Linux Analysis Report
oovw68w2UV.elf

Overview

General Information

Sample name: oovw68w2UV.elf
renamed because original name is a hash value
Original sample name: 1c1b2d7f790750d60a14bd661dae5c5565f00c6ca7d03d062adcecda807e1779.elf
Analysis ID: 1543067
MD5: 24544104aaa9931b8cc0c68622864488
SHA1: c69ffb5061ec42c876531f153c5b94302d6d9daf
SHA256: 1c1b2d7f790750d60a14bd661dae5c5565f00c6ca7d03d062adcecda807e1779
Tags: BlackBastaelfuser-JAMESWT_MHT
Infos:

Detection

BlackBasta
Score: 68
Range: 0 - 100
Whitelisted: false

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected BlackBasta ransomware
Found Tor onion address
Contains symbols related to standard C library sleeps (sometimes used to evade sandboxing)
Reads CPU information from /sys indicative of miner or evasive malware
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

AV Detection

barindex
Source: oovw68w2UV.elf Avira: detected
Source: oovw68w2UV.elf ReversingLabs: Detection: 55%
Source: oovw68w2UV.elf Virustotal: Detection: 53% Perma Link
Source: /tmp/oovw68w2UV.elf (PID: 6236) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior

Networking

barindex
Source: oovw68w2UV.elf, 6236.1.000000000072c000.0000000000760000.rw-.sdmp String found in binary or memory: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/
Source: oovw68w2UV.elf String found in binary or memory: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.42
Source: oovw68w2UV.elf String found in binary or memory: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/
Source: oovw68w2UV.elf String found in binary or memory: https://www.torproject.org/
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: Yara match File source: oovw68w2UV.elf, type: SAMPLE
Source: classification engine Classification label: mal68.rans.evad.linELF@0/0@0/0
Source: oovw68w2UV.elf ELF static info symbol of initial sample: /usr/lib/../lib64/crti.o
Source: submitted sample Stderr: No such file or directory: exit code = 0
Source: ELF symbol in initial sample Symbol name: nanosleep
Source: ELF symbol in initial sample Symbol name: sleep
Source: /tmp/oovw68w2UV.elf (PID: 6236) Reads CPU info from /sys: /sys/devices/system/cpu/online Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs