Linux Analysis Report
b2J6hgvd51.elf

Overview

General Information

Sample name: b2J6hgvd51.elf
renamed because original name is a hash value
Original sample name: 457222713d4a8277493c0747bdce9451.elf
Analysis ID: 1467806
MD5: 457222713d4a8277493c0747bdce9451
SHA1: b0ae943216cc9ab58e822d07e371c7fef387d828
SHA256: 4d66e4c34a1704c72480c6b76588e98fafc4c768069206a7fd1ad0eeb0b5af7e
Tags: 32elfmipsmirai
Infos:

Detection

Score: 48
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Creates hidden files and/or directories
Creates hidden files without content (potentially used as a mutex)
Executes the "rm" command used to delete files or directories
HTTP GET or POST without a user agent
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: b2J6hgvd51.elf ReversingLabs: Detection: 34%
Source: global traffic HTTP traffic detected: GET /shindemips HTTP/1.0Data Raw: 00 00 00 00 46 4f Data Ascii: FO
Source: unknown TCP traffic detected without corresponding DNS query: 45.128.232.191
Source: unknown TCP traffic detected without corresponding DNS query: 45.128.232.191
Source: unknown TCP traffic detected without corresponding DNS query: 45.128.232.191
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 45.128.232.191
Source: unknown TCP traffic detected without corresponding DNS query: 45.128.232.191
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: global traffic HTTP traffic detected: GET /shindemips HTTP/1.0Data Raw: 00 00 00 00 46 4f Data Ascii: FO
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal48.linELF@0/0@0/0
Source: /tmp/b2J6hgvd51.elf (PID: 6215) File: /tmp/.06 Jump to behavior
Source: /tmp/b2J6hgvd51.elf (PID: 6215) Empty hidden file: /tmp/.06 Jump to behavior
Source: /usr/bin/dash (PID: 6196) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Co6xdv7aMj /tmp/tmp.TVZNp3OeR1 /tmp/tmp.T14iEYSQI3 Jump to behavior
Source: /usr/bin/dash (PID: 6197) Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.Co6xdv7aMj /tmp/tmp.TVZNp3OeR1 /tmp/tmp.T14iEYSQI3 Jump to behavior
Source: /tmp/b2J6hgvd51.elf (PID: 6215) Queries kernel information via 'uname': Jump to behavior
Source: b2J6hgvd51.elf, 6215.1.000055be50e14000.000055be50e9b000.rw-.sdmp Binary or memory string: U!/etc/qemu-binfmt/mips
Source: b2J6hgvd51.elf, 6215.1.00007fffae3ed000.00007fffae40e000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-mips/tmp/b2J6hgvd51.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/b2J6hgvd51.elf
Source: b2J6hgvd51.elf, 6215.1.000055be50e14000.000055be50e9b000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/mips
Source: b2J6hgvd51.elf, 6215.1.00007fffae3ed000.00007fffae40e000.rw-.sdmp Binary or memory string: /usr/bin/qemu-mips
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs