Linux Analysis Report
sshd

Overview

General Information

Sample Name: sshd
Analysis ID: 635357
MD5: e4a6305453071029694a1f941133261a
SHA1: da4be5db609d644f7468756f20996c8fe7a17d6e
SHA256: 87f9284961cbd6155b2dd0ce1c241b54f186a036e97ead7d091353c44afeb0ce
Infos:

Detection

Score: 72
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Uses known network protocols on non-standard ports
Opens /proc/net/* files useful for finding connected devices and routers
Sample contains symbols with suspicious names
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

AV Detection

barindex
Source: sshd Avira: detected
Source: sshd Virustotal: Detection: 63% Perma Link

Spreading

barindex
Source: /tmp/sshd (PID: 6230) Opens: /proc/net/route Jump to behavior

Networking

barindex
Source: Traffic Snort IDS: 2840333 ETPRO TROJAN ELF/BASHLITE Variant CnC Activity 192.168.2.23:57822 -> 45.95.55.12:23
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 39654
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 33268
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.55.12
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.55.12
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.55.12
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.55.12
Source: unknown TCP traffic detected without corresponding DNS query: 45.95.55.12
Source: unknown TCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown TCP traffic detected without corresponding DNS query: 2.2.2.2
Source: unknown TCP traffic detected without corresponding DNS query: 3.3.3.3
Source: unknown TCP traffic detected without corresponding DNS query: 4.4.4.4
Source: unknown TCP traffic detected without corresponding DNS query: 5.5.5.5
Source: unknown TCP traffic detected without corresponding DNS query: 6.6.6.6
Source: unknown TCP traffic detected without corresponding DNS query: 7.7.7.7
Source: unknown TCP traffic detected without corresponding DNS query: 9.9.9.9
Source: unknown TCP traffic detected without corresponding DNS query: 11.11.11.11
Source: unknown TCP traffic detected without corresponding DNS query: 12.12.12.12
Source: unknown TCP traffic detected without corresponding DNS query: 13.13.13.13
Source: unknown TCP traffic detected without corresponding DNS query: 14.14.14.14
Source: unknown TCP traffic detected without corresponding DNS query: 15.15.15.15
Source: unknown TCP traffic detected without corresponding DNS query: 16.16.16.16
Source: unknown TCP traffic detected without corresponding DNS query: 17.17.17.17
Source: unknown TCP traffic detected without corresponding DNS query: 18.18.18.18
Source: unknown TCP traffic detected without corresponding DNS query: 19.19.19.19
Source: unknown TCP traffic detected without corresponding DNS query: 20.20.20.20
Source: unknown TCP traffic detected without corresponding DNS query: 21.21.21.21
Source: unknown TCP traffic detected without corresponding DNS query: 22.22.22.22
Source: unknown TCP traffic detected without corresponding DNS query: 23.23.23.23
Source: unknown TCP traffic detected without corresponding DNS query: 24.24.24.24
Source: unknown TCP traffic detected without corresponding DNS query: 25.25.25.25
Source: unknown TCP traffic detected without corresponding DNS query: 26.26.26.26
Source: unknown TCP traffic detected without corresponding DNS query: 27.27.27.27
Source: unknown TCP traffic detected without corresponding DNS query: 28.28.28.28
Source: unknown TCP traffic detected without corresponding DNS query: 29.29.29.29
Source: unknown TCP traffic detected without corresponding DNS query: 30.30.30.30
Source: unknown TCP traffic detected without corresponding DNS query: 31.31.31.31
Source: unknown TCP traffic detected without corresponding DNS query: 32.32.32.32
Source: unknown TCP traffic detected without corresponding DNS query: 33.33.33.33
Source: unknown TCP traffic detected without corresponding DNS query: 34.34.34.34
Source: unknown TCP traffic detected without corresponding DNS query: 35.35.35.35
Source: unknown TCP traffic detected without corresponding DNS query: 36.36.36.36
Source: unknown TCP traffic detected without corresponding DNS query: 37.37.37.37
Source: unknown TCP traffic detected without corresponding DNS query: 38.38.38.38
Source: unknown TCP traffic detected without corresponding DNS query: 39.39.39.39
Source: unknown TCP traffic detected without corresponding DNS query: 40.40.40.40
Source: unknown TCP traffic detected without corresponding DNS query: 41.41.41.41
Source: unknown TCP traffic detected without corresponding DNS query: 42.42.42.42
Source: unknown TCP traffic detected without corresponding DNS query: 43.43.43.43
Source: unknown TCP traffic detected without corresponding DNS query: 44.44.44.44
Source: unknown TCP traffic detected without corresponding DNS query: 45.45.45.45
Source: unknown TCP traffic detected without corresponding DNS query: 46.46.46.46
Source: sshd String found in binary or memory: http://45.95.55.12/bins.sh;
Source: ELF static info symbol of initial sample Name: passwords
Source: ELF static info symbol of initial sample Name: usernames
Source: classification engine Classification label: mal72.spre.troj.lin@0/0@0/0
Source: ELF static info symbol of initial sample FILE: libc/string/mips/memcpy.S
Source: ELF static info symbol of initial sample FILE: libc/string/mips/memset.S
Source: ELF static info symbol of initial sample FILE: libc/sysdeps/linux/mips/crt1.S
Source: ELF static info symbol of initial sample FILE: libc/sysdeps/linux/mips/crti.S
Source: ELF static info symbol of initial sample FILE: libc/sysdeps/linux/mips/crtn.S
Source: ELF static info symbol of initial sample FILE: libc/sysdeps/linux/mips/pipe.S

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 39654
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 33268
Source: /tmp/sshd (PID: 6230) Queries kernel information via 'uname': Jump to behavior
Source: sshd, 6230.1.00000000793b1a2b.0000000011876d7e.rw-.sdmp, sshd, 6232.1.00000000793b1a2b.0000000011876d7e.rw-.sdmp, sshd, 6293.1.00000000793b1a2b.0000000011876d7e.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/mipsel
Source: sshd, 6230.1.00000000e33a4a40.0000000048fb67c3.rw-.sdmp, sshd, 6232.1.00000000e33a4a40.0000000048fb67c3.rw-.sdmp, sshd, 6293.1.00000000e33a4a40.0000000048fb67c3.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/sshdSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/sshd
Source: sshd, 6230.1.00000000793b1a2b.0000000011876d7e.rw-.sdmp, sshd, 6232.1.00000000793b1a2b.0000000011876d7e.rw-.sdmp, sshd, 6293.1.00000000793b1a2b.0000000011876d7e.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/mipsel
Source: sshd, 6230.1.00000000e33a4a40.0000000048fb67c3.rw-.sdmp, sshd, 6232.1.00000000e33a4a40.0000000048fb67c3.rw-.sdmp, sshd, 6293.1.00000000e33a4a40.0000000048fb67c3.rw-.sdmp Binary or memory string: /usr/bin/qemu-mipsel
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs