Linux Analysis Report
lIIKVQc5cj.elf

Overview

General Information

Sample name: lIIKVQc5cj.elf
renamed because original name is a hash value
Original sample name: 236c1ab0f391bf4252c53162d687314b.elf
Analysis ID: 1446369
MD5: 236c1ab0f391bf4252c53162d687314b
SHA1: 14adde96ea132e53522639e109461c1f342e0b1b
SHA256: d99f6f44ac80bd81e6fe2bb0327d53e37e8415593ee3935676a149a8765893d9
Tags: 32armelfmirai
Infos:

Detection

Score: 56
Range: 0 - 100
Whitelisted: false

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Executes the "rm" command used to delete files or directories
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

AV Detection

barindex
Source: lIIKVQc5cj.elf ReversingLabs: Detection: 47%
Source: lIIKVQc5cj.elf Virustotal: Detection: 39% Perma Link
Source: unknown HTTPS traffic detected: 34.254.182.186:443 -> 192.168.2.14:59320 version: TLS 1.2
Source: unknown TCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknown TCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknown TCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknown TCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknown TCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknown TCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknown TCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknown TCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknown TCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknown TCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknown TCP traffic detected without corresponding DNS query: 34.254.182.186
Source: unknown TCP traffic detected without corresponding DNS query: 185.125.190.26
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: daisy.ubuntu.com
Source: unknown Network traffic detected: HTTP traffic on port 46540 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 59320
Source: unknown Network traffic detected: HTTP traffic on port 59320 -> 443
Source: unknown HTTPS traffic detected: 34.254.182.186:443 -> 192.168.2.14:59320 version: TLS 1.2

System Summary

barindex
Source: lIIKVQc5cj.elf, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: 5482.1.00007f42d8017000.00007f42d8020000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: Process Memory Space: lIIKVQc5cj.elf PID: 5482, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
Source: ELF static info symbol of initial sample .symtab present: no
Source: lIIKVQc5cj.elf, type: SAMPLE Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: 5482.1.00007f42d8017000.00007f42d8020000.r-x.sdmp, type: MEMORY Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: Process Memory Space: lIIKVQc5cj.elf PID: 5482, type: MEMORYSTR Matched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
Source: classification engine Classification label: mal56.linELF@0/0@2/0
Source: /usr/bin/dash (PID: 5494) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.NFTAlYjTat /tmp/tmp.CawU0L4Sll /tmp/tmp.ZbPifuRcZD Jump to behavior
Source: /usr/bin/dash (PID: 5503) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.NFTAlYjTat /tmp/tmp.CawU0L4Sll /tmp/tmp.ZbPifuRcZD Jump to behavior
Source: /tmp/lIIKVQc5cj.elf (PID: 5482) Queries kernel information via 'uname': Jump to behavior
Source: lIIKVQc5cj.elf, 5482.1.00007ffc2c9a2000.00007ffc2c9c3000.rw-.sdmp Binary or memory string: qemu: %s: %s
Source: lIIKVQc5cj.elf, 5482.1.00007ffc2c9a2000.00007ffc2c9c3000.rw-.sdmp Binary or memory string: leqemu: %s: %s
Source: lIIKVQc5cj.elf, 5482.1.0000560c3eea9000.0000560c3efd7000.rw-.sdmp Binary or memory string: Vrg.qemu.gdb.arm.sys.regs">
Source: lIIKVQc5cj.elf, 5482.1.0000560c3eea9000.0000560c3efd7000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/arm
Source: lIIKVQc5cj.elf, 5482.1.00007ffc2c9a2000.00007ffc2c9c3000.rw-.sdmp Binary or memory string: /usr/bin/qemu-arm
Source: lIIKVQc5cj.elf, 5482.1.0000560c3eea9000.0000560c3efd7000.rw-.sdmp Binary or memory string: V!/etc/qemu-binfmt/arm
Source: lIIKVQc5cj.elf, 5482.1.00007ffc2c9a2000.00007ffc2c9c3000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-arm/tmp/lIIKVQc5cj.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/lIIKVQc5cj.elf
Source: lIIKVQc5cj.elf, 5482.1.0000560c3eea9000.0000560c3efd7000.rw-.sdmp Binary or memory string: rg.qemu.gdb.arm.sys.regs">
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs