Edit tour
Linux
Analysis Report
linux_arm64.elf
Overview
General Information
Sample name: | linux_arm64.elf |
Analysis ID: | 1543427 |
MD5: | 8014c239074b291949ad02412c68dcaa |
SHA1: | 0f3ba8516e4e05659e02c3c79337598186eca9d4 |
SHA256: | 6563fa59ed29306a47ea2b0aa67bedc77e1d25c8a911569a042a269775747c77 |
Tags: | elfuser-abuse_ch |
Infos: |
Detection
Chaos
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Multi AV Scanner detection for submitted file
Yara detected Chaos
Drops files in suspicious directories
Sample tries to set files in /etc globally writable
Uses known network protocols on non-standard ports
Writes identical ELF files to multiple locations
Creates hidden files and/or directories
Creates hidden files without content (potentially used as a mutex)
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "kill" or "pkill" command typically used to terminate processes
Executes the "sleep" command used to delay execution and potentially evade sandboxes
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads CPU information from /sys indicative of miner or evasive malware
Reads the 'hosts' file potentially containing internal network hosts
Sample has stripped symbol table
Sample tries to kill a process (SIGKILL)
Sample tries to set the executable flag
Sleeps for long times indicative of sandbox evasion
Suricata IDS alerts with low severity for network traffic
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Writes ELF files to disk
Writes shell script file to disk with an unusual file extension
Classification
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1543427 |
Start date and time: | 2024-10-27 20:58:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 27s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample name: | linux_arm64.elf |
Detection: | MAL |
Classification: | mal72.troj.evad.linELF@0/56@2/0 |
- Report size exceeded maximum capacity and may have missing behavior information.
- VT rate limit hit for: linux_arm64.elf
Command: | /tmp/linux_arm64.elf |
PID: | 6221 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: |
- system is lnxubuntu20
- linux_arm64.elf New Fork (PID: 6226, Parent: 6221)
- linux_arm64.elf New Fork (PID: 6232, Parent: 6221)
- service New Fork (PID: 6237, Parent: 6232)
- service New Fork (PID: 6240, Parent: 6232)
- service New Fork (PID: 6242, Parent: 6232)
- linux_arm64.elf New Fork (PID: 6235, Parent: 6221)
- linux_arm64.elf New Fork (PID: 6255, Parent: 6235)
- update-rc.d New Fork (PID: 6268, Parent: 6255)
- linux_arm64.elf New Fork (PID: 6320, Parent: 6235)
- systemd New Fork (PID: 6271, Parent: 6270)
- systemd New Fork (PID: 6338, Parent: 6337)
- systemd New Fork (PID: 6345, Parent: 6344)
- systemd New Fork (PID: 6348, Parent: 1)
- System.img.config New Fork (PID: 6355, Parent: 6348)
- System.img.config New Fork (PID: 6544, Parent: 6348)
- sh New Fork (PID: 6550, Parent: 6544)
- 32678 New Fork (PID: 6564, Parent: 6550)
- 32678 New Fork (PID: 6607, Parent: 6550)
- id.services.conf New Fork (PID: 6613, Parent: 6607)
- id.services.conf New Fork (PID: 6615, Parent: 6607)
- id.services.conf New Fork (PID: 6621, Parent: 6607)
- service New Fork (PID: 6637, Parent: 6621)
- service New Fork (PID: 6639, Parent: 6621)
- service New Fork (PID: 6640, Parent: 6621)
- id.services.conf New Fork (PID: 6629, Parent: 6607)
- System.img.config New Fork (PID: 6548, Parent: 6348)
- service New Fork (PID: 6560, Parent: 6548)
- service New Fork (PID: 6565, Parent: 6548)
- service New Fork (PID: 6566, Parent: 6548)
- System.img.config New Fork (PID: 6555, Parent: 6348)
- sshd New Fork (PID: 6350, Parent: 936)
- sshd New Fork (PID: 6363, Parent: 936)
- sshd New Fork (PID: 6384, Parent: 6363)
- sshd New Fork (PID: 6498, Parent: 936)
- sshd New Fork (PID: 6512, Parent: 6498)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Chaos | Multi-functional malware written in Go, targeting both Linux and Windows, evolved from elf.kaiji. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ChaosGo | Yara detected Chaos | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ChaosGo | Yara detected Chaos | Joe Security | ||
JoeSecurity_ChaosGo | Yara detected Chaos | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-27T20:58:53.091952+0100 | 2850023 | 1 | A Network Trojan was detected | 154.12.82.11 | 7878 | 192.168.2.23 | 52100 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior | ||
Source: | Reads CPU info from /sys: | Jump to behavior |
Networking |
---|
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | Reads hosts file: | Jump to behavior |
Source: | Suricata IDS: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |