Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
25jan. Required documents.lnk

Overview

General Information

Sample Name:25jan. Required documents.lnk
Analysis ID:794655
MD5:42d501d938b5152accfb8541ccd302a5
SHA1:476e42f9e316d44fbd4bf2371e2c8b5c0503eab5
SHA256:1e6c697fe3b106fd43b6d7c96752a3618eaa04765e89bf8bc4b2e7cb8eb5034c
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Creates hidden files and/or directories

Classification

Analysis Advice

All HTTP servers contacted by the sample do not answer. The sample is likely an old dropper which does no longer work.
Non-zero exit code suggests an error during the execution. Lookup the error code for hints.
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:794655
Start date and time:2023-01-30 19:54:03 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 19s
Hypervisor based Inspection enabled:false
Report type:light
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample file name:25jan. Required documents.lnk
Detection:MAL
Classification:mal48.linLNK@0/0@0/0
Command:xdg-open "/tmp/25jan. Required documents.lnk"
PID:6234
Exit Code:4
Exit Code Info:
Killed:False
Standard Output:

Standard Error:
  • system is lnxubuntu20
  • exo-open (PID: 6246, Parent: 6234, MD5: 60a307a6a6325e2034eb5cc56bff1abd) Arguments: exo-open "/tmp/25jan. Required documents.lnk"
  • cleanup
No yara matches
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 25jan. Required documents.lnkVirustotal: Detection: 8%Perma Link
Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknownTCP traffic detected without corresponding DNS query: 91.189.91.43
Source: classification engineClassification label: mal48.linLNK@0/0@0/0
Source: /usr/bin/exo-open (PID: 6246)Directory: /root/.cacheJump to behavior
Source: /usr/bin/exo-open (PID: 6246)Queries kernel information via 'uname':
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Hidden Files and Directories
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
25jan. Required documents.lnk8%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
109.202.202.202
unknownSwitzerland
13030INIT7CHfalse
91.189.91.43
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
91.189.91.42
unknownUnited Kingdom
41231CANONICAL-ASGBfalse
No context
No context
No context
No context
No context
No created / dropped files found
File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=14, Archive, ctime=Sat Jul 16 12:18:48 2016, mtime=Sat Jul 16 12:18:48 2016, atime=Sat Jul 16 12:18:48 2016, length=232960, window=hide
Entropy (8bit):4.469401886349938
TrID:
  • Windows Shortcut (20020/1) 100.00%
File name:25jan. Required documents.lnk
File size:1312
MD5:42d501d938b5152accfb8541ccd302a5
SHA1:476e42f9e316d44fbd4bf2371e2c8b5c0503eab5
SHA256:1e6c697fe3b106fd43b6d7c96752a3618eaa04765e89bf8bc4b2e7cb8eb5034c
SHA512:0ea012f85c749ccbb153766423c88d166eb186725b21ba1be442f3ac7d3290aa3356b80fefceff23dd010dd82e814bbd316f7e7b7a5d43e76c224c4e16f577e8
SSDEEP:24:8vJ25BdHdaUCMbXUx+/fqiT0x4o0agFDTXD/Fom:80hH5h0OoATXjFo
TLSH:C821870507FBA319F3B24E76043AE3458FA2F951FD63A72D5254A18C8860F08EC74B17
File Content Preview:L..................F.... .......d.......d.......d...........................5....P.O. .:i.....+00.../C:\...................V.1...../Urk..Windows.@........H.0/Urk..........................u...W.i.n.d.o.w.s.....Z.1.....)V.>..System32..B........H.0)V.>......
TimestampSource PortDest PortSource IPDest IP
Jan 30, 2023 19:54:54.408082008 CET42836443192.168.2.2391.189.91.43
Jan 30, 2023 19:54:54.668056011 CET4251680192.168.2.23109.202.202.202
Jan 30, 2023 19:55:09.767362118 CET43928443192.168.2.2391.189.91.42
Jan 30, 2023 19:55:20.006814003 CET42836443192.168.2.2391.189.91.43
Jan 30, 2023 19:55:24.102634907 CET4251680192.168.2.23109.202.202.202
Jan 30, 2023 19:55:50.725249052 CET43928443192.168.2.2391.189.91.42
Jan 30, 2023 19:56:11.204283953 CET42836443192.168.2.2391.189.91.43

System Behavior

Start time:19:54:55
Start date:30/01/2023
Path:/usr/bin/exo-open
Arguments:exo-open "/tmp/25jan. Required documents.lnk"
File size:27264 bytes
MD5 hash:60a307a6a6325e2034eb5cc56bff1abd