Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
EG4I1Przgq

Overview

General Information

Sample Name:EG4I1Przgq
Analysis ID:626619
MD5:97e27b840c2c54655ed1894da03f8f5b
SHA1:70a19ece13bdec070090c0892b46a96392a51fe5
SHA256:a2fd969df550f26d35b46a40c7c3bb2a513c01c42ba3d96d0de736d01cdc54ec
Tags:32elfmiraimotorola
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket
Sample has stripped symbol table

Classification

Analysis Advice

Static ELF header machine description suggests that the sample might not execute correctly on this machine.
All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:626619
Start date and time: 14/05/202216:25:062022-05-14 16:25:06 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 49s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:EG4I1Przgq
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Detection:MAL
Classification:mal48.lin@0/0@0/0
Command:/tmp/EG4I1Przgq
PID:6225
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
KiraV2
Standard Error:
  • system is lnxubuntu20
  • EG4I1Przgq (PID: 6225, Parent: 6124, MD5: cd177594338c77b895ae27c33f8f86cc) Arguments: /tmp/EG4I1Przgq
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: EG4I1PrzgqVirustotal: Detection: 44%Perma Link
Source: EG4I1PrzgqReversingLabs: Detection: 41%
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global trafficTCP traffic: 192.168.2.23:44600 -> 103.136.40.176:8985
Source: /tmp/EG4I1Przgq (PID: 6225)Socket: 127.0.0.1::9473
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: unknownTCP traffic detected without corresponding DNS query: 103.136.40.176
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal48.lin@0/0@0/0
Source: /tmp/EG4I1Przgq (PID: 6225)Queries kernel information via 'uname':
Source: EG4I1Przgq, 6225.1.00000000224adb7b.00000000a892d5d3.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-m68k/tmp/EG4I1PrzgqSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/EG4I1Przgq
Source: EG4I1Przgq, 6225.1.00000000437dcf39.00000000639f456b.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/m68k
Source: EG4I1Przgq, 6225.1.00000000224adb7b.00000000a892d5d3.rw-.sdmpBinary or memory string: /usr/bin/qemu-m68k
Source: EG4I1Przgq, 6225.1.00000000437dcf39.00000000639f456b.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/m68k
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Standard Port
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
EG4I1Przgq44%VirustotalBrowse
EG4I1Przgq41%ReversingLabsLinux.Trojan.Mirai
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
103.136.40.176
unknownIndia
139884AGPL-AS-APApeironGlobalPvtLtdINfalse
109.202.202.202
unknownSwitzerland
13030INIT7CHfalse
91.189.91.43
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
91.189.91.42
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
No context
No context
No context
No context
No context
No created / dropped files found
File type:ELF 32-bit MSB executable, Motorola m68k, 68020, version 1 (SYSV), statically linked, stripped
Entropy (8bit):6.185022722583914
TrID:
  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
File name:EG4I1Przgq
File size:39652
MD5:97e27b840c2c54655ed1894da03f8f5b
SHA1:70a19ece13bdec070090c0892b46a96392a51fe5
SHA256:a2fd969df550f26d35b46a40c7c3bb2a513c01c42ba3d96d0de736d01cdc54ec
SHA512:4974ae4d6d795fa768f497751cba6e8b9718922b6200e96d54369b5fe84414962bcb4aec488291543e7be9d016b0856bdf7d504dd09107fe59a4b22d5e34e285
SSDEEP:768:mgeTOZ232gkIV8oYemuDw54Yo9qjmwxKGJ:FRk2gkm8SZw51CqVJ
TLSH:790319AAF402AC3CF84FF5BA541A4D0DBA2067C252835B2673B7FDB39C321956E06D45
File Content Preview:.ELF.......................D...4...T.....4. ...(.................................. ....................h..%....... .dt.Q............................NV..a....da.....N^NuNV..J9....f>"y.... QJ.g.X.#.....N."y.... QJ.f.A.....J.g.Hy....N.X.........N^NuNV..N^NuN

ELF header

Class:ELF32
Data:2's complement, big endian
Version:1 (current)
Machine:MC68000
Version Number:0x1
Type:EXEC (Executable file)
OS/ABI:UNIX - System V
ABI Version:0
Entry Point Address:0x80000144
Flags:0x0
ELF Header Size:52
Program Header Offset:52
Program Header Size:32
Number of Program Headers:3
Section Header Offset:39252
Section Header Size:40
Number of Section Headers:10
Header String Table Index:9
NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
NULL0x00x00x00x00x0000
.initPROGBITS0x800000940x940x140x00x6AX002
.textPROGBITS0x800000a80xa80x86ee0x00x6AX004
.finiPROGBITS0x800087960x87960xe0x00x6AX002
.rodataPROGBITS0x800087a40x87a40xe020x00x2A002
.ctorsPROGBITS0x8000b5ac0x95ac0x80x00x3WA004
.dtorsPROGBITS0x8000b5b40x95b40x80x00x3WA004
.dataPROGBITS0x8000b5c00x95c00x3540x00x3WA004
.bssNOBITS0x8000b9140x99140x22300x00x3WA004
.shstrtabSTRTAB0x00x99140x3e0x00x0001
TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
LOAD0x00x800000000x800000000x95a60x95a64.27070x5R E0x2000.init .text .fini .rodata
LOAD0x95ac0x8000b5ac0x8000b5ac0x3680x25981.39440x6RW 0x2000.ctors .dtors .data .bss
GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
TimestampSource PortDest PortSource IPDest IP
May 14, 2022 16:25:49.806746006 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:25:49.835391998 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:25:49.835479975 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:25:49.835839033 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:25:49.864341974 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:25:49.864414930 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:25:49.893512964 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:25:52.841309071 CEST42836443192.168.2.2391.189.91.43
May 14, 2022 16:25:53.609468937 CEST4251680192.168.2.23109.202.202.202
May 14, 2022 16:25:59.846168995 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:25:59.875133038 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:25:59.875191927 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:25:59.875477076 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:26:08.200978994 CEST43928443192.168.2.2391.189.91.42
May 14, 2022 16:26:14.924597025 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:26:14.924875021 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:26:18.440675020 CEST42836443192.168.2.2391.189.91.43
May 14, 2022 16:26:24.584352970 CEST4251680192.168.2.23109.202.202.202
May 14, 2022 16:26:29.964560032 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:26:29.964730024 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:26:45.004359961 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:26:45.004611969 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:26:49.159693956 CEST43928443192.168.2.2391.189.91.42
May 14, 2022 16:26:59.925295115 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:26:59.954272032 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:26:59.954901934 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:27:09.639008999 CEST42836443192.168.2.2391.189.91.43
May 14, 2022 16:27:15.020914078 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:27:15.021085024 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:27:30.060866117 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:27:30.061049938 CEST446008985192.168.2.23103.136.40.176
May 14, 2022 16:27:45.100692987 CEST898544600103.136.40.176192.168.2.23
May 14, 2022 16:27:45.101030111 CEST446008985192.168.2.23103.136.40.176

System Behavior

Start time:16:25:48
Start date:14/05/2022
Path:/tmp/EG4I1Przgq
Arguments:/tmp/EG4I1Przgq
File size:4463432 bytes
MD5 hash:cd177594338c77b895ae27c33f8f86cc
Start time:16:25:48
Start date:14/05/2022
Path:/tmp/EG4I1Przgq
Arguments:n/a
File size:4463432 bytes
MD5 hash:cd177594338c77b895ae27c33f8f86cc