Edit tour
Linux
Analysis Report
la.bot.arm7.elf
Overview
General Information
Sample name: | la.bot.arm7.elf |
Analysis ID: | 1543060 |
MD5: | 061b963e1978b991da96aae6164a2f2d |
SHA1: | 8839eb4dfe9022177891f9c8f11111a6c2223f0a |
SHA256: | 167e58e111e5efb882cf0cbdff2dede657d637b419a78d31e22798bafd7feae3 |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Sends malformed DNS queries
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1543060 |
Start date and time: | 2024-10-27 07:32:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 49s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | la.bot.arm7.elf |
Detection: | MAL |
Classification: | mal56.troj.linELF@0/0@11/0 |
- VT rate limit hit for: 75cents.libre. [malformed]
- VT rate limit hit for: ru.coziest.lol. [malformed]
Command: | /tmp/la.bot.arm7.elf |
PID: | 5515 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | thIs wEek on xLaB lEarNs nOthinG xd |
Standard Error: | qemu: uncaught target signal 11 (Segmentation fault) - core dumped qemu: uncaught target signal 11 (Segmentation fault) - core dumped |
- system is lnxubuntu20
- la.bot.arm7.elf New Fork (PID: 5517, Parent: 5515)
- la.bot.arm7.elf New Fork (PID: 5519, Parent: 5515)
- la.bot.arm7.elf New Fork (PID: 5541, Parent: 5515)
- la.bot.arm7.elf New Fork (PID: 5553, Parent: 5541)
- la.bot.arm7.elf New Fork (PID: 5710, Parent: 5541)
- la.bot.arm7.elf New Fork (PID: 5712, Parent: 5710)
- la.bot.arm7.elf New Fork (PID: 5740, Parent: 5541)
- la.bot.arm7.elf New Fork (PID: 5742, Parent: 5740)
- cleanup
⊘No yara matches
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | String: | ||
Source: | String: | ||
Source: | String: |