Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
mips.elf

Overview

General Information

Sample name:mips.elf
Analysis ID:1543413
MD5:4222146a411330a26431fb40204b723a
SHA1:d67d280720db895d3eb19bde69d3940299203407
SHA256:ab946b31d14b3be2b518a49328cb51f2bd9a3e8e7a51a8442e6d0ebdab73cc33
Tags:elfuser-abuse_ch

Detection

Score:48
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Sample has stripped symbol table
Uses the "uname" system call to query kernel version information (possible evasion)

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1543413
Start date and time:2024-10-27 20:23:42 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 30s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:mips.elf
Detection:MAL
Classification:mal48.linELF@0/0@0/0
  • VT rate limit hit for: mips.elf
Command:/tmp/mips.elf
PID:5493
Exit Code:2
Exit Code Info:
Killed:False
Standard Output:

Standard Error:fatal error: sigaction failed

runtime stack:
runtime.throw({0x5c705a, 0x10})
runtime/panic.go:1023 +0x54 fp=0x7ffffce4 sp=0x7ffffcd0 pc=0x5d5c8
runtime.sysSigaction.func1()
runtime/os_linux.go:535 +0x4c fp=0x7ffffcf0 sp=0x7ffffce4 pc=0x9b920
runtime.sysSigaction(0x41, 0x7ffffd18, 0x0)
runtime/os_linux.go:534 +0x7c fp=0x7ffffd08 sp=0x7ffffcf0 pc=0x5a1a0
runtime.sigaction(...)
runtime/sigaction.go:15
runtime.setsig(0x41, 0x7e7c4)
runtime/os_linux.go:482 +0xbc fp=0x7ffffd34 sp=0x7ffffd08 pc=0x5a06c
runtime.initsig(0x0)
runtime/signal_unix.go:148 +0x2c0 fp=0x7ffffd70 sp=0x7ffffd34 pc=0x7de10
runtime.mstartm0()
runtime/proc.go:1753 +0x70 fp=0x7ffffd78 sp=0x7ffffd70 pc=0x65b20
runtime.mstart1()
runtime/proc.go:1725 +0x94 fp=0x7ffffd88 sp=0x7ffffd78 pc=0x65a18
runtime.mstart0()
runtime/proc.go:1686 +0x7c fp=0x7ffffd9c sp=0x7ffffd88 pc=0x65964
runtime.mstart()
runtime/asm_mipsx.s:89 +0x14 fp=0x7ffffda0 sp=0x7ffffd9c pc=0xa312c

goroutine 1 gp=0xc00128 m=nil [runnable]:
runtime.main()
runtime/proc.go:146 fp=0xc3e7ec sp=0xc3e7ec pc=0x61284
runtime.goexit({})
runtime/asm_mipsx.s:641 +0x4 fp=0xc3e7ec sp=0xc3e7ec pc=0xa5560
  • system is lnxubuntu20
  • mips.elf (PID: 5493, Parent: 5417, MD5: 0d6f61f82cf2f781c6eb0661071d42d9) Arguments: /tmp/mips.elf
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: mips.elfReversingLabs: Detection: 13%
Source: ELF static info symbol of initial sample.symtab present: no
Source: classification engineClassification label: mal48.linELF@0/0@0/0
Source: ELF file sectionSubmission: mips.elf
Source: /tmp/mips.elf (PID: 5493)Queries kernel information via 'uname': Jump to behavior
Source: mips.elf, 5493.1.0000558f2fc19000.0000558f2fedb000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
Source: mips.elf, 5493.1.0000558f2fc19000.0000558f2fedb000.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
Source: mips.elf, 5493.1.00007ffd3d9c4000.00007ffd3d9e5000.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/mips.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/mips.elf
Source: mips.elf, 5493.1.00007ffd3d9c4000.00007ffd3d9e5000.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
SourceDetectionScannerLabelLink
mips.elf13%ReversingLabsLinux.Trojan.RevhellMarte
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
No context
No context
No context
No context
No context
No created / dropped files found
File type:ELF 32-bit LSB executable, MIPS, MIPS32 version 1 (SYSV), statically linked, Go BuildID=dQwzuhzQV1eN6XuZhLnh/1yT4Fk98-kXULAj_-D-B/TMqtx2lLlL8QIP5WOPvk/azxN3RKIwG9XmJJtveyR, stripped
Entropy (8bit):5.538179431809445
TrID:
  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
File name:mips.elf
File size:9'568'439 bytes
MD5:4222146a411330a26431fb40204b723a
SHA1:d67d280720db895d3eb19bde69d3940299203407
SHA256:ab946b31d14b3be2b518a49328cb51f2bd9a3e8e7a51a8442e6d0ebdab73cc33
SHA512:98f60bb528b8c486d1f55a53ff4393b91c844ad78e19a5207cdbd06a8f5448d7da3de74a084c5b14328a16b803134652faffd758e729af39988d1343dfdaaf2a
SSDEEP:49152:ngM600w96vZpChK1iUYiLdrpqMkWdwc4yHaA4drgl3GN+lnEk:n6oK1iUBOUUI
TLSH:70A60804BC842BEAC46C5B7584EACA5626745D145EF14A2A37A0FFACBC762347F47C8C
File Content Preview:.ELF.....................]..4..........P4. ...(.........4...4...4...................................d...d.............................M...M...............N...O...O.@:?.@:?..............................V..........Q.td...............................p.......

ELF header

Class:ELF32
Data:2's complement, little endian
Version:1 (current)
Machine:MIPS R3000
Version Number:0x1
Type:EXEC (Executable file)
OS/ABI:UNIX - System V
ABI Version:0
Entry Point Address:0xa5dd4
Flags:0x50001004
ELF Header Size:52
Program Header Offset:52
Program Header Size:32
Number of Program Headers:7
Section Header Offset:276
Section Header Size:40
Number of Section Headers:16
Header String Table Index:14
NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
NULL0x00x00x00x00x0000
.textPROGBITS0x110000x10000x4d87bc0x00x6AX004
.rodataPROGBITS0x4f00000x4e00000x19640c0x00x2A0032
.gnu.attributesGNU_ATTRIBUTES0x00x6764100x100x00x0001
.typelinkPROGBITS0x6864200x6764200x31040x00x2A0032
.itablinkPROGBITS0x6895400x6795400xf700x00x2A0032
.gosymtabPROGBITS0x68a4b00x67a4b00x00x00x2A001
.gopclntabPROGBITS0x68a4c00x67a4c00x2595800x00x2A0032
.go.buildinfoPROGBITS0x8f00000x8e00000x5900x00x3WA0016
.noptrdataPROGBITS0x8f05a00x8e05a00x2fca20x00x3WA0032
.dataPROGBITS0x9202600x9102600xab500x00x3WA0032
.bssNOBITS0x92adc00x91adc00x2bc480x00x3WA0032
.noptrbssNOBITS0x956a200x946a200xeccc0x00x3WA0032
.note.go.buildidNOTE0x10f9c0xf9c0x640x00x2A004
.shstrtabSTRTAB0x00x9200000xb70x00x0001
.MIPS.abiflagsMIPS_ABIFLAGS0x10f840xf840x180x00x2A008
TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
PHDR0x340x100340x100340xe00xe02.49820x4R 0x10000
NOTE0xf9c0x10f9c0x10f9c0x640x645.42080x4R 0x4.note.go.buildid
LOAD0x00x100000x100000x4d97bc0x4d97bc5.08230x5R E0x10000.text .note.go.buildid .MIPS.abiflags
LOAD0x4e00000x4f00000x4f00000x3f3a400x3f3a405.62860x4R 0x10000.rodata .typelink .itablink .gosymtab .gopclntab
LOAD0x8e00000x8f00000x8f00000x3adc00x756ec5.60940x6RW 0x10000.go.buildinfo .noptrdata .data .bss .noptrbss
GNU_STACK0x00x00x00x00x00.00000x6RW 0x4
ABIFLAGS0xf840x10f840x10f840x180x180.88870x4R 0x8.MIPS.abiflags
No network behavior found

System Behavior

Start time (UTC):19:24:23
Start date (UTC):27/10/2024
Path:/tmp/mips.elf
Arguments:/tmp/mips.elf
File size:5773336 bytes
MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9