Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
25jan. Required documents.lnk

Overview

General Information

Sample Name:25jan. Required documents.lnk
Analysis ID:794655
MD5:42d501d938b5152accfb8541ccd302a5
SHA1:476e42f9e316d44fbd4bf2371e2c8b5c0503eab5
SHA256:1e6c697fe3b106fd43b6d7c96752a3618eaa04765e89bf8bc4b2e7cb8eb5034c
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Creates hidden files and/or directories

Classification

Analysis Advice

All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Non-zero exit code suggests an error during the execution. Lookup the error code for hints.
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:794655
Start date and time:2023-01-30 19:54:03 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 19s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample file name:25jan. Required documents.lnk
Detection:MAL
Classification:mal48.linLNK@0/0@0/0
Command:xdg-open "/tmp/25jan. Required documents.lnk"
PID:6234
Exit Code:4
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • exo-open (PID: 6246, Parent: 6234, MD5: 60a307a6a6325e2034eb5cc56bff1abd) Arguments: exo-open "/tmp/25jan. Required documents.lnk"
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 25jan. Required documents.lnkVirustotal: Detection: 8%Perma Link
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: classification engineClassification label: mal48.linLNK@0/0@0/0
Source: /usr/bin/exo-open (PID: 6246)Directory: /root/.cacheJump to behavior
Source: /usr/bin/exo-open (PID: 6246)Queries kernel information via 'uname': Jump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Hidden Files and Directories
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
25jan. Required documents.lnk8%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
109.202.202.202
unknownSwitzerland
13030INIT7CHfalse
91.189.91.43
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
91.189.91.42
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
109.202.202.202tltckqoZW6.elfGet hashmaliciousBrowse
    iVpgXsO6TJ.elfGet hashmaliciousBrowse
      ia2RlJsCVb.elfGet hashmaliciousBrowse
        3WwbD7M27o.elfGet hashmaliciousBrowse
          nbxtrUR7m9.elfGet hashmaliciousBrowse
            YqvwJsA6q9.elfGet hashmaliciousBrowse
              esOdAbjPM9.elfGet hashmaliciousBrowse
                ktPj6JE5Ci.elfGet hashmaliciousBrowse
                  tiR314Dsku.elfGet hashmaliciousBrowse
                    Rl141wwn1h.elfGet hashmaliciousBrowse
                      yIJJ7D6oU4.elfGet hashmaliciousBrowse
                        mbf2QOELNh.elfGet hashmaliciousBrowse
                          oFCmK70wlE.elfGet hashmaliciousBrowse
                            8INuVMs8Of.elfGet hashmaliciousBrowse
                              cB5pPcm3CT.elfGet hashmaliciousBrowse
                                ma844vEGhi.elfGet hashmaliciousBrowse
                                  2YdBZR5ZFn.elfGet hashmaliciousBrowse
                                    Zs6LduMS7k.elfGet hashmaliciousBrowse
                                      ZfbIwVQt4b.elfGet hashmaliciousBrowse
                                        http://195.133.40.73/bins/Paralysis.armGet hashmaliciousBrowse
                                          91.189.91.43tltckqoZW6.elfGet hashmaliciousBrowse
                                            iVpgXsO6TJ.elfGet hashmaliciousBrowse
                                              ia2RlJsCVb.elfGet hashmaliciousBrowse
                                                3WwbD7M27o.elfGet hashmaliciousBrowse
                                                  nbxtrUR7m9.elfGet hashmaliciousBrowse
                                                    YqvwJsA6q9.elfGet hashmaliciousBrowse
                                                      esOdAbjPM9.elfGet hashmaliciousBrowse
                                                        ktPj6JE5Ci.elfGet hashmaliciousBrowse
                                                          tiR314Dsku.elfGet hashmaliciousBrowse
                                                            Rl141wwn1h.elfGet hashmaliciousBrowse
                                                              yIJJ7D6oU4.elfGet hashmaliciousBrowse
                                                                mbf2QOELNh.elfGet hashmaliciousBrowse
                                                                  oFCmK70wlE.elfGet hashmaliciousBrowse
                                                                    8INuVMs8Of.elfGet hashmaliciousBrowse
                                                                      cB5pPcm3CT.elfGet hashmaliciousBrowse
                                                                        ma844vEGhi.elfGet hashmaliciousBrowse
                                                                          2YdBZR5ZFn.elfGet hashmaliciousBrowse
                                                                            Zs6LduMS7k.elfGet hashmaliciousBrowse
                                                                              ZfbIwVQt4b.elfGet hashmaliciousBrowse
                                                                                http://195.133.40.73/bins/Paralysis.armGet hashmaliciousBrowse
                                                                                  No context
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                  CANONICAL-ASGBtltckqoZW6.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  iVpgXsO6TJ.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  ia2RlJsCVb.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  3WwbD7M27o.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  nbxtrUR7m9.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  YqvwJsA6q9.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  esOdAbjPM9.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  ktPj6JE5Ci.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  tiR314Dsku.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  Rl141wwn1h.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  yIJJ7D6oU4.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  mbf2QOELNh.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  oFCmK70wlE.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  8INuVMs8Of.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  cB5pPcm3CT.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  ma844vEGhi.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  2YdBZR5ZFn.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  Zs6LduMS7k.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  ZfbIwVQt4b.elfGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  http://195.133.40.73/bins/Paralysis.armGet hashmaliciousBrowse
                                                                                  • 91.189.91.42
                                                                                  INIT7CHtltckqoZW6.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  iVpgXsO6TJ.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  ia2RlJsCVb.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  3WwbD7M27o.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  nbxtrUR7m9.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  YqvwJsA6q9.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  esOdAbjPM9.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  ktPj6JE5Ci.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  tiR314Dsku.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  Rl141wwn1h.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  yIJJ7D6oU4.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  mbf2QOELNh.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  oFCmK70wlE.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  8INuVMs8Of.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  cB5pPcm3CT.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  ma844vEGhi.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  2YdBZR5ZFn.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  Zs6LduMS7k.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  ZfbIwVQt4b.elfGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  http://195.133.40.73/bins/Paralysis.armGet hashmaliciousBrowse
                                                                                  • 109.202.202.202
                                                                                  No context
                                                                                  No context
                                                                                  No created / dropped files found
                                                                                  File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=14, Archive, ctime=Sat Jul 16 12:18:48 2016, mtime=Sat Jul 16 12:18:48 2016, atime=Sat Jul 16 12:18:48 2016, length=232960, window=hide
                                                                                  Entropy (8bit):4.469401886349938
                                                                                  TrID:
                                                                                  • Windows Shortcut (20020/1) 100.00%
                                                                                  File name:25jan. Required documents.lnk
                                                                                  File size:1312
                                                                                  MD5:42d501d938b5152accfb8541ccd302a5
                                                                                  SHA1:476e42f9e316d44fbd4bf2371e2c8b5c0503eab5
                                                                                  SHA256:1e6c697fe3b106fd43b6d7c96752a3618eaa04765e89bf8bc4b2e7cb8eb5034c
                                                                                  SHA512:0ea012f85c749ccbb153766423c88d166eb186725b21ba1be442f3ac7d3290aa3356b80fefceff23dd010dd82e814bbd316f7e7b7a5d43e76c224c4e16f577e8
                                                                                  SSDEEP:24:8vJ25BdHdaUCMbXUx+/fqiT0x4o0agFDTXD/Fom:80hH5h0OoATXjFo
                                                                                  TLSH:C821870507FBA319F3B24E76043AE3458FA2F951FD63A72D5254A18C8860F08EC74B17
                                                                                  File Content Preview:L..................F.... .......d.......d.......d...........................5....P.O. .:i.....+00.../C:\...................V.1...../Urk..Windows.@........H.0/Urk..........................u...W.i.n.d.o.w.s.....Z.1.....)V.>..System32..B........H.0)V.>......
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Jan 30, 2023 19:54:54.408082008 CET42836443192.168.2.2391.189.91.43
                                                                                  Jan 30, 2023 19:54:54.668056011 CET4251680192.168.2.23109.202.202.202
                                                                                  Jan 30, 2023 19:55:09.767362118 CET43928443192.168.2.2391.189.91.42
                                                                                  Jan 30, 2023 19:55:20.006814003 CET42836443192.168.2.2391.189.91.43
                                                                                  Jan 30, 2023 19:55:24.102634907 CET4251680192.168.2.23109.202.202.202
                                                                                  Jan 30, 2023 19:55:50.725249052 CET43928443192.168.2.2391.189.91.42
                                                                                  Jan 30, 2023 19:56:11.204283953 CET42836443192.168.2.2391.189.91.43

                                                                                  System Behavior

                                                                                  Start time:19:54:55
                                                                                  Start date:30/01/2023
                                                                                  Path:/usr/bin/exo-open
                                                                                  Arguments:exo-open "/tmp/25jan. Required documents.lnk"
                                                                                  File size:27264 bytes
                                                                                  MD5 hash:60a307a6a6325e2034eb5cc56bff1abd