Edit tour
Linux
Analysis Report
kpLwzBouH4.elf
Overview
General Information
Sample name: | kpLwzBouH4.elfrenamed because original name is a hash value |
Original sample name: | 91449c2830e32f60d5b4a1c4aaece84d.elf |
Analysis ID: | 1477665 |
MD5: | 91449c2830e32f60d5b4a1c4aaece84d |
SHA1: | 3b6c75c183ce8c369b6a578b3ab60c1474dce6cc |
SHA256: | 82cac44937ab2d7c20d46e53b87a73594824457443a1946083df6cca33e324cf |
Tags: | 32armelfmirai |
Infos: |
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Multi AV Scanner detection for submitted file
Sample deletes itself
Sample is packed with UPX
Detected TCP or UDP traffic on non-standard ports
ELF contains segments with high entropy indicating compressed/encrypted content
Enumerates processes within the "proc" file system
Sample contains only a LOAD segment without any section mappings
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)
Classification
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1477665 |
Start date and time: | 2024-07-21 20:31:41 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 9m 13s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | kpLwzBouH4.elfrenamed because original name is a hash value |
Original Sample Name: | 91449c2830e32f60d5b4a1c4aaece84d.elf |
Detection: | MAL |
Classification: | mal56.evad.linELF@0/0@0/0 |
Command: | /tmp/kpLwzBouH4.elf |
PID: | 6305 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | im in deep sorrow. |
Standard Error: |
- system is lnxubuntu20
- kpLwzBouH4.elf New Fork (PID: 6307, Parent: 6305)
- kpLwzBouH4.elf New Fork (PID: 6309, Parent: 6307)
- kpLwzBouH4.elf New Fork (PID: 6311, Parent: 6307)
- cleanup
⊘No yara matches
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | TCP traffic: |
Source: | Socket: | Jump to behavior |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |