path:/tmp/j0Ee2pkXcH
Arguments:/tmp/j0Ee2pkXcH
File size:5773336 bytes
MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9
Start time:16:17:48
Start date:14/05/2022
Path:/tmp/j0Ee2pkXcH
Arguments:n/a
File size:5773336 bytes
MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9