Linux Analysis Report
BWfKcndJCz

Overview

General Information

Sample Name: BWfKcndJCz
Analysis ID: 679622
MD5: 00e2f1330f45468f78497ea8c73e0b3d
SHA1: 00562d888ec7a88f8023e8252aef1480234e7c06
SHA256: febec5c5c4719ca23ad04e2f1b7ffe76b81035d5dd79d0eb1f61d9917886e022
Tags: 32elfmirairenesas
Infos:

Detection

Mirai
Score: 68
Range: 0 - 100
Whitelisted: false

Signatures

Yara detected Mirai
Multi AV Scanner detection for submitted file
Uses known network protocols on non-standard ports
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable

Classification

AV Detection

barindex
Source: BWfKcndJCz Virustotal: Detection: 40% Perma Link
Source: BWfKcndJCz ReversingLabs: Detection: 40%

Networking

barindex
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49484
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49492
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49494
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49498
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43540
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49504
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43546
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49510
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43554
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49516
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43558
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49522
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43564
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49526
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43570
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49532
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43576
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43578
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43580
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43582
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57354
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57358
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57360
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57364
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57366
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57372
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57378
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57380
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57384
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57388
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:53436 -> 46.23.109.40:1312
Source: /tmp/BWfKcndJCz (PID: 6270) Socket: 127.0.0.1::1312 Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) Socket: 0.0.0.0::0 Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) Socket: 0.0.0.0::53413 Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) Socket: 0.0.0.0::80 Jump to behavior
Source: unknown DNS traffic detected: queries for: arcticboatz.cz
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 130.178.235.45
Source: unknown TCP traffic detected without corresponding DNS query: 97.254.121.18
Source: unknown TCP traffic detected without corresponding DNS query: 92.51.44.34
Source: unknown TCP traffic detected without corresponding DNS query: 245.199.218.18
Source: unknown TCP traffic detected without corresponding DNS query: 114.32.252.187
Source: unknown TCP traffic detected without corresponding DNS query: 178.88.163.32
Source: unknown TCP traffic detected without corresponding DNS query: 82.134.184.5
Source: unknown TCP traffic detected without corresponding DNS query: 180.208.179.221
Source: unknown TCP traffic detected without corresponding DNS query: 1.21.212.2
Source: unknown TCP traffic detected without corresponding DNS query: 86.252.252.159
Source: unknown TCP traffic detected without corresponding DNS query: 32.21.5.32
Source: unknown TCP traffic detected without corresponding DNS query: 162.109.115.201
Source: unknown TCP traffic detected without corresponding DNS query: 152.123.118.152
Source: unknown TCP traffic detected without corresponding DNS query: 44.187.123.210
Source: unknown TCP traffic detected without corresponding DNS query: 122.154.229.193
Source: unknown TCP traffic detected without corresponding DNS query: 186.67.23.78
Source: unknown TCP traffic detected without corresponding DNS query: 161.109.108.0
Source: unknown TCP traffic detected without corresponding DNS query: 105.3.142.125
Source: unknown TCP traffic detected without corresponding DNS query: 14.143.111.75
Source: unknown TCP traffic detected without corresponding DNS query: 141.13.41.240
Source: unknown TCP traffic detected without corresponding DNS query: 118.173.205.59
Source: unknown TCP traffic detected without corresponding DNS query: 189.227.114.192
Source: unknown TCP traffic detected without corresponding DNS query: 76.63.234.178
Source: unknown TCP traffic detected without corresponding DNS query: 12.227.132.97
Source: unknown TCP traffic detected without corresponding DNS query: 157.116.37.48
Source: unknown TCP traffic detected without corresponding DNS query: 218.47.154.164
Source: unknown TCP traffic detected without corresponding DNS query: 249.102.187.221
Source: unknown TCP traffic detected without corresponding DNS query: 125.133.233.75
Source: unknown TCP traffic detected without corresponding DNS query: 43.5.150.128
Source: unknown TCP traffic detected without corresponding DNS query: 196.32.29.125
Source: unknown TCP traffic detected without corresponding DNS query: 58.160.84.42
Source: unknown TCP traffic detected without corresponding DNS query: 69.136.185.0
Source: unknown TCP traffic detected without corresponding DNS query: 187.71.89.163
Source: unknown TCP traffic detected without corresponding DNS query: 178.109.227.57
Source: unknown TCP traffic detected without corresponding DNS query: 24.213.203.226
Source: unknown TCP traffic detected without corresponding DNS query: 2.25.30.89
Source: unknown TCP traffic detected without corresponding DNS query: 135.211.204.21
Source: unknown TCP traffic detected without corresponding DNS query: 4.55.192.84
Source: unknown TCP traffic detected without corresponding DNS query: 65.184.48.58
Source: unknown TCP traffic detected without corresponding DNS query: 157.226.29.109
Source: unknown TCP traffic detected without corresponding DNS query: 35.139.194.3
Source: unknown TCP traffic detected without corresponding DNS query: 109.49.145.61
Source: unknown TCP traffic detected without corresponding DNS query: 73.20.159.185
Source: unknown TCP traffic detected without corresponding DNS query: 250.130.92.49
Source: unknown TCP traffic detected without corresponding DNS query: 151.214.154.194
