Edit tour
Linux
Analysis Report
la.bot.sh4.elf
Overview
General Information
Sample name: | la.bot.sh4.elf |
Analysis ID: | 1543058 |
MD5: | b8a467a9a040b74efc2f3e224030e8db |
SHA1: | 47b5f25953c296e5ec9662bf8c409ba2c5e7d63b |
SHA256: | dcbcd8d69b04ed426a4d2d8c1ce667bb1db4a9ac5dd80284e3ef00abf78316ec |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Multi AV Scanner detection for submitted file
Deletes system log files
Sample tries to access files in /etc/config/ (typical for OpenWRT routers)
Creates hidden files and/or directories
Enumerates processes within the "proc" file system
Executes the "rm" command used to delete files or directories
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1543058 |
Start date and time: | 2024-10-27 07:32:08 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 20s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | la.bot.sh4.elf |
Detection: | MAL |
Classification: | mal56.evad.linELF@0/0@0/0 |
- Skipping network analysis since amount of network traffic is too extensive
- VT rate limit hit for: la.bot.sh4.elf
Command: | /tmp/la.bot.sh4.elf |
PID: | 6282 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | thIs wEek on xLaB lEarNs nOthinG xd |
Standard Error: |
- system is lnxubuntu20
- dash New Fork (PID: 6244, Parent: 4332)
- dash New Fork (PID: 6245, Parent: 4332)
- dash New Fork (PID: 6246, Parent: 4332)
- dash New Fork (PID: 6247, Parent: 4332)
- dash New Fork (PID: 6248, Parent: 4332)
- dash New Fork (PID: 6249, Parent: 4332)
- dash New Fork (PID: 6250, Parent: 4332)
- dash New Fork (PID: 6251, Parent: 4332)
- dash New Fork (PID: 6252, Parent: 4332)
- dash New Fork (PID: 6253, Parent: 4332)
- la.bot.sh4.elf New Fork (PID: 6284, Parent: 6282)
- la.bot.sh4.elf New Fork (PID: 6285, Parent: 6282)
- la.bot.sh4.elf New Fork (PID: 6306, Parent: 6282)
- la.bot.sh4.elf New Fork (PID: 6322, Parent: 6306)
- la.bot.sh4.elf New Fork (PID: 6362, Parent: 6306)
- la.bot.sh4.elf New Fork (PID: 6364, Parent: 6362)
- la.bot.sh4.elf New Fork (PID: 6410, Parent: 6306)
- la.bot.sh4.elf New Fork (PID: 6412, Parent: 6410)
- la.bot.sh4.elf New Fork (PID: 6439, Parent: 6306)
- la.bot.sh4.elf New Fork (PID: 6441, Parent: 6439)
- la.bot.sh4.elf New Fork (PID: 6466, Parent: 6306)
- la.bot.sh4.elf New Fork (PID: 6468, Parent: 6466)
- la.bot.sh4.elf New Fork (PID: 6498, Parent: 6306)
- la.bot.sh4.elf New Fork (PID: 6500, Parent: 6498)
- cleanup
⊘No yara matches
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | String: | ||
Source: | String: | ||
Source: | String: |