Source: unknown TCP traffic detected without corresponding DNS query: 171.112.64.222
Source: unknown TCP traffic detected without corresponding DNS query: 100.146.112.132
Source: unknown TCP traffic detected without corresponding DNS query: 59.208.126.78
Source: unknown TCP traffic detected without corresponding DNS query: 243.215.24.159
Source: unknown TCP traffic detected without corresponding DNS query: 207.23.86.61
Source: ELF static info symbol of initial sample .symtab present: no
Source: /tmp/BWfKcndJCz (PID: 6281) SIGKILL sent: pid: 936, result: successful Jump to behavior
Source: Initial sample String containing 'busybox' found: /bin/busybox AK1K2
Source: Initial sample String containing 'busybox' found: /bin/busybox cp /bin/busybox retrieve && >retrieve && /bin/busybox chmod 777 retrieve && /bin/busybox cp /bin/busybox .t && >.t && /bin/busybox chmod 777 .t
Source: Initial sample String containing 'busybox' found: /bin/busybox echo -en '%s' %s %s && /bin/busybox echo -en '\x45\x43\x48\x4f\x44\x4f\x4e\x45'
Source: Initial sample String containing 'busybox' found: >%st && cd %s && >retrieve; >.t/bin/busybox cp /bin/busybox retrieve && >retrieve && /bin/busybox chmod 777 retrieve && /bin/busybox cp /bin/busybox .t && >.t && /bin/busybox chmod 777 .t
Source: Initial sample String containing 'busybox' found: >>>/bin/busybox echo -en '%s' %s %s && /bin/busybox echo -en '\x45\x43\x48\x4f\x44\x4f\x4e\x45'
Source: classification engine Classification label: mal68.troj.lin@0/0@54/0
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/491/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/793/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/772/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/796/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/774/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/797/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/777/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/799/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/658/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/912/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/759/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/936/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/918/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/1/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/761/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/785/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/884/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/720/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/721/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/788/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/789/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/800/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/801/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/847/fd Jump to behavior
Source: /tmp/BWfKcndJCz (PID: 6281) File opened: /proc/904/fd Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49484
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49492
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49494
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49498
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43540
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49504
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43546
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49510
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43554
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49516
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43558
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49522
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43564
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49526
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43570
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 49532
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43576
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43578
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43580
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 43582
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57354
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57358
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57360
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57364
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57366
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57372
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57378
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57380
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57384
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 57388
Source: /tmp/BWfKcndJCz (PID: 6270) Queries kernel information via 'uname': Jump to behavior
Source: BWfKcndJCz, 6270.1.00007ffe116e0000.00007ffe11701000.rw-.sdmp, BWfKcndJCz, 6368.1.00007ffe116e0000.00007ffe11701000.rw-.sdmp, BWfKcndJCz, 6282.1.00007ffe116e0000.00007ffe11701000.rw-.sdmp Binary or memory string: /usr/bin/qemu-sh4
Source: BWfKcndJCz, 6270.1.000055ed5f758000.000055ed5f7bb000.rw-.sdmp, BWfKcndJCz, 6368.1.000055ed5f758000.000055ed5f7bb000.rw-.sdmp, BWfKcndJCz, 6282.1.000055ed5f758000.000055ed5f7bb000.rw-.sdmp Binary or memory string: U5!/etc/qemu-binfmt/sh4
Source: BWfKcndJCz, 6270.1.000055ed5f758000.000055ed5f7bb000.rw-.sdmp, BWfKcndJCz, 6368.1.000055ed5f758000.000055ed5f7bb000.rw-.sdmp, BWfKcndJCz, 6282.1.000055ed5f758000.000055ed5f7bb000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/sh4
Source: BWfKcndJCz, 6270.1.00007ffe116e0000.00007ffe11701000.rw-.sdmp, BWfKcndJCz, 6368.1.00007ffe116e0000.00007ffe11701000.rw-.sdmp, BWfKcndJCz, 6282.1.00007ffe116e0000.00007ffe11701000.rw-.sdmp Binary or memory string: _Nx86_64/usr/bin/qemu-sh4/tmp/BWfKcndJCzSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/BWfKcndJCz

Stealing of Sensitive Information

barindex
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: BWfKcndJCz, type: SAMPLE
Source: Yara match File source: 6368.1.00007f2810400000.00007f2810414000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6282.1.00007f2810400000.00007f2810414000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6270.1.00007f2810400000.00007f2810414000.r-x.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: BWfKcndJCz, type: SAMPLE
Source: Yara match File source: 6368.1.00007f2810400000.00007f2810414000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6282.1.00007f2810400000.00007f2810414000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6270.1.00007f2810400000.00007f2810414000.r-x.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